IP Net Checker 1.4.6.6 serial key or number
IP Net Checker 1.4.6.6 serial key or number
エキサイトブログ
Gioco di domino.gioca a burraco online.the program periodically pings, checks tcp ports or.torrent hash: fdaf7f7eba1cccdf72f0cd450ec.download veronisoft ip net checker v 9 laxity torrent from software category on isohunt.miglior gioco di belote.divertiti giocando insieme a oltre 20.
For free.direct download via magnet link.free.the app periodically pings.thepiratebay.to, download torrents, music, movies, games, apps, software and much more.download veronisoft.ip.net.checker.v.5 laxity.vs ip monitor formerly veronisoft ip net checker .4 is a network.internet and lan.acquistali oggimiglior.
Veronisoft.veronisoft ip net checker 4 activator rar: logiciel: veronisoft ip net checker 4 x86x64 exclusive: logiciel: veronisoft ip net checker v.4 x64 laxity.similar activation keys.download veronisoft.ip.net.checker.v.7 laxity torrent or any other torrent from.
The applications windows.serial key for veronisoft ip net checker v.6 can be found and viewed here.thepiratebay.to, download torrents, music, movies, games, apps, software and much more.view in text.i prezzi aumentano. on user specified computers workstations, servers or.
Other network.veronisoft ip net checker v.2.veronisoft ip net checker .6 3 mb ip net checker is a network monitoring software that allows you to verify the network connectivity of ip hosts on thedownload ip net checker.
Milioni di amici online.in vendita oggi.assicurati i biglietti.ip net checker is a network monitoring.we have the largest serial numbers data base.download from rapidgator.net.titre: veronisoft ip net checker v 7 laxity torrent.entra e gioca a briscola.
With Veronisoft ip net checker 1.4.6.6 x86x64h33tmalestom often seekPopular Downloads:Cardrecovery v5.10 build 0121 cracked proxyJunior learning calculating accelerator set 1Corel painter essentials 3 corel painter 9.5Ashampoo burning studio 2017 with key by aldo97Joboshare video converter 2.7 serialこの記事をみんなに教えよう!
Источник: [https://torrent-igruha.org/3551-portal.html]Study Guide for
MasterExam for A+ MasterExam for Exam 220-802 A+ Practical Application
Exam Type: MasterExamTyaria Carlisle
09/24/2020 05:48:52 AM
This Adaptive Study Guide represents all questions that were answered incorrectly. The test question title, steps (if applicable) and references have been included to assist you in your study.
In which way would a support professional be able to view the .docx on the end of a file from the Folder Options panel?
Choices:
A - | Clear the View hidden files check box |
B - | Select the View hidden files check box |
C - | Select the Extensions options check box |
D - | Clear the Hide extensions for known file types check box |
References:
EXPLANATION: To be able to see the .docx extension and other extensions, a support professional must deselect Hide extensions. REFERENCE: LearnKey's A+ Certification 2012 Course Session 7 Control Panel Folder Options OBJECTIVE: 1.0 Operating Systems 1.5 Given a scenario, use Control Panel utilities (the items are organized by ""classic view/large icons"" in Windows) 1.5.1 Common to all Microsoft Operating Systems 1.5.1.4 Folder options 1.5.1.4.3 Hide extensions
BSODs are usually caused by a hardware problem; however, the technician has troubleshot all the hardware and found no problems. Which are some common causes of BSODs due to the operating system? Choose all that apply.
Choices:
A - | Corrupt .dll files |
B - | Memory corruption |
C - | Malfunctioning motherboard |
D - | Poorly written device drivers |
References:
EXPLANATION: Some of the most common causes of BSOD are corrupt DLL files and poorly written device drivers. REFERENCE: LearnKey's A+ Certification 2012 Course Session 10 Troubleshooting OS Problems Common OS Symptoms OBJECTIVE: 4.0 Troubleshooting 4.6 Given a scenario troubleshoot operating system problems with appropriate tools. 4.6.1 Common symptoms 4.6.1.1 BSOD
An administrator wants to configure printer drivers with Print Management. Which option represents the group where Print Management can be accessed?
Choices:
A - | Programs |
B - | User Accounts |
C - | Administrative Tools |
D - | Appearance and Personalization |
References:
EXPLANATION: Located under Administrative Tools, Print Management is a complex tool that allows users to regulate printers, drivers, and view print job information. REFERENCE: LearnKey's A+ Certification 2012 Course Session 7 Windows Administration Tools Tool Explanations OBJECTIVE: 1.4 Given a scenario, use appropriate operating system features and tools. 1.4.1 Administrative 1.4.1.11 Print management
A user is trying to determine whether the Windows OS has been activated. Which would be the path to find this information in Windows 7 from the Control Panel?
Choices:
A - | HomeGroups |
B - | Display > Resolution |
C - | Folder Options > Sharing |
D - | System and Security > System |
References:
EXPLANATION: The path that would be used to find out if the OS has been activated is: Control Panel > System and Security > System. REFERENCE: LearnKey's A+ Certification 2012 Course Session 7 Control Panel Security Center and Power Options OBJECTIVE: 1.0 Operating Systems 1.5 Given a scenario, use Control Panel utilities (the items are organized by ""classic view/large icons"" in Windows) 1.5.1 Common to all Microsoft Operating Systems 1.5.1.5 System
A user wants to know how to create an extended partition on a computer running Windows XP. Use the drag and drop method to correctly order the steps that will create an extended partition from the Disk Management snap-in.
References:
EXPLANATION: By following the steps in the correct order, a user would be able to create an extended partition. REFERENCE: LearnKey's A+ Certification 2012 Course Session 8 Window Disk Management Windows Disk Management Bonus Round OBJECTIVE: 1.0 Operating Systems 1.4 Given a scenario, use appropriate operating system features and tools. 1.4.4 Disk management 1.4.4.3 Extending partitions
Which tools are used to troubleshoot problems with the motherboard, RAM, CPU, and power? Choose all that apply.
Choices:
A - | Multimeter |
B - | POST card |
C - | Loopback plugs |
D - | Motherboard gauge |
E - | Power supply tester |
References:
EXPLANATION: The tools used for troubleshooting are POST card, multimeter, loopback plugs, and a power supply tester. REFERENCE: LearnKey's A+ Certification 2012 Course Session 10 Troubleshooting System Problems System Repair Tools OBJECTIVE: 4.0 Troubleshooting 4.2 Given a scenario, troubleshoot common problems related to motherboards, RAM, CPU, and power with appropriate tools. 4.2.2 Tools
Which option represents a method of migrating 100 users to different computers using the USMT?
Choices:
A - | Windows automatically creates 100 users |
B - | Running a predetermined script on startup |
C - | Letting users copy data to a removable disk |
D - | Logging in the USMT Web site and creating an account |
References:
EXPLANATION: Scripts are instructions that can be triggered by an event such as when the computer starts. A script can call a program to run with specific options selected. A script can be run on multiple computers using variables. An example of variables are a user name and creating a network location based on a user name. REFERENCE: LearnKey's A+ Certification 2012 Course Session 8 System Migrations System Migration Tools OBJECTIVE: 1.6 Setup and configure Windows networking on a client/desktop. 1.4.5 Other 1.4.5.1 User State Migration tool (USMT)
Which options represent the Windows 7 editions that include BitLocker? Choose all that apply.
Choices:
A - | Ultimate |
B - | Standard |
C - | Enterprise |
D - | Professional |
References:
EXPLANATION: Ultimate and Enterprise editions contain BitLocker. BitLocker is also an option for Windows Server 2008 R2. REFERENCE: LearnKey's A+ Certification 2012 Course Session 7 Windows 7 Features Windows 7 Features Bonus Round OBJECTIVE: 1.0 Operating Systems 1.1 Compare and contrast the features and requirements of various Microsoft Operating Systems. 1.1.4 Features 1.1.4.2 bit-locker
If a file cannot be cleaned, which action is taken by the antivirus software?
Choices:
A - | Blocks connectivity |
B - | Quarantines the file |
C - | Compresses file codes |
D - | Disables system restore |
References:
EXPLANATION: If an antivirus program cannot clean a file, it quarantines the file. REFERENCE: LearnKey's A+ Certification 2012 Course Session 9 Security Solutions Security Solutions Bonus Round OBJECTIVE: 4.0 Troubleshooting 4.7 Given a scenario, troubleshoot common security issues with appropriate tools and best practices. 4.7.3 Best practices for malware removal 4.7.3.2 Quarantine infected system
Which recovery method is used to create a backup of a system partition and make a floppy disk containing critical system settings?
Choices:
A - | System Configuration |
B - | Emergency Repair Disk |
C - | System Recovery Console |
D - | Automated System Recovery |
References:
EXPLANATION: Automated System Recovery (ASR) is used to create a backup of a system partition and make a floppy disk containing critical system settings. REFERENCE: LearnKey's A+ Certification 2012 Course Session 7 Installation Planning Installation Planning Bonus Round OBJECTIVE: 1.0 Operating Systems 1.2 Given a scenario, install, and configure the operating system using the most appropriate method. 1.2.9 Factory recovery partition
Which are the uses of the Disk Management snap-in?
Choices:
A - | Services and tools |
B - | Reading and writing |
C - | Disk failure and reboot |
D - | Partitioning and formatting |
References:
EXPLANATION: The tool for partitioning and formatting is the Disk Management utility. REFERENCE: LearnKey's A+ Certification 2012 Course Session 8 Windows Disk Management Windows Disk Management Bonus Round OBJECTIVE: 1.0 Operating Systems 1.4 Given a scenario, use appropriate operating system features and tools. 1.4.4 Disk management
An administrator wants to navigate the local hard drive in search of a folder. Which option represents the command she can use to view files?
Choices:
A - | Mmc |
B - | Explorer |
C - | Notepad |
D - | Services |
References:
EXPLANATION: Typing the command explorer will open the MS Explorer which displays files and folders on a drive. REFERENCE: LearnKey's A+ Certification 2012 Course Session 8 Run Line Utilities Explorer OBJECTIVE: 1.4 Given a scenario, use appropriate operating system features and tools. 1.4.6 Run line utilities 1.4.6.8 EXPLORER
Click the Exhibit button. Which option represents the symbol that represents an administrative share?
Choices:
A - | Option A |
B - | Option B |
C - | Option C |
D - | Option D |
References:
EXPLANATION: When the symbol $ is used with a share name, it represents an administrative share which is hidden. The default settings allow only administrators access. REFERENCE: LearnKey's A+ Certification 2012 Course Session 9 Security Settings Shared Files and Folders OBJECTIVE: 1.0 Operating Systems 1.8 Explain the differences among basic OS security settings. 1.8.3 Shared files and folders
Which options represent features of the Aero desktop experience? Choose all that apply.
Choices:
A - | Aero Filp 3D |
B - | Task Switcher |
C - | Aerodynamic control panel |
D - | Aero Shake and Aero Peek |
References:
EXPLANATION: Aero allows for thumbnail previews of the taskbar, glass window borders, and shake and peek window arrangement. Aero Flip 3D and the Task Switcher are also features of Windows Vista. REFERENCE: LearnKey's A+ Certification 2012 Course Session 7 Windows 7 Features Graphical Features OBJECTIVE: 1.0 Operating Systems 1.1 Compare and contrast the features and requirements of various Microsoft Operating Systems. 1.1.4 Features 1.1.4.2 Aero
A technician purchased a maintenance kit for a printer. The kit included a fuser assembly and _________ components.
Choices:
A - | extinct |
B - | unused |
C - | replaceable |
D - | unobtainable |
References:
EXPLANATION: A maintenance kit usually contains replaceable components such as rollers and gears that wear over time and with heavy use. REFERENCE: LearnKey's A+ Certification 2012 Course Session 10 Troubleshooting Additional Devices Printer Repair Tools OBJECTIVE: 4.9 Given a scenario, troubleshoot printers with appropriate tools 4.9.2 Tools 4.9.2.1 Maintenance kit
Which actions should a user take if RAID is not found? Choose all that apply.
Choices:
A - | Verify the cables |
B - | Check the controller |
C - | Attempt to boot the OS |
D - | Ensure the drives have not failed |
References:
EXPLANATION: If RAID is not found, verify the cables, check the controller, and ensure the drives have not failed. REFERENCE: LearnKey's A+ Certification 2012 Course Session 10 Troubleshooting Storage Problems Storage Problems OBJECTIVE: 4.0 Troubleshooting 4.3 Given a scenario, troubleshoot hard drives and RAID arrays with appropriate tools. 4.3.1 Common symptoms 4.3.1.7 RAID not found
Which option involves acquiring, testing, and installing multiple code changes to an administered computer system?
Choices:
A - | Disk checking |
B - | Driver updates |
C - | System restores |
D - | Patch management |
References:
EXPLANATION: Patch management involves acquiring, testing, and installing multiple code changes to an administered computer system. REFERENCE: LearnKey's A+ Certification 2012 Course Session 9 Preventative Maintenance Preventative Maintenance Bonus Round OBJECTIVE: 1.0 Operating Systems 1.7 Perform preventive maintenance procedures using appropriate tools. 1.7.1 Best practices 1.7.1.5 Patch management
Which is the correct definition for the term social engineering?
Choices:
A - | A social networking Web site launched in February 2004 |
B - | The act of removing by cleansing or ridding of sediment from the Web |
C - | Software designed to secretly access a computer system without the owner's informed consent |
D - | The act of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical cracking techniques |
References:
EXPLANATION: Social engineering is the act of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical cracking techniques. REFERENCE: LearnKey's A+ Certification 2012 Course Session 9 Security Threats Social Engineering OBJECTIVE: 2.0 Security 2.2 Compare and contrast common security threats 2.2.1 Social engineering
Which utilities and Web sites can be used to upgrade to Windows 7? Choose all that apply.
Choices:
A - | Windows Upgrade Advisor from Microsoft's Web site |
B - | Windows Compatibility Center from Microsoft's Web site |
C - | Windows 7 Upgrade Compatibility Pros from a third party |
D - | Windows 7 logo'd products lists from winqual.microsoft.com |
References:
EXPLANATION: The utilities and Web sites that can be used to upgrade to Windows 7 are: Windows uprgrade advisor, Windows compatibility center, and Windows 7 logo'd products lists. REFERENCE: LearnKey's A+ Certification 2012 Course Session 7 Installation Planning Installation Planning Bonus Round OBJECTIVE: 1.0 Operating Systems 1.2 Given a scenario, install, and configure the operating system using the most appropriate method 1.2.2 Type of installations 1.2.2.1 Creating image 1.2.2.1.2 Upgrade
Which recovery tool re-creates the boot sector in the command prompt?
Choices:
A - | COPY |
B - | FIXMBR |
C - | CHKDSK |
D - | FIXBOOT |
References:
EXPLANATION: FIXBOOT replaces the bootmgr file and writes a new Windows Vista compatible boot sector to the system partition. REFERENCE: LearnKey's A+ Certification 2012 Course Session 8 Windows Command Prompt OS Commands OBJECTIVE: 1.0 Operating Systems 1.3 Given a scenario, use appropriate command line tools. 1.3.3 Recovery console 1.3.3.1 Fixboot
Which does the IPCONFIG command display?
Choices:
A - | DNS details |
B - | Network statistics |
C - | Available hosts over the network |
D - | TCP/IP network configuration values |
References:
EXPLANATION: Internet protocol configuration or IPCONFIG displays current TCP/IP network configuration values. REFERENCE: LearnKey's A+ Certification 2012 Course Session 8 Windows Command Prompt Networking Commands OBJECTIVE: 1.0 Operating Systems 1.3 Given a scenario, use appropriate command line tools. 1.3.1 Networking 1.3.1.4 IPCONFIG
An administrator wants to know more about how e-mail spam is identified. Which options represent characteristics of spam e-mail messages? Choose all that apply.
Choices:
A - | A blank subject line |
B - | Same advertising in the body of the e-mail |
C - | Same source address already identified as a spam supplier |
D - | Same message size in bytes as an identified spam message |
References:
EXPLANATION: A spammer will use one message to send to many recipients. There is typically an advertisement or link to a Web site. Although fictitious information and misleading data can be included, messages usually have similarities that can be used to associate spam messages in different inboxes. REFERENCE: LearnKey's A+ Certification 2012 Course Session 10 Troubleshooting OS Problems OS Problems Bonus Round OBJECTIVE: 4.7 Given a scenario, troubleshoot common security issues with appropriate tools and best practices. 4.7.1 Common symptoms 4.7.1.9 Spam
A technician is making custom-sized Ethernet cables. Which tool would she probably use to fix the plastic connectors to the ends of the cable?
Choices:
A - | Crimper |
B - | Ball peen |
C - | Kevlar shear |
D - | Swaging tool |
References:
EXPLANATION: A crimper is a special tool designed to lock a connector on the end of a cable. REFERENCE: LearnKey's A+ Certification 2012 Course Session 10 Troubleshooting Network Problems Network Repair Tools OBJECTIVE: 4.5 Given a scenario, troubleshoot wired and wireless networks with appropriate tools. 4.5.2 Tools 4.5.2.6 Crimper
A user has some missing files or incorrect versions of files when booting a computer. Which command utility can be used to fix this problem?
