1 / 34

IT Essentials

IT Essentials. JEOPARDY. Final Review. Router Modes. Router Modes. Practice Safe PC is it?. An Apple a Day…. WAN Encapsulation. WAN Encapsulation. Fu-Shitzu. WAN Services. WAN Services. Black and white and Read all over. Router Basics. Router Basics. GTPC (Grand

marion
Download Presentation

IT Essentials

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. IT Essentials JEOPARDY Final Review

  2. Router Modes Router Modes Practice Safe PC is it? An Apple a Day… WAN Encapsulation WAN Encapsulation Fu-Shitzu WAN Services WAN Services Black and white and Read all over Router Basics Router Basics GTPC (Grand Theft PC) Router Commands Router Commands It’s not PC ► ► ► F i n a l J e o p a r d y ◄ ◄ ◄ 200 200 200 200 100 200 100 200 400 400 400 400 400 200 200 400 600 600 600 600 600 300 300 600 800 800 800 800 800 400 400 800 1000 1000 1000 1000 500 500 1000 1000

  3. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Practice Safe PC is it?200 This port can support up to 63 Devices A: What is Firewire?

  4. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Practice Safe PC is it?400 It can detect multiple bit errors and correct single bit errors. A: What is ECC memory ?

  5. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Practice Safe PC is it?600 Two characteristics of a motherboard that are determined by the chipset (form factor). A: What are maximum memory supported and Processor Supported?

  6. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Practice Safe PC is it?800 The industry accepted method for maintenance cleaning of CPU heat sinks. A: What is a compressed air?

  7. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Practice Safe PC is it?1000 This Windows 2000 tool can be used by a technician to check the hard drive. A: What is Scandisk?

  8. 100 100 100 100 100 100 100 100 100 100 100 100 200 200 200 200 200 200 200 200 200 200 200 200 Question 300 300 300 300 300 300 300 300 300 300 300 300 400 400 400 400 400 400 400 400 400 400 400 400 500 500 500 500 500 500 500 500 500 500 500 500 An Apple a Day… 200 List three common tasks performed during preventative maintenance. A: What are Check and Secure loose cables, Clean the mouse and keyboard and Update Drivers ?

  9. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 An Apple a Day… 400 Two situations it is recommended to ask the customer to sign a liability release form. A: What is when a back up is not available and when you cannot back up the data?

  10. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 An Apple a day… 600 The point a key must be pressed to start the BIOS setup program. A: What is during the POST?

  11. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 An Apple a Day… 800 Some motherboards require this 4-pin or 6-pin power connector A: What is AUX?

  12. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 An Apple a Day…1000 These three tools will optimize computer performance. A: What isSpyware remover, Defrag and Disk Cleanup?

  13. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Fu-Shitzu 200 Two features that make laptops a good alternative to desktop computers. A: What arecompact design and portability?

  14. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Fu-Shitzu400 Laptops use this type of memory. A: What is SODIMM ?

  15. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Fu-Shitzu 600 The major difference between laptop and desktop motherboards. A: What is Desktop motherboards have standard form factors and laptop motherboards are proprietary?

  16. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Fu-Shitzu 800 A collection of settings that control the power settings of a laptop. A: What are Power schemes?

  17. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Fu-Shitzu 1000 Two actions to clean the surface of CDs and DVDs A: What is use a lint-free cotton cloth and wipe disc from center outward?

  18. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Black and White and Read all over200 Dot-matrix printers use this technology. A: What is Impact?

  19. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Black and White and Read all over 400 The phase where a laser printer applies toner to the latent image. A: What is developing?

  20. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Black and White and Read all over 600 The print process that uses solid sheets of ink that are heated by the print head A: What is dye-sublimination?

  21. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Black and White and Read all over 800 The advantage of a solid ink printer over an inkjet printer. A: What are vivid color prints?

  22. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Black and White and Read all over 1000 The type of scanner used for high quality reproduction of valuable paintings A: What is drum scanner?

  23. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 GTPC (Grand Theft PC) 200 Many machines coordinate this. A: What is DDoS attack?

  24. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 GTPC (Grand Theft PC)400 Two steps that should be performed when securing a wireless network A: What is Change default passwords and use MAC filtering ?

  25. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 GTPC (Grand Theft PC)600 What is the first step in troubleshooting Security issues. A: What is gather data from customer ?

  26. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 GTPC (Grand Theft PC)800 When an employee inadvertently allows a visitor to see their username and password which is later used in an external attack. A: What is social engineering ?

  27. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 GTPC (Grand Theft PC)1000 Two standards (as defined in the curriculum) regarding usernames and passwords. A: What is simple username convention and defined rules for password expiration and lockout?

  28. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 It’s not PC200 The rule that all good call center technicians follow A: What is each new customer call is a fresh start?

  29. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 It’s not PC400 Checking grammar and spelling before sending an email and using mixed case in an email are examples of this. A: What is Netiquette?

  30. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 It’s not PC 600 Legal agreement between a customer and the service vendor confirming a specific level of support. A: What is an SLA?

  31. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 It’s not PC800 Three items that are a common part of an SLA A: What is supported software, diagnostic procedures and service location?

  32. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 It’s not PC1000 When transferring a customer to the next technician you should give three items to the receiving technician. A: What is your name, ticket number and customer name?

  33. 100 100 100 100 100 100 200 200 200 200 200 200 Question 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Final Jeopardy The long and/or short name of the first computer. A: What is ENIAC or Electronic Numerical Integrator And Computer ?

  34. 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Final Jeopardy Computers in History

More Related