Deck 32: The Complete PC Tech
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/37
Play
Full screen (f)
Deck 32: The Complete PC Tech
1
Input,processing,storage,and output are collectively referred to as the ____________________.
computing process
2
____________________ requires specific devices,such as the keyboard and mouse,that enable you to tell the computer to do something,such as open a program or type a word.
Input
3
The operating system (OS)provides a (n)____________________ and tools so that the microprocessor and other chips can process your request.
interface
4
After you have successfully solved the user's problem,have the user sit down and ____________________ the task to ensure full system functionality.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
5
What helps you track the troubleshooting history of a machine over time?
A) Event Viewer
B) Documenting
C) Performance Monitor
D) User-generated problems
A) Event Viewer
B) Documenting
C) Performance Monitor
D) User-generated problems
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
6
If you can't get the computer or peripheral working in a fairly short period of time,what should you do?
A) Clean up.
B) Reload.
C) Escalate the problem.
D) Ask the user to wait while you call your supervisor.
A) Clean up.
B) Reload.
C) Escalate the problem.
D) Ask the user to wait while you call your supervisor.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
7
What is always recommended before making any major changes to a critical system?
A) Test your theory.
B) Add more RAM.
C) Back up.
D) Reboot using Low Resolution mode.
A) Test your theory.
B) Add more RAM.
C) Back up.
D) Reboot using Low Resolution mode.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
8
If a theory is not confirmed,what should you do next?
A) Make changes
B) Implement the solution
C) Establish a new theory or escalate
D) Verify full functionality
A) Make changes
B) Implement the solution
C) Establish a new theory or escalate
D) Verify full functionality
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
9
What kind of report should detail what happened and where it happened?
A) Down time
B) Formalized
C) Incident
D) Performance
A) Down time
B) Formalized
C) Incident
D) Performance
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
10
What is the process of continuous or constant downloading from a game server called?
A) MMORPG
B) Stream loading
C) Steam loading
D) Triggering
A) MMORPG
B) Stream loading
C) Steam loading
D) Triggering
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
11
All of the following are part of the computing process EXCEPT:
A) Input
B) Processing
C) Output
D) Memory
A) Input
B) Processing
C) Output
D) Memory
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
12
What usually contains a Torx wrench,a Phillips-head screwdriver,and a pair of tweezers?
A) Tech toolkit
B) Boot bag
C) FRU box
D) ZIP tote
A) Tech toolkit
B) Boot bag
C) FRU box
D) ZIP tote
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
13
What software tool allows you to reset a lost or forgotten password?
A) Torx
B) 7-Zip
C) FRU
D) Password clearer
A) Torx
B) 7-Zip
C) FRU
D) Password clearer
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
14
If a user or a technician becomes injured on the job,what should be done?
A) Don't tell anyone.
B) Escalate the problem.
C) Establish a theory of probable cause.
D) Create an incident report.
A) Don't tell anyone.
B) Escalate the problem.
C) Establish a theory of probable cause.
D) Create an incident report.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
15
Sally has fixed a multitray printer that was jamming.After cleaning it and installing a maintenance kit,she verifies the original problem is no longer present.What else should she do?
A) Clean up and go.
B) Reinstall the drivers.
C) Tell the customer to be more careful about keeping the printer clean.
D) Test all trays.
A) Clean up and go.
B) Reinstall the drivers.
C) Tell the customer to be more careful about keeping the printer clean.
D) Test all trays.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
16
What is the first step of the troubleshooting theory?
A) Identify the problem.
B) Establish theory of probable cause.
C) Test the theory.
D) Verify full system functionality.
A) Identify the problem.
B) Establish theory of probable cause.
C) Test the theory.
D) Verify full system functionality.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
17
What are spare parts that you take with you to a worksite or workstation called?
A) System units
B) FRUs
C) CMOS settings
D) Backups
A) System units
B) FRUs
C) CMOS settings
D) Backups
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
18
Spare RAM sticks,a video card,a NIC,and a power supply are all examples of __________.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
19
What is an FRU?
A) A field-replaceable unit
B) A free-reigning usability
C) A failed removable unit
D) A fire reduction utility
A) A field-replaceable unit
B) A free-reigning usability
C) A failed removable unit
D) A fire reduction utility
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
20
What are the four primary stages of the computing process?
A) Keyboard,CPU,monitor,mouse
B) Input,loading,processing,storing
C) Input,processing,storage,output
D) Processing,displaying,storing,output
A) Keyboard,CPU,monitor,mouse
B) Input,loading,processing,storing
C) Input,processing,storage,output
D) Processing,displaying,storing,output
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
21
An FRU is also known as a (n)____________________.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
22
After you test a theory to determine cause,you should establish a (n)____________________ to resolve the problem and implement a solution.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
23
While attempting to identify the problem,you should ____________________ the user and identify user changes to the computer.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
24
The ____________________ is nothing more than a set of steps you use along with the computing process to diagnose and fix a computer.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
25
What software utilities should you include in your traveling toolkit for troubleshooting purposes?
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
26
Explain escalation.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
27
Explain the troubleshooting theory.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
28
What is the best way to verify full system functionality?
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
29
List five FRU examples.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
30
What is a critical preventive measure to consider in almost every case?
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
31
At what stage of the troubleshooting theory process should backups be performed?
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
32
When you press a keyboard key,the _________________ reads the grid of your keyboard,discovers your input,and then sends the information to the CPU.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
33
What are the four primary stages of the computing process?
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
34
After verifying full system functionality,you should document ____________________,___________________,and ____________________.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
35
List three tools found in a typical technician toolkit.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
36
When you encounter a partially functional computer,you should consider making backups.What should you include in the backup?
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
37
What are the six major steps in troubleshooting?
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck