Deck 32: The Complete PC Tech

Full screen (f)
exit full mode
Question
Input,processing,storage,and output are collectively referred to as the ____________________.
Use Space or
up arrow
down arrow
to flip the card.
Question
____________________ requires specific devices,such as the keyboard and mouse,that enable you to tell the computer to do something,such as open a program or type a word.
Question
The operating system (OS)provides a (n)____________________ and tools so that the microprocessor and other chips can process your request.
Question
After you have successfully solved the user's problem,have the user sit down and ____________________ the task to ensure full system functionality.
Question
What helps you track the troubleshooting history of a machine over time?

A) Event Viewer
B) Documenting
C) Performance Monitor
D) User-generated problems
Question
If you can't get the computer or peripheral working in a fairly short period of time,what should you do?

A) Clean up.
B) Reload.
C) Escalate the problem.
D) Ask the user to wait while you call your supervisor.
Question
What is always recommended before making any major changes to a critical system?

A) Test your theory.
B) Add more RAM.
C) Back up.
D) Reboot using Low Resolution mode.
Question
If a theory is not confirmed,what should you do next?

A) Make changes
B) Implement the solution
C) Establish a new theory or escalate
D) Verify full functionality
Question
What kind of report should detail what happened and where it happened?

A) Down time
B) Formalized
C) Incident
D) Performance
Question
What is the process of continuous or constant downloading from a game server called?

A) MMORPG
B) Stream loading
C) Steam loading
D) Triggering
Question
All of the following are part of the computing process EXCEPT:

A) Input
B) Processing
C) Output
D) Memory
Question
What usually contains a Torx wrench,a Phillips-head screwdriver,and a pair of tweezers?

A) Tech toolkit
B) Boot bag
C) FRU box
D) ZIP tote
Question
What software tool allows you to reset a lost or forgotten password?

A) Torx
B) 7-Zip
C) FRU
D) Password clearer
Question
If a user or a technician becomes injured on the job,what should be done?

A) Don't tell anyone.
B) Escalate the problem.
C) Establish a theory of probable cause.
D) Create an incident report.
Question
Sally has fixed a multitray printer that was jamming.After cleaning it and installing a maintenance kit,she verifies the original problem is no longer present.What else should she do?

A) Clean up and go.
B) Reinstall the drivers.
C) Tell the customer to be more careful about keeping the printer clean.
D) Test all trays.
Question
What is the first step of the troubleshooting theory?

A) Identify the problem.
B) Establish theory of probable cause.
C) Test the theory.
D) Verify full system functionality.
Question
What are spare parts that you take with you to a worksite or workstation called?

A) System units
B) FRUs
C) CMOS settings
D) Backups
Question
Spare RAM sticks,a video card,a NIC,and a power supply are all examples of __________.
Question
What is an FRU?

A) A field-replaceable unit
B) A free-reigning usability
C) A failed removable unit
D) A fire reduction utility
Question
What are the four primary stages of the computing process?

A) Keyboard,CPU,monitor,mouse
B) Input,loading,processing,storing
C) Input,processing,storage,output
D) Processing,displaying,storing,output
Question
An FRU is also known as a (n)____________________.
Question
After you test a theory to determine cause,you should establish a (n)____________________ to resolve the problem and implement a solution.
Question
While attempting to identify the problem,you should ____________________ the user and identify user changes to the computer.
Question
The ____________________ is nothing more than a set of steps you use along with the computing process to diagnose and fix a computer.
Question
What software utilities should you include in your traveling toolkit for troubleshooting purposes?
Question
Explain escalation.
Question
Explain the troubleshooting theory.
Question
What is the best way to verify full system functionality?
Question
List five FRU examples.
Question
What is a critical preventive measure to consider in almost every case?
Question
At what stage of the troubleshooting theory process should backups be performed?
Question
When you press a keyboard key,the _________________ reads the grid of your keyboard,discovers your input,and then sends the information to the CPU.
Question
What are the four primary stages of the computing process?
Question
After verifying full system functionality,you should document ____________________,___________________,and ____________________.
Question
List three tools found in a typical technician toolkit.
Question
When you encounter a partially functional computer,you should consider making backups.What should you include in the backup?
Question
What are the six major steps in troubleshooting?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/37
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 32: The Complete PC Tech
1
Input,processing,storage,and output are collectively referred to as the ____________________.
computing process
2
____________________ requires specific devices,such as the keyboard and mouse,that enable you to tell the computer to do something,such as open a program or type a word.
Input
3
The operating system (OS)provides a (n)____________________ and tools so that the microprocessor and other chips can process your request.
interface
4
After you have successfully solved the user's problem,have the user sit down and ____________________ the task to ensure full system functionality.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
5
What helps you track the troubleshooting history of a machine over time?

