subject

1. james added a new video card and needs to get a power supply that will have enough power to run the new card.
when researching the new power supply, what feature does james need to look for to make sure he has enough power to run his computer with the new video card?
form factor
wattage
dual voltage option
80 plus gold rating
2. rebecca completed work on a computer and is verifying the functionality of the system when she finds a new problem. this problem is not urgent and can be easily fixed. the policy at rebecca’s company is that all problems need to be reported and given a priority code before they can be assigned to someone.
what should rebecca do about this new problem?
report the new problem.
troubleshoot the new problem.
ignore the new problem.
determine whether fixing the first problem caused the second problem.
3. while you are working on your computer, it shuts down unexpectedly, and you detect a burning smell. when you remove the case cover, you notice a distended capacitor.
what can you do to fix this problem?
reseat the ram.
replace the cmos battery.
replace the power supply.
replace the motherboard.
4. lin is booting up his computer, and during the boot process, the computer powers down. after several unsuccessful attempts to boot his computer, he decides that he needs to start the troubleshooting process. lin thinks that the problem could be in the power supply, so he uses a power supply tester. the test shows that the power supply is functioning properly.
what should lin check next in the troubleshooting process?
processor
motherboard
ram
hard drive
5. your customer wants to build a new computer and needs to make sure he orders the correct power supply for his machine.
what should you tell him to check to make sure he orders the correct power supply? (select all that apply.)
wattage requirements
ram requirements
type of cooling
form factor
number of hard drives
video requirements

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 03:50
You are working as a security analyst in a company xyz that owns the whole subnet range of 23.0.0.0/8 and 192.168.0.0/8. while monitoring the data, you find a high number of outbound connections. you see that ip's owned by xyz (internal) and private ip's are communicating to a single public ip. therefore, the internal ip's are sending data to the public ip. after further analysis, you find out that this public ip is a blacklisted ip, and the internal communicating devices are compromised. what kind of attack does the above scenario depict?
Answers: 3
question
Computers and Technology, 22.06.2019 11:00
Which action is good business etiquette? a. switching your cell phone off before you enter a meeting b. keeping your cell phone on low volume before you enter a meeting c. setting a pleasant ring tone on your cell phone before you enter a meeting d. setting a standard ringtone on your cell phone before you enter a meeting
Answers: 1
question
Computers and Technology, 22.06.2019 19:20
Write a program that prompts the user to input a string. the program then uses the function substr to remove all the vowels from the string. for example, if str = "there", then after removing all the vowels, str = "thr". after removing all the vowels, output the string. your program must contain a function to remove all the vowels and a function to determine whether a character is a vowel.
Answers: 2
question
Computers and Technology, 22.06.2019 23:30
The next button in the review section shows the next available comment. next slide with no comment. previous comment. edited comment.
Answers: 1
You know the right answer?
1. james added a new video card and needs to get a power supply that will have enough power to run t...
Questions
Questions on the website: 13722363