Rabu, 18 Agustus 2010

Jawaban IT Essentials Chapter 10 exam( Version 4.1 )

Jawaban ini di jamin nilainya lebih dari 80. Jangan lupa commentnya kalu sudah di lihat  & di baca.







 1 When dealing with an angry customer, which two things can a technician do to resolve the problem? (Choose two.)
 *Allow the customer to explain the problem, possibly dispelling some of the anger.
 *Sympathize with the customer's problem.


2 A customer calls to complain that another technician was rude to them. In the past, the technician has received many complaints about rudeness regarding this coworker. How should the technician handle this complaint?
 *Listen to the complaint, apologize for the incident, and then offer to help the customer.


3 A technician receives a call from a customer who is too talkative. How should the technician handle the call?
 *Allow the customer to speak without interruption and then try to use closed-ended questions to gather data.


4 Which three items are commonly parts of a service level agreement (SLA)? (Choose three.)
 *supported software
 *diagnostic procedures
 *service location


5 Which three pieces of information should be given to the next technician when transferring a customer? (Choose three.)
 *your name
 *ticket number
 *customer name


6   
Which three tasks are commonly carried out by a level-one technician? (Choose three.)
 *document all information on the work order
 *prioritize the problem
 *gather information from the customer


7 The technician begins diagnosing a problem by asking an experienced customer to visit a troubleshooting Web site. The customer becomes angry because she feels this could be done without calling the technician. What should the technician do?
 *Explain how the Web site can be used by both of them during the call to quickly eliminate problems.


8 A technician wants to apply for a job in a call center for a computer repair service. Which two characteristics are desirable for this type of position? (Choose two.)
 *possess good listening skills
 *display professional behavior at all times


9 A customer calls to report a computer problem. Which two actions can the technician use to establish a good rapport with the customer? (Choose two.)
 *Allow the customer to speak without interruption.
 *Refer to the customer by name whenever possible.


10 What are three guidelines for beginning a call with a customer? (Choose three.)
 *Determine the level of knowledge that the customer possesses about computers.
 *Use brief communication to establish a one-to-one connection with the customer.
 *Call the customer by name.


11 Which three techniques should be used to successfully deal with a talkative customer? (Choose three.)
 *Politely interrupt to refocus the customer.
 *Gather as much information as possible while the customer is talking.
 *Allow the customer to talk for one minute and then ask closed-ended question to regain control of call.


12 Which two approaches are recommended when dealing with customers on the telephone? (Choose two.)
 *Be positive.
 *Look for alternative ways to help the customer.


13 While a technician is listening to a lengthy explanation of a problem, the technician identifies the solution to the problem. How should the technician proceed?
 *Wait until the customer has finished speaking, and then explain the possible solution.


14 Which two techniques should be used when dealing with an inexperienced customer? (Choose two.)
 *Use simple step-by-step instructions.
 *Speak in plain terms.


15 What is the recommended way to place customers on hold?
 *Ask and wait for permission before placing customers on hold.


16 Which issue is an example of an exception to an SLA that should be escalated to a manager?
 *A customer wants two new computers added to the existing SLA without additional cost.


17 Which three relaxing techniques can help relieve the stress caused from helping customers in a call center? (Choose three.)
 *Go for a quick walk.
 *Listen to soothing sounds
 *Practice relaxed breathing.


18 Which two guidelines demonstrate proper netiquette? (Choose two.)
 *Begin each e-mail with an appropriate greeting.
 *Avoid replying to "flames".


19 A technician is trying to calm an angry customer. What is the best approach?
 *Maintain a positive tone of voice and offer to help solve the problem.


20 A technician is talking on the telephone to an angry customer who is unhappy with previous service. How should the technician calm the customer?
 *Listen carefully and attempt to solve the customer's problem.
READ MORE - Jawaban IT Essentials Chapter 10 exam( Version 4.1 )

Jawaban IT Essentials Chapter 9 exam( Version 4.1 )

Jawaban ini di jamin nilainya lebih dari 80. Jangan lupa commentnya kalu sudah di lihat  & di baca.







 1 Which three suggestions are good security password policies that a company or individual should follow? (Choose three.)
 *Passwords should have an expiration period.
 *Password lockout should be enabled.
 *A mix of letters, numbers, and other characters should be used.


2 Which two characteristics describe a worm? (Choose two.)
 *Is self-replicating.
 *Travels to new computers without any intervention or knowledge of the user.


