What is the third step of troubleshooting?

A) Establish a theory of probable cause.
B) Test a theory to determine the cause.
C) Identify the problem.
D) Establish a plan of action.


B

Computer Science & Information Technology

You might also like to view...

To recover from a system lockout in Android, enter your Google login information

Indicate whether the statement is true or false

Computer Science & Information Technology

Spyware can be used in a computer-based espionage to collect sensitive information

Indicate whether the statement is true or false.

Computer Science & Information Technology

Within a data classification scheme, "comprehensive" means that an information asset should fit in only one category.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

________ is a hybrid version of Ethernet that uses either 10Base-T or 100Base-T.

a. Mullion Ethernet b. Base-T Ethernet c. 10/100 Ethernet d. Token ring Ethernet e. FDDI Ethernet

Computer Science & Information Technology