Professional Documents
Culture Documents
1)
Temperature should be preferentially between 45 to 90 degrees Fahrenheit (7 to 32 degrees Celsius) to avoid overheating.
In dusty conditions, laptop vents should be partially covered to prevent the internal components from getting dirty.
Laptops should be cleaned every month or the internal components will be damaged.
Category 5e
coaxial
fiber optic
UTP
The computer automatically boots into Safe Mode and displays a warning on the screen.
The screen flashes with a red background and displays a warning message.
The computer returns an error message indicating the I/O address of the failing device.
0.0.0.255
0.0.255.255
0.255.255.255
255.0.0.0
255.255.0.0
255.255.255.0
hard disk
flash drive
Application
Transport
Internet
network Access
The motherboard slot requires the number of wires that are represented by the different colors.
touch pad
Mouse
biometric authentication
Bluetooth
Task Manager
Event Viewer
System Restore
Obtain devices which are specially designed for heavily used laptops.
F1
F8
F12
Alt-Z
Windows key
BOOT.INI
STARTUP.INI
SYSTEM.INI
WIN.INI
glass cleaner
isopropyl alcohol
mild detergent
rubbing alcohol
Fans that are used to help cool a system are commonly placed on which two components? (Choose two.) OJO VERIFICAR
PORQUE ME APARECE MAL
sound card
CMOS
video card
RAID card
CPU
Ntldr
Regedit
Msconfig
Task Manager
Press the function key sequence to activate the image on the projector.
Turn audio and video off on the laptop and on for the projector.
IDE
SATA
PATA
USB
20-pin
24-pin
Berg
Molex
P8
P9
NTBOOTDD
HAL
NTSCSILDR
NTWINHAL
Refer to the exhibit. Which type of device uses the connector shown in the graphic?
DVD drive
Keyboard
NIC
RAM
sound card
44.1 MHz
100 MB/s
3 GHz
1 TB
all-in-one
Drum
handheld
flatbed
cache memory
DDR SDRAM
FPM DRAM
SDRAM
SRAM
Individual users are in control of their own computers and network resources.
Personnel costs are lower because a dedicated network administrator is no longer necessary.
Delete the print job from the queue and print again.
antivirus program
Firewall
network analyzer
spyware program
Refer to the exhibit. Which sequence of steps describes the printing process used by a laser printer?
1,2,3,4,5,6
2,5,3,4,1,6
3,4,1,6,2,5
4,2,6,5,3,1
DDoS
phishing
social engineering
spyware
in the BIOS
on the battery
Choose Start > Control Panel > System > Advanced > Performance area. Choose the Settings button.
Choose Start > Control Panel > System > Hardware > Device Manager > View > Resources by type
Choose Start > Control Panel > Administrative Tools > Performance area > VMem
Choose Start > All Programs > Accessories > System Tools > System Restore
ACPI
AMP
APM
UPS
WPM
Passwords should combine a user's special dates and initials so they can be alphanumeric.
PS/2
component
speaker
DVI
parallel
Choose Start > Settings > Control Panel. Double-click System. Click the Hardware tab. Choose Device Manager. Choose Action > Uninstall.
Choose Start > Settings > Control Panel. Double-click Add or Remove Programs. Click Change.
compressed air
antistatic mat
soft cloth
flat-head screwdriver
phishing
social engineering
spoofing
spamming
HALL
NTLDR
NTDETECT
NTOSKRNL
dot-matrix
solid-ink
daisy-wheel
thermal