Choices:
A - | SFC |
B - | FORMAT |
C - | FIXBOOT |
D - | BOOTREC |
References:
EXPLANATION:The SFC tool can replace incorrect versions or missing files with the correct files. REFERENCE: LearnKey's A+ Certification 2012 Course Session 8 Windows Command Prompt OS Commands OBJECTIVE: 1.0 Operating Systems 1.3 Given a scenario, use appropriate command line tools. 1.3.2 OS 1.3.2.15 SFC
A user is instructed to type Cmd in the Run line. Which option represents the action triggered by typing Cmd in the Run line?
Choices:
A - | Regedit opens |
B - | A dialog box opens |
C - | The computer shuts off |
D - | A command prompt opens |
References:
EXPLANATION: Cmd opens the command prompt which enables a user to type in commands or instructions for the operating system. It has been called the MS-DOS prompt because it resembles the MS-DOS operating system which does not use a graphical interface. REFERENCE: LearnKey's A+ Certification 2012 Course Session 8 Run Line Utilities Available Utilities OBJECTIVE: 1.4 Given a scenario, use appropriate operating system features and tools. 1.4.6 Run line utilities 1.4.6.3 CMD
Which option represents the best reason to calibrate a mobile device screen?
Choices:
A - | To clear settings that interfere with 3G |
B - | To correct errors with voice command calls |
C - | To synchronize e-mail from the network carrier |
D - | To set up screens for best touch responsiveness |
References:
EXPLANATION: Calibrating a mobile device screen sets up the screen to match the icons displayed. When the screen is pressed, it can be set up to press slightly to the left, right, or dead center of the intended target. REFERENCE: LearnKey's A+ Certification 2012 Course Session 6 Mobile Device Operating Systems Screen Calibration OBJECTIVE: 3.0 Mobile Devices 3.1 Explain the basic features of mobile operating systems. 3.1.1 Android vs. iOS 3.1.1.4 Screen calibration
Which type of formatting does not scan the disk for bad sectors?
Choices:
A - | CDFS |
B - | Full format |
C - | Quick format |
D - | Normal format |
References:
EXPLANATION: Quick format does not scan the disk for bad sectors. CDFS is not a type of formatting. REFERENCE: LearnKey's A+ Certification 2012 Course Session 7 Installation Planning File Systems OBJECTIVE: 1.0 Operating Systems 1.2 Given a scenario, install, and configure the operating system using the most appropriate method. 1.2.4 File system types/formatting 1.2.4.5 Quick format vs. full format
A technician is using Event Viewer to determine problems within the operating system. Which are log files inside the Event Viewer to help in this process? Choose all that apply.
Choices:
A - | System |
B - | Security |
C - | Command |
D - | Application |
References:
EXPLANATION: The Event Viewer can help determine problems within the operating system through three log files: system, security, and applications. REFERENCE: LearnKey's A+ Certification 2012 Course Session 10 Troubleshooting OS Problems OS Problems Bonus Round OBJECTIVE: 4.0 Troubleshooting 4.6 Given a scenario troubleshoot operating system problems with appropriate tools. 4.6.2 Tools 4.6.2.11 Event viewer
A technician is disassembling several laptops. Which option demonstrates good practice with regards to organizing parts? Choose all that apply.
Choices:
A - | Use spray paint to mark parts |
B - | Put all parts in one bin as a central location |
C - | Use plastic bins to keep parts sorted neatly |
D - | Use plastic bags to keep parts sorted neatly |
References:
EXPLANATION: Sorting parts and keeping them organized is crucial to the reassembly process. There are many small parts that are easily confused and will be lost without proper organization. REFERENCE: LearnKey's A+ Certification 2012 Course Session 10 Troubleshooting Additional Devices Laptop Disassembly Process OBJECTIVE: 4.8 Given a scenario, troubleshoot, and repair common laptop issues while adhering to the appropriate procedures. 4.8.2 Disassembling process for proper re-assembly 4.8.2.2 Organize parts
Which is an option for which firewall to use on a computer?
Choices:
A - | Ultra Firewall |
B - | Linux Firewall |
C - | Normal Firewall |
D - | Windows Firewall |
References:
EXPLANATION: Windows Firewall can be used easily because it is built into the operating system. REFERENCE: LearnKey's A+ Certification 2012 Course Session 8 Network Configuration Firewall and Proxy Settings OBJECTIVE: 1.0 Operating Systems 1.6 Setup and configure Windows networking on a client/desktop. 1.6.8 Firewall settings 1.6.8.2 Configuration
Which is a solution when a computer automatically boots to safe mode?
Choices:
A - | Replace missing files |
B - | Replace missing Boot.ini |
C - | Reinstall operating system |
D - | Reinstall or uninstall device drivers |
References:
EXPLANATION: A solution for a computer that automatically boots to safe mode is to reinstall or uninstall device drivers that are causing the problem. REFERENCE: LearnKey's A+ Certification 2012 Course Session 10 Troubleshooting OS Problems Common OS Symptoms OBJECTIVE: 4.0 Troubleshooting 4.6 Given a scenario troubleshoot operating system problems with appropriate tools. 4.6.1 Common symptoms 4.6.1.11 Boots to safe mode
Which is a way to determine if an exception is needed in the firewall for an application?
Choices:
A - | Disable firewall |
B - | Create a virtual machine |
C - | Notify the motherboard of the error |
D - | Test application through a different port |
References:
EXPLANATION: To determine if an exception is needed, a user would need to disable the firewall and open up the ports. REFERENCE: LearnKey's A+ Certification 2012 Course Session 8 Network Configuration Network Configuration Bonus Round OBJECTIVE: 1.0 Operating Systems 1.6 Setup and configure Windows networking on a client/desktop. 1.6.8 Firewall settings 1.6.8.3 Enable/disable Windows Firewall
Which option represents the minimum amount of space required on a ReadyBoost device?
Choices:
A - | 4 GB |
B - | 32 GB |
C - | 256 MB |
D - | 812 MB |
References:
EXPLANATION: ReadyBoost requires a minimum of 256 MB reserved for caching. A cache cannot be over 4 GB on a FAT32 formatted drive or 32 GB on an NTFS formatted drive. REFERENCE: LearnKey's A+ Certification 2012 Course Session 7 Windows 7 Features Windows 7 Features Bonus Round OBJECTIVE: 1.0 Operating Systems 1.1 Compare and contrast the features and requirements of various Microsoft Operating Systems. 1.1.4 Features 1.1.4.2 ready boost
A user is smelling an electronic burning smell every time the computer is turned on. Which could be the cause of this smell?
Choices:
A - | A solid-state drive is creating heat |
B - | The power supply fan is working perfectly creating heat |
C - | Dust has choked up the heat sink fan and the CPU is overheating |
D - | The motherboard is processing information and is overheating |
References:
EXPLANATION: One of the possible causes for the burning smell is that dust has choked up the heat sink fan and the CPU is overheating. REFERENCE: LearnKey's A+ Certification 2012 Course Session 10 Troubleshooting Storage Problems Storage Problems Bonus Round OBJECTIVE: 4.0 Troubleshooting 4.2 Given a scenario, troubleshoot common problems related to motherboards, RAM, CPU, and power with appropriate tools. 4.2.1 Common symptoms 4.2.1.15 Burning smell
A technician is checking corrupted files. Which are some effects of corrupted files? Choose all that apply.
Choices:
A - | Missing Boot.ini |
B - | Invalid boot disk |
C - | Device fails to start |
D - | Services fail to start |
References:
EXPLANATION: Corrupt files can cause devices and services to fail to start. REFERENCE: LearnKey's A+ Certification 2012 Course Session 10 Troubleshooting OS Problems Common OS Symptoms OBJECTIVE: 4.0 Troubleshooting 4.6 Given a scenario troubleshoot operating system problems with appropriate tools. 4.6.1 Common symptoms 4.6.1.6 Device fails to start 4.6.1.8 Services fails to start
Which option represents a reason a computer would use an alternate IP address instead of one assigned by a network server?
