Tech Support – Semester 2 – 2nd Years Final Test Question Notes Since this is quite a lengthy document – I have spiced it up with a few amazing quotes, jokes, computer haiku and factoids – hope you find them all!! Session 4 1. In installation of a motherboard in the case – how can you tell where to plug in the fans for power? Ans – check the motherboard book. 2. T/F – Windows has management settings to regulate the speed of the case fans. True 3. Which component of the hard drive is used to store actual data? Ans – platters. 4. To calculate the capacity of a hard drive – what formula? Multiply Cylinders x head x sectors x 512 bytes 5. Hard drives have a read/write head for both sides of each platter in the drive. True 6. How can you tell which IDE controller is Primary or Secondary? Ans: look for labels on the mb or check the mb booklet. 7. What standard allowed the hard drive capacity to grow from 504 MB to 8.3 GB ? ATA-2 8. What is the max number of IDE hard drives that can be attached to one controller? 2 9. How does a computer tell which drive to boot from? Jumper settings and BIOS settings 10. Ultra DMA cables look exactly like the IDE cables so you cannot tell them apart just by looking. False 11. When installing the Ultra DMA cables, the colored end always plugs in the ?? Ans motherboard 12. If a high speed drive is installed using a lower speed cable, what will happen? Ans: it will work but at a slower speed. 13. Serial ATA drives must be configured as Master or Slave with jumper settings ans: False 14. Serial ATA drives can have how many drives plugged in to a single connector on the motherboard? 1 15. SATA is changing the look of newer motherboards in what ways? Ans – may have only 1 IDE connector and many SATA connectors 16. SCSI stands for what? Small computer Systems Interface 17. What is it about SCSI technology that will speed up the performance of a computer? The scsi controller will move data without involving the cpu – it works on its own. 18. Chaos reigns within. Reflect, repent, reboot. Order shall return. 19. How many devices can be installed on a scsi wide controller? 16 20. At the end of a scsi chain, what must be installed? Terminator 21. When a system has both IDE and SATA hard drives, how do you set the boot order? BIOS 22. Often when people install a new SATA drive in their computer, they find it will not boot. What is the common cause of this problem? Ans: They forgot to set the boot order. 23. In setting up a new hard drive, what is necessary before it can be formatted? Ans: partitioning 24. What device is replacing the FDD? CD-ROM drive 25. The capacity of most CD-ROM drives is ? ans 700 mb 26. How can you eject a CD from a drive when the computer is not turned on? Use the manual override switch located in a small hole in the front of the drive 27. What differences are there between the connectors on the back of an IDE hd and and IDE CD-ROM drive? Sound card connector 28. If a CD-RW drive is marked with the numbers 40x32x52x on the front – what does that mean? Burn speed is 40x, rewrite speed is 32 x and read speed is 52x 29. What was the speed of the original cd-ROMs? 150 Kps 30. DVD formats ; do you need different burners for DVD-R, DVE+R, DVD-re, DVD+rw? Not anymore 31. Computers in the future may weigh no more than 1.5 tons. Popular Mechanics, forecasting the relentless march of science, 1949. Session 5 notes 1. Thumb drives – (or Flash drives) removable media - flash drives – speed- U3 drive with built in applications- browsers tools etc – easy to troubleshoot If damaged – no fix but they can be formatted 2. Floppy drive 1.44MB fdd cable has a twist 3. Ext HDs – container with sata , pata or usb/firewire. Or could be ext DVD or CD with usb or esata connector-No spec drivers required Usb A vs B connectors B = downsteam, A-upstream toward the root hub. Can hook in more hubs but devices pull too much power if you hook up too many – get error mess on screen. 4. 3 speeds 1.1 slow (1.5 mbsp) full – 12 mbps 2.0 – 480 mbps – needs a high speed usb controller on motherbd. Usb devices need drivers installed before you plug in device – always use mfg’s Driver Errors will be with too little power or speed. – get a 2.0 usb controller card 5. Fire wire Ieee 1394 – firewire – invented by Apple- 6 pin connector or mini 4-pin for unpowered devices. 