There is a problem with the power supplied to a group of computers and you do not know how to fix the problem. What should you do first?

a. Establish a theory of why you can't figure out the problem.
b. Contact the building supervisor or your manager.
c. Test the theory to determine cause
d. Document findings, actions, and outcomes.


Answer: b. Contact the building supervisor or your manager.

Computer Science & Information Technology

You might also like to view...

Consider a hypothetical car hire company and sketch out a three-tier solution to the provision of their underlying distributed car hire service. Use this to illustrate the benefits and drawbacks of a three-tier solution considering issues such as performance, scalability, dealing with failure and also maintaining the software over time.

What will be an ideal response?

Computer Science & Information Technology

What are some examples of routing metrics that can be used to determine the best path for a network?

What will be an ideal response?

Computer Science & Information Technology

Match each item with a statement below.

A. A security feature that prevents malicious software from inserting executable code into sections of memory intended for data storage. B. A feature supported by some OS kernels to enable guest OS communication with Hyper-V for improved performance. C. Hardware virtualization support for AMD processors. D. A video graphics processing unit, can be used to provide accelerated video and 3D rendering. E. An option that enables a host PC's memory and processors to be split up into nodes. F. A disk that is tied to another disk, and only stores the changes between the two disks. G. A virtual floppy disk file that can be attached to a virtual machine. H. Allows the use of only as much memory as needed, within a specified range, by a virtual machine. I. Allows a virtual machine on a host to have an exact copy on the local network, or across the Internet, which can be used if the primary virtual machine goes down. J. Special hardware that handles cryptographic keys.

Computer Science & Information Technology

Server ______ uses software to enable a physical server to emulate the hardware and computing capabilities of one or more servers.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology