You are on page 1of 10

The BEST information to document when changing the refresh rate on the display is to include: the previous refresh

rate and the new refresh rate applied. A technician converts several existing Windows XP Professional laptops from English to the German language: Control Panel> Regional and Language Options> Regional Options The following components are included in a typical laser printer maintenance kit Paper pickup rollers, Fuser & Transfer rollers Printing protocols that can be used for printing over a network: LPR & RAW.

Most CRT monitors contain several pounds of lead. Lead is dangerous to humans and to the environment, and must be dealt with carefully. Other harmful elements found in CRTs include arsenic, beryllium, cadmium, chromium, mercury, nickel, and zinc. A technician wants to install a RAID array that has two hard drives and the best performance. RAID 0 levels should be implemented. RAID 0 -block-level striping without parity or mirroring and no fault tolerance RAID 1 -mirroring without parity or striping, data is written identically to multiple drives, thereby producing a "mirrored set" RAID 2 -bit-level striping with dedicated Hamming-code parity, all disk spindle rotation is synchronized, and data is striped such that each sequential bit is on a different drive. Hamming-code parity is calculated across corresponding bits and stored on at least one parity drive.\ RAID 3 -byte-level striping with dedicated parity RAID 4 -block-level striping with dedicated parity is identical to RAID 5, but confines all parity data to a single drive
SATA and SCSI adapter cards should be installed so a PC can use RAID DVI and VGA display connections are the MOST commonly used to connect an LCD monitor to a desktop.

The TV tuner card is a class of internal and external devices that allows you to connect a broadcast signal, such as home cable television, to your computer and display it. Most TV tuner cards act as video capture cards as well. A video capture card can also be a stand-alone device and is often used to save a video stream to the computer for later manipulation or sharing. Component Video is an analog technology based on Luma(Y) full and two chroma (B-Y) and (R-Y)YPbPr compressed signals for anolog version and YcbCr for high end digital version resulting in low bandwiwdth needed. S-Video is also component video has one Luma and two chromas combined. But signal recreation is not as good as component video. A KVM switch (with KVM being an abbreviation for keyboard, video, or visual display unit, mouse) is a hardware device that allows a user to control multiple computers from a single keyboard, video monitor and mouse. Some KVM switches can also function in reverse - that is, a single PC can be connected to multiple monitors, keyboards, and mice.
When performing a Windows installation on a computer that has its hard drives connected to a new SATA card. Press F6 when prompted to load the additional drivers. 300Mbps is the maximum transfer speed that can be achieved on SATA interface?

NIC is the physical interface between the computer and the cabling.

Bluetooth 2.0 has a maximum range of 30 feet (9 meters)

USB version 1.1 supported data rates as high as 12Mbps (1.5MBps). USB 2.0 supports data rates as high as 480Mbps (60MBps), 40 times that of its predecessor. 5 meters(16 feet) is the maximum recommended cable length for connecting USB devices.
IEEE 1394b(800 Mbps in Full Duplex) standard supports 9 pin male to male connector cable upto 100m long. IEEE 1394(400 Mbps in half duplex) extends upto 4.5 meters with 63 devices connected together. A user calls and says they cannot get to the Internet. How would a technician walk the user through checking the IP address and default Gateway on the computer? Start>Run>type cmd>click OK>type ipconfig /all>press enter key and ask user to read the results

Satellite usually has the HIGHEST latency. NICs (specifically Fast Ethernet NICs) can operate twice as fast (200Mbps) in fullduplex mode as they do normally in half-duplex mode (100Mbps).
Which of the following network ports is normally associated with unencrypted web traffic? 53-DNS: resolves host names to IP addresses 80-HTTP: Web traffic 110- POP3, Post Office Protocol3 for receiving email 443-HTTPS-Secure Web Traffic