1394 A – 4000 mbps 1394 B = 800 mbps Can daisychain while usb cannot Cable distance – usb – 5 meters, firewire only 4.5 m long. Otherwise same rules apply except may not get the right error messages with firewire 6. Esata – looks like sata that is reinforced for external use. Up to 3 Gbps speed. Ext devices are configured and troubleshoot same as internal 7. Flash memory cards – different types CF flash – uses mini pcmcia connection – acts like a small expansion bus – not just storage – could be a GPS etc. Smart media – competitor to CF – not too much around any more SD – Secure Digital ( just mem or SDIO – more than just mem - ) Three sizes – regular - Mini – micro Sony Mem stick – Regular or Pro – only used by Sony xD – half the size – popular for phones and cameras Need a card reader to access. 640K ought to be enough for anybody. Bill Gates, 1981 8. Sound Sound card – handles sampled or midi sounds- midi files are smaller than wave forms Some older motherboards will have an on-board speaker CD/DVD drive has a connector to the sound card for CD/DVD drive. Along with ide and power. Installing – sound card if not built in to motherbd 3 connectors – Microphone – speaker out and aux and MIDI connector 7.1 sound card- side channels – sub woofer Newer – pci ex 1x connection Session 6 Notes 1. What functions are performed by an OS? User interface, communicate w hardware. Application support information, file system (new os’s – network support) 2. Partitioning a drive, what exactly is it? What happens when a drive is partitioned? 3. What is NTFS? – File system for Windows NT – Windows 2K + 4. Linux – what are some of the common distributions? Who created it? 5. What is the minimum speed processor for Win 2000? 6. Identify: Start button, task bar, quick launch bar, system tray 7. How to open the command prompt, execute a command, and then return to Windows 8. File extensions and associations. 9. How to change the virtual memory on a system 10. How to enable hidden files and folders to be displayed. 11. What is the master boot record? First sector on HD – computer looks there after the POST. Followed by the partition table. Max 4 partitions on one HD> The Active Partition is the one that the computer will boot from now. 12. How many logical drives can be placed on an extended partition? 13. What is striping in a RAID array? What happens if a hard drive is lost – do you loose the data? 14. NTFS is always preferable to FAT32,unless some application needs FAT. 15. Install questions – regional and language, keyboard type, name and organization, product key, computer name(descriptive 15 char max), Admin password, time zone settings, network settings (workgroup or domain) 16. Press any key to boot from CD means what? (There is a bootable CD in the caddy) 17. What are automatic updates? What options can you select from? 18. Basic partitions (late 70s) vs Dynamic Partitions Basic – limit of 4 partitions on one drive. 19. Extended partition – cannot be active, or bootable. Does not get a drive letter. You create a logical drive to access it – unlimited logical drives as long as you have letters. Win 2000 – introduced Dynamic Disks. Throws out everything but master boot record. No FAT tables. Nobody knows how it works – proprietary information. Only can use MS APIs to access. New windows installation starts as Basic Drive. 20. Disk Management – My computer/Manage/Disk Management – can set partitions, properties of Basic and Dynamic drives 21. Dynamic drives – Main features of dynamic – can create as many vols as you want on a single drive ( they mount as folder names ) and you can change drive letters 22. RAID – means Redundant Array of Independent Disks 0- Striping – write data across the drives – saves bits of a file on multiple drives. But if one goes down – you lose the file – but very fast. 1- Mirroring – data is repeated on each drive- multiple copies. Slow but very safe. Duplexing means each drive has it’s own controller. 2- 4- Combine mirroring plus striping – tries to get speed and data safety. Use parity to figure out it data is complete, and error correction. 5 – Combines striping and parity for data security. Parity and data are spread across drives. 3 or more drives. So if any drive goes out, the other two can generate the missing data. THIS IS THE DEFACTO STANDARD. Raid 0 + 1 – Combines striping and mirroring – requires 4 drives to set up. Benefit – no parity needs to be generated so speeds it up. Not as good as RAID 5. RAID 10 – 4 drives – stripe on one, mirror on the other. Basically care about Raid 0, 1, 5 0 can be done on ANY version of Windows 2000 or XP Raid 1 and 5 require server OS. No keyboard present. Press F1 to continue. Zen engineering. 23. Hardware RAID needs special controller card – SATA or SCSI- min of 3. Windows sees it as one drive. More robust and faster than software. It will come up with its own RAID config screen. RAID is not available on all motherboards – need to read the manual. Note that with 3 drives – one of them will be used just for parity data, so you have the remaining two for user data. 24. Best way to do hardware RAID – buy a special controller (Adaptec) and set up as a system – or buy a hd array – hot swappable – Windows still sees it as one large drive. Software RAID – done in Windows such as 2003 Server. Admin Tools/Computer Management/ Disk Management Session 7 – Most important topics for Second Year students Section C: Working with Command Prompt 1. Directories- Dir, cls, cd\”Documents and Settings”\”Mike Meyers”, cd\, dir - relative and absolute paths 2. How to launch applications from the command prompt i.e write launches wordpad. Edit program. 3. Dir/ah to show all the hidden files (file attributes) a s h r - attributes set by bits set to on or off 4. System – any important file so file is not easily erased 5. Archive – used for backup programs – R means Read only 6. Attrib +h file.txt to set that file as hidden 7. Wildcards 8. Deleting Files 9. Copy Command 10. Xcopy 11. Move Command Section D: Basic Windows Maintenance 12. File Fragmentation – Know how to run the Defragmenter utility 13. Error Checking 14. CHKDSK 15. Disk Cleanup · Disk Cleanup Options Session 8 Notes Section A: Networking · Network Cables · Cat Levels – for UTP – Unshielded twisted pair Cat5 vs cat5e ( cat 5 – 10-100 mbps, Cat 5e – may go all the way to 1 gbps) Cat6 – 1 gbps to 10 gbps · Fiber-Optic Cable More common now in common offices Contains fiber, cladding ( reflective part ) Kevlar strands for strenght, and protective covering (sheathing) Single mode – laser light – for long distances Multi mode-LED – much more commonly used · Fire Ratings- for UTP or fiber cables (plenum space – space under floor or above ceiling where wires are run. PVC – burns readily Riser – runs vertically befween floors Plenum – usually requires by city ordinances for fire safety · Network Connectors RJ 45 – network RJ 11 – phone (modem) Fiber- ST and SC connectors – used in pairs for send and receive LC – much smaller – in pairs MT-RJ – has two wires built in Section B: Hardware Technology Two computer programmers are driving on a Highway. They switch on the radio and there is a warning: Please note that a car is driving on highway 75 against the traffic. The programmer near the driver looks at him and says: One? There are hundreds of them. · Network Connections – Ethernet is the way we move data between computersaddressing · MAC Address Details- every network card has one – 12 hex values – first 6 identify the brand (OEM id)– last 6 are different – unique ID What type of computer peripheral cards have MAC addresses? (Network cards) To view – rt click on MyNetwk Neighborhod, Properties, then choose one of the network connections – rt click/ status / Support tab/ Details Or use command prompt – ipconfig /all – listed under Physical address · Packets – contain mac addr of receiver, mac addr of source, actual data( about 1500 bytes), CRC check. Packets are encoded as elect voltage on the wire · Ethernet Standard – set of standards about how we transfer info over the network. Over 30 yrs old. · CSMA/CD – Carrier Sense Multiple Access/Collision Detection – if collision occurs, packet is resent. · 10Base-T – first UTP ( used to be coaxial) 10 mbps – t for twisted pair – bandwidth is 10 mbps. First Ethernet to use a hub instead of daisy-chaining co-ax – Max distance is 100 meters. – Ran at half duplex – could send or receive but not both at the same time. · 100Base-T – cat 5 or better- uses two pairs – send and receive. Full duplex. Send and receive at same time. Began to use switches instead of hubs. · 1000Base-T · Network Card Settings · Network Hub - Now we use switches – they are “smart” hubs that create a hardwired connection between sender and receiver instead of broadcasting data packets Section