comptia a+ customer lcd panel factory
- So this, my friends, what I have in front of me, is an actual LCD monitor, I just took off the case, because in this episode I want to talk about some of the parts that are really, really important to us techs on the inside of LCD monitors. So let me go ahead and let"s start with probably the most important part there is right here. And this is a big guy right here. This is the actual LCD screen itself. Now, if we take a look, let me zoom in on this, there are millions of tiny little wires coming into this LCD screen with a few controller functions right here. So, this incredibly fragile piece contains gazillions, over a million, of these little picture elements in here. Now, because there"s no power, theoretically, you can"t see through an LCD when there"s no power, however, no LCD is perfect, so you can probably see me a little bit, I can see the camera a little bit. Alright, so this is the working part of any monitor. So let me just set this off to the side for a moment, because there"s more. So let"s look down here at this very bright, very white piece right here. What you"re actually looking at, they"re a little bit taped down so it"s tricky to see, but underneath here, and also way down at the bottom, are these big, long fluorescent tubes. They"re CCFLs. All of this white is basically a reflector, because we want the light to be as even as possible across the monitor so you don"t have dark and bright spots on the monitor itself. So, those are where the CCFLs live. Now, what"s interesting, if I can do this without losing a finger, is underneath here. Eh, you know what, let"s flip the whole thing over first. Here"s the power connection, this is where the monitor gets its electricity, and over here are inputs that are going to come from video cards from my system itself. Okay, now let"s go back in this guy a little bit. So, first of all, here"s the power over here, so what you have in here is a standard AC to DC power supply just like you"d see at a desktop system, although much, much smaller. This is designed to give us the DC power that our circuitry needs to run. However, there"s a problem, and the problem is, especially with the old school CCFLs, these CCFLs are fluorescent lights, and fluorescent lights need AC power. So what you would do is you would take your DC power and then have to convert it back into AC through what were known as inverters. Now, with these LED panels we see today, we don"t see the inverters anymore, you"re only going to have inverters if you have CCFLs. Okay, now coming back over here, this is the actual inputs from our video card itself, and these are different types of technologies, of connectors, we cover those in other episodes, we have some logic circuitry here, and this guy right here is the primary connection to the LCD panel itself. So, when you"re working with an LCD panel, couple things I want to make sure you understand. Number one, you"re going to have a panel of course, number two, you"re going to have a separate backlight unit. If you"re using CCFLs, and there"s plenty of monitors that still do, you are going to have inverters that take the DC power that was just converted from AC, yeah it was, and turns it back into AC to run the CCFLs. On top of that, we"re going to have our connectors, our inputs from our data connection, and of course, a big power connection as well. (jazzy guitar music)
This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution. There are several actions that could trigger this block including submitting a certain word or phrase, a SQL command or malformed data.
1. When you are installing a different SVGA monitor, it is unlikely that the new monitor has the same capabilities as the old one. As a result, the image on the screen may not be readable. In such instances, change the video resolution to Standard VGA before installing the new monitor. You can change the resolution appropriately after the image on the screen is readable with the new monitor. It may also be necessary to load appropriate device driver, if you are installing a different display adapter.
2. If the LCD screen changes colors, like turning green and then blue or red, it is likely that you have a cable problem. First check the monitor cable whether it is loose. Then try to twist the monitor and see if there is any problem. If the problem occurs, it may be necessary to replace the LCD monitor cable.
3. You need more brightness when a projector is used in environment where there is plenty of light in the room. Higher lumens provide more brightness, but more expensive.
4. TFT LCDs, also known as "active matrix", were developed as a variant of LCD. TFT LCDs improved the color, contrast and response times of passive matrix LCDs. FT LCD stands for "Thin Film Transistor" and "Liquid Crystal Display".
5. The two most common types of TFT LCDs are IPS TFT LCD and TN TFT LCD. TN generally has a faster response time, which provides better entertainment experiences for watching sports or gaming, but IPS was designed to solve TN display flaws, such as a poor viewing angle and low-quality color reproduction.
6. LCD display can"t be viewed by itself. It requires back lighting, just like your digital watch requires a back light to view the time. At present, there are two main methods of backlighting in LCD flat-panels: Cold-Cathode Fluorescent Lamp (CCFL) and LED (light-emitting diode). LCD with CCFL back lighting were widely used in TVs and computer monitors. However, they are becoming obsolete these days. LCD with LED back lighting is widely used in TVs and computer monitors. Now a days. LED back lighting is most popular as it requires less power, and lasts longer. Note that the back lighting technologies should not be confused with LCD display technologies. The popular term LED TV is a bit misleading as it is actually an LCD TV, but with LED back lighting instead of CCFL.
7. Plasma display is entirely a different technology when compared with LCD. In plasma display each pixel on the screen is illuminated by a tiny bit of plasma or charged gas, somewhat like a tiny neon light. Plasma displays offer high refresh times, better viewing angles and color schemes when compared with LCD displays. However, they consume more power, and bulkier.
1. TN (Twisted Nematic):The advantages of these panels are low manufacturing cost and a relatively high level of responsiveness; the pixels change their state quickly which helps make moving images appear smoother. Some Twisted Nematic displays have double the usual refresh rate (120Hz instead of 60Hz) allowing them to take advantage of "active 3D shutter" technologies and allowing them to display twice as much information every second for a smoother gaming experience. Even 144Hz refresh rates have become possible using this technology.
2. VA panels (Vertical Alignment panels):These panels are more like TN panels, the main advantage is its efficiency at blocking light from the backlight when it"s not wanted. This gives deeper blacks and higher contrast ratios of around 2000:1 - 5000:1 Another key advantage of VA is the improved viewing angles and colour reproduction compared to TN. The main disadvantage is its slow responsiveness.
3. IPS and PLS: IPS is short for In-Plane Switching is a technology developed chiefly by LG Display, PLS (Plane to Line Switching) technology by Samsung and AHVA by AUO. These are sometimes simply referred to collectively as "IPS-type" panels. The main advantage is their superior colour accuracy, consistency and viewing angles when compared to the other LCD technologies. Usually, you can get contrast ratios of 1:1000 on these panels.
This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution. There are several actions that could trigger this block including submitting a certain word or phrase, a SQL command or malformed data.
CompTIA A+ certification validates the latest skills needed by today’s computer support professionals. CompTIA A+ confirms a technician’s ability to perform tasks such as installation, configuration, diagnosing, preventive maintenance and basic networking. The exams also cover domains such as security, safety and environmental issues and communication and professionalism. CompTIA A+ ensures the right people have the right skills. While many of the essential skills are universal, there are additional skills required to support the needs of businesses. By offering certification options for specific job scenarios, CompTIA A+ gives individuals the ability to grow their careers in a certain area, and employers the flexibility to choose the exam combination that best fits their needs.
Students must be familiar with using a personal computer, mouse, and keyboard. They must be comfortable in a Windows environment; be able to launch and close activities; and navigate to information stored on the computer. They must be able to manage files and folders.
After completing this CompTIA training, you"ll be prepped for the Core 220-1001 and be better prepared to either get your first IT job or advance into junior systems administrator or senior support roles.
For anyone who leads a technology team, this A+ training can be used for A+ 220-1001 exam prep, on-boarding new IT professionals, or as part of an entry-level training plan.
This CompTIA A+ training moves through the Core 220-1001 exam objectives, and covers topics including:Laptop display: LCD lighting and screen types, LED, OLED, components, touchscreens, digitizers
This A+ training is considered foundational-level CompTIA training, which means it was designed for technical support specialists with 6 to 12 months of experience, but can be used by professionals with no experience at all. This Core 220-1001 course is valuable for new or aspiring IT professionals, experienced technical support specialists looking to validate foundational skills, and even non-technical professionals.
New or aspiring IT professionals. There is a broad consensus among IT experts that CompTIA A+ training is an excellent way to begin a career in information technology. It broadly covers the basics, and gives the aspiring IT specialist an introduction into the concepts and technologies they’ll be dealing with for the rest of their professional life. If there’s any exam you should get first, it’s A+. Even if you don’t want to get certified, anyone new to IT will greatly benefit from CompTIA A+ training.
Experienced IT professionals. Many IT specialists have developed their profession based on the knowledge gained in particular platforms or technologies required for their job. But even after five years, it’s possible to have gaps in IT knowledge and skills that could hinder their careers. Going back for CompTIA A+ training is a good choice for engineers who need to round out their knowledge and refresh their understanding of the hardware and software that they support.
Desktop hardware user training. People who work with technology products and services, whether in management, sales, or customer support, can benefit from a general understanding of information technology. CompTIA A+ training provides a survey of technical terms and solutions that would be helpful for those in tech-related businesses. This CompTIA A+ training offers a greater understanding of what might otherwise seem like a mystery.
Technicians need to familiarize themselves with strategies, features, and techniques that can help ensure a safe and secure small office/home office (SOHO) environment. In this course, discover home router security settings to configure on a SOHO network. Explore wireless security considerations, including changing the service set identifier (SSID), disabling SSID broadcast and encryption settings, disabling guest access, and changing channels. Next, discover firewall security features such as disabling unused ports and port forwarding or mapping. You"ll also learn to install and configure browsers and relevant security settings. Next you"ll explore browser installations, extensions, and plug-ins, as well as password managers and certificates. Lastly, explore Internet browsing security features and techniques, including pop-up blockers, clearing browsing data, clearing cache, private-browsing mode, sign-in/browser data synchronization, and ad blockers. Once you have completed this course, you"ll be able to configure security settings for browsers and SOHO networks. This course is part of a series that will help you prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
Breakdown: Port replicators as well as docking stations allow you to keep peripheral devices such as external monitors and keyboards plugged in when you need to take the notebook with you. Both devices, in essence, replicate the peripheral ports of the notebook in order to allow this. Docking stations include additional features such as slots for full-size desktop PCI cards, additional media/accessory bays, CD drives and other expansion slots.
Breakdown: Some notebooks have a security locking slot on the outside of the case typically indicated by a symbol of a padlock next to it. You can use this slot to attach a cable lock with the other end looped around a fixed, sturdy object.
Breakdown: A local area network (LAN) is a specifically designed configuration of computers and other devices located within a confined area, such as a home or office building, and connected by wires or radio waves that permit connected devices to communicate with one another or share data and services.
Breakdown: In a star topology, each node is connected to a central network connectivity device such as a hub or a switch. This device then distributes the information packets it receives to the star’s nodes. In a star topology, each node has its own wired or wireless connection to the hub.
Breakdown: In a bus topology, each node is connected to the next by a direct line so that a continuous line is formed. There’s no central point in such an arrangement. Each node is simply connected to the next one on either side of it. The ends of the bus are closed off with a terminator device to prevent signal reflection which could generate interference on the line.
Breakdown: In a ring topology, each node is connected to two nodes on either side of it such that all nodes form a continuous loop. Communication is enabled by passing a token around the ring to each node. When a node has the token, it can transmit data. The token packet travels in a circle or ring in a single direction even though the nodes are physically arranged as a star.
Breakdown: In a mesh topology, all nodes in the mesh have independent connections to all other nodes in the mesh. This configuration makes it very fault tolerant and scalable. Most mesh topologies aren’t fully meshed due to cost. More common is a partial mesh topology with some redundant links.
Breakdown: The benefit of the star topology is that because each node has its own connection to the central network connectivity device, when a single connection fails, it doesn’t affect the communication ability of other nodes connected to the same central device. If the central device fails, however, none of the nodes connected to it are able to communicate on the network.
Breakdown: A Digital Subscriber Line (DSL) is a high-speed data and voice transmission line that still uses telephone wires for transmission but carries the digital data at frequencies well above those used for voice transmission. Voice and data can be transmitted at the same time over a DSL connection.
Breakdown: You can now connect to the Internet either through your smartphone or through your laptop using a cellular network PC card. 4G cellular networks are capable of speeds of 100 Mbps while and 1 Gbps while stationary using Long Term Evolution (LTE) technology.
Breakdown: Modems are devices that enable you to connect your computer to another network through a phone line. The modem in the sending computer must convert the digital signals within the computer to analog signals that are compatible with the phone system. On the other end, the receiving modem must then convert analog signals back into digital signals.
Breakdown: Load balancers are devices that distribute networking or computing workloads across multiple resources. A load balancing router can dynamically adjust network routes to balance the utilization across networks.
Breakdown: A proxy server is a server that acts as an intermediary between computers on a network and the Internet. Before sending a packet, the proxy server replaces the original sender’s IP address and other identifying information with its own. When the response arrives, the proxy server looks up the original sender’s information, updates the incoming packet, and forwards it to the client. This allows for anonymous access to the Internet, thus providing an added layer of security.
Many proxy servers also provide caching functions which speed up content serving so that clients don’t need to constantly hit the Internet for web pages that already reside on the local network.
Breakdown: On a PC, the modem provides a connection for a regular phone line which is an RJ-11 connection – the same type of connection used for a standard phone wall outlet. In addition, a modem usually has an Rj-11 connection for a telephone.
Breakdown: A bridge is an internetworking device that connects two LANs and makes them appear to be one or segments a larger LAN into two smaller pieces. Bridges can filter traffic thus preventing local traffic from one segment from going beyond the segment.
You’re wiring Ethernet in a star topology. What’s the internetworking device you use to take the signal transmitted from one computer and propagate it to all the other computers in the network?
Breakdown: Fiber optic cables carry light-based data through strands of glass or plastic and is currently the fastest (and most expensive) network transmission medium.
Breakdown: Unshielded Twisted-Pair (UTP) uses four pairs of wires and is typically used to connect network nodes. The wire pairs are twisted together to prevent crosstalk (interference).
Which network medium contains a layer of braided wire or foil between the core and the outside insulating layer, plus another layer of plastic or rubberized material that separates the central core from the shielding layer?
Breakdown: Coaxial cables (“coax” for short) contain a layer of braided wire or foil between the core and the outside insulating layer. The shielding layer helps protect the data from EMI problems. Coaxial cabling is typically found in older networks.
Breakdown: The standard BNC connector is considered a 2-pin connector – pin 1 is the center conductor, which carries the data signal and pin 2 is the tinned copper braid, which provides the ground.
Which medium might also have letters after the number to indicate the cable’s impedance (specified in ohms) and to indicate whether the inner conductor is solid or stranded?
Breakdown: Coaxial cable comes in many variations and is specified by the RG standard. RG cable might also have letters after the number to indicate cable’s impedance (specified in ohms) and whether the inner conductor is solid or stranded.
Breakdown: Fiber optic cable is used by telephone and cable companies to deliver information across long distances. It’s also used as the backbone for networks.
Breakdown: Since fiber optic cable doesn’t carry electrical signals it’s safe to use in hazardous, high-voltage environments. It can be used where explosive fumes are present without danger of ignition, however, not all fiber optic cable is plenum grade. For use in plenum installations, fiber optic cable must have an outer material made from some kind of fire-resistant material such as PVC. Such cables are sold as plenum grade fiber optic cables.
Breakdown: A cable testing device can be used to test cables and network connections. It’s a highly versatile device, which can be used to test a wide variety of cables and connections. You can purchase cable testing devices for your particular LAN or one that’s compatible with multiple network types.
Breakdown: In addition to testing physical cables and connections, a cable testing device can also test and verify a wide variety of network functions.
Breakdown: The basic electrical measurement functions of a multimeter (both analog and digital) are voltage, resistance, and current. Typically, a computer technician will need to measure voltage (both DC and AC) and resistance (mostly in terms of continuity) in the course of his/her work. Electrical current will seldom, if ever, be something that needs to be measured.
Breakdown: Subnet masks are used to identify the network-ID portion of an IP address. Subnet masks allow additional addresses to be implemented within a given address space. Each IP network class has a default subnet mask. The default submask for a Class C network is: 255.255.255.0.
Breakdown: On a TCP/IP network, if a computer doesn’t know how to deliver a packet, it hands off the packet to the default gateway (usually a router) to deliver. This happens every time a computer needs to deliver a packet to a network other than its own.
Breakdown: The network 169.254.0.0. is reserved for Automatic Private IP Addressing (APIPA). Windows 2000 and later operating systems automatically generate an address in this range if they are configured to obtain an IPv4 address from a DHCP server and are unable to contact one. Addresses in this range are private and can’t be used on the Internet.
Breakdown: A MAC address, also referred to as a physical address, adapter address, or Ethernet address, identifies a device on a LAN. Part of the address contains the manufacturer’s identifier with the rest being a unique number. No two NICs have the same identifying code. MAC addresses are absolute, unlike IP addresses which are subject to change.
Breakdown: The IP version uses 128-bit addresses. These addresses are written and displayed in the hexadecimal-equivalent values for each of their 16 bytes. Like IPv4 addresses, IPv6 are also composed of two parts: the network ID and the host ID.
