Download presentation
Presentation is loading. Please wait.
Published byNigel Ferdinand Watts Modified over 9 years ago
2
IT Essentials Final Review JEOPARDY
3
RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 100 200 300 400 500RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands 200 400 600 800 1000 Practice Safe PC is it? Practice Safe PC is it? An Apple a Day… An Apple a Day… Fu-Shitzu Black and white and Read all over Black and white and Read all over GTPC (Grand Theft PC) (Grand Theft PC) It’s not PC It’s not PC 100 200 300 400 500 200 400 600 800 1000 ► ► ► F i n a l J e o p a r d y ◄ ◄ ◄ 1000
4
Question This port can support up to 63 Devices Practice Safe PC is it? 200 A: What is Firewire ? 100 200 300 400 500
5
Question A: What is ECC memory ? It can detect multiple bit errors and correct single bit errors. 100 200 300 400 500 Practice Safe PC is it? 400
6
Question 100 200 300 400 500 A: What are maximum memory supported and Processor Supported ? Two characteristics of a motherboard that are determined by the chipset (form factor). Practice Safe PC is it? 600
7
Question 100 200 300 400 500 A: What is a compressed air ? The industry accepted method for maintenance cleaning of CPU heat sinks. Practice Safe PC is it? 800
8
Question 100 200 300 400 500 A: What is Scandisk? This Windows 2000 tool can be used by a technician to check the hard drive. Practice Safe PC is it? 1000
9
Question 100 200 300 400 500 A: What are Check and Secure loose cables, Clean the mouse and keyboard and Update Drivers ? List three common tasks performed during preventative maintenance. An Apple a Day… 200 100 200 300 400 500
10
Question 100 200 300 400 500 A: What is when a back up is not available and when you cannot back up the data? Two situations it is recommended to ask the customer to sign a liability release form. An Apple a Day… 400
11
Question 100 200 300 400 500 A: What is during the POST ? The point a key must be pressed to start the BIOS setup program. An Apple a day… 600
12
Question 100 200 300 400 500 A: What is AUX? Some motherboards require this 4-pin or 6-pin power connector An Apple a Day… 800
13
Question 100 200 300 400 500 A: What is Spyware remover, Defrag and Disk Cleanup ? These three tools will optimize computer performance. An Apple a Day… 1000
14
Question 100 200 300 400 500 A: What are compact design and portability ? Two features that make laptops a good alternative to desktop computers. Fu-Shitzu 200
15
Question 100 200 300 400 500 A: What is SODIMM ? Laptops use this type of memory. Fu-Shitzu 400
16
Question 100 200 300 400 500 A: What is Desktop motherboards have standard form factors and laptop motherboards are proprietary? The major difference between laptop and desktop motherboards. Fu-Shitzu 600
17
Question 100 200 300 400 500 A: What are Power schemes? A collection of settings that control the power settings of a laptop. Fu-Shitzu 800
18
Question 100 200 300 400 500 A: What is use a lint-free cotton cloth and wipe disc from center outward ? Two actions to clean the surface of CDs and DVDs Fu-Shitzu 1000
19
Question 100 200 300 400 500 A: What is Impact ? Dot-matrix printers use this technology. Black and White and Read all over 200
20
Question 100 200 300 400 500 A: What is developing? The phase the a laser printer applies toner to the latent image. Black and White and Read all over 400
21
Question 100 200 300 400 500 A: What is dye-sublimination ? The print process that uses solid sheets of ink that are heated by the print head Black and White and Read all over 600
22
Question 100 200 300 400 500 A: What are vivid color prints? The advantage of a solid ink printer over an inkjet printer. Black and White and Read all over 800
23
Question 100 200 300 400 500 A: What is drum scanner ? The type of scanner used for high quality reproduction of valuable paintings Black and White and Read all over 1000
24
Question 100 200 300 400 500 A: What is DDoS attack ? Many machines coordinate this. GTPC (Grand Theft PC) 200
25
Question 100 200 300 400 500 A: What is Change default passwords and use MAC filtering ? Two steps that should be performed when securing a wireless network GTPC (Grand Theft PC) 400
26
Question 100 200 300 400 500 A: What is gather data from customer ? What is the first step in troubleshooting Security issues. GTPC (Grand Theft PC) 600
27
Question 100 200 300 400 500 A: What is social engineering ? When an employee inadvertently allows a visitor to see their username and password which is later used in an external attack. GTPC (Grand Theft PC) 800
28
Question 100 200 300 400 500 A: What is simple username convention and defined rules for password expiration and lockout? Two standards (as defined in the curriculum) regarding usernames and passwords. GTPC (Grand Theft PC) 1000
29
Question 100 200 300 400 500 A: What is each new customer call is a fresh start ? The rule that all good call center technicians follow It’s not PC 200
30
Question 100 200 300 400 500 A: What is Netiquette ? Checking grammar and spelling before sending an email and using mixed case in an email are examples of this. It’s not PC 400
31
Question 100 200 300 400 500 A: What is an SLA? Legal agreement between a customer and the service vendor confirming a specific level of support. It’s not PC 600
32
Question 100 200 300 400 500 A: What is supported software, diagnostic procedures and service location? Three items that are a common part of an SLA It’s not PC 800
33
Question 100 200 300 400 500 A: What is your name, ticket number and customer name? When transferring a customer to the next technician you should give three items to the receiving technician. It’s not PC 1000
34
Question A: What is ENIAC or Electronic Numerical Integrator And Computer ? The long and short name of the first computer. Final Jeopardy 100 200 300 400 500
35
Computers in History Final Jeopardy 100 200 300 400 500
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.