3389 is the default port used for (Remote Desktop Protocol). Point-to-Point Protocol over Ethernet (PPPoE) is a network protocol mainly used with DSL networks. By using PPPoE, users can virtually "dial" from one machine to another over an Ethernet network, establish a point to point connection between them and then securely transport data packets over the connection. It is mainly used by telephone companies Specifically, the address 127.0.0.1 is called the loopback address, which is used for troubleshooting network adapters. Automatic Private IP Addressing (APIPA) has reserved the address block 169.254.1.0 through 169.254.254.255[note 1] for link-local addressing in Internet Protocol Version 4. They are assigned to interfaces by host-internal, i.e. stateless, address autoconfiguration when other means of address assignment are not available. The Internet Engineering Task Force has directed the Internet Assigned Numbers Authority (IANA) to reserve the following IPv4 address ranges for private networks, as published in RFC 1918[1]: number of host id IP address range classful description addresses size 10.0.0.0 10.255.255.255 16,777,216 single class A 24 bits 172.16.0.0 172.31.255.255 1,048,576 16 contiguous class Bs 20 bits 192.168.0.0 65,536 256 contiguous class Cs 16 bits 192.168.255.255 Ping is a computer network administration utility used to test the reachability of a

host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer. Just type PING IPaddress or PING hostname and see if it works. If you can't make a connection to the remote host, you'll get back the following:
Request timed out.

The technical specification IEEE 802.15.1 describes a wireless personal area network (WPAN) based on Bluetooth version 1.1. Encryption key characters for various WEP 64-bit WEP: 10 digit key, 128-bit WEP: 26 digit key, 256-bit WEP: 58 digit key Number of characters involved in WPA encryption key False security-8 characters Bare minimum security- 20characters Maximum security 63 characters WPA2 is more secure than WPA because it uses the much stronger AES (Advanced Encryption Standard) protocol for encrypting packets. The encryption key may be from 8 to 63 printable ASCII characters or 64 hexadecimal digits. The maximum length results in 256 bit strength, which is what 64 (hex digits) multiplied by 4 bits/digit yields. The term bot is short for robot. Criminals distribute malicious software (also known as malware) that can turn your computer into a bot (also known as a zombie). When this occurs, your computer can perform automated tasks over the Internet, without you knowing it. Criminals use botnets to send out spam email messages, spread viruses, attack computers and servers, and commit other kinds of crime and fraud.
After a user ran a registry cleaning program, the computer running Windows XP will not boot. A technician recommend first : Boot using Last Known Good Configuration. Using regedit, Export the registry file to backup before changes are made. The following should be configured on a shared Windows XP Professional system to ensure that each user's data is secure 1.Add multiple users in the Control Panel User Account applet. 2. Use NTFS security to secure the data files. Operating system CD is needed to perform an ASR(Automatic System recovery)restore in Windows XP.{Chap7 pg 38}

If your computer was produced after the release of Windows XP and you need to install a third-party SCSI, IDE, or RAID driver in order to recognize the disk drives, press F6 as soon as the screen turns from black to blue (Setup will prompt you at the bottom of the screen). {Chap7, pg 16} With Windows XP, you can upgrade to the Home version only from Windows 98 or Windows Me. You can upgrade to the Professional version from Windows 98, Windows Me, Windows NT Workstation 4.0, Windows 2000 Professional, or even from Windows XP Home. With Windows 2000, upgrades can only be done from the following programs:

Windows 95 Windows 98 Windows NT Workstation 3.51 Windows NT Workstation 4.0

Windows 2000/XP Professional offers three main methods for performing unattended installations: Remote Installation Service (RIS), System Preparation Tool(cloning), and Setup Manager(by preparing answer CD) AERO : Authentic, Energetic, Reflective and Open.[1] Intended to be a cleaner, more powerful, more efficient and more aesthetically pleasing user interface than the previously used theme and is available with most editions of Vista and Windows 7 In Vista new feature UAC, or User Account Control, was added to increase security -something it accomplishes by asking if you're sure you want to perform an action that could have negative consequences, or if you want to keep an action that just occurred. UAC can be turned off by choosing Start " Control Panel "
The Windows Experience Index is used to determine: a performance value of system components. Windows defender and Data Execution Prevention utilities can help prevent viruses and other malware. Starting Windows XP in Safe Mode will cause Windows to prevents successful boot and logon from updating Last Known Good Configuration and uses the minimum set of drivers and services to start the GUI.

