which of the following tests the CPU, memory, chipset, video adapter, disk controllers, disk drives, and keybo
When a PC is turned on, which of the following tests the CPU, memory, chipset, video adapter,
disk controllers, disk drives, and keyboard?
Which of the following actions should be taken to add an additional IDE hard drive?
Which of the following actions should be taken to add an additional IDE hard drive?
What do you suggest the technician should do?
While working at a customer’s home, the customer informs the Certkiller .com technician that the
customer has to go out for a few minutes. The customer assures the technician that if he needs
anything his ten year old child would be able to assist. What do you suggest the technician should
do?
Which of the following could be used in a token ring network?
Which of the following could be used in a token ring network?
which of the following problems?
Keyboard errors are MOST often caused by which of the following problems? (Select TWO).
Which of the following is made up of 8 bits?
Which of the following is made up of 8 bits?
Which of the following actions should the technician take?
Upon arriving at a customers location, a technician is informed by a manager that the manager
has never been happy with the companys service. The technician attempts to question the
manager but the manager is yelling. Which of the following actions should the technician take?
which authentication approach to ensure communication and the users?? identity?
Public and private keys are applied by which authentication approach to ensure communication
and the users?? identity?
Which of the following would recover from that error without data loss?
The user boots their computer in the morning to discover the message OS not found . Which of
the following would recover from that error without data loss?
Which of the following should the technician configure for the user?
A technician is configuring a wireless network for a user concerned about security. The user has a
laptop running Windows XP and has purchased a new WAP. The user wants the most secure
method of wireless authentication. Which of the following should the technician configure for the
user?