C: Wireless – use radio waves 802.11b – 11 mbps, 2.4 ghz band 802.11a – 54 mbps – 5 ghz band- but travels short dist and is $$$ 802.11g – 54 mbps – 2.4 ghz band – covers longer dist – compat with 11b-most Common 802.11n – extra connections Wireless Nics – expansion cards, PCMCIA cards, flash drive style cards, ext USB type ( good for moving the card around to get best signal) · Wireless Options · Wireless Access Points – like a hub (switch ) for wireless Need to set up which channel ( usually 1, 6, 11 ) , SSID to broadcast, WEP (outdated) or WPA (Wireless Protected Access – used now- needs a pswd) · Connecting to a Wireless Network – once connected the WAP will provide the IP address – either check Windows to manage wireless connection, or use 3rd party – but never both WPA-PSK – WPA withPublic Shared Key- most common Troubleshooting – device driver – correct SSID- correct passwd – dead spots · Cellular Wireless- not part of 802.11. Uses cell provider · Bluetooth Introduction-automated wireless connection – uses device profiles – 22 different ones exist such as headphone, modem, file transfer. · Working with Bluetooth – set devices as discoverable – then they find each other Section D: Network Protocols · Protocol Stacks- different programs that manage data transfer – packet creation and reassembly – etc network tasks – lots of different ones invented over time. Three that are significant TCP/IP, one of oldest · IPX/SPX – created by Novell – most popular before early 90s.-client/server-very efficient. MS invented NetBios/NetBeui as part of Windows – very chatty – lots of netwk traffic All machines in a netwk must be running same protocol. When a tech tells you that computer monitors don't have cartridges in them, argue. We love a good argument. Section E: TCP/IP Protocol · TCP/IP Properties-old-slow-difficult to configure – but whole internet runs on it.-its free Subnet mask – to specify traffic for computers in same network. 255 means filter out all other addresses. 0 means filter out none. Subnet gateway – the IP address of the router · DNS - A domain name is a Web address such as www.learnkey.com that has been attached to a specific IP address. (true) · DNS Resolution-since IP addr are hard to memorize. (Domain Name System) is a hierarchy of servers that resolve the name to an Ip address. Local domain name server will go to world bank of DNS servers – the COM servers to look up the name and resolve the ip addr. · DHCP – the service that automatically configures a devices IP address. Manually entered IP is called static IP ·APIPA Session 9 Section A: Network Sharing – resources to share are files, folders, printing, · Workgroups/Domains – the two types of Windows networking – what is a peer to peer network? How is a Domain different from peer to peer? What is the difference between domain users and local users? · Rights and Permissions Permissions – have to do with files and folders Rights – a policy that says what users can do. When you get a message about insufficient disk space, delete everything in the Windows directory. It's nothing but trouble anyway. · Groups – Every user has a set of NTFS permissions to get access to certain files and folders. Large numbers of users are hard to manage – so administrators manage users by placing them in groups. Pre-set groups (Administrators is one, Users, Power Users · Setting Up User Accounts – why is it wise to set up another user who has admin rights & permissions and use that one instead of administrator account? Security risk. · File Sharing · Making Workgroups and Sharing Power User and Standard User are the same category. Users and Limited Users are the same category · Accessing Shared Folders Using the Security Tab to control sharing and file permissions Full control, Modify, Read and Execute, List folder contents, Read, write…can set each permission to Allow or Deny. When shared – the folder icon changes to the folder in a hand icon. Know how to create a shortcut to a shared folder on another network computer (Right Click) Know how to map a drive letter to a shared folder on a network computer. · Sharing a Network Printer When the printer won't print, re-send the job at least 20 times. Print jobs frequently get sucked into black holes. When the printer still won't print after 20 tries, send the job to all 68 printers in the building. One of them is bound to