What ACPI power state describes when the CPU and RAM are still receiving power but unused devices are powered down?
What ACPI power state describes when the CPU and RAM are still receiving power but unused devices are powered down? S1 S4 S3 S5
What ACPI power state describes when the CPU and RAM are still receiving power but unused devices are powered down? S1 S4 S3 S5
What ACPI power state describes when the CPU and RAM are off and the contents of RAM have been saved to a temporary file on the hard drive? S4 S3…
What ACPI power state describes when the computer is on and the CPU is running? S0 S4 S3 S5
A technician is upgrading many PCs used within the company. How should the technician dispose of an old battery? Recycle following local regulations. Fix it with duct tape and reuse…
What ACPI power state describes when the CPU is off and the RAM is set to a slow refresh rate, often called suspend mode? S3 S4 S2 S5
A technician is upgrading many PCs used within the company. How should the technician dispose of an old hard drive? Recycle following local regulations. Seal in a cardboard box. Give…
A technician is upgrading many PCs used within the company. How should the technician dispose of an old motherboard? Recycle following local regulations. Take it home. Give it to your…
A technician is upgrading many PCs used within the company. How should the technician dispose of an old inkjet printer cartridge? Recycle following local regulations. Give it to your neighbor.…
A technician is upgrading many PCs used within the company. How should the technician dispose of old RAM? Recycle following local regulations. Take it to the garbage dump. Burn it.…
A technician is upgrading many PCs used within the company. How should the technician dispose of an old power supply? Recycle following local regulations. Burn it. Take it to the…
What is the difference between a scripting language and a compiled language? Scripting languages need to be converted into executable code using a compiler, while compiled languages are interpreted as…
A bench technician enters the server room and finds the backup server computer case open. The hard drives containing patient medical data are all physically disconnected from the motherboard and…
What is used to control illegal use of software and content? chain of custody service level agreement End User License Agreement digital rights management Explanation: Digital rights management, or DRM,…
In a computer forensics investigation, which type of data is considered volatile data and can be lost if power is removed from the computer? data stored on magnetic disks data…
Which subject area describes collecting and analyzing data from computer systems, networks, and storage devices, as part of an investigation of alleged illegal activity? cyber law computer forensics cryptography disaster…
What two kinds of problems should be escalated from a level one technician to a level two technician? (Choose two.) problems that require rebooting the equipment problems that can be…
What two actions are appropriate for a support desk technician to take when assisting customers? (Choose two.) Interrupt customers if they start to solve their own problems. Comfort a customer…
What are three pieces of information a level one technician should gather from a customer? (Choose three.) contact information description of the problem details of any recent changes to the…
Which two actions should a technician take if illegal content, such as child pornography, is discovered on the hard drive of a customer computer? (Choose two.) Confront the customer immediately.…
The IT department has just purchased 15 wireless access points in order to provide full wireless coverage for all 100 employees within the company and is looking to deploy the…