Solo disponible en BuenasTareas
  • Páginas : 7 (1734 palabras )
  • Descarga(s) : 0
  • Publicado : 1 de junio de 2011
Leer documento completo
Vista previa del texto
The ABC Company sales force has been provided with smartphones and portable printers as shown in the graphic. Which two short-range technologies can support these types of devices? (Choose two.)







Refer to the exhibit. Which type of technology is most suitable to bring Internet services to the facilities shown in the graphic?Bluetooth




Which technology allows a user to securely access a company LAN across a public network?





Which three laser printer components usually break? (Choose three.)

fuser assembly

primary corona

pickup rollers

transfer rollers

secondary corona

paper trays

A networkadministrator has been informed about a problem with the network printer. What is the best way to prevent print jobs from being added to the queue while the printer is being repaired?

Send an e-mail to all users telling them to stop sending any print jobs to the printer.

Send a network message to all users telling them to stop sending any print jobs to the printer.

Unplug the printer from theprint server.

Stop the print service.

After scanning an image, what is the next step to conclude a scanner test?

Scan the same image again and compare both scanned images to detect scanning deficiencies.

Calibrate the scanner based on the image that has been scanned.

Print the scanned image and contrast it with the scanned image.

Visually compare the image against theimage on the screen.

What are two characteristics of the IEEE 1284 standard? (Choose two.)

These cables usually have 9 pins or 25 pins on both ends.

The maximum cable length is 50 ft (15 m).

All ports used by this standard are also known as D-shell ports.

The two available operative modes are EPP and ECP.

Bi-directional communication is allowed.

What is thehighest risk associated with improperly charged or mishandled batteries?

The components can overheat.

The laptop will be unable to hold enough charge.

The battery can explode.

The lifetime of the battery will be reduced.

After the administrator manually configures the correct SSID on a new laptop, the computer is still unable to connect to the wireless LAN. Which additionalaction should the administrator take to resolve this problem?

Modify the group account of the user to include all file permissions.

Reboot the wireless access point.

Rename the laptop and reset the user password on the network.

Verify that the MAC address for the laptop is in the MAC address filter table.

A technician has been asked to install a second optical drive in acomputer. The technician will need to configure the drive as slave. How can the technician accomplish this desired configuration?

Use jumpers on the motherboard to configure the drive as slave.

List the drive as slave in the CMOS.

Connect the drive after the twist in the PATA cable.

Use jumpers on the drive to configure the drive as slave.

A company has a preventivemaintenance policy that requires every computer have a new restore point created every six months. How can a technician create the restore point?

From the CLI enter the command restore /cn.

Go to Start > Control Panel > Accessories > System Tools > System Restore > Create a restore point.

Go to Start > All Programs > Accessories > System Tools > System Restore > Create a restore point.Right-click My Computer and then go to Properties > Restore > Create Restore Point.

Which Startup type must be selected for a service that should run each time the computer is booted?






Which action should be taken first if a card key is lost or stolen?

Disable the card key system until the key can be recovered....
tracking img