work. Section B: The Internet · Connections · ISDN · Cable Modem · DSL · Satellite · Broadband Box · Routing · Router Diagram · Firewall Configuration – Know how to set up a firewall for a home system. Watch Mike’s example of setting up a NetGear router/firewall. Be sure the change the default password since hackers all know the defaults. Then the internet will see the IP address of the firewall/router, instead of the actual address of the PCs in the building or house. Section C: Internet Services · Ports · TCPView · TCP, UDP, and ICMP Packets · Internet Options Section D: Network Troubleshooting · Structured Cabling – Think – start with hardware and work up – or vice versa – important thing is to have a method and follow it. Rack mounts – used to hold routers, cabling, etc in an organized and sturdy way. Cables come in from plenum above ceiling or below floor. Solid core copper wires have better electrical capability but more easily damaged. Used in plenum, wiring closet. Patch cords use stranded wire to be more flexible. Patch cords used from computer to wall. · Cable Testers Continuity Testers – all wires are complete and carry the signal through. TDR – Time domain reflectometer. ($400-500) – can tell you if a wire is broken and if so, where. Cable Certifiers – Extremely expensive – determine which CAT level. Detect electrical interference such as fluorescent light fixtures. Can print out documents to certify the cables are installed correctly. · Link Lights- Look at these lights to see if computer is talking to hub or router. Check network card and correct driver. · Configuration Commands · Ipconfig and Ping Ipconfig /all (shows all network configuration info) , ipconfig /release – to disconnect from the DHCP server, ipconfig /renew-reconnects to DHCP server. Ipconfig /displaydns – to show the DNS cache to see all web sites visited recently. Ipconfig /flushdns. Nslookup – look up the DNS name server – can tell if the DNS server is down. Tracert – shows ip addresses of every router between you and the web address you are trying to reach. Pathping – like tracert only works faster. Ping computer name, ping ip address – to see if one computer can communicate with the other computer. Example – ping the ip address of the default gateway. · Shared Resources Yesterday it worked. Today it is not working. Windows is like that. Session 10 Section A: Laptops vs. Desktops · Internal Components – RAM is not proprietary · Hard Drive – NOT proprietary · External Monitor – trick is to find the function key to turn on ext monitor functioning – use it for projectors too. · Function Keys May want to find the func key to disable the touch pad – they are sometimes annoying. · Power Settings – what is standby? Conserves power by shutting down specific items (user can choose)– different setting for plugged in and not plugged in. Not a Windows feature – but made by manufacturer. · Monitor – LCD screen IS proprietary. · Port Replicator · PCMCIA · Power and Batteries Section B: Troubleshooting Laptops – Get instructions for dismantling from the manufacturer!! Not intuitive as to how to do it. · AC Adaptor – Make sure that not too many peripherals are draining power. Ac adapter converts AC to DC for use by the laptop · Power Checklist-. Check the wall jack for power, then check the adapter. LED light says it is putting out power.. No green light means that Adapter has failed. Check input and output values (Volts and amps) to make sure they are correct for your laptop. Can buy universal Ac adaptors for laptops that adjust output to fit your laptop. If AC adapter is running 10% below its rating then need to replace it. · Multimeter – to test power input and output · Testing Process · Connecting to a Laptop – Wireless adapters are internal – no antenna, so you may need one. · Infrared Port · Devices – such as Blue Tooth, Wireless etc can be turned on and off – check for both hardware on/off or software on/off in troubleshooting. · LCD – may see white or black dead pixels – use caution in cleaning – can change resolution same as any other monitor. Sometimes the connection between the computer and the LCD screen comes loose. Check toggling of the output. Check brightness and contrast. Will it output to an external monitor? · Diagnosis Checklist · Input Devices – touchpads can be re-aligned. USB mice are handy. External keyboards available. Section C: Printers · Dot Matrix · Inkjet · Laser – uses a green or blue photosensitive roller to print. Negative Electric charges determine where the toner is placed.