Choices:
A - | The computer is in a domain |
B - | The network adapter prefers a static IP address |
C - | The computer has a complicated computer name |
D - | The DHCP server is unavailable to assign an IP address |
References:
EXPLANATION: A computer with an alternate IP address will use the alternate IP address when there is no DHCP server available. REFERENCE: LearnKey's A+ Certification 2012 Course Session 8 Network Configuration Configuring Alt IP Address OBJECTIVE: 1.6 Setup and configure Windows networking on a client/desktop. 1.6.9 Configuring an alternative IP address in Windows 1.6.9.1 IP addressing
Which is the best mode to use when scanning for viruses?
Choices:
A - | Safe mode |
B - | CHKDSK mode |
C - | PrivateScan mode |
D - | Regular Windows boot |
References:
EXPLANATION: Safe mode is the best mode to use for scanning viruses if the antivirus software offers it. REFERENCE: LearnKey's A+ Certification 2012 Course Session 9 Security Solutions Malware Removal OBJECTIVE: 4.0 Troubleshooting 4.7 Given a scenario, troubleshoot common security issues with appropriate tools and best practices. 4.7.3 Best practices for malware removal 4.7.3.4 Remediate infected systems 4.7.3.4.2 Scan and removal techniques
When a technician is testing a theory, sometimes it is a simple case of reconnecting a plug, but more often than not, it leads the technician to which other issue?
Choices:
A - | Know that computer needs to be replaced |
B - | The inevitable verification of a broken part |
C - | Reconstruct the computer from the ground up |
D - | The user was wrong and there is no problem with the computer |
References:
EXPLANATION: Often testing theories leads a technician to verify that there is a broken part. REFERENCE: LearnKey's A+ Certification 2012 Course Session 10 Troubleshooting Theory Troubleshooting Theory Bonus Round OBJECTIVE: 4.0 Troubleshooting 4.1 Given a scenario, explain the troubleshooting theory. 4.1.3 Test the theory to determine the cause
Which options represent categories in the Control Panel category view in Windows 7? Choose all that apply.
Choices:
A - | Programs |
C - | Speech Recognition |
D - | Network and Internet |
B - | User Accounts |
References:
EXPLANATION: Programs, User Accounts, and Network and Internet are categories in the Control Panel. Speech Recognition is an application found under the Ease of Use category. REFERENCE: LearnKey's A+ Certification 2012 Course Session 7 Windows 7 Features Windows 7 Features Bonus Round OBJECTIVE: 1.0 Operating Systems 1.1 Compare and contrast the features and requirements of various Microsoft Operating Systems. 1.1.4 Features 1.1.4.2 category view vs. classic view
If TRACERT stops before saying Trace Complete, which action should the user take?
Choices:
A - | Replace router |
B - | Troubleshoot router |
C - | Reboot and run TRACERT again |
D - | Respond to the appropriate port |
References:
EXPLANATION: If a TRACERT stops altogether before saying Trace Complete, a user should check the network documentation to find out which router it stopped at. The user then needs to make sure that the router is troubleshot by the appropriate personnel. REFERENCE: LearnKey's A+ Certification 2012 Course Session 8 Windows Command Prompt Windows Command Prompt Bonus Round OBJECTIVE: 1.0 Operating Systems 1.3 Given a scenario, use appropriate command line tools. 1.3.1 Networking 1.3.1.2 TRACERT
Worms are similar to viruses except they __________, whereas a virus does not.
Choices:
A - | self-replicate |
B - | decrease in size |
C - | have to be manually installed |
D - | have to be distributed by way of PPTP VPNs |
References:
EXPLANATION: Worms are similar to viruses except they self-replicate, whereas a virus does not. REFERENCE: LearnKey's A+ Certification 2012 Course Session 9 Security Threats Malware OBJECTIVE: 2.0 Security 2.2 Compare and contrast common security threats 2.2.6 Viruses 2.2.6.1 Worms
Which option represents users who are able to see public folders on Windows 7?
Choices:
A - | Power users only |
B - | Local administrators only |
C - | All who use the computer |
D - | Domain Administrators only |
References:
EXPLANATION: Anyone logged into the computer has access to public folders. This file structure makes it easy to share files between users. REFERENCE: LearnKey's A+ Certification 2012 Course Session 7 Windows 7 Features Windows 7 Features Bonus Round OBJECTIVE: 1.0 Operating Systems 1.1 Compare and contrast the features and requirements of various Microsoft Operating Systems. 1.1.4 Features 1.1.4.2 file structure and paths
A technician is trying to figure out why a computer has displayed a BSOD. In order to find out more information about what caused the problem, which would be the best place for the technician to search for the stop code error message from the BSOD?
Choices:
A - | Google search |
B - | OS documentation |
C - | Microsoft's Web site |
D - | Company documentation of past problems |
References:
EXPLANATION: The best location to search for the information of a stop error code would be to search Microsoft's Web site. REFERENCE: LearnKey's A+ Certification 2012 Course Session 10 Troubleshooting OS Problems Common OS Symptoms OBJECTIVE: 4.0 Troubleshooting 4.6 Given a scenario troubleshoot operating system problems with appropriate tools. 4.6.1 Common symptoms 4.6.1.1 BSOD
In which installation process does the installation start, progress, and finish without a user touching the computer?
Choices:
A - | Clean installation |
B - | Attended installation |
C - | Controlled installation |
D - | Unattended installation |
References:
EXPLANATION: Unattended installation is when an installation starts, progresses, and finishes without a user touching it. REFERENCE: LearnKey's A+ Certification 2012 Course Session 7 Installation Planning Installation Types OBJECTIVE: 1.0 Operating Systems 1.2 Given a scenario, install, and configure the operating system using the most appropriate method 1.2.2 Type of installations 1.2.2.1 Creating image 1.2.2.1.1 Unattended installation
In Windows Vista, offline file configuration is done through the Control Panel, which is unique to Windows Vista. Which is used to configure offline files in Windows 7?
Choices:
A - | Sync Center |
B - | Control Panel |
C - | Personalization |
D - | Help and Support |
References:
EXPLANATION: The Sync Center is used to configure offline files in Windows 7, among other things. REFERENCE: LearnKey's A+ Certification 2012 Course Session 7 Control Panel Differences Unique to Windows Vista OBJECTIVE: 1.0 Operating Systems 1.5 Given a scenario, use Control Panel utilities (the items are organized by ""classic view/large icons"" in Windows) 1.5.3 Unique to Vista 1.5.3.3 Offline files
Which is one of the issues that occur when there is a problem with the power supply?
Choices:
A - | Loud noise |
B - | Continuous reboots |
C - | Blank screen bootup |
D - | Intermittent device failure |
References:
EXPLANATION: One of the many things that can happen when there are problems with the power supply is intermittent device failure. REFERENCE: LearnKey's A+ Certification 2012 Course Session 10 Troubleshooting System Problems Common System Symptoms OBJECTIVE: 4.0 Troubleshooting 4.2 Given a scenario, troubleshoot common problems related to motherboards, RAM, CPU, and power with appropriate tools. 4.2.1 Common symptoms 4.2.1.11 Intermittent device failure
Which is used for a client computer to see the shares on another client computer?
Choices:
A - | IEEE |
B - | SMB |
C - | LAN |
D - | QTRW |
References:
EXPLANATION: The server message block protocol (SMB) is used to connect to remote shares. REFERENCE: LearnKey's A+ Certification 2012 Course Session 8 Network Configuration Shares OBJECTIVE: 1.0 Operating Systems 1.6 Setup and configure Windows networking on a client/desktop. 1.6.3 Network shares/ mapping drives
Which are firewall settings that must be considered? Choose all that apply.
Choices:
A - | Exceptions |
B - | Configuration |
C - | Enable/disable |
D - | Automatic updates |
References:
EXPLANATION:The firewall settings are exceptions, configuration, and enable/disable. REFERENCE: LearnKey's A+ Certification 2012 Course Session 8 Network Configuration Firewall and Proxy Settings OBJECTIVE: 1.0 Operating Systems 1.6 Setup and configure Windows networking on a client/desktop. 1.6.8 Firewall settings
A user has run FIXBOOT, but there are problems with the Master Boot Record. Which repair tool can be run in collation with FIXBOOT?
Choices:
A - | FIXCDC |
B - | FIXMBR |
C - | FIXTOOL |
D - | FIXRECORD |
References:
EXPLANATION: A tool that is usually run right after FIXBOOT is FIXMBR and is used to fix problems in the Master Boot Record. REFERENCE: LearnKey's A+ Certification 2012 Course Session 10 Troubleshooting OS Problems OS Repair Tools OBJECTIVE: 4.0 Troubleshooting 4.6 Given a scenario troubleshoot operating system problems with appropriate tools. 4.6.2 Tools 4.6.2.3 Fixmbr
Which computer capability allows a user to boot into one of several installed operating systems?
