You can make a hat, you can make a brooch
Where would you be most likely to use a plenum cable?
Which of these security technologies would be considered a factor of authentication?
What makes a computer worm significantly different than other types of malicious software?
One of your eight-outlet under-desk UPS units has stopped working, and you’d like to find the best way to decommission the unit. Which of these would be the best way to dispose of this broken UPS?
In this study group episode; the difference between x86 and x64, a step-by-step of the boot process, DNS vs. DHCP, 802.11 versions, and much more.
Professor Messer’s CompTIA A+ Study Group – September 24, 2011 Read More »
In this study group edition; plenum cable, the OSI model in the real world, DoS in IPv6, and subnetting, subnetting, subnetting!
Professor Messer’s Network+ Study Group – September 24, 2011 Read More »
One of your customers has shown up at your desk with his broken computer, and he’s visibly upset and quite vocal about the problem he’s having. He’s also asking for a very specific repair that doesn’t appear to have any relationship to his issue. What’s the best way to handle this difficult situation?
You’ve had your computer for a couple of years, and you’ve noticed recently that the fan inside of the case is running more often and at higher rates of speed. What is the most likely cause of this issue?
You’ve just replaced your two old 1 GB memory modules in your desktop computer with two new 2 GB memory modules. However, when you turn on your computer it beeps and the screen remains black. Which of these would be the most likely cause of this issue?