Chkdsk: This tool checks the integrity of the harddrives in your machine this tool can check and correct errors found on the local harddrive. The tool can be launched from a command prompt by opening the command prompt and typing in chkdsk. Chkdsk has many options such as chkdsk /f. This command will fix the errors found when you run just the standard chkdsk this only report the status of the harddrive. Next tool on our list is the disk defragmenter tool.
| |Question 9 |What is the current name of your computer? | |Question 10 |What do you see when you log on to a Server Core computer? | |Question 11 |What is the current name of the computer? | |Question 12 |What functions can you perform with the netdom command? | |Question 13 |What warning is displayed on the screen?
· The ROM BIOS stores the first instruction, which is the instruction to run the power-on self-test (POST). · POST begins by checking the BIOS chip and then tests CMOS RAM. · POST checks the hardware devices (such as the video card), secondary storage devices, such as hard drives and floppy drives,
Do not select the Use BinHex For Macintosh check box. 3. c. .NET password authentication 4. b. Increase the connection time-out value on the front-end POP3 virtual server. 5. c. The Exchange virtual server on a back-end server 6. c. Verify that moved user accounts have POP3 enabled. 7. a.
vi. B: The CPU reads all RAM sequentially, beginning with the first byte, until it happens to read the byte that the CPU wanted to read. 6. A user has opened a word processor, typed the numbers 123456789, and stored the document as a file called report1. Which of the following determines, in part, what bits the computer stores in the file to represent the text typed into the report?
4.4.3 Noise SMF Crosstalk Coaxial Interference Coaxial Op en (Open Circuit) UTP Short (Short Circuit) MMF Break UTP 4.4.4 I first start with my anti-virus to run any scans, after that I go into my device manager and click the network adapter. I then will go into my general tab and click trouble shoot. 4.4.5 Some of the common strategies for trouble shooting from top down starts with are you able to view a web page in your browser, can you se nd or receive email and/or are your username and password correct, and are your Interne t Explorer connection settings correct. If none of those are an issue you take it a little further. Is there a firewall configured on your computer, is your firewall block ing ports, if you turn off the firewall does it resolve your problem?
Determine whether port expanders are made for specific types of computers, or if they generic devices that will work with any computer. 4. You should also discuss the possible advantages and disadvantages of using a port expander. Required Resources In addition to having read Chapter 4 to become familiar with the different buses available on the motherboard, you will need to search the Internet for information on port expanders. Submission Specifications Submit the results of your work using the following specifications: File Format: Microsoft Word (.doc /.docx) Length: 1-2 pages Font: Arial 10-point Line Spacing: Double Self-Assessment Checklist The following checklist will help you prepare for the graded activity and/or assess the deliverable(s) as you prepare to submit them.
domain controller 1) What is the term used to describe a read-only copy of a user profile stored on a network share? Mandatory Profile 2) When you create a new user account with the User Accounts control panel, you can only add it to which of the following groups? ((choose all that apply)) Administrators and Users 3) When you log on to a newly installed Win 7 computer for the first time, why can you not use the administrator account? It is disabled 4) What is true about The User Accounts Control Panel? It can create Local Users Only.
The Windows Vista driver attempts to maintain the association to the wireless router/AP over power state transitions (such as hibernate). If the computer resumes its normal state from standby or hibernation before the wireless router/AP times out and disconnects, you are still connected to the network and there is no need to provide your user name/password. Problem or symptom: With my Windows Vista based computer, I cannot connect to a wireless router/AP that requires LEAP authentication. Possible solution: This is a known defect with the Cisco CCXv4 supplicant pertaining to LEAP. The solution to this problem is being investigated; please check support.dell.com for latest Dell Wireless releases.
COSC 101-007: Microbased Computer Literacy Syllabus Instructor: Dr. Waleed Farag Semester: Spring, 2003 Lectures: M/W 6:30 PM - 8:00 PM Room 327/320 Office: 339 Stright Hall Phone: (724)357-7995 E-mail: farag@iup.edu Web Page: www.people.iup.edu/farag Office Hours: T 11:15 AM - 1:15 PM, W 2:30 PM - 3:30 PM, R 11:15 AM - 1:15 PM COSC 101 Web Page: www.scsite.com I. Course Description An introductory course designed to provide students with a fundamental understanding of computers. The course familiarizes students with the interaction of computer hardware and software. Emphasis is placed on the application of microcomputers, the use of productivity software (word processing, spreadsheet management,