Choices:
A - | Multi OS |
B - | Multiboot |
C - | Multi-installs |
D - | Multi-images |
References:
EXPLANATION: Multiboot means that a computer has multiple operating systems installed on it and a user can access these for whichever operating system is needed for a given project. REFERENCE: LearnKey's A+ Certification 2012 Course Session 7 Installation Planning Installation Types OBJECTIVE: 1.0 Operating Systems 1.2 Given a scenario, install, and configure the operating system using the most appropriate method 1.2.2 Type of installations 1.2.2.1 Creating image 1.2.2.1.5 Multiboot
When a computer automatically boots to safe mode, which has the computer discovered?
Choices:
A - | The password was incorrect |
B - | It is unable to boot in normal mode |
C - | That antimalware is malfunctioning |
D - | There is someone using brute force to get information from the computer |
References:
EXPLANATION: A computer will boot to safe mode when it has discovered it is unable to boot in normal mode. REFERENCE: LearnKey's A+ Certification 2012 Course Session 10 Troubleshooting OS Problems Common OS Symptoms OBJECTIVE: 4.0 Troubleshooting 4.6 Given a scenario troubleshoot operating system problems with appropriate tools. 4.6.1 Common symptoms 4.6.1.11 Boots to safe mode
Which option represents the OS upgrade path that will preserve files in My Documents?
Choices:
A - | Windows Vista 32-bit to Windows 7 32-bit |
B - | Windows Vista 32-bit to Windows 7 64-bit |
C - | Windows Vista Home to Windows 7 Professional |
D - | Windows Vista Ultimate upgrade to Windows 7 Ultimate |
References:
EXPLANATION: The upgrade from Vista Ultimate to Windows 7 Ultimate will preserve application data and personal data. REFERENCE: LearnKey's A+ Certification 2012 Course Session 7 Windows 7 Features Windows 7 Features Bonus Round OBJECTIVE: 1.0 Operating Systems 1.1 Compare and contrast the features and requirements of various Microsoft Operating Systems. 1.1.5 Upgrade paths - differences between in place upgrades, compatibility tools, Windows upgrade OS advisor
Which option represents the definition of the acronym APIPA?
Choices:
A - | Allocated Public IP Addressing |
B - | Automatic Public IP Addressing |
C - | Allocated Private IP Addressing |
D - | Automatic Private IP Addressing |
References:
EXPLANATION: APIPA stands for Automatic Private IP Addressing. This function is useful when a DHCP server is unavailable due to connectivity problems. REFERENCE: LearnKey's A+ Certification 2012 Course Session 10 Troubleshooting Network Problems Common Network Symptoms OBJECTIVE: 4.5 Given a scenario, troubleshoot wired and wireless networks with appropriate tools. 4.5.1 Common symptoms 4.5.1.2 APIPA address
A user has only Microsoft tools. Which would be used to deploy an image of an operating system installation?
Choices:
A - | WDS |
B - | CDFS |
C - | NTFS |
D - | FAT32 |
References:
EXPLANATION: Windows Deployment Services is a Microsoft tool which helps deploy an image of an operating system installation. REFERENCE: LearnKey's A+ Certification 2012 Course Session 7 Installation Planning Installation Types OBJECTIVE: 1.0 Operating Systems 1.2 Given a scenario, install, and configure the operating system using the most appropriate method 1.2.2 Type of installations 1.2.2.1 Creating image 1.2.2.1.7 Image deployment
An administrator is unable to install a printer on a computer. Which option may be preventing the installation of the printer?
Choices:
A - | The printer has a cracked case |
B - | The print spooler has become corrupted |
C - | The computer already has a printer installed |
D - | The printer does not have a network connector attached |
References:
EXPLANATION: The print spooler controls the print jobs and can become corrupted. The print spooler service sometimes needs to be stopped prior to new installations. REFERENCE: LearnKey's A+ Certification 2012 Course Session 10 Troubleshooting Additional Devices Common Printer Symptoms OBJECTIVE: 4.9 Given a scenario, troubleshoot printers with appropriate tools 4.9.1 Common symptoms 4.9.1.16 Unable to install printer
A network administrator is troubleshooting a switch. He wants to know the path of data packets from a workstation to a Web site. Using the command prompt, which command would he use to learn a path that data uses to reach the Web site?
Choices:
A - | DIR |
B - | SUBST |
C - | TRACERT |
D - | SYSTEMINFO |
References:
EXPLANATION: Tracert will expose jump points data uses to reach a destination. REFERENCE: LearnKey's A+ Certification 2012 Course Session 10 Troubleshooting Network Problems TRACERT Command OBJECTIVE: 4.5 Given a scenario, troubleshoot wired and wireless networks with appropriate tools. 4.5.2 Tools 4.5.2.9 TRACERT
Which two commands work together in the Recovery Console to make a disk bootable again when it has lost the boot sector and the master boot record?
Choices:
A - | FIXMBR |
B - | EXPAND |
C - | FXNEWS |
D - | FIXBOOT |
References:
EXPLANATION: FIXBOOT and FIXMBR work together to make a disk bootable. REFERENCE: LearnKey's A+ Certification 2012 Course Session 8 Windows Command Prompt OS Commands OBJECTIVE: 1.0 Operating Systems 1.3 Given a scenario, use appropriate command line tools. 1.3.3 Recovery console 1.3.3.1 Fixboot 1.3.3.2 Fixmbr
A computer recently began displaying information about a threat reported by security software. The user does not recall installing this software, and pop-up windows are interrupting the normal operation of the computer. Which option represents programs that claim to scan for malware and produce false results with the goal of a user paying for additional support and protection?
Choices:
A - | VMware |
B - | Falseware |
C - | Rogue antivirus |
D - | Malware remover |
References:
EXPLANATION: Rogue antivirus software is intentionally disrupting a computer's performance to coerce the user into paying for their service. This unscrupulous method is becoming more prevalent in malware, as more users are using security software to protect their computers. REFERENCE: LearnKey's A+ Certification 2012 Course Session 10 Troubleshooting OS Problems OS Security Issue Symptoms OBJECTIVE: 4.7 Given a scenario, troubleshoot common security issues with appropriate tools and best practices. 4.7.1 Common symptoms 4.7.1.8 Rogue antivirus
Click, in the correct order, the steps to set up a MAC address filter.
References:
EXPLANATION: Obtain the MAC addresses of each client from its operating system or configuration utility. Enter those addresses into a configuration screen for the wireless access point or router. Switch on the filtering option. REFERENCE: LearnKey's A+ Certification 2012 Course Session 10 Network Security Network Security Bonus Round OBJECTIVE: 2.0 Security 2.5 Given a scenario, secure a SOHO wired network. 2.5.5 Enable MAC filtering
Which options are advantages of creating operating system installation images? Choose all that apply.
Choices:
A - | Installations cannot fail |
B - | Installations can be unattended |
C - | The OS does not need to be licensed |
D - | The installation can be initiated over the network |
References:
EXPLANATION: An operating system installation image supports multiple installations by removing repetitive tasks such as selecting the time zone and other options. A technician can install an operating system and preserve the options in an image. This image can be deployed over the network or on removable media. Options include partition settings, license information, and which software options are included in the image. REFERENCE: LearnKey's A+ Certification 2012 Course Session 7 Installation Planning Installation Types OBJECTIVE: 1.0 Operating Systems 1.2 Given a scenario, install, and configure the operating system using the most appropriate method 1.2.2 Type of installations 1.2.2.1 Creating image 1.2.2.1.1 Unattended installation
Which option represents the effect on the network card when the duplex configuration is set to auto?
Choices:
A - | Network connections are automatically turned on |
B - | Network connections are automatically turned off |
C - | Network connections are detected and settings adjusted |
D - | Network connections are detected and cable settings are indicated |
References:
EXPLANATION: The auto setting will attempt to detect the fastest type of transport and cable limitations between two devices. The network card will set the device to the highest setting. REFERENCE: LearnKey's A+ Certification 2012 Course Session 8 Network Configuration Network Configuration Bonus Round OBJECTIVE: 1.6 Setup and configure Windows networking on a client/desktop. 1.6.10 Network card properties 1.6.10.1 Half duplex/full duplex/auto
Which are things to check when testing connectivity with various devices paired by Bluetooth? Choose all that apply.