Breakdown: The Domain Name System (DNS) is used to resolve host names to IP addresses and to find computers such as Web and e-mail servers. A fully qualified domain name (FQDN) is typically composed of three parts: a host name, a domain name, and a top-level domain name. The “www” part is the host’s name or an alias for the actual name.
Breakdown: Dynamic Host Configuration Protocol (DHCP) is an automated mechanism to assign IP addresses dynamically to clients from a pool of possible addresses called a scope. Using DHCP to assign IP configuration to client computers on your network simplifies administration and avoids the problem of IP information being entered incorrectly in the case of static IP assignment.
Breakdown: TCP is connection-oriented and reliable. It is similar to delivering a letter by registered mail. Inside the letter, each page is numbered so that it can be read in the proper order. When the message is received, the sender is notified that it arrived properly at its destination. If it doesn’t, then the receiver notifies the sender to resend the message.
SSH was designed as a replacement for insecure remote shells, which sent data (including passwords) in plain text. Which of the following is one of those insecure remote shells?
Breakdown: Secure Shell (SSH) exchanges data between two network nodes over a secure channel. SSH was designed as a replacement for Telnet and other insecure remote shells, which sent data (including passwords) in plain text. These shells left the data open for interception.
Which email protocol is used to send and receive e-mail messages between e-mail servers and used by e-mail client software to send messages to the server, but never used by clients to retrieve email from the server?
Breakdown: Simple Mail Transfer Protocol (SMTP) is used to send and receive e-mail messages between email servers. It is also used by e-mail client software, such as MS Outlook, to send messages to the email server. SMTP is never used by a client computer to retrieve email from a server. Other protocols such as POP3 control the retrieval of e-mail messages.
Which IEEE 802.11 standard operates in the 2.4 GHz frequency range, has a data speed of up to 20+ Mbps, and has a range of 45 meters indoors and 90 meters outdoors?
Breakdown: The 802.11g standard is backwards-compatible with 802.11b which transmits data at 11 Mbps. 802.11g has a higher throughput at 20+ Mbps and some devices advertise speeds of up to 54 Mbps. Devices supporting 802.11g have a transmission range of up to 4 meters indoors and 90 meters outdoors.
Which IEEE 802.11 standard operates in the 2.4 and 5 GHz frequency range, has a data speed of up to 600 Mbps, and has a range of 70 meters indoors and 250 meters outdoors?
Breakdown: Devices supporting 802.11n can transmit data at up to 600 Mbps in either the 5 GHz or 2.4 GHz band. The transmission range is up to 70 meters indoors and 250 meters outdoors.
Breakdown: The 802.11 standard defines an access point (AP) as a device that functions as a transparent bridge between the wireless client and the wired network.
Breakdown: Though there are several configuration steps that you should take to adequately secure a wireless router, but at an absolute minimum, you should enable some form of data encryption method. It is advisable to select the most secure transmission encryption method compatible with the clients on the LAN. Options might include WEP, WPA Personal WPA2, WPA Enterprise, RADIUS, and 802.11i.
Breakdown: Network Address Translation (NAT) devices correlate internal and external addresses. A single public IP address is assigned to the device and each private node is assigned a unique IP address that is not visible to the public network. The NAT device (router) makes certain that inbound and outbound packets arrive at the correct destination. NAT expands the limited number of IP addresses that can be used directly on the Internet and also provides a layer of security to private networks.
Breakdown: On larger networks where public access to resources such as a Web server, e-mail server, or FTP server are required, a perimeter network is established where these resources can reside. The perimeter network, also referred to as a demilitarized zone (DMZ), is set up between the private network (intranet) and the Internet. Computers in the DMZ are accessible to computers on both the Internet as well as the intranet. Typically, computers within the DMZ have limited access to computers on the intranet while direct connections between the Internet and the internal network are blocked.
Breakdown: A firewall is a device that controls traffic between a public network and a private internal network. Firewalls examine the contents of network traffic and permit or block transmission based on rules. Firewalls vary in price and complexity and use one or more security techniques such as stateful packet inspection, access control lists, and basic packet filtering.