- toner also carries a charge so it is attracted to the roller wherever the writing is. Paper receives a positive charge so the toner is attracted to the paper. Then a fuser applies heat to bond the ink to the paper. · Toner · Laser Printer Diagram · Other Printer Types – thermal (like in cash registers) Solid ink printers ( like Tektronics Phasers – use wax crayons - $$) Dye Sublimation – specialty products like on CD roms Section D: Installing Printers · Printer Installation Parallel - Centronics ( mini 36), USB, Firewire, Serial (older), SCSI - special · Installing Print Drivers – get driver from Windows, or manufacturer Cd, or web. Section E: Printer Settings and Maintenance · Print Options – how do you tell which printer is the default? Look for check mark. · Printer Features -Options vary by printer – duplex means print front and back, can use draft quality to save ink and time. Portrait vs Landscape. Print spooler icon in system tray can let you view jobs and other information. Use the printer screen readout to see error messages. Know how to print a test page on the printers that you use – each model is different. Power Save mode is important Consumables – best to use good quality paper – use good OEM toner cartridges, or refurb ones may save money if they are good quality ( sometimes cause problems). If you see a dip on the bottom of the cartridge it is poor quality. · Toner Cartridges · Scheduled Maintenance – important for lasers. Register your printers with the manufacturer for updates and maintenance – possible recalls. Keep the printer CLEANuse an Anti-Static vacuum. Watch the counters for times to call for maintenance. Maintenance kits include the paper-pick-up rollers, etc – especially the parts that wear out. · Print Problems Faded copies – low toner. No print - primary corona turned off or failed. Streaks – either drum or cartridge. Section F: Scanners · Overview – get digital images of text or graphics into the computer. Transverse mechanism moved scanner head down over the image. · TWAIN – Device driver - set of standards for how scanning devices should communicate with applications on a computer. Commonly used by all manufacturers. · Scanner Maintenance -Scanners don’t break often – but important to keep clean. Session 11 Section A: Security · Passwords- use digits, special characters – never birthdays or obvious passwords – don’t use family or pet names, don’t write passwords down. · Security Devices Fingerprint biometric Smart Cards – need a smart card reader – look like a credit card. Put it in while you work – then take it out when you leave Key fobs – look like a USB flash drive – uses a password Dongles – plug into keyboard or USB port – used for copyright protection to keep software secure. Section B: Protecting Your PC · Security Review – threats vs security tools – take responsibility Bios passwords – password on boot Backups – keeps your data secure – do your own backups – work files, email, personal data. Update windows often – get the security patches. Use NTFS Permissions to control access to files and folders. · Virus Definition - they replicate and activate · More Definitions MALWARE OR GRAYWARE DEFINITIONS Trojan – looks like one thing but is actually doing something else. You install it intentionally. Worm – replicates over a network Spam – unsolicited email. – that you cannot opt out of. Adware – work in a web browser – can include pop-ups or pop-unders etc. Spyware – sends info from your computer to other servers without your permission.. · Software Firewall – comes in Windows XP – Right click on network connection – set it in the General Tab. Can allow exceptions if you choose. · avast! - Free Anti Virus program – checks web email – network files – outlook exchange SMTP or POP , Web shield protects from spyware/adware RECOMMENDED TOOLS – SpyBot Search and Destroy, and Ad-Aware used together. · Locking and Encryption Physically lock your computer to prevent theft etc. Keyboard lock – cntrl-alt-del – keeps programs running – only the authorized password can unlock. Encryption – Right click on folder – General tab/ Advanced – can set encryption there. So even if people have permission to get to files – they can’t read it. Can