Choices:
A - | IOP servers |
B - | Voice recognition |
C - | Exchange of data |
D - | Network connectivity |
References:
EXPLANATION: A couple of things to check are: 1 voice recognition if you are paired with a headset, and 2, network connectivity if pairing to a device for Internet access. REFERENCE: LearnKey's A+ Certification 2012 Course Session 6 Mobile Connectivity Connectivity Options OBJECTIVE: 3.0 Mobile Devices 3.2 Establish basic network connectivity and configure email 3.2.2 Bluetooth 3.2.2.5 Test connectivity
Which server is used by Microsoft as a platform that provides e-mail, scheduling, and tools?
Choices:
A - | Gmail server |
B - | Yahoo server |
C - | Power server |
D - | Exchange server |
References:
EXPLANATION: The Microsoft Exchange Server is the messaging platform that provides e-mail, etc. REFERENCE: LearnKey's A+ Certification 2012 Course Session 6 Mobile Connectivity Mobile Connectivity Bonus Round OBJECTIVE: 3.0 Mobile Devices 3.2 Establish basic network connectivity and configure email 3.2.3 Email configuration 3.2.3.2 Exchange
Which are unique utilities to Windows Vista? Choose all that apply.
Choices:
A - | Offline Files |
B - | Tablet PC Settings |
C - | Pen and Input Devices |
D - | Network Setup Wizard |
References:
EXPLANATION: The unique utilities of Windows Vista are Tablet PC Settings, Pen and Input Devices, and Offline Files. REFERENCE: LearnKey's A+ Certification 2012 Course Session 7 Control Panel Differences Unique to Windows Vista OBJECTIVE: 1.0 Operating Systems 1.5 Given a scenario, use Control Panel utilities (the items are organized by ""classic view/large icons"" in Windows) 1.5.3 Unique to Vista
A technician has gone through step 3 and tested a theory. A plan of action has been established. When should the plan of action be implemented?
Choices:
A - | Immediately |
B - | When the technician has time |
C - | Tomorrow after thinking about it more |
D - | Later, after the computer has been rebooted |
References:
EXPLANATION: The plan of action should be implemented immediately. REFERENCE: LearnKey's A+ Certification 2012 Course Session 10 Troubleshooting Theory Troubleshooting Theory Bonus Round OBJECTIVE: 4.0 Troubleshooting 4.1 Given a scenario, explain the troubleshooting theory. 4.1.4 Establish a plan of action to resolve the problem and implement the solution
VPN protects the packets from which type of eavesdropping?
Choices:
A - | Simple |
B - | Hacker |
C - | Satellite |
D - | Social engineering |
References:
EXPLANATION: VPN protects the packets from simple eavesdropping. REFERENCE: LearnKey's A+ Certification 2012 Course Session 8 Network Configuration Establishing Network Connections OBJECTIVE: 1.0 Operating Systems 1.6 Setup and configure Windows networking on a client/desktop. 1.6.4 Establish network connections 1.6.4.1 VPN
Which are functions of using the Recovery Console? Choose all that apply.
Choices:
A - | Fix boot sectors |
B - | Fix boot records |
C - | Fix update failures |
D - | Partition management |
References:
EXPLANATION: A Recovery Console can fix boot sectors and records, as well as set up partition management. REFERENCE: LearnKey's A+ Certification 2012 Course Session 9 Security Solutions Security Tools OBJECTIVE: 4.0 Troubleshooting 4.7 Given a scenario, troubleshoot common security issues with appropriate tools and best practices. 4.7.2 Tools 4.7.2.4 Recovery console
Which command prompt tools can be used to troubleshoot hard drives? Choose all that apply.
Choices:
A - | RFTF |
B - | FDISK |
C - | CHKDSK |
D - | FORMAT |
References:
EXPLANATION: FDISK, CHKDSK, and FORMAT are command prompt tools used to troubleshoot hard drives. REFERENCE: LearnKey's A+ Certification 2012 Course Session 10 Troubleshooting Storage Problems Storage Repair Tools OBJECTIVE: 4.0 Troubleshooting 4.3 Given a scenario, troubleshoot hard drives and RAID arrays with appropriate tools. 4.3.2 Tools 4.3.2.3 CHKDSK
A user cannot connect to the wireless connection in a certain part of the office. Which option represents the term for a spot of the network that does not offer a connection?
Choices:
A - | RF hole |
B - | RF pothole |
C - | RF shadow |
D - | RF sunspot |
References:
EXPLANATION: RF shadow is the term for a place on the network that has no connection. Slight antenna adjustments can rectify the situation. REFERENCE: LearnKey's A+ Certification 2012 Course Session 10 Troubleshooting Additional Devices Common Laptop Symptoms OBJECTIVE: 4.8 Given a scenario, troubleshoot, and repair common laptop issues while adhering to the appropriate procedures. 4.8.1 Common symptoms 4.8.1.10 No wireless connectivity
A user has discovered some corrupted files in the OS. Which repair tool can be used to replace those files?
Choices:
A - | SFC |
B - | FIXMBR |
C - | Safe mode |
D - | Repair disks |
References:
EXPLANATION: The System File Checker (SFC) can be used to replace corrupted or missing files. REFERENCE: LearnKey's A+ Certification 2012 Course Session 10 Troubleshooting OS Problems OS Repair Tools OBJECTIVE: 4.0 Troubleshooting 4.6 Given a scenario troubleshoot operating system problems with appropriate tools. 4.6.2 Tools 4.6.2.4 SFC
Which command is used to do partition management?
Choices:
A - | FDISK |
B - | CHKDSK |
C - | FORMAT |
D - | IPCONFIG |
References:
EXPLANATION: FDISK is used to do partition management. REFERENCE: LearnKey's A+ Certification 2012 Course Session 10 Troubleshooting Storage Problems Storage Repair Tools OBJECTIVE: 4.0 Troubleshooting 4.3 Given a scenario, troubleshoot hard drives and RAID arrays with appropriate tools. 4.3.2 Tools 4.3.2.6 FDISK
Which new utility application in Windows 7 is a workgroup with password security?
Choices:
A - | HomeGroup |
B - | Printer group |
C - | Security group |
D - | Windows group |
References:
EXPLANATION: HomeGroup is a workgroup new to Windows 7 that in order to join the user must know the password. REFERENCE: LearnKey's A+ Certification 2012 Course Session 7 Control Panel Differences Control Panel Differences Bonus Round OBJECTIVE: 1.0 Operating Systems 1.5 Given a scenario, use Control Panel utilities (the items are organized by ""classic view/large icons"" in Windows) 1.5.4 Unique to Windows 7 1.5.4.1 HomeGroup
Which SFC option scans all protected files at the next boot?
Choices:
A - | SFC /SCANNOW |
B - | SFC /SCANONCE |
C - | SFC /SCANNEDIN |
D - | SFC /SCANIMMEDIATELY |
References:
EXPLANATION: SFC /scanonce scans all protected files at the next boot. REFERENCE: LearnKey's A+ Certification 2012 Course Session 8 Windows Command Prompt Windows Command Prompt Bonus Round OBJECTIVE: 1.0 Operating Systems 1.3 Given a scenario, use appropriate command line tools. 1.3.2 OS 1.3.2.15 SFC
Which option represents the default setting of the guest account on a Windows 7 computer?
Choices:
A - | Active |
B - | Hidden |
C - | Disabled |
D - | Unrestricted |
References:
EXPLANATION: The guest account is disabled by default. Disabling and restricting the guest account avoids remote login problems and applications attempting to gain access to the computer system. REFERENCE: LearnKey's A+ Certification 2012 Course Session 9 Security Settings Security Settings Bonus Round OBJECTIVE: 1.0 Operating Systems 1.8 Explain the differences among basic OS security settings. 1.8.1 User and groups 1.8.1.3 Guest
Which could a corrupted boot sector cause to happen to an operating system?
Choices:
A - | Failure to boot |
B - | Improper shutdown |
C - | Slow system performance |
D - | Spontaneous updates from the Internet |
References:
EXPLANATION: A corrupt boot sector could cause the operating system to fail to boot. REFERENCE: LearnKey's A+ Certification 2012 Course Session 10 Troubleshooting OS Problems Common OS Symptoms OBJECTIVE: 4.0 Troubleshooting 4.6 Given a scenario troubleshoot operating system problems with appropriate tools. 4.6.1 Common symptoms 4.6.1.2 Failure to boot
Which command in the Recovery Console propagates the master boot record to the boot sector?
Choices:
A - | FXMV |
B - | FIXMBR |
C - | SCANOS |
D - | FIXBOOT |
References:
EXPLANATION: FIXMBR rewrites the master boot record to the system partition. REFERENCE: LearnKey's A+ Certification 2012 Course Session 8 Windows Command Prompt OS Commands OBJECTIVE: 1.0 Operating Systems 1.3 Given a scenario, use appropriate command line tools. 1.3.3 Recovery console 1.3.3.2 Fixmbr
Which is a major difference between a HomeGroup and a WorkGroup?