Breakdown: You should always avoid using jargon where plain language suffices. You aren’t out to impress the user with techno-babble. You need to speak clearly about the issue and implement the appropriate solution. Explain any acronyms and abbreviations you use.
Breakdown: You must match your communication level with your customer’s abilities. By assessing the customer’s competence level you can deliver the message appropriately.
You and a colleague respond to a user who’s having a problem. As the user is describing the problem to your colleague, you roll your eyes. Which guidelines for professional communication are you not following? (Choose all that apply)
Breakdown: Behaving in such a manner in the presence of a customer violates multiple guidelines for professional communication, but the two primary ones that are violated in this example are respecting the customer and considering the total message. Rolling one’s eyes in the presence of a customer is highly disrespectful and sends a hostile message.
Breakdown: Air-quality is important for both humans as well as electronic equipment. Dust and dirt can accumulate inside computers and block air vents that can cause overheating. Hard disk drives, for example, are prone to failure in high-heat environments. Data recovery from damaged drives can be an expensive process.
Breakdown: You should periodically inspect ventilation holes and components for dust. Use compressed-air or an air compressor to push dust and other matter out of the enclosure. A link-free cloth can also be used to clean dust and debris from ventilation openings.
Breakdown: The MSDS personal protective C rating recommends wearing goggles, gloves, and other protective gear when using this product. This is the most hazardous rating and extreme caution must be used when handling and disposing of such materials.
Breakdown: There are six stages in the CompTIA A+ troubleshooting model with the first being to identify the problem. The sixth, and final stage, is to document findings, actions, and outcomes.
Breakdown: While testing the theory to determine the actual cause of the problem you will be inspecting and testing components related to the problem. This may include examining connections, power being turned on, and visual and audible indicators. You may need to consult vendor documentation for descriptions of status lights and other indicators.
What is the name of the Web site containing problem and solution references for the Microsoft client operating systems, such as Windows 2000 Professional, Windows XP, Windows Vista, and Windows 7, as well as many other Microsoft applications?
Breakdown: For help with a problem concerning software or hardware on a computer running a Microsoft operating system, an excellent troubleshooting reference is Microsoft’s Help and Support Center site. A component of the Help and Support Center is the Microsoft Knowledge Base, which explains many Microsoft error messages.
Which of the following types of software is responsible for accepting input from devices such as a keyboard, mouse, scanner, or smart card reader, and creating output on devices such as a monitor, printer, or speakers?
Breakdown: An operating system is a set of software instructions that control the computer and run other programs on the computer. Applications are installed on top of the operating system and work with the operating system and the computer’s hardware such as the monitor, mouse, keyboard, printer, and other devices.
Breakdown: A graphical user interface (GUI) has icons or menus that you can click or select to perform a function or run a program. Along with a keyboard and a pointing device such as a mouse, you are able to interact with screen elements when working with a GUI.
Breakdown: The Windows 7 Enterprise edition is designed for large, global organizations with complex IT infrastructures and is available only through Microsoft’s volume licensing programs.
Breakdown: The Windows 7 Home Basic edition is only available in emerging markets. It’s highly unlikely that you will encounter it in the course of your work as an IT professional.
Breakdown: The Aero desktop GUI with Flip 3D is not available in Windows Vista Home Basic along with several other advanced features only available in the higher-end Windows Vista editions.
Breakdown: Multiprocessor support is found in the Windows XP Professional edition. The Professional version is designed for the business user. The feature sets of these editions vary significantly because business organizations need to control and secure their client computers more than the typical home user.
Breakdown: The Windows notification area displays icons for system and program applications that are running but have no desktop presence. The time and volume icons are displayed in the notification area.
Breakdown: The “/a:h” file attributes switch with option to display hidden files combined with the “/o:n” file sort switch and option to display files in alphabetical order.
Breakdown: A hypervisor, or virtual machine manager, is the core virtualization software that enables multiple virtual computers to run on a single physical host. The hypervisor controls and allocates the host machine’s resources to give each guest operating system what it needs while making sure that the different VMs (virtual machines) on the host machine do not interfere with each other.
Breakdown: Despite virtualization having some benefits when it comes to security, they are still vulnerable to malware attacks, user errors, and external attacks just like a standalone computer. VMs still require firewalls, antivirus software, and user security measures just like ordinary desktops on the network.
Breakdown: Task Manager is a Windows GUI utility that provides information about the applications, processes, and services that are running on your computer. The Performance tab within Task Manager displays a dynamic representation of the most common performance indicators for your computers such as CPU and page file usage, number of threads, handles, and processes among others.
Breakdown: In Windows 7 and Windows Vista, DirectX Diagnostic (dxdiag.exe) is a utility you can use to see the status of your DirectX installation, however, unlike in Windows 2000 Professional and Windows XP, you are unable to test and troubleshoot video- or sound-related problems.
Breakdown: The Application tab in Task Manager displays the status of applications running on your computer. You can end an application, switch to a running application, or start an application from this tab.
Breakdown: The Processes tab in Task Manager displays information about the processes that are running on your computer. Information about the process’s percentage of CPU usage and the amount of memory the process is using is displayed. You can end processes from this tab, which comes in handy if a process is consuming too much in the way of computing resources.
Breakdown: The Recovery tab in a service’s Properties dialog box allows you to configure the computer’s response when a service fails, including various actions depending on the number of failures, which includes specifying a program that the operating system should run when a service failure occurs.
Breakdown: The Dependencies tab in the service’s Properties dialog box specifies the services that a service depends on to function correctly as well as the services which depend on this service in order to function.
Breakdown: In Windows 7 the Devices and Printers window provides a central location where you can view and access all of your computer’s devices. You can view detailed information about each device, determine if each device is working properly, and connect network devices and printers that were not added automatically.
Breakdown: If a device is not yet Device Stage-enabled, the AutoPlay dialog box will open when you connect the device to your computer. AutoPlay provides general options for interacting with devices.
True or false? If a device is not yet Device Stage-enabled, double-clicking its icon in the Devices and Printers window opens a specialized page with icons and options; this is an XML “page” built by the device manufacturer.
Breakdown: In the Devices and Printers window, double-clicking a device not supported by Device Stage will open the Properties dialog box for that device.
In which power state does the computer take all current applications running in RAM, save them to the systems swap partition on the hard disk, and turn the computer’s power off?
Breakdown: During hibernation mode, the computer takes all current applications running in RAM, saves them in the swap partition on the hard disk, and then turns the notebook’s power off. All components of the computer are turned off. As a result, the Hibernate power state requires zero power. The OS is restored faster from this state than from a shutdown, but more slowly than from the Sleep power state.
Breakdown: Power consumption is most important with portable computers that get their power from rechargeable batteries, but even on desktops effective power management can save energy and therefore money for the user or organization.
Breakdown: The Disk Management utility allows you to alter existing partitions on a disk. You can extend a partition if there is unallocated space next to it on the disk. You can also shrink a partition to free up space if the partition is not full.
Breakdown: To share files or folders with other users on a network, you use the Share with command to select users that you wish to give access to your files or folders.
Breakdown: The Wake on LAN feature allows you to configure a computer, such as a print server, that is in a power saving mode to “wake up” when the network card receives a connection request.
Domain 1.0 – Mobile devices1.1 – Given a scenario, install and configure laptop hardware and components.Hardware/device replacementKeyboard – Hard drive
Memory/MicroSD1.6 – Given a scenario, configure basic mobile device network connectivity and application support.Wireless/cellular data network (enable/disable)Hotspot
Number of devices/types of devices to be powered3.8 – Given a scenario, select and configure appropriate components for a custom PC configuration to meet customer specifications or needs.Graphic/CAD/CAM design workstationMulticore processor
Wireless settings3.10 – Given a scenario, configure SOHO multifunction devices/printers and settings.Use appropriate drivers for a given operating systemConfiguration settingsDuplex
Hard drive caching3.11 – Given a scenario, install and maintain various print technologies.LaserImaging drum, fuser assembly, transfer belt, transfer roller, pickup rollers, separate pads,
Domain 5.0 – Hardware and Network Troubleshooting5.1 – Given a scenario, use the best practice methodology to resolve problems.Always consider corporate policies, procedures, and impacts before implementing changes
6. Document findings, actions, and outcomes5.2 – Given a scenario, troubleshoot problems related to motherboards, RAM, CPUs, and power.Common symptomsUnexpected shutdowns
Multiple failed jobs in logs5.5 – Given a scenario, troubleshoot common mobile device issues while adhering to the appropriate procedures.Common symptomsNo display