3 Which type of program causes banners and ads to appear on the desktop without any user intervention?
 *adware


4 A network administrator is looking for a technology that includes both hardware and software authentication. Which technology could the administrator use?
 *Trusted Platform Module (TPM)


5 When setting up a new wireless access point, which basic security measure should be taken?
 *Disable SSID broadcast.


6 Which best practice should be included in a password protection policy?
 *Implement lockout rules upon consecutive unsuccessful attempts at accessing the system.


 7 Which wireless security technology is a good choice when using Cisco equipment in conjunction with operating systems such as Windows and Linux?
 *LEAP


8 A bank is upgrading the hard drives in a server. What should be done to the old hard drives to permanently remove any confidential data?
 *Destroy the hard drives with a hammer.


9 Which two statements are true about username and password standards? (Choose two.)
 *The username naming convention should be kept simple.
 *Rules about password expiration and lockout should be defined.


10 A technician has downloaded the latest Windows XP updates from the Microsoft website. What should the technician do before installing the updates?
 *Create a restore point.


11 A financial organization is donating computers to a local charity. What is the best method to remove all data from the hard drives in the computers?
 *Use data wiping software and delete any hard drive partitions.


12 Which three security storage features are supported by the TPM hardware module? (Choose three.)
 *encryption keys
 *digital certificates
 *passwords


13 A fingerprint reader is an example of which security technology?
 *biometric


14 Where is the safest place to store backups?
 *locked server room


15 Which type of authentication is evidenced by the use of a small chip on a card that contains user identification data such as bank account numbers and digital signatures?
 *smart card


16 Which two items can be downloaded from the Microsoft website to help protect Windows XP? (Choose two.)
 *service packs
 *security patches


17 Which threat to security uses traffic from zombie computers to overwhelm servers?
 *DDoS


18 What is the preferred wireless encryption technique if the wireless clients support it?
 *WPA


19 Which is the best procedure to secure a laptop left at the office while the user is away for an extended period of time?
 *Place the laptop in a locked security cage designed to store computer equipment.


20 What is the best method for a company to secure data being transmitted across the Internet between remote sites?
 *Use computers secured with smartcard authentication.


21 Which type of software is downloaded onto the computer of a user without the knowledge of the user and causes information about various products to be displayed on the user's monitor?
 *adware


22 An attacker has managed to decode the encrypted messages of a wireless network. The network uses Windows XP and Cisco equipment. The security protocol that is used is WEP with 64-bit encryption. Which action can be recommended to the technician for securing the network?
 *Upgrade to the LEAP wireless security protocol.


23 What must be done to ensure that the anti-virus software on a computer is able to detect and eradicate the most recent viruses?
 *Download the latest signature files on a regular basis.


24 Which statement accurately describes the WEP standard?
 *WEP is a first generation security standard for wireless communication.


25 What are two examples of malware? (Choose two.)
 *spyware
 *grayware


26 An employee for a small company inadvertently allows a visitor to see their username and password. At home, the visitor then uses this information to gain access to the company network. This is an example of what type of threat?
 *social engineering


27 An attacker claiming to be a bank representative contacts a potential victim via e-mail and requests disclosure of vital account information. Which security attack is being implemented?
 *phishing
READ MORE - Jawaban IT Essentials Chapter 9 exam( Version 4.1 )

Jawaban IT Essentials Chapter 8 exam( Version 4.1 )

Jawaban ini di jamin nilainya lebih dari 80. Jangan lupa commentnya kalu sudah di lihat  & di baca.







 1 Refer to the exhibit. Which type of network cable is shown?
 *fiber-optic


2 Which term describes the process of adding headers to data as it moves through the layers of the OSI model?
 *encapsulation


3 When purchasing Cisco components for a network installation, what are three warning signs that the equipment may be counterfeit? (Choose three.)
 *The price is much less than expected.
 *The equipment is new and in the original shipping container.
 *The equipment appears to be performing at a substandard level.


4 Which protocol is used to automatically configure network devices?
 *DHCP


5 Which protocol lacks support for encryption and can be initiated from a computer command prompt?
 *Telnet


6 Which broadband technology would be recommended for a business that requires workers to access the Internet while visiting customers at many different locations?
 *cellular


7 Which two factors are used to determine the different categories of UTP cabling? (Choose two.)
 *The number of twists in the wires inside the cable.
 *The number of wires inside the cable.


8 Which network topology will allow all devices to continue to communicate with each other should a network cable fail?
 *mesh


9 Which software must be installed and working correctly on a computer to successfully enable a VPN connection to a remote site?
 *VPN client


10 A college student is confused. To use online banking, the student types https://www.banking.com, whereas to access the college web page, the student types http://www.college.edu. Why would the two institutions use different protocols?
 *The bank encrypts the web page information that is sent and received.


