Computers and Technology

You are in the process of building a computer for a user in your organization. You have installed the following components into the computer in Office 1:i5-8600K 3.60 GHz 6 core processor
-4x8 GB DDR4 memory (32GB)
-Three SATA hard drivesYou need to make sure the new components are installed correctly and functioning properly. You also need to install a new SATA CD/DVD drive and make sure the computer boots successfully. The user also needs to be able to print to the Color Laser Printer shared on the network.
Perform tasks in the following order:
-Identify and connect any components that are not properly connected.
-Use the PC tools on the shelf to test for components that are not functioning. Replace any bad components with the known good parts on the shelf.
-Install the required CD/DVD drive in one of the drive bays and connect the power cable from the power supply.
-Connect the CD/DVD data cable from the CD/DVD drive to the motherboard.
-After resolving the issues and installing the SATA CD/DVD drive, boot the computer into Windows.
-Add the Color Laser Printer hosted on CorpServer to the list of available printers.
-Set the printer as the default printer.

answer
Answers: 1

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 16:20, mandy9386
Consider the following statements, then select one of the answers below: the signal() function shown below registers "sig_handler()" as the signal handler function for the sigkill signal, without the complexity of using when the sigkill signal is sent to a process running this code, by a user typing "kill -kill ", where the correct process id is used for to target the process, sig_handler() will be executed.
Answers: 1
image
Computers and Technology, 23.06.2019 14:30, naomi20044
Select the correct answer. andy received a potentially infected email that was advertising products. andy is at risk of which type of security threat? a. spoofing b. sniffing c. spamming d. phishing e. typo-squatting
Answers: 2
image
Computers and Technology, 23.06.2019 15:00, abelxoconda
1. which of the following statements are true about routers and routing on the internet. choose two answers. a. protocols ensure that a single path between two computers is established before sending packets over it. b. routers are hierarchical and the "root" router is responsible for communicating to sub-routers the best paths for them to route internet traffic. c. a packet traveling between two computers on the internet may be rerouted many times along the way or even lost or "dropped". d. routers act independently and route packets as they see fit.
Answers: 2
image
Computers and Technology, 24.06.2019 01:30, jadaroyval
Write a program that asks the user to enter the name of an input file. if the file does not exist, the program should prompt the user to enter the file name again. if the user types quit in any uppercase/lowercase combinations, then the program should exit without any further output.
Answers: 3
Do you know the correct answer?
You are in the process of building a computer for a user in your organization. You have installed t...

Questions in other subjects:

Konu
English, 03.04.2021 22:40
Konu
Mathematics, 03.04.2021 22:40
Konu
English, 03.04.2021 22:40