Top-Rated Free Essay
Preview

Chapter 12 Textbook Questions and Answe

Powerful Essays
850 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Chapter 12 Textbook Questions and Answe
Chapter 12 Questions and Answers - Bryce Moore - 11/25/2014

1. What are the six steps that you can use to solve any computer problem?
Step 1: Interview the User and Back Up Data
Step 2: Establish a Theory
Step 3: Test your Theory
Step 4: Plan the fix and resolve the problem
Step 5: Verify and Prevent
Step 6: Document
2. Blue screen errors happen when which type of processes encounter an error?
When processes running in Kernel mode encounter a problem and Windows must stop the system.
3. In what folder are driver files stored?
C:\Windows\System\32\drivers
4. What is the command to use the Memory Diagnostics tool?
Chkdsk with /rparameter
5. What method can you use to test memory on a Windows XP system by using the Memory Diagnostics tool without having to install Windows 7 or Vista on the system?
In the command prompt window, enter mdsched.exe, press enter. A dialog box will ask if you want to run the test now or on the next restart
6. What is the command to use the System File Checker to immediately verify system files?
To verify system files on the next start? sfc /scannow sfc /scanrs
7. How many bits does an x86-based operating system process at one time?
32-bit
8. What GUI tool can you use to stop a program that is hung?
Task Manager
9. What command-line tool can you use to stop a program that is hung?
Taskkill
10. How can you eliminate the possibility that an application error is caused by another application or service running in the background Tasklist : More
11. How does Windows know which application to use to open a file when you double-click the file in Windows Explorer?
File Extensions
12. Which windows tool can you use to install the drivers needed so that a user can open a data file using an application that is normally not used with the file?
( ODBC ) Data Sources Open Database Connectivity
13. Which two tools might a software developer or system administrator use to register a component of an application in the windows registry?
Component Services ( COM+ ) tool, Regsvr32_ utility
( You can unregister a component in Regsvr32_ by using the command: /u parameter
14. If an application works when the system is loaded in Safe Mode, but does not work when Windows is loaded normally, what can you assume?
You can assume that the problem might be the operating system, device drivers, or other applications that load at startup and are conflicting with the application
15. When an application written for Windows XP does not work in Windows 7, which tool should you attempt to use first to solve the problem, Compatibility Mode or XP Mode?
You can try running compatibility mode first. The steps for this are-
Step 1: Check the " Run this program in compatibility mode for: " option
Step 2: From the drop-down menu, select the operating system that the application was written to run under.
Step 3: Click " Apply " and close the " Properties " box.

If Compatability Mode does not fix the problem, the last resort is to run it in XP Mode
XP Mode can be used to install XP in a virtual machine under Windows 7.

Why?
Applications installed in XP Mode only work in the XP enviroment. Again, ( only use this option as a last resort because XP Mode takes up a lot of system resources.

Thinking Critically
1. Categorize each of the following tasks or decisions into one of the six steps to troubleshoot any computer problem.
a. Set up back up schedule.
b. Reimage Windows 7
c. Decide the problem must be a courrupted video driver.
d. Copy Word documents to a USB flash drive.
e. Apply a restore point

Six Steps:
Step 1: Interview the User and Back Up Data d. Copy Word documents to a USB flash drive.
e. Apply a restore point a. Set up back up schedule.

Step 2: Establish a Theory
c. Decide the problem must be a courrupted video driver.

Step 3: Test your Theory
b. Reimage Windows 7

Step 4: Plan the fix and resolve the problem
Step 5: Verify and Prevent
Step 6: Document

2. As a helpdesk technician, list four good detective questions to ask if a user calls to say, " My PC won't boot. "
1. What error messages, unuusal displays, or failures did you see?
2. When did the problem start?
3. Have you made any hardware softwarem or configuration changes?
4. Has anyone else used your computer recently?
5. What changes have recently been made to the system?

3. Reword the following questions that might be asked when interviewing a user over the telephone. Your new questions should reflect a more positive attitude toward the user.
a. Did you drop your laptop?
Has the laptop been damaged by a fall or drop recently?
b. Did you forget to recharge the laptop battery?
Was the charger plugged in all the way on the laptop?
c. You say the problem is that Microsoft Word is giving an error, but do you really know how to use that application?
Can you read to me what the error on Microsoft Word says?