11 What is the purpose of the device that uses the 198.133.219.43 address?
 *It is the device that translates domain names to IP addresses.


12 Which Cisco team can be contacted to help when Cisco equipment is suspected to be counterfeit?
 *Cisco Brand Protection Team


13 Which digital technology provides an upstream speed that is typically less than the downstream speed?
 *ADSL


14 Which utility can be used to determine end-to-end connectivity between source and destination?
 *ping


15 Which Windows XP command displays the route taken by packets crossing an IP network?
 *tracert


16 Which procedure is normally performed when connecting a computer to an Ethernet network for the first time?
 *Configure the NIC for a specific network protocol.


17 A student brings a laptop to a school that has wireless access. The laptop is not connecting to the school network. What is the first thing that the student should check?
 *the available wireless networks within range.


18 Which device enables computers to be attached to a network without segmenting the network?
 *hub


19 Which topology has only one central point of failure, is easy to troubleshoot, and is most commonly implemented in newer networks?
 *star


20 Which layer of the OSI model is primarily concerned with accessing the physical media and physical addressing?
 *Data Link


21 Which wireless IEEE standard operates in a radio frequency of 2.4 GHz and supports a maximum bandwidth of 54 Mbps?
 *802.11g


22 A company is investigating the use of an ISDN service to act as backup for the ASDL service they use to communicate with branch offices. They discover that the ISDN BRI service uses two 64 kb/s B channels. Which function do the B channels perform?
 *carry the data stream


23 What is the maximum range a data signal can travel through a 1000BASE-T network segment?
 *328 ft (100 m)


24 A technician is configuring a computer to send print jobs to a network printer. When the technician sends a test print to the printer, the print job fails. The technician tries to ping the network printer, but the technician suddenly remembers a change in Windows that is hampering the troubleshooting process. What change might this be?
 *The Windows firewall has network printing disabled by default.


25 What is one difference between a network domain and a workgroup?
 *A domain provides centralized control.


26 Which three protocols are associated with e-mail? (Choose three.)
 *IMAP
 *POP3
 *SMTP


27 A network administrator wants to connect a new building to an existing network using cable that can provide a secure connection and is not susceptible to electrical interference. The new building is approximately 800 meters away from the existing network. Which cable type should the administrator choose?
 *fiber optic


28 Which two characteristics describe Ethernet technology? (Choose two.)
 *supported by IEEE 802.3 standards
 *uses a bus logical topology


29 Which three factors are reasons to choose a client/server model for a network instead of peer-to-peer? (Choose three.)
 *The company network requires secure access to confidential information.
 *The users need a central database to store inventory and sales information.
 *The data gathered by the employees is critical and should be backed up on a regular basis.


30 Which technique is used to ensure that data from one computer does not collide with data from any other computer in a CSMA/CD network?
 *Computers listen to the network for clearance to send data.
READ MORE - Jawaban IT Essentials Chapter 8 exam( Version 4.1 )

Jawaban IT Essentials Chapter 7 exam( Version 4.1 )

Jawaban ini di jamin nilainya lebih dari 80. Jangan lupa commentnya kalu sudah di lihat  & di baca.







 1 What is an advantage of using a solid-ink printer instead of an inkjet printer?
 *It produces vivid color prints.


2 What is typical of a network printer installation?
 *the use of Ethernet or wireless


3 Which two modes of operation within the IEEE 1284 standard allow bi-directional communication? (Choose two.)
 *ECP
 *EPP


4 What is the maximum number of devices that can be connected to a single FireWire interface?
 *63


5 What is a common disadvantage of inkjet printers?
 *The nozzles can get obstructed.


6 What are two advantages of using impact printers? (Choose two.)
 *carbon-copy printing ability
 *inexpensive consumables


7 Which software converts scanned pages into text?
 *Optical Character Recognition


8 Which two Wi-Fi standards are used to provide a wireless connection between printers and computers? (Choose two.)
 *802.11b
 *802.11g


9 Which laser printer component is a metal cylinder that is coated with a light-sensitive insulating material?
 *drum


10 Instead of the document that was expected, a printer is printing unusual characters. What should be the next steps in solving this printer problem?
 *Check the printer data cabling. If the cabling is secure on both ends, replace the print cartridge or ribbon.


