Which devices redundancy is used in RAID adapter?
A RAID adapter connects to multiple hard disk drives (HDDs) or solid-state drives (SSDs), making them work as one logical unit. provides a way to store data across multiple hard disks for redundancy and/or performance improvement. To the operating system, A RAID array appears as one disk. Which cable you recommend supporting both audio and video to a high definition television from your PC? HDMI To support authentication via who you are, eyes, face, fingerprint, what device you recommend? BIOMETRIC security compares physical characteristics against stored profiles to authenticate people. A profile is a data file containing known characteristics of an individual. if we need to create backup for 5 TB data, what device you recommend using to save your backup? what is UPS, and thins node will add value? Uninterruptible power supply (UPS) - Helps protect against potential electrical power problems by supplying a consistent level of electrical power to a computer or other device. The battery is constantly recharging while the UPS is in use. if we have multiple WIFI network run 2.4, how can we prevent them to interfere with each other RFI? shat is SDS and why they are important? A Safety Data Sheet is a fact sheet that summarizes information about material identification, including hazardous ingredients that can affect personal health, fire hazards, and first-aid requirements. How to dispose of these materials. What can we measure using digital multimeter? A multimeter is a device that can take many types of measurements. It tests the integrity of circuits and the quality of electricity in computer components. anti-static wrist strap is always good tool except some case, what are they? Never wear an antistatic wrist strap if you are repairing a power supply unit. what should be used to clean a CPU and a heat sink? isopropyl alcohol and a lint-free cloth what slots can be used for installing Wireless NIC in your motherboard? Wireless NICs use PCI or PCIe expansion slots on the motherboard. what devices can use SATA cables to talk to Motherboard? Internal HDDs, SSDs, and optical drives often connect to the motherboard using Serial AT Attachment what can indicate hardware failure detected by the BIOS? If a device is malfunctioning, an error or a beep code alerts the technician of the problem. how can we use BIOS settings to secure a computer? what are our options? You can also choose to encrypt an entire hard drive using a feature called BitLocker. Before using BitLocker, the Trusted Platform Module (TPM) must be enabled in BIOS. A BIOS PASSWORD Prevents the operating system from booting and the BIOS settings from being changed without the appropriate password. Why we need computer preventive maintenance? what we can do if PC is very dusty inside? To remove dust from the inside of a computer, use a combination of compressed air, a low-air-flow ESD vacuum cleaner, and a small lint- free cloth. what is the name of the Mac OS X disk backups tool? TIME MACHINE what should we include in our documentation when we troubleshoot problem? When a computer is powered on and fails to start. What initial procedure to deal with this failure? Why NTFS and not FAT? NTFS offers FAR more storage room capacity what is solid-state hybrid disk? what do we call %USERPROFILE% represent in the path C:\Users\%USERPROFILE%\AppData\Local\Temp? %USERPROFILE% is an environment variable set by the OS with the username that is currently logged on to the computer. What is best tool to use when response from your PC is slow? TASK MANAGER What tool you should use when a new sound card is installed in a PC, but it is not operating correctly? Where we use Hyper visor? The software that creates and manages a virtual machine on a host machine is called the hypervisor, or Virtual Machine Manager (VMM). A hypervisor can run multiple virtual machines on a single host computer. What indicates setting an incorrect boot order in the system BIOS? why Client Server and not P2P network? Client Server features a centralized server that provides information and services to all. Peer to peer has no centralized server and everything is dependent on individual machines. Which OSI layer has Physical address, e.g., MAC? Layer 2 DATA LINK when should we use DHCP over Static? DHCP is the service used by ISPs, network administrators, and wireless routers to automatically assign IP addressing information to hosts. Static addressing is easy to do set up in a small network with very few hosts but static addressing can lead to complications and conflicting addresses in a large network what port is used for HTTP, and HTTPS? HTTP operates on PORT 80. HTTPS operates on port 443 what commands we use to test if DNS is working or not, assume name is Google.com? ping. ping destination_name (e.g., ping www.cisco.com) What is the advantage of WPA2? WPA2 is the industry standard for securing WLANs. Uses the Advanced Encryption Standerd (AES) for encryption which is considered to be the strongest Which Cloud computing service would be best for an organization that needs to collaboratively create applications and deliver them over the web? Why we need to clean dust from network equipment closets? why we can ping internal but not external hosts? what common input devices found on laptop? what can cause mobile device exhibits very slow performance? What should be done first before attempting to repair a hardware component on a laptop? DATA BACKUP what can cause appearance of flashing lines on a laptop screen? Images on the screen are not refreshing fast enough or the inverter is damaged what indicates that the battery in a mobile device could become physically hazardous? The battery is swollen What are two potential risks that could result from rooting or jail-breaking a mobile device? Voids warranty and increases risk of virus infection how can we preserve the security and integrity of data and applications on mobile device? when you recommend impact printer? Uses continuous feed paper, less expensive ink, and carbon copy printing ability What must the user do for other Windows 7 computers in the house to obtain the proper driver for printer he wants us to share? Which three components are typically found in laser printer maintenance kits? Fuser assembly, transfer rollers, separation pads, and pickup rollers what is DDoS? DoS is a type of attack that creates an abnormally large amount of requests to network servers, such as email or web servers. A DDoS attack is like a DoS attack but is created using many more computers, sometimes in the thousands, to launch the attack. what is a good password security policy Minimum length, Complexity, Variety, and Expiration list features in TPM module? Trusted Platform Module (TPM) – This is a chip designed to secure hardware by storing encryption keys, digital certificates, passwords, and data. TPM is used by Windows to support BitLocker full-disk encryption. List steps of Troubleshooting? Step 1 Identify the problem, Step 2 Establish a theory of probable cause, Step 3 Test your theories to determine the cause of the problem, Step 4 Establish a plan of action to resolve the problem and implement the solution, Step 5 Verify full functionality and, if applicable, implement preventive measures, and Step 6 Document your findings, actions, and outcomes Which question is a close-ended? what is open source license of an application software? what should you do if your customer is irritated that you cannot provide immediate assistance? why network printer is printing vertical lines and streaks on all pages? Laser printer drum is damaged or the toner is not evenly distributed in the cartridge what triggers Windows 7 computer that displays an "Invalid Boot Disk”? Media that does not have an operating system is in a drive, the boot order is not sec correctly, the hard drive is not detected, the hard drive does not have an operating system installed, the MBR/GPT is corrupted, the computer has a boot sector virus, or the hard drive is failing how to solve a missing or corrupt DLL message is displayed? One or more programs using the DLL file was uninstalled and removed it with it, or it was corrupted during a bad installation what actions FW can take? what is Backup operator group and when we can use it? describe different access control devices?
This Paper Will Serve as an Overview of the Processes That Occur Across Each Part of the Five Layer Network Model When One Network Node Connects to Another Network Node on a Seperate Network Through a TCP Connection