Choices:
A - | WorkGroups can handle more usage |
B - | HomeGroups have better encryption of files |
C - | HomeGroups have greater storage for shared files |
D - | WorkGroups have to explicitly share anything that needs to be shared |
References:
EXPLANATION: Workgroups have to explicitly share anything that needs to be shared. REFERENCE: LearnKey's A+ Certification 2012 Course Session 8 Network Configuration Network Types OBJECTIVE: 1.0 Operating Systems 1.6 Setup and configure Windows networking on a client/desktop. 1.6.1 HomeGroup, file/print sharing 1.6.2 Workgroup vs. domain setup
Which security option is meant to protect client computers from malicious attacks and intrusions, but sometimes is the culprit of applications failing?
Choices:
A - | Firewall |
B - | FireWire |
C - | Anti-malware |
D - | Antivirus software |
References:
EXPLANATION: The Windows Firewall is meant to protect client computers from malicious attacks and intrusions. REFERENCE: LearnKey's A+ Certification 2012 Course Session 8 Network Configuration Network Configuration Bonus Round OBJECTIVE: 1.0 Operating Systems 1.6 Setup and configure Windows networking on a client/desktop. 1.6.8 Firewall settings
Firewalls are used to prevent which types of attacks? Choose all that apply.
Choices:
A - | Worms |
B - | Viruses |
C - | Rootkits |
D - | DoS attacks |
E - | Trojan horses |
References:
EXPLANATION: Firewalls are used to prevent worms, viruses, DoS attacks, and Trojan horses. REFERENCE: LearnKey's A+ Certification 2012 Course Session 9 Security Solutions Security Solutions Bonus Round OBJECTIVE: 2.0 Security 2.1 Apply and use common prevention methods. 2.1.2 Digital security 2.1.2.2 Firewalls
Which is a piece of code added to software in order to fix security vulnerabilities, especially as a temporary correction between two versions of the same software?
Choices:
A - | Patch |
B - | Program |
C - | Exchange |
D - | Installation |
References:
EXPLANATION: Patching is a piece of code added to software in order to fix a bug, especially as a temporary correction between two versions of the same software. REFERENCE: LearnKey's A+ Certification 2012 Course Session 6 Mobile Device Security Patching OBJECTIVE: 3.0 Mobile Devices 3.3 Compare and contrast methods for securing mobile devices 3.3.7 Patching/OS updates
Which option represents a main benefit for using a 64-bit operating system?
Choices:
A - | Using more than 6 USB devices |
B - | Accessing RAM larger than 4 GB |
C - | Accessing HDDs larger than 256 GB |
D - | Using a video card with over 512 MB of RAM |
References:
EXPLANATION: A 64-bit operating system will manage 4 GB or more of RAM and manage RAM more efficiently than a 32-bit operating system. REFERENCE: LearnKey's A+ Certification 2012 Course Session 7 Microsoft Operating Systems Windows XP OBJECTIVE: 1.0 Operating Systems 1.1 Compare and contrast the features and requirements of various Microsoft Operating Systems. 1.1.4 Features 1.1.4.1 32-bit vs. 64-bit
While browsing the Internet with a popular browser, a user notices pop-up boxes. He wants to stop unwelcomed advertisements. Which option represents troubleshooting techniques that may help remove pop-up windows? Choose all that apply.
Choices:
A - | Delete cookies |
B - | Clear the cache |
C - | Open the Web page again |
D - | Check pop-up blocker settings |
References:
EXPLANATION: Some Web sites use cookies and the cache to activate pop-ups. Clearing these may stop the Web site from sending pop-up data. Pop-up blocker settings should be set to block pop-ups. Opening the Web page a second time is not likely to change the behavior of the Web site. REFERENCE: LearnKey's A+ Certification 2012 Course Session 10 Troubleshooting OS Problems OS Problems Bonus Round OBJECTIVE: 4.7 Given a scenario, troubleshoot common security issues with appropriate tools and best practices. 4.7.1 Common symptoms 4.7.1.1 Pop-ups
Which can be done if a user suspects that previous restore points contain copies of infected monitored files?
Choices:
A - | Disable any antivirus software |
B - | Restore the computer with a new signature |
C - | Create restore points without the infected files |
D - | Turn off System Restore and then turn it on again |
References:
EXPLANATION: If a user suspects that previous restore points contain copies of infected monitored files, turn off System Restore, then turn it on again. REFERENCE: LearnKey's A+ Certification 2012 Course Session 9 Security Solutions Malware Removal OBJECTIVE: 4.0 Troubleshooting 4.7 Given a scenario, troubleshoot common security issues with appropriate tools and best practices. 4.7.3 Best practices for malware removal 4.7.3.3 Disable system restore
Which should a user do if he is experiencing slow performance on a drive?
Choices:
A - | Restart the drive |
B - | Reset POST codes |
C - | Reboot the RAID array |
D - | Remove the data and replace the drive |
References:
EXPLANATION: If a user is experiencing slow performance on a drive, they should remove the data and replace the drive before the drive fails. REFERENCE: LearnKey's A+ Certification 2012 Course Session 10 Troubleshooting Storage Problems Common Storage Symptoms OBJECTIVE: 4.0 Troubleshooting 4.3 Given a scenario, troubleshoot hard drives and RAID arrays with appropriate tools. 4.3.1 Common symptoms 4.3.1.2 Slow performance
A user has a laptop with sticking keys. Which option represents a potential cause for sticking keys?
Choices:
A - | Display failure |
B - | Dirty keyboard |
C - | Hard drive failure |
D - | OS needs an update |
References:
EXPLANATION: Sticking keys is usually due to a dirty keyboard. Debris can get lodged under the keys. Liquids can harden under the keys, causing sticking. REFERENCE: LearnKey's A+ Certification 2012 Course Session 10 Troubleshooting Additional Devices Common Laptop Symptoms OBJECTIVE: 4.8 Given a scenario, troubleshoot, and repair common laptop issues while adhering to the appropriate procedures. 4.8.1 Common symptoms 4.8.1.4 Sticking keys
Which is the correct definition for spyware?
Choices:
A - | A type of phone fraud |
B - | Software that consumers unknowingly install that can track online usage and personal information |
C - | A self-replicating computer program that uses a network to send copies of itself to linked networks with or without human intervention |
D - | When an identity thief standing close to a person in a checkout line or crowd memorizes personal information such as name, address, phone number, or PIN |
References:
EXPLANATION: Spyware is software that consumers unknowingly install that can track online usage and personal information. REFERENCE: LearnKey's A+ Certification 2012 Course Session 9 Security Threats Malware OBJECTIVE: 2.0 Security 2.2 Compare and contrast common security threats 2.2.6 Spyware
Which option may be used to boot Windows 2000, Windows XP, or Windows Vista?
Choices:
A - | Aero |
B - | DVD disc |
C - | ReadyBoost |
D - | Windows Firewall |
References:
EXPLANATION: A DVD may be used to boot Windows 2000, Windows XP, or Windows Vista. REFERENCE: LearnKey's A+ Certification 2012 Course Session 7 Installation Planning Boot Methods OBJECTIVE: 1.0 Operating Systems 1.2 Given a scenario, install, and configure the operating system using the most appropriate method. 1.2.1 Boot methods 1.2.1.3 DVD
Which option represents the IP address of the device that provides a connection to the Internet?
Choices:
A - | IP Address |
B - | Subnet mask |
C - | Preferred DNS |
D - | Default Gateway |
References:
EXPLANATION: In a home network, there is typically a modem that connects to an Internet service provider. This device is the default gateway and handles the connection to the Internet. REFERENCE: LearnKey's A+ Certification 2012 Course Session 8 Network Configuration Network Configuration Bonus Round OBJECTIVE: 1.6 Setup and configure Windows networking on a client/desktop. 1.6.9.4 Gateway
Which options represent Windows XP editions designed primarily for home users? Choose all that apply.
Choices:
A - | Home |
B - | Enterprise |
C - | Professional |
D - | Media Center |
References:
EXPLANATION: The Enterprise and Professional editions are designed for domains and corporate use. Home and Media Center operating systems are designed for the home user, although Media Center has many of the same features as Professional. REFERENCE: LearnKey's A+ Certification 2012 Course Session 7 Microsoft Operating Systems Windows XP OBJECTIVE: 1.0 Operating Systems 1.1 Compare and contrast the features and requirements of various Microsoft Operating Systems.