11 Which step of the laser printing process is the last step performed by a laser printer when printing a document?
 *fusing


12 Which three functions are commonly included in the all-in-one devices? (Choose three.)
 *fax
 *printer
 *scanner


13 What is the best source for a Windows-compatible scanner driver?
 *website for scanner manufacturer


14 Which printing technology uses the vibration of a crystal to control the flow of ink onto the paper to produce an image?
 *piezoelectric


15 Which unit is commonly used to measure the print quality of an inkjet printer?
 *DPI


16 A museum possesses several old paintings that the curators wish to reproduce and sell in the museum gift shop. Which type of scanner can be used to produce the highest-quality reproduction?
 *drum


17 Which step of the laser printing process involves scanning the photosensitive drum with a laser?
 *writing


18 Which software, embedded in a printer, controls how the printer operates and can be upgraded?
 *Firmware


19 Which type of printer is commonly used in stores to produce cash register receipts?
 *thermal


20 Which two names refer to the IEEE 1394 standard? (Choose two.)
 *FireWire
 *i.Link


21 Which standard governs the use of parallel printer ports?
 *IEEE 1284


22 Which Windows XP command sends a file named example.txt to the default printer?
 *print example.txt


23 Which printer technology is used in low-cost, photo-quality printers
 *inkjet


24 Which technology is used by laser printers?
 *electrophotographic


25 What laser printer component could cause streaking?
 *drum
READ MORE - Jawaban IT Essentials Chapter 7 exam( Version 4.1 )

Jawaban IT Essentials Chapter 3 exam( Version 4.1 )

Jawaban ini di jamin nilainya lebih dari 80.
Jangan lupa commentnya kalu sudah di lihat  & di baca.













1 Which port is typically used for external wireless NICs?
 *USB


2 A technician is installing a new power supply in a computer. Which type of power connector should be used to connect to a PATA hard drive?
 *Molex


3 Refer to the exhibit. Which type of port is shown?
 *USB


4 A field technician has been asked to install a wireless 802.11g NIC in a computer, but is unsure about the expansion slots available. Which two types of wireless NICs should the technician have available? (Choose two.)
 *PCIe
 *PCI


5 Which type of drive is installed in a 5.25-inch bay?
 *optical drive


6 A technician is installing a new CPU in a ZIF socket on a motherboard. What is the primary way of securing the CPU in place?
 *load lever


7 Which internal component of a computer uses a 3-pin power connector?
 *fan


8 Which solution should be used to clean a CPU and a heat sink?
 *isopropyl alcohol


9 A technician is assembling a new computer. Which two components are often easier to install before mounting the motherboard in the case? (Choose two.)
 *CPU
 *memory


10 After a technician has assembled a new computer, it is necessary to configure the BIOS. At which point must a key be pressed to start the BIOS setup program?
 *during the POST


11 What is the most reliable way for users to buy the correct RAM to upgrade a computer?
 *Check the motherboard manual or manufacturer's website.


12 When building a computer, which two components are normally installed in 3.5-inch drive bays? (Choose two.)
 *hard drive
 *optical drive


13 How many pins are in a SATA data cable connector?
 *7


14 Refer to the exhibit. Which type of hard drive uses the power connector shown?
 *SATA


15 Which action is recommended to prevent the motherboard from contacting the metal base of the case?
 *Use standoffs to keep the motherboard above the metal base.


16 A technician is troubleshooting a computer that has a malfunctioning floppy drive. The technician observes that the floppy drive light remains lit constantly. How should the technician attempt to repair the problem?
 *Connect the data cable making sure that the colored stripe on the cable is aligned with pin 1 on the drive and the motherboard.


17 Which additional 4-pin or 6-pin power connector is required by some motherboards?
 *AUX


18 What is a convenient way that a technician can tell whether a ribbon cable is for an IDE hard drive or a floppy drive?
 *The floppy cable has a twist in the cable.


19 A technician has just finished assembling a new computer. When the computer is powered up for the first time, the POST discovers a problem. How does the POST indicate the error?
 *It issues a number of short beeps.


20 A technician is installing a new power supply in a computer. Which type of power connector should be used to connect to a floppy drive?
 *berg
READ MORE - Jawaban IT Essentials Chapter 3 exam( Version 4.1 )

Jawaban IT Essentials Chapter 1 exam( Version 4.1 )

Jawaban ini di jamin nilainya lebih dari 80.
Jangan lupa commentnya kalu sudah di lihat  & di baca.










