IT Essentials JEOPARDY Module 1 – 10 Review
Black and white and Read all over Router Modes Router Modes Practice Safe PC is it? An Apple a Day… WAN Encapsulation WAN Encapsulation Laptops & Stuff WAN Services WAN Services Black and white and Read all over Router Basics Router Basics Grand Theft PC Router Commands Router Commands It’s not PC ► ► ► F i n a l J e o p a r d y ◄ ◄ ◄ 200 200 200 200 200 100 200 100 400 400 400 400 200 400 200 400 600 600 600 600 300 600 600 300 800 800 800 800 800 400 800 400 1000 1000 1000 1000 1000 500 500 1000
Practice Safe PC is it? 200 Question This port can support up to 63 Devices Question A: What is Firewire ? 100 200 300 400 500
Practice Safe PC is it? 400 Question Best way to fully ensure that data is unable to be recovered from a hard drive. Question A: What is Shatter hard drive platters with a hammer? 100 200 300 400 500
Practice Safe PC is it? 600 Question Power mode that is used by a laptop so that all the data is saved, all the applications the user was working on are left open, and there is no power used by the laptop. Question A: What is Hibernate? 100 200 300 400 500
Practice Safe PC is it? 800 Question The industry accepted method for maintenance cleaning of a CPU heat sinks. Question A: What is Compressed Air ? 100 200 300 400 500
Practice Safe PC is it? 1000 Question This Windows XP command line tool can be used by a technician to check the hard drive. Question A: What is chkdsk? 100 200 300 400 500
An Apple a Day… 200 Question List one of the three common tasks performed during preventative maintenance. Question A: What are Check and Secure loose cables, Anti-virus scan, and Update Drivers ? 100 200 300 400 500 100 200 300 400 500
An Apple a Day… 400 Question One of two situations it is recommended to ask the customer to sign a liability release form. Question A: What is when a back up is not available and when you cannot back up the data? 100 200 300 400 500
An Apple a Day… 600 Question During what point that a key must be pressed to start the BIOS setup program. Question A: What is during the POST ? 100 200 300 400 500
An Apple a Day… 800 Question Some motherboards require this 4-pin or 6-pin power connector. Question A: What is AUX - auxiliary? 100 200 300 400 500
An Apple a Day… 1000 Question One of the three tools will optimize computer performance. Question A: What is Spyware remover, Defrag and Disk Cleanup ? 100 200 300 400 500
Laptops & Stuff 200 Question Two features that make laptops a good alternative to desktop computers. Question A: What are compact design and portability ? 100 200 300 400 500
Laptops & Stuff 400 Question Laptops use this type of memory. A: What is SODIMM ? 100 200 300 400 500
Laptops & Stuff 600 Question One of two things that are done prior to replacing components that are not hot swappable in a laptop . Question A: What is Unplug laptop and remove battery? 100 200 300 400 500
Laptops & Stuff 800 Question A collection of settings that control the power settings of a laptop. Question A: What are Power schemes? 100 200 300 400 500
Laptops & Stuff 1000 Question One of the two actions to clean the surface of CDs and DVDs Question A: What is use a lint-free cotton cloth and wipe disc from center outward ? 100 200 300 400 500
Black and White and Read all over 200 Dot-matrix printers use this technology. Question A: What is Impact ? 100 200 300 400 500
Black and White and Read all over 400 The phase the a laser printer applies toner to the latent image. Question A: What is developing? 100 200 300 400 500
Black and White and Read all over 600 The print process that uses solid sheets of ink that are heated by the print head Question A: What is dye-sublimination ? 100 200 300 400 500
Black and White and Read all over 800 The advantage of a solid ink printer over an inkjet printer. Question A: What are vivid color prints? 100 200 300 400 500
Black and White and Read all over 1000 The type of scanner used for high quality reproduction of valuable paintings Question A: What is drum scanner ? 100 200 300 400 500
Grand Theft PC 200 Question Many computers in different locations coordinate this. Question A: What is DDoS attack ? 100 200 300 400 500
Grand Theft PC 400 Question Two steps that should be performed when securing a wireless network Question A: What is Change default passwords and use MAC filtering ? 100 200 300 400 500
Grand Theft PC 600 Question What is the first step in troubleshooting Security issues. Question A: What is gather data from customer ? 100 200 300 400 500
Grand Theft PC 800 Question When an employee inadvertently allows a visitor to see their username and password which is later used in an external attack. Question A: What is social engineering ? 100 200 300 400 500
Grand Theft PC 1000 Question One of the two standards (as defined in the curriculum) regarding usernames and passwords. Question A: What is simple username convention and defined rules for password expiration and lockout? 100 200 300 400 500
It’s not PC 200 The rule that all good call center technicians follow Question A: What is each new customer call is a fresh start ? 100 200 300 400 500
It’s not PC 400 Checking grammar and spelling before sending an email and using mixed case in an email are examples of this. Question A: What is Netiquette ? 100 200 300 400 500
It’s not PC 600 Legal agreement between a customer and the service vendor confirming a specific level of support. Question A: What is an SLA? 100 200 300 400 500
It’s not PC 800 Three items that are a common part of an SLA Question A: What is supported software, diagnostic procedures and service location? 100 200 300 400 500
It’s not PC 1000 When transferring a customer to the next technician you should give three items to the receiving technician. Question A: What is your name, ticket number and customer name? 100 200 300 400 500
Final Jeopardy Question The concept of the PDA (Personal Digital Assistant) has existed since the ________. Question A: What is 1970’s? 100 200 300 400 500
Final Jeopardy Computers in History 100 200 300 400 500