4. A user tells you that Microsoft Word gives errors when saving a file. What should you do next?
b. Ask the user when the problem first started.

You May Also Find These Documents Helpful

  • Good Essays

    Which of the following answers are true about random-access memory (RAM) as it is normally used inside a personal computer? ( choose two answers)…

    • 957 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    It255 Final Study Guide

    • 843 Words
    • 4 Pages

    4. Which of the following is a detailed written definition of how software and hardware are to be used?…

    • 843 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Nt1210 Chapter 1 Review

    • 1315 Words
    • 6 Pages

    4. Which of the following are true about random-access memory (RAM) as it is normally used inside a personal computer?…

    • 1315 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    b. Should “problem” = an issue in the code that is preventing it from executing, than the first thing I would imagine being done is to look over the program for syntax errors and logic errors. (While I know that syntax is usually the culprit for error, I may as well look for the both of them if I’m going to be going over code line by line.)…

    • 848 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Chapters 1-4

    • 1910 Words
    • 8 Pages

    3. What is the application mentioned in the chapter that creates a virtual machine on a computer?…

    • 1910 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Hcs 451 Week 3 Team Dq

    • 309 Words
    • 2 Pages

    Step 1 essentially is defining what the problem is, why the problem exists, and why the problem needs to be resolved.…

    • 309 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    My computer is one year old. That is we bought it exactly one year ago, but in today’s view it might as well be ten years old. Technology with computers is so fast paced, that as soon as my computer hit the store’s display it was obsolete. I have 2.00 GB in RAM, 32-bit operating system, and it is an Intel Celeron Processor at 2.20 GH2. I was not willing to check my ROM because I was told that I would have to shut down the computer to do this and then immediately do a test that would then take 30-60 minutes to complete.…

    • 422 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Forensic Science

    • 2510 Words
    • 11 Pages

    • Gather volatile information – memory, process list, network connections, open files… • Power off machine and image disk…

    • 2510 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    a On the client computer, use a text editor to open the application configuration file.…

    • 947 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    2. What role did the computer play in creating the problems? Were they the fault of the computer or were the management problems?…

    • 294 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Used to link or embed an object, display and manipulate data from other windows based applications.…

    • 298 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Srs - Bb

    • 13822 Words
    • 56 Pages

    The Software Requirement Specifications (SRS) provide detailed information regarding the functionality of the software. These requirements are based on the intended uses detailed in Appendix F and the Safety Critical Requirements detailed in Appendix G. A variety of tools are available for use in meeting these specifications. In general, the data dictionary for specific files provides a great deal of control through the data type, pattern matches, and input transform requirements. However, specific algorithms have been included in the software routines where appropriate and Kernel Security and Menu Management provides additional tools (i.e., menu access and security keys for meeting the specifications). As with the file structure and the rest of…

    • 13822 Words
    • 56 Pages
    Satisfactory Essays
  • Good Essays

    BA201 NVQ

    • 889 Words
    • 3 Pages

    A lot of problems at work are caused by technical difficulties, for example the computers and printers sometimes tend to develop faults, such as jamming. This could be programs not…

    • 889 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    QUESTION 2 2.1 2.2 INTRODUCTION DISCUSSION 2.2.1 Computer Hardware: Physical Devices 2.2.2 Computer Software: Intellectual Interfaces 2.2.2.1 System Software: Technology Management 2.2.2.2 Application Software: Your Productivity 2.2.3 Database Management System 2.2.4 Security Requirements 2.3 SUMMARY…

    • 5829 Words
    • 24 Pages
    Powerful Essays
  • Powerful Essays

    Information System

    • 2727 Words
    • 11 Pages

    Program-data dependence refers to the coupling of data stored in files and the specific programs required to update and maintain those files such that changes to the data . Every traditional computer program has to describe the location and nature of the data with which it works. In traditional file environment, any change in a sofware program could require a change in the data accessed by the program. One program might be modified from a…

    • 2727 Words
    • 11 Pages
    Powerful Essays