Core 1 Flashcards
What type of standard adapter card might be used to connect internal FRU devices to the motherboard of a laptop?
Mini-PCIe, mSATA, or M.2.
A company is looking to upgrade the performance of its computers as cost-effectively as possible. What computer component can be cheaply upgraded to improve read/write times?
Hard drive
A computer component was upgraded recently to improve speed. However, during the boot process, the screen states “no bootable disk.” What may have been upgraded?
Hard drive
A support technician had a vendor replace a computer component for an end user’s laptop. The issue was that certain keys failed to press down when typed. What component did the support team replace to resolve the issue?
Keyboard
A technician is performing a keyboard replacement and asks for your help. The data cable for the old keyboard will not pull out. How should it be removed?
This type of flat data connector is secured by a latch. Pop the latch up before trying to remove the cable.
Which is least likely solution for a dim mobile device screen?
Charge the battery
Which is not true of shared printers?
To access a shared printer, create a local printer and then convert it to shared.
A retailer sales representative is trying to sell an LCD TV to a customer. The sales pitch involved a great color contrast. However, it may not be suitable for wide living rooms. What kind of LCD technology does this TV have?
Vertical alignment (VA) uses crystals that tilt rather than twist or rotate. This technology supports a wide color gamut and the best contrast-ratio performance.
Why must a vendor account usually be configured on a smartphone?
A vendor account, such as an Apple, Google, or Samsung account, is required to use the app store.
Which types of data might require mapping between fields when syncing between applications?
Contacts and calendar items.
A company has discovered that an employee has been emailing product design documents to her smartphone and then saving the files to the smartphone’s flash drive. Which technology can be deployed to prevent such policy breaches?
Mobile application management (MAM) allows an enterprise to create a protected container as a workspace for corporate apps and data and prevent copying to other storage areas.