Which unique Windows 7 applet allows a user to connect to desktops and programs from a workplace?
Choices:
A - | HomeGroup |
B - | Action Center |
C - | Network Setup Wizard |
D - | RemoteApp and Desktop Connections |
References:
EXPLANATION: The RemoteApp and Desktop Connections is a unique Windows 7 applet that allows users to connect to desktops and programs remotely from the workplace. REFERENCE: LearnKey's A+ Certification 2012 Course Session 7 Control Panel Differences Unique to Windows 7 OBJECTIVE: 1.0 Operating Systems 1.5 Given a scenario, use Control Panel utilities (the items are organized by ""classic view/large icons"" in Windows) 1.5.4 Unique to Windows 7 1.5.4.3 Remote application and desktop applications
Which practices should be used to prevent malware? Choose all that apply.
Choices:
A - | Update antivirus software regularly |
B - | Have a running antivirus software installed |
C - | Ensure a firewall is available, enabled, and updated |
D - | Open unknown attachments before downloading the content |
References:
EXPLANATION: To prevent malware, have a running antivirus software installed, update the antivirus software regularly, and ensure that a firewall is available, enabled, and updated. REFERENCE: LearnKey's A+ Certification 2012 Course Session 9 Security Solutions Security Solutions Bonus Round OBJECTIVE: 4.0 Troubleshooting 4.7 Given a scenario, troubleshoot common security issues with appropriate tools and best practices. 4.7.2 Tools 4.7.2.2 Anti-malware software
Which are kinds of cellular options used to connect to a network? Choose all that apply.
Choices:
A - | 3G |
B - | 4G |
C - | 2C |
D - | 3C |
References:
EXPLANATION: The two different types of cellular options to connect to a network are 3G and 4G. 4G is supposedly going to out strip 3G. REFERENCE: LearnKey's A+ Certification 2012 Course Session 6 Mobile Connectivity Connectivity Options OBJECTIVE: 3.0 Mobile Devices 3.2 Establish basic network connectivity and configure email 3.2.1 Wireless/ cellular data network (enable/disable)
Which is used by a computer to load an operating system during the boot process?
Choices:
A - | BIOS |
B - | Multimeter |
C - | Boot device |
D - | POST tester |
References:
EXPLANATION: A boot device is used by a computer to load an operating system during the boot process. REFERENCE: LearnKey's A+ Certification 2012 Course Session 7 Installation Planning Installation Planning Bonus Round OBJECTIVE: 1.0 Operating Systems 1.2 Given a scenario, install, and configure the operating system using the most appropriate method. 1.2.1 Boot methods
A user has an empty USB flash drive in a port. Which could occur if the BIOS is configured to boot from a device and then from the hard drive?
Choices:
A - | Nothing would happen |
B - |
PixelPlanet PdfEditor v1.0.0.48 Multilingual
VariCAD 2012 v1.05 Incl. Keymaker-CORE | 137.5 MB
VariCAD is a 3D/2D CAD system for mechanical engineering. In addition to standard tools for 3D modeling and 2D drafting, the CAD system provides support for parameters and geometric constraints, tools for shells, pipelines, sheet metal unbending and crash tests, assembly support, libraries of standard mechanical parts (ANSI, DIN) and symbols, mechanical part calculations and tools for working with bills of materials (BOM) and title blocks. VariCAD supports STEP, STL, IGES, DWG and DXF file formats. VariCAD is compact, fast, easy to use, and provides everything one needs for mechanical design. VariCAD is sold "fully loaded", including all features and functions, for one affordable price. The CAD system delivers an excellent performance-to-price ratio.
You can start by creating a 3D model and then use it to automatically create drawings files, or you can draw only in 2D. Designing in 3D is generally more "natural," in that it closely represents actual parts and assemblies. The 3D approach is usually more intuitive than 2D drafting. Models created in 3D are easily converted into conventional 2D documentation.
3D Modeling
VariCAD provides a library of basic 3D solids (prism, cylinder, cone, etc.), which are easily modified by editing the original profile or parameters. Solids can also easily be created by profile rotation, extrusion, or lofting. More complex tools include rotation blending between two profiles, lofting between a circle and rectangle, and creation of helical surfaces.
Solids can be added or subtracted, thus forming Boolean trees representing real mechanical parts. Boolean operations have options for automatic trimming, or automatic removal of subtracted volumes. Predefined operations like hole drilling, face milling, groove milling and edge beveling/filleting are also available. Boolean trees are very easy to edit.
3D Tools - Assemblies, Groups, Parts etc.
VariCAD also provides tools for assembly support. If the link between a part and assembly is defined, any changes made to the part file are reflected in the assembly file and vice-versa. Linked copies can also be defined. In this case, editing of one object causes all its linked copies to be updated. Solid groups can be defined as well, making selection and visibility changes simple for multiple objects.
Crash Tests (Interferences)
One excellent feature of 3D modeling is component interference checking. VariCAD can check 3D assemblies for possible collisions (overlapping volume) between components.
Calculations
VariCAD can calculate 2D section area, surface area, volume, mass, center of gravity, and moment of gyration. A library of mechanical calculations is also included, for standard parts used every day by mechanical designers. These mechanical parts include tension and compression springs, pre-stressed bolted connections, pins and parallel keys, grooved shafts, bearings, beams under combined stress (bending and torsion), spur and bevel gearing geometry, and belt drives.
Surface Development (Sheet Metal Unbending)
VariCAD can also create developed (flattened) surfaces of 3D solids. The XY coordinates of the developed surfaces can be saved to a text file for further processing. You can input bending coefficients in order to customize your calculations.
Mechanical Part and Symbol Libraries
VariCAD contains libraries of standard mechanical parts (ANSI, DIN), such as bolts, nuts, pins, plugs, cotters, gaskets, bearings, rolled and drawn shapes, and hydraulic, pneumatic, and electronic symbols. You can add items to these libraries or modify existing parts - all 2D and most 3D dimensions can be edited.
Non-graphical information can also be assigned to parts, such as type of material or supplier. This information is incorporated into an assembly and can be used for material requisitions, bills of materials (BOM), title blocks, or other purposes.
3D - 2D Export
3D models are easily converted into 2D drawings to produce conventional drafting documentation. You can create 2D views of one or more selected solids by defining the views in 3D. In addition, you can also export specified sections. VariCAD supports updates of a 2D drawing after changes in 3D.
2D Drawing and Editing
Drawing functions are geared toward easy use in engineering. Some handy features of 2D drawing include: an intelligent cursor that automatically detects objects and snap points, numerous snap modes, flexible item selectability, auxiliary construction lines, ortho mode, rectangular grid, drawing layers (up to 250), block creation, hatching with automatic border detection, advanced dimensioning, surface texture symbols, welding symbols, tolerance symbols, and more. Dimensions can be in millimeters or inches.
BOM and Title Blocks
VariCAD provides tools for maintaining drawing databases, which represent the data structure of the product. Databases can be created manually (using data extraction from the assembly), or by loading a file. There are constraints between data in part and assembly drawing title blocks and the assembly database. You can build a bill of material (BOM) from the database, then easily modify the database using commands like mass attribute changes, sorting of information, etc.
The data structure of the product (BOM) can be exported into other systems or into a spreadsheet. Automatic BOM and title block creation is another one of VariCAD's useful tools. A mask is used for customization; if you create masks for BOM and title blocks, you can use them until a change is necessary. The CAD system provides default masks which can be adjusted to suit your needs.
Compatibility
VariCAD can interchange files with other CAD systems. You can import STEP (3D), DWG (2D), DXF (2D) and IGES (2D) files, and export STEP (3D), STL (3D), IGES (3D and 2D), DWG (2D), DXF (2D). The files can be converted individually or in batch routines, thereby converting multiple files in one step.
Printing and Plotting
Printing within VariCAD is highly customizable. You can use Windows or KDE Linux printer drivers, or VariCAD built-in drivers. Postscript printing is also available.
Summary
VariCAD is a total CAD solution for mechanical engineering. It is compact, fast, easy to use, and contains everything you need for mechanical engineering design. The high performance and powerful tools of our fully loaded package make VariCAD a superb investment. And at our price, no other product is a better value.Resume-able Download Links:
http://www.uploadic.com/dku2nqp5bfg0
or
http://filerio.com/lp09df8w97uh
What’s New in the IP Net Checker 1.4.6.6 serial key or number?
Screen Shot
System Requirements for IP Net Checker 1.4.6.6 serial key or number
- First, download the IP Net Checker 1.4.6.6 serial key or number
-
You can download its setup from given links: