Verify your work area is low static or static free when repairing or building a computer.

a. true
b. false


Answer: a. true

Computer Science & Information Technology

You might also like to view...

When you use a subscript not within the range of acceptable subscripts, your subscript is said to be ____.

A. out of range B. out of area C. out of bounds D. out of series

Computer Science & Information Technology

Case 11-1 Cindy is learning the basics of formatting Microsoft Word documents. Her trainer, Annie, is an expert at giving lessons on working with documents and how it can be enhanced for better understanding and appearance. Annie trains Cindy on how she can create a style named "Title" that would consist of all the formatting instructions, such asĀ italic, blue, 18-point Cambria, and centered, she could apply to any paragraph in the document. Cindy decides to modify the formatting of this style to 16-point Arial on a shaded red background. Which of the following should Cindy do to apply the new formatting to all text that has the Title style?

A. ?Create a new style definition with the new formatting instead of updating the existing Title style. B. ?Change the existing style definition for "Title" that updates all text that has the Title style definition applied to the new style definition. C. ?Create a macro named "Title" that specifies formatting layouts for individual pages that can be grouped as desired. D. ?Change the filename of the document and then reapply the new formatting with an alternate Title style definition.

Computer Science & Information Technology

You can easily create a task from an e-mail message (including attachments) or a contact by using the ____ command.

A. Create B. Arrange C. Move D. Copy

Computer Science & Information Technology

Match each item with a statement below.

A. A console interface that can be used to interact with an ESXi server host. B. The process of assigning more disk space to virtual disks that you have space available on a VMFS data store. C. A file stored in a VMFS volume that acts as a proxy or go-between providing a physical storage device to virtual disk mapping. D. Allows the administrator to set up rules and procedures to manage how virtual network resources are used. E. Allocates the space required for a virtual machine during creation. Data remaining on the physical device is zeroed out when the disk is created. F. Space required for a virtual disk is allocated during creation, but data remaining on the physical device is not erased during creation, it is zeroed out over time. G. Uses only as much data store space as the disk initially needs. H. As an example, this is used by a physical switch to pass packets from multiple VLANs to a host using VLAN tags. I. An emulated version of the AMD 79C970 PCnet32 NIC J. The next generation of a paravirtualized NIC, designed for performance and advanced features such as fault tolerance.

Computer Science & Information Technology