Free Essay

Comptia a+ Guide to Pc's

In:

Submitted By mikeb215
Words 488
Pages 2
1) Explain how a user, rather than the user's computer, might be the problem.

Users are not all aware of how a system functions. They may think a device on the system is not worlking when it may only be a power issue. Pg. 184

2. How can a technician determine whether a problem is hardware or software related?

By using his/her senses, Sight, hearing, smell. watch, look and listen.Take notes. Pg.185

3. The _BIOS___ chip executes POST. Pg.185

4. True/ False The manufacturer of the RAM chip determines what error codes are shown during POST. False Pg.187

5. To troubleshoot an array of possible system startup problems, press the __F8__ key during the system startup process to bring up the Advanced Boot Options menu. Pg.191

6. If a computer beeps once during POST, what is the problem? A memory error. Pg.185 7. The _____ might have a numeric display mounted that shows an error code. Motherboard. Pg. 187

8. If a computer beeps once and then three times, then four times, then three more times during POST and the computer has a Phoenix BIOS, what is a possible suspect component? RAM Pg. 187

9. A _loopback plug__ is used to test a serial, parallel, or RJ-45 port. Pg. 188

10. An adapter that performs diagnostics and displays a code or LEDs is known as a ___POST card_______. Pg. 187

11. True/False When a technician is behind on time, it is okay to swap more than one part at a time. False
12. Where can you find the lastest information on POST error codes? Manufacturer's website. Motherboard Manual. Pg. 190

13. True/False During the Test the theory phase, you might be required to escalate the problem to a more experienced technician. True. Pg.190

14. True/False After swapping a part in a computer and powering on, you can assume that the problem is solved. False. The problem is solved when the User accepts the system. Pg. 191

15. What is the last and most important step in resolving a computer problem? Document findings, actions and outcomes for future reference. Pg.184

16. If a problem is hardware related, WIndows Device Manager can be useful in getting the problem narrowed down to a subunit. Device Manager. Pg. 190

17. A computer problem is never solved until the user. Accepts the system and verifies functionality. Pg.191
18. You see a user's password taped to the side of the keyboard. What do you do? d. Tell the user to change the password.
19. You spent more time than expected at a customer site. Now you are late for your next service call. What do you do? Contact the customer and inform them of the circumstances. Pg. 193
20. Place the six steps of troubleshooting in the order in which they occur d. b. a. f. e. c. Pg.184

Similar Documents

Premium Essay

Network Administrator

...Re-use: "This task contains portions of material that were originally submitted during [1/6/2013 -2/12/2013] in [IT401-1301A] with [Kay N. Crook]." Re-use: "This task contains portions of material that were originally submitted during [8/19/2012 -9/26/2012] in [ENGL205-1203B-04] with [Carmen Kimble]." IT326-1401A-01: Network Infrastructure Administration D & S Residential Services Network Implementation Plan-2014 Titius Ivie February 3, 2014 Table of Contents Target Organization 5 Corporate Structure 5 Business Goal 5 Part 1: Proposed Network Solution 7 Network Configuration 7 Transmission Media 7 Targeted Users 8 Hardware and Software Requirements 8 Production Applications 10 External and Internal Costs 11 Personnel (External Costs) 11 Hardware and Software (Internal Costs) 12 Short Term and Long Term Benefits to the Organization 13 Part 2: Network Design 14 Physical Topology 14 Part 3: Installation and Configuration 15 Installation and Configuration Steps 15 Part 4: Maintenance and Troubleshooting 19 Maintaining servers on the network 19 Maintaining PCs on the network 19 Implementing security 20 Managing network connections 21 Unauthorized Usage 21 Proper Network Operating System 22 Training users 23 Conclusion 24 Part 5: Remote Access 26 Network Pro Prep Toolkit Screenshots 27 Screenshot of Completed Labs--Phase 1 27 Screenshot of Completed Labs--Phase 2 28 Screenshot of Completed Labs--Phase 3 32 ...

Words: 4303 - Pages: 18

Premium Essay

Itsc 2439 Ch.1-12 Study Guides

...Chapter 1 Study Guide True/False Indicate whether the statement is true or false. ____ ____ ____ 1. End-user computing refers to the use of computers for both business and personal use. 2. The first computers used widely in businesses were available during the 1940s. 3. The goal of transaction processing on early computers was to replace as much manual processing of business information as possible with automated processing. 4. Among the reasons for the growth in decentralized computing was the availability of inexpensive personal computer hardware and productivity software. 5. The applications development backlog was due to the inability of computer professionals to design and write programs fast enough to keep up with the demand for new applications. 6. All knowledge workers are computer professionals. 7. A knowledge worker is another name for a computer user. 8. Use of a computer’s graphical user interface means that users no longer have to remember which command to enter to perform a task. 9. To operate a graphical user interface, a user types keyboard commands to tell a computer which tasks to perform. ____ ____ ____ ____ ____ ____ ____ 10. The Information Technology department is a modern name for the Data Processing department. ____ 11. Distributed computing links large-scale systems and personal computers to meet both organizational and individual worker needs. ____ 12. Computer departments in most organizations today are called data processing departments...

Words: 28017 - Pages: 113

Premium Essay

Paper

...Management of Information Security Third Edition This page intentionally left blank Management of Information Security Third Edition Michael Whitman, Ph.D., CISM, CISSP Herbert Mattord, M.B.A., CISM, CISSP Kennesaw State University ———————————————————————— Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Management of Information Security, Third Edition Michael E. Whitman and Herbert J. Mattord Vice President, Career and Professional Editorial: Dave Garza Executive Editor: Stephen Helba Managing Editor: Marah Bellegarde Product Manager: Natalie Pashoukos Developmental Editor: Lynne Raughley Editorial Assistant: Meghan Orvis Vice President, Career and Professional Marketing: Jennifer McAvey Marketing Director: Deborah S. Yarnell Senior Marketing Manager: Erin Coffin Marketing Coordinator: Shanna Gibbs Production Director: Carolyn Miller Production Manager: Andrew Crouth Senior Content Project Manager: Andrea Majot Senior Art Director: Jack Pendleton Cover illustration: Image copyright 2009. Used under license from Shutterstock.com Production Technology Analyst: Tom Stover © 2010 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information...

Words: 229697 - Pages: 919