Recover CD and Factory Recovery Partition -- are not so much installation options as they are reinstallation options that allow you to reinstall the operating system in the event of a system crash. Some manufacturers include a recover/recovery CD with their systems that are licensed to be used only for the purpose of recovering the system, while others include a fresh copy of the OS on a hard drive partition for this same purpose. MSConfig (officially called System Configuration in Windows Vista and Windows 7 or Microsoft System Configuration Utility in previous operating systems) is a system utility to troubleshoot the Microsoft Windows startup process. It can disable or re-enable software, device drivers and Windows services that run at startup, or change boot parameters. This utlity is available in Control Panel in Administrative Tool.
Registry can also be used to stop a program from loading at startup

A standoff is used in mechanics and electronics to separate two parts from one another. Formatting a disk for use by an operating system and its applications involves three different steps. 1. Low-level formatting (i.e., closest to the hardware) marks the surfaces of the disks with markers indicating the start of a recording block (typically today called sector markers) and other information to be used later, in normal

operations, by the disk controller to read or write data. This is intended to be the permanent foundation of the disk, and is often completed at the factory. 2. Partitioning creates data structures needed by the operating system. This level of formatting often includes checking for defective tracks or defective sectors. 3. High-level formatting creates the file system format within the structure of the intermediate-level formatting. This formatting includes the data structures used by the OS to identify the logical drive or partition's contents). This may occur during operating system installation, or when adding a new disk. Disk and distributed file system may specify an optional boot block, and/or various volume and directory information for the operating system. In certain operation systems (e.g., Microsoft Windows), the two processes are combined and the term "format" is understood to mean an operation in which a new disk medium is fully prepared to store files. Hyperthreading features allows a single CPU to be reported to the operating system as two
CPUs

DxDiag ("DirectX Diagnostics") is a diagnostics tool used to test DirectX functionality and troubleshoot video- or sound-related hardware problems. DxDiag is by default located in %SystemRoot%\System32.[1] In Windows Vista and Windows 7, DxDiag only shows information; it is no longer possible to test the hardware and the various DirectX components.
Windows Vista applications that run in the sidebar are know as- Gadgets The Compatibility tab within an application shortcuts Properties can be used to help solve certain functionality issues when working with older DOS or Windows applications inside of Windows Vista

During startup, problems with devices that fail to be recognized properly, services that fail to start, and so on are written to the System log and can be viewed with the Event Viewer. You can access it through Computer Management or directly from the Administrative Tools in Control Panel.
A user reports that after a stop error appeared the PC started to reboot in a continuous loop. The automatically restart feature in System Failure option is on.

Windows Media Center is included in various versions of Windows XP Media Center Edition, Windows Vista Home Premium and Ultimate and all editions of Windows 7 except for Starter and Home Basic. It is an application that allows users to view and record live television, as well as organize and play music and videos. It requires TV tuner card to be installed.
The Encrypting File System (EFS) is a component of the NTFS file system on Windows 2000, Windows XP Professional, and Windows Server 2003. (Windows XP Home doesn't include EFS.

For resoring users data and files connect two computers by LAN or null modem serial cable and use Windows Easy Transfer tool (beneath System Tools on the Accessories menu) in Vista, while in Windows XP use utility known as the Files and Settings Transfer Wizard. USMT(User State Migration Tool) is a replacement for Windows XP's Files and Settings Transfer Wizard (FASTWiz) and Windows Vista's Easy transfer.

You cannot format a volume larger than 32 gigabytes (GB) in size using the FAT32 file system during the Windows XP installation process. Windows XP can mount and support FAT32 volumes larger than 32 GB (subject to the other limits), but you cannot create a FAT32 volume larger than 32 GB by using the Format tool during Setup. If you need to format a volume that is larger than 32 GB, use the NTFS file system to format it. Theoretically FAT32 can have max. volume of 8TB(8*240Bytes). To set PATH System Variables in Windows XP, Go ControlPanelSystemAdvancedEnvironment Variables In regards to computer case form factors, BTX provides the MOST room for effective cooling. Minimum/default resolution for windows XP/Vista/7, 800x600 PERFMON utility is used to perform a baseline on a hard drive. It opens Reliability and Performance Monitor in Control Panel Administrative Tools? Computer Management Utility has Task Scheduler, Event Viewer, Reliability & Performance Manager, device Manager, Disk Management and Services and Applications System Information Utility starts when msinfo32 is entered in run line. System Configuration Utility starts when msconfig in entered in run line. Dxdiag utility is used to display component driver versions.

When referring to a computer, thrashing or disk thrashing is a term used to describe when the hard disk drive is being overworked by moving information between the system memory and virtual memory excessively. Thrashing is often caused when the system does not have enough memory, the system swap file is not properly configured, or too much is running on the computer and it has low system resources. For all Windows Vista Premium Ready PCs, when using Alt+Tab to switch between open windows, a preview of each open window appears instead of just the program icon. In addition, Windows Flip 3D enables users to flip through a cascading stack of their open windows using the mouse scroll wheel. Windows can be stacked and rotated in 3D to provide views of all of them simultaneously. (The keyboard shortcuts are Win+Tab, which makes Flip 3D disappear after releasing, Ctrl+Win+Tab, which keeps Flip 3D visible after releasing, and Shift+Win+Tab to flip through open windows backward).
Windows XP is the FIRST operating system to have Windows Compatibility Mode installed by default. 1. Right click on the link of the program that you want to fix. Click on Properties. Click on the Compatibility tab. Click on Run this program in compatibility mode and select one of these: o Windows 95

2. 3. 4.

o o o

Windows 98 Windows NT 4 Windows 2000

full-size ATX board is 12 9.6 in (305 244 mm). Originally the motherboard was powered by one 20-pin connector. An ATX power supply provides a number of peripheral power connectors, and (in modern systems) two connectors for the motherboard: a 4-pin auxiliary connector providing additional power to the CPU, and a main 24-pin power supply connector, an extension of the original 20-pin version. One way to ensure that dust and grime don't find their ways into your computer is to always leave the blanks in the empty slots on the back of your box. Blanks are the pieces of metal or plastic that come with the case and cover the expansion slot openings. They are designed to keep dirt, dust, and other foreign matter from the inside of the computer. They also maintain proper airflow within the case to ensure that the computer doesn't overheat. Except for NTOSKRNL.EXE, all the key boot files are located in the root of the C: partition on the computer Windows Vista, XP, and 2000 need a number of other files from the system directories system and system32. An important one is the hardware abstraction layer HAL.DLL. Numerous other dynamic link library, or DLL, files are also required, but usually the lack or corruption of one of them produces a noncritical error, whereas the absence of HAL.DLL causes the system to be nonfunctional. Wake on LAN (WOL) is a standard that allows you to turn on a computer from another location over a network connection or Internet System Restore- Windows feature should be disabled to ensure removal of malware and viruses during disinfection process Ink is a liquid or paste that contains pigments and/or dyes used in printers are harmful materials. VPN allows a asecure cnnection between 2 pts. LCD Display uses passive and active matrix technology Recommended max length for parallel ATA cable 18 inch Security features included in Windows XP Professional but not in XP Home edition:
1. Encrypted File System(EFS) 2. Incoming Remote desktop sessions 3. Logging on to a Network domain

Scalable Link Interface (SLI) is a brand name for a multi-GPU solution developed by NVIDIA for linking two or more video cards together to produce a single output. SLI is an application of parallel processing for computer graphics, meant to increase the processing power available for graphics. Therefore SLI Compatible means a computer can host dual PCI Express video cards. Best way to ensure airflow in the board Which action should not be performed during preventive maintenance Determining an underlying reason to prevent similar problem happening in future Fast User switching to enable multiple user w/o logging out 4 primary sources of display problems Causes of overheating of computer no dust, no blocks on fans Verification of a port that a printer is currently using- light, fire & water detection Which factors improve HDD performance & speed faster seek time, increased revolutions/m Which is not a component of basic Electronic access Control system Proximity reader, biometric reader, programmable locks, Door motion detector No. of PCMCIA III cards to be used in single type III slot without an adapter BitLocker Utility One of the newest security features that is available only in the Enterprise and Ultimate versions of Windows Vista is BitLocker. BitLocker is a drive encryption feature that can encrypt an entire volume with 128-bit encryption. By encrypting the entire volume, the data is not accessible to someone who may boot another operating system in an attempt to bypass the computer's security. BitLocker requires two partitions -- one for the operating system volume and another for the system volume. It also requires that the system partition be set to active and have at least 1.5GB. TPM is required for BitLocker. After successfully installing a free anti virus solution, Windows notifies that there is no antivirus software disable antivirus protection notification within Security Center. Active Listening(Focuses on speaker and what he is saying) involves -Listen and attempt to understand what customer is saying\ -Allow the customer to complete his point -Response to the questions and directions appropriately But not agree whith what customer is saying Features Windows XP professional Simple file sharing Yes Remote Desktop Yes Joining Domain Yes Basic Disk Partitioning Yes XP Home Yes Yes No Yes

Only Computer and Monitor should be connected to UPS, No printer or audi/video After Identifying the problem analyse it After major fire is detected in the basement Evacuate the building first

To verify a port a printer is using select properties of the printer from Printers Control Panel Gateways supports protocol translation between dissimilar systems at different Open Systems Interconnection Layers Which of the following FAT32 Volume size Windows XP and 2000 will recognise 1024 GB, 2048 GB, 32 GB or 16 GB ans 2048GB ASR restore in XP will be performed by Operating System CD Which printer component contains harmful substances Ink cartridge, laser printer toner, ribbon cartridge, platen ans toner Which component supports commpunication between CPU and RAM on ATX motherboard Northbridge chipset, Southbridge chipset, Advance technology Attachment(ATA) Interface, Firmware ans ATA Maximum 10 monitors can be connected using multiple monitor feature During preventive maintenance paper towel should not be used to wipe LCD screen Electronic Access Control has Biometric detection, Proximity Reader, Programmable Locks not Door Motion Detector

Fast User Switching


This feature (which is also found on many Linux distributions and Mac OS X) allows users to log out without closing programmes. These programs continue to run in the background, even when a different user logs in. When the original user logs back in they can pick up where they left off.
Features such as Encrypting File System (EFS) and computer domain account support add complexity that is primarily for business use and therefore is not supported in Windows XP Home Edition.

The ASR process allows to restore the system disk (usually the C: drive) including the Windows files, all Registry settings and all user programs and data, allowing to recover a completely crashed system. To use this procedure you must be able to boot the Windows XP Pro Setup-program from the installation CD-ROM.

Professional is a superset of Home, offering additional remote access, security, performance, manageability and multi-lingual features. Home Yes Yes Yes Yes Pro Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Some Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Network Setup Wizard, Windows Messenger, Help & Support Centre Network Setup Wizard, Windows Messenger, Help & Support Centre Laptop support: ClearType & DualView Wireless connections automatic 802.11 configuration. Remote Desktop (a.k.a. single user Terminal Services) Remote Assistance (shared desktop) Internet Information Services (IIS) 5.1 webserver & FTP server Offline Files (access to network share when disconnected from server) Multiprocessor support (Home supports some HT processors) Internet Explorer 6 privacy support (improved in SP2) FAT, FAT32 & NTFS Encrypting File System built into NTFS File access control Can connect to a Windows Server domain Group Policy Network Software Maintenance & Remote Installation Service (RIS) Roaming User Profiles Run any language applications on any language Windows XP. Multi-lingual User Interface (MUI) add-on

You might also like