A) Event Viewer
B) Documenting
C) Performance Monitor
D) User-generated problems
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
6
If you can't get the computer or peripheral working in a fairly short period of time,what should you do?

A) Clean up.
B) Reload.
C) Escalate the problem.
D) Ask the user to wait while you call your supervisor.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
7
What is always recommended before making any major changes to a critical system?

A) Test your theory.
B) Add more RAM.
C) Back up.
D) Reboot using Low Resolution mode.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
8
If a theory is not confirmed,what should you do next?

A) Make changes
B) Implement the solution
C) Establish a new theory or escalate
D) Verify full functionality
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
9
What kind of report should detail what happened and where it happened?

A) Down time
B) Formalized
C) Incident
D) Performance
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
10
What is the process of continuous or constant downloading from a game server called?

A) MMORPG
B) Stream loading
C) Steam loading
D) Triggering
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
11
All of the following are part of the computing process EXCEPT:

A) Input
B) Processing
C) Output
D) Memory
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
12
What usually contains a Torx wrench,a Phillips-head screwdriver,and a pair of tweezers?

A) Tech toolkit
B) Boot bag
C) FRU box
D) ZIP tote
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
13
What software tool allows you to reset a lost or forgotten password?

A) Torx
B) 7-Zip
C) FRU
D) Password clearer
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
14
If a user or a technician becomes injured on the job,what should be done?

A) Don't tell anyone.
B) Escalate the problem.
C) Establish a theory of probable cause.
D) Create an incident report.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
15
Sally has fixed a multitray printer that was jamming.After cleaning it and installing a maintenance kit,she verifies the original problem is no longer present.What else should she do?

A) Clean up and go.
B) Reinstall the drivers.
C) Tell the customer to be more careful about keeping the printer clean.
D) Test all trays.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
16
What is the first step of the troubleshooting theory?

A) Identify the problem.
B) Establish theory of probable cause.
C) Test the theory.
D) Verify full system functionality.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
17
What are spare parts that you take with you to a worksite or workstation called?

A) System units
B) FRUs
C) CMOS settings
D) Backups
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
18
Spare RAM sticks,a video card,a NIC,and a power supply are all examples of __________.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
19
What is an FRU?

A) A field-replaceable unit
B) A free-reigning usability
C) A failed removable unit
D) A fire reduction utility
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
20
What are the four primary stages of the computing process?

A) Keyboard,CPU,monitor,mouse
B) Input,loading,processing,storing
C) Input,processing,storage,output
D) Processing,displaying,storing,output
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
21
An FRU is also known as a (n)____________________.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
22
After you test a theory to determine cause,you should establish a (n)____________________ to resolve the problem and implement a solution.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
23
While attempting to identify the problem,you should ____________________ the user and identify user changes to the computer.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
24
The ____________________ is nothing more than a set of steps you use along with the computing process to diagnose and fix a computer.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
25
What software utilities should you include in your traveling toolkit for troubleshooting purposes?
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
26
Explain escalation.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
27
Explain the troubleshooting theory.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
28
What is the best way to verify full system functionality?
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
29
List five FRU examples.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
30
What is a critical preventive measure to consider in almost every case?
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
31
At what stage of the troubleshooting theory process should backups be performed?
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
32
When you press a keyboard key,the _________________ reads the grid of your keyboard,discovers your input,and then sends the information to the CPU.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
33
What are the four primary stages of the computing process?
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
34
After verifying full system functionality,you should document ____________________,___________________,and ____________________.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
35
List three tools found in a typical technician toolkit.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
36
When you encounter a partially functional computer,you should consider making backups.What should you include in the backup?
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
37
What are the six major steps in troubleshooting?
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 37 flashcards in this deck.