1 Which type of memory is primarily used as cache memory?
 *SRAM



2 A customer orders a new computer and specifies an internal read-write, non-volatile storage device that uses low power, has fast access to data, and is reliable. What is a suitable storage device that meets these requirements?
 *solid state drive



3 Which type of ROM can be reprogrammed with software while it is still physically installed in the computer?
 *EEPROM



4 Refer to the exhibit. Based on the advertisement that is shown, what is the native resolution of this computer system?
 *1280 x 800



5 Which type of computer resources are direct lines to the processor used by computer components to request information from the CPU?
 *IRQs



6 Which two activities are normally controlled by the Northbridge part of the chip set? (Choose two.)
 *access to the RAM
 *access to the video card



7 Which type of RAM chip has the fastest clock rate but consumes the least power and generates the least heat?
 *DDR3 SDRAM



8 Which expansion slot would be used to install a video capture card in a new computer?
 *Peripheral Component Interconnect-Express



9 A technician is helping a customer compare two hard drives. Which unit of measurement is used for the hard drive speed?
 *revolutions per minute



10 Refer to the exhibit. Which type of cable is shown in the graphic?
 *Serial


11 Which type of memory is unable to have the contents modified?
 *ROM


12 Which important feature is offered by the USB standard?
 *It can supply power from the computer to devices.


13 Which CPU architecture uses a small set of instructions that are designed to be executed rapidly?
 *RISC


14 Which two characteristics are determined by the chip set on a motherboard? (Choose two.)
 *maximum amount of memory that can be installed
 *type of connectors that will be on the motherboard


15 Which two devices are considered input devices? (Choose two.)
 *biometric authentication device
 *digital camera


16 Which technology would be best to use for drive redundancy and data protection?
 *RAID


18 Which two categories are used to classify CPU architecture? (Choose two.)
 *CISC
 *RISC


19 Which three system resources are commonly used for communication between the CPU or memory and other components in the computer? (Choose three.)
 *IRQ
 *DMA
 *I/O address


20 What is the function of a capture card?
 *enables a video signal to be recorded to the computer hard drive


21 Why are solid state drives reliable and therefore suitable to be installed in computers used in harsh industrial workplaces?
 *They consume less power and have no moving parts.


22A technician needs to back up 4 GB of data using a single storage medium. Which medium can hold the entire 4 GB on a single disc?
 *DVD+/-R


23 How many conductors are found in a SATA data cable?
 *7


24 What are the two connector types for the 1394a interface? (Choose two.)
 *4-pin
 *8-pin


25 Which two form factors are commonly used to build a new computer? (Choose two.)
 *BTX
 *ATX


26 A company employee has very important data on a computer. What RAID level should be used if the criteria include that data be written and read simultaneously and that all data be duplicated using a minimum of three drives?
 *5


27 PATA data cables are available in two different types. The types are distinguished by the number of conductors. Which two types are available? (Choose two.)
 *80
 *120


28 Which three devices are considered output devices? (Choose three.)
 *fingerprint scanner
 *headphones
 *printer











READ MORE - Jawaban IT Essentials Chapter 1 exam( Version 4.1 )

Minggu, 20 Juni 2010

DANA CEKAK, PERSATU KEDODORAN

Minggu, 20 Juni 2010















TUBAN - Pihak manajemen tim Persatu masih bekerja keras menggali dana untuk menghadapi putaran kedua kompetisi Divisi III Regional Jatim.

Beberapa waktu lalu, manajer Persatu Lilik Soehardjono sudah melakukan pertemuan dengan jajaran ofisial dan ketua Pengcab PSSI Tuban, Hadi Tugur. Pertemuan tersebut untuk merumuskan langkah-langkah penyelamatan Persatu. Lilik kini masih menunggu komitmen dari Semen Gresik untuk memberikan tambahan dana bagi Persatu agar bisa tetap berkiprah pada putaran kedua ini. ''Inilah kesempatan terbaik untuk promosi ke Divisi II. Kami akan berjuang sekuat tenaga agar tim ini bisa eksis,'' tuturnya.

Sementara, para pemain juga masih terus melakukan latihan intensif. Pelatih kepala S. Karjan bersama dua asistennya, Didik Maryadi dan Salamun Patra masih berusaha keras mendongkrak performa Nur Happy dkk.

Sementara itu, Ronggomania, kelompok suporter pendukung Persatu juga berharap tim berjuluk Laskar Ronggolawe itu melanjutkan kiprahnya. Hasil apik selama putaran I lalu diharapkan bisa diteruskan pada putaran II nanti. Terkait kesulitan finansial yang dihadapi Persatu, Ronggomania berharap semua pihak khususnya Pemkab Tuban memiliki kepedulian terhadap tim kebanggaan Tuban tersebut. ''Kami sudah capek bersuara meminta pemkab untuk membantu, namun kenyataannya juga nggak menuai hasil,'' kata ketua Ronggomania, Arka. (zak/wid)






NARSUMBER:Radar Bojonegoro
READ MORE - DANA CEKAK, PERSATU KEDODORAN