Which of the following commands would be used?
On a computer running Windows XP, a user wants to format the secondary hard drive on the computer to FAT32. Which of the following commands would be used?
Which of the following utilities optimizes hard drive performance by scanning system file structure for errors
Which of the following utilities optimizes hard drive performance by scanning system file structure for errors?
A technician should advise the customer that:
A customer requests assistance with a product that is outside the scope of the company’s support. A technician should advise the customer that:
Which of the following may be causing the problem?
A technician is installing an additional hard drive in a computer but it is not recognized in the BIOS. Which of the following may be causing the problem?
Which of the following protocols is used for secure web browsing (e.g. HTTPS)?
Which of the following protocols is used for secure web browsing (e.g. HTTPS)?
Which of the following actions could be taken to prevent this error message in the future?
A user is working with an application on a computer running Windows XP Home when a ‘Low Virtual Memory’ error message appears. Which of the following actions could be taken to prevent this error message in the future?
Which of the following would be the MOST likely cause of the problem?
A user reports not being able to log into a domain at work on a computer running Windows XP Home. Which of the following would be the MOST likely cause of the problem?
Which of the following actions should be taken?
A technician is adding a Windows 2000 laptop computer to a Windows 2003 domain. After configuring network settings, enabling DHCP, File Sharing and entering the correct domain name, the error message, domain not available is shown when Enter is pressed.
Which of the following actions should be taken?
Which of the following is the BEST way to prevent viruses and Trojan horses from attacking operating system fi
Which of the following is the BEST way to prevent viruses and Trojan horses from attacking operating system files?
The user needs to:
A user reports that all print jobs are printing to the wrong printer. The user needs to: