Chapter 1 Flashcards

1
Q

What are the traits of a Tech?

A

Honesty/ Integrity,
Dependability/ Responsibility, and
Sensitivity.
HIDRS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the Ethic of Reciprocity? aka as the Golden Rule?

A

Rule: “Do unto others as you would have them do unto you.” In a tech’s life, this can translate as “Treat people’s things as you would have other people treat yours.” Don’t use or touch anything—keyboard, printer, laptop, monitor, mouse, phone, pen, paper, or cube toy—without first asking permission. Follow this rule at all times, even when the customer isn’t looking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Work of Authorization?

A

aka Authorization of Work, this form documents the company name, billing information, date, scope of work, and that sort of thing. Even if you do your repairs, these forms can save you from angst and litigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does EMP stand for?

A

Electromagnetic Pulse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Electromagnetic Pulse (EMP)?

A

When electricity improperly jumps from one place to another in ways that cause damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does ESD stand for?

A

Electrostatic Discharge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Electrostatic Discharge (ESD)?

A

ESD means the passage of a static electrical charge from one item to another. ESD is a type of EMP. Have you ever rubbed a balloon against your shirt, making the balloon stick to you? That’s a classic example of static electricity. All computing devices are well protected against ESD on the outside. Unless you take a screwdriver or pry tool and open up a PC or other computing device, you don’t need to concern yourself with ESD.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False? ESD only occurs when two objects that store different amounts (the hip electrical term to use is potential) of static electricity come in contact.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False? The secret to avoiding ESD is to keep you and the parts of the computer you touch at the same electrical potential, otherwise known as grounding yourself to the computing device.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an Antistatic Wrist Strap?

A

This simple device consists of a wire that connects on one end to an alligator clip and on the other end to a small metal plate that secures your wrist with an elastic strap. You snap the alligator clip onto any handy metal part of the computer and place the wrist strap on either wrist.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or False? Static electricity, and therefore the risk of ESD, is much more prevalent in wet, dry environments.

A

False. Static electricity, and therefore the risk of ESD, is much more prevalent in dry, cool environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an Antistatic mat? aka ESD mat?

A

One of the big issues when working with a computer occurs if you find yourself pulling out parts from the computer and setting them aside. The moment you take a piece out of the computer, it no longer has contact with the systems and may pick up static from other sources. Techs use antistatic mats to eliminate this risk. An antistatic mat—or ESD mat—acts as a point of common potential; it’s typical to purchase a combination antistatic wrist strap and mat that all connect to keep you, the computer, and any loose components at the same electrical potential.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or False? The metal plate on the antistatic wrist strap touches the skin of your wrist. Don’t put it on over the sleeve of a long-sleeved shirt.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What do you call a device that stops or resists the flow of electricity to prevent a static charge from racing through the device?

A

Resistors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or False? Do not put PC components in an anti-static bag, instead on the bag.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a specially designed bag that sheds whatever static electricity you have when you touch it, thus preventing any damage to components stored within?

A

Antistatic bag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

True or False? If you do not have an antistatic wrist strap, take a moment to touch the power supply every once in a while as you work to keep yourself at the same electrical potential as the computer.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What do you call the term when you touch the power supply every once in a while as you work to keep yourself at the same electrical potential as the computer?

A

Self-grounding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the tools for proper PC component handling and storage?

A

ESD straps, ESD mats, antistatic bags, and self-grounding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

True or False? Always disconnect power before repairing a personal computing device.

A

True

21
Q

What does EMI stand for?

A

Electromagnetic Interference

22
Q

What is Electromagnetic Interference?

A

A magnetic field interfering with electronics is electromagnetic interference (EMI).

23
Q

True or False? You can prevent EMI by putting magnets on computer equipment. Certain components are particularly susceptible to EMI, especially storage devices like hard drives.

A

False. You can prevent EMI by keeping magnets away from computer equipment. Certain components are particularly susceptible to EMI, especially storage devices like hard drives.

24
Q

What does RFI stand for?

A

Radio Frequency Interference

25
Q

What is Radio Frequency Interference?

A

Strange noises on your speakers or cell phone.

26
Q

Which of the following does not emit radio waves?
A. Cell phones
B. Wireless network cards
C. Cordless phones
D. Potato
E. Baby monitors
D. Microwave ovens

A

D. Potato

27
Q

What are the two types of metal bags that offer shielding against EMI and RFI as well as ESD?

A

These are the silvery bags you’ll see hard drives packed in, for example, and the black-and-silver woven bags you’ll sometimes see.

28
Q

True or False. When thinking about safety, maintain compliance with government regulations. You may be required to wear certain protective gear or take extra precautions while in the workplace.

A

True

29
Q

What type of fire extinguisher to use for electrical equipments?

A

Class C fire extinguishers

30
Q

What is the first troubleshooting methodology?

A

Identify the problem
*Question the user and identify user changes to the computer and perform backups before making changes
* Inquire regarding environmental or infrastructure changes
* Review system and application logs

31
Q

What is the second troubleshooting methodology?

A

Establish a theory of probable cause (Question the Obvious)
*If necessary, conduct external or internal research based on symptoms

32
Q

What is the third troubleshooting methodology?

A

Test the theory to determine cause
*Once the theory is confirmed, determine the next steps to resolve problem
*If theory is not confirmed re-establish new theory or escalate

33
Q

What is the fourth troubleshooting methodology?

A

Establish a plan of action to resolve the problem and implement the solution.

34
Q

What is the fifth troubleshooting methodology?

A

Verify full system functionality and, if applicable, implement preventive measures.

35
Q

What is the last/6th troubleshooting methodology?

A

Document findings, actions, and outcomes.

36
Q

Which troubleshooting methodology is the scenario below?

Ben asked the user “here!): “Has anything recently changed on the computer that might have made this problem appear?” What you’re really saying is: “Have you messed with the computer? Did you install some evil program? Did you shove a USB drive in so hard that you broke the connection?”

A

Identify the Problem / First one

37
Q

True or False: In most troubleshooting situations, it is NOT important to back up critical files before making changes to a system.

A

False.
The CompTIA A+ certification exams assume that all techs should back up systems every time before working on them, even though that’s not how it works in the real world.

38
Q

Which troubleshooting methodology is the scenario below?

Ben is taking a moment to look for clues “What do you see? Is a connector mangled or a plastic part damaged? Even if that connector or part works fine, the physical abuse could provide extra information. If the user can’t connect to a network, check the cable. Was something rolled over?”

A

Establish a theory of probable cause (Question the Obvious)

39
Q

True or False. You need to check in with management to make certain you have permission to make necessary changes to the PC.

A

True

40
Q

True or False. If you don’t have the skills—or the permissions—to fix the issue, DO NOT escalate the problem. Fix it until you break it.

A

False. If you don’t have the skills—or the permissions—to fix the issue, you need to ESCALATE THE PROBLEM.

41
Q

What is Escalation?

A

Escalation is the process your company (or sometimes just you) goes through when you—the person assigned to repair a problem—are not able to get the job done.

It’s okay to escalate a problem because no one can fix every problem. All companies should have some form of escalation policy. It might mean calling your boss.

It might mean filling out and sending some in-house form to another department. Escalation is sometimes a more casual process.

42
Q

Which troubleshooting methodology requires a few steps before you can implement the solution? For example, you might need additional resources such as known good replacement parts. A backup of user data should be part of the plan of action.

A

Establish a Plan of Action. The 4th step

43
Q

Which troubleshooting is the scenario below?

Even though you think the problem is fixed, you need to verify with the customer/user that it’s fixed. Second, try to do something to prevent the problem from happening again in the future, if possible.

A

Verify and Prevent / The 5th step

44
Q

Which troubleshooting is the scenario below?

What was the problem? What did you do to fix it? What worked? What didn’t? The best guide to use for documentation is: “What would I have liked to have known about this problem before I walked up to it?”

A

Document findings, actions, and outcomes. / The 6th/last one

45
Q

True or False: Documenting problems helps you track the troubleshooting history of a computing device over time, enabling you to make longer-term determinations about retiring it or changing out more parts. If

A

True

46
Q

At the very least, what tool should be in every technician’s toolkit?
A. Pliers
B. Hammer
C. Straight-slot screwdriver
D. Phillips-head screwdriver

A

D. Phillips-head screwdriver

47
Q

You are at a customer’s workstation to install several software and hardware updates, a process that will take a while and require several reboots of the computer. What should you do about the password to the user’s account?
A.Require the customer to sit with you throughout the process so she can type in her password each time. B.Ask the user to write down her password for you to use.
C.Ask the user to change her password temporarily for you to use.
D. Call your supervisor.

A

C.
In this circumstance, asking for a temporary password is the right answer. Make sure the user changes her password back before you leave the site.

48
Q

Once you have ascertained the computer’s problem and backed up the critical data, what should you do?
A. Establish a theory of probable cause.
B. Start fixing the machine.
C.Question users more to find out how they caused the problem.
D. Document.

A

A.
You should establish a theory of probable cause once you have ascertained the problem and backed up data.

49
Q
A