encrypt docs, email, tool is PGP for email encryption. Telnet and ftp are not encrypted processes. · SSL – Secure Sockets layer – standard method for encrypting all types of data. · Policies – windows set of rights for users – defines what they can and can’t do. Control panel / Administrative Tools / Local security policy Auditing policies – keep a record of certain events – view using the Event Viewer. Section C: Protecting Your Network · Wireless Security – set up through the software that comes with your access point. Turn off wireless v if you are not using it. Change the default SSID – hackers know those. Disable SSID broadcasts – then clients have to configure their connection using a password – keeps casual users out. WEP vs WPA – don’t use WEP – it is too easy to hack. Freeware programs to break WEP. WPA-PSK – the personal shared key – for encryption choose TKP – most people will have TKP. Type in a pass phrase – make it a strong password. MAC address filter can whitelist or blacklist certain computers. Always change the default password. · Encryption · NAT = Network address translation.- always set to filter NAT redirection By law – certain ips not allowed on internet Starting with 10, 172, 192.168 – these are called private ips · DHCP Server – limit the number of users on your wireless or turn off DHCP and set static IPs on your computers. · Social Engineering – people try to trick you into giving out private information, nefarious means to get you to reveal information. · This Old PC – be sure to wipe data from HD before giving it out. Data Migration – copy data from old pc to new one – install the old hd into the new computer. Formatting or re-partitiition will not thoroughly remove data. Degaussing will totally erase the data. You can erase and re-write 3 times and data will still be available on the drive. Use US military 5220 standard for wiping utilities. Remove inventory stickers, purchase papers, etc – before recycling or disposing. Five cannibals get appointed as programmers in an IT company. During the welcoming ceremony the boss says: "You`re all part of our team now. You can earn good money here, and you can go to the company canteen for something to eat. So don`t trouble the other employees. The cannibals promise not to trouble the other employees. A month later the boss returns and says: "You`re all working very hard, and I`m very satisfied with all of you. However, one of our cleaners has disappeared. Do any of you know what happened to her?" The cannibals disavowed all knowledge of the missing cleaner. After the boss left, the leader of the cannibals says to the others: "Which of you idiots ate the cleaner?" A hand raises hesitantly, to which the leader of the cannibals says: "You fool! For four weeks we`ve been eating Team Leaders, Managers, and Project Managers so no one would notice anything, and you have to go and eat the cleaner!" Section D: Troubleshooting Methods · FRU · System Diagnosis · Mental Reassemble · Validate Results Section E: Safety · Safe Working Environment · Dangerous Components · Accidents · Disposables Section F: Communication and Professionalism · Use Clear, Concise, Direct Statements · Avoid Interrupting · Clarify Statements, Ask Questions · Avoid Jargon, Abbreviations, Acronyms · Listen to Customers · Maintaining Positive Attitude and Voice · Avoid Arguing/Being Defensive · Do Not Minimize Customer Problems · Avoid Being Judgmental · Avoid Distractions/ Interruptions · Respectful of Property Session 12 – Just need to listen to the presentation – valuable skills for any career!! Section A: Importance of Communication Skills · Being a Powerful Communicator · Improved Quality, Reduced Costs Section B: Communications Theory · Communication Formulas · Communication Process · Three Perceived Elements · Tone of Voice · Body Language · Environment · Communication Roles Section C: Listening Skills · Hindrances of Listening Components and Hiindrances · Effective Listening- Auditory, Visual, Kinesthetic (touching)-More than just listening to people ( reading, computers, etc) focus on listening to and understanding people. · Seven Distractions –Impatience, Information Overload, Perceived Value (users are very important to IT professionals), Prejudice, Lack of Empathy, Physical Distractions, Personal Preoccupation · Five Listening Levels (book: 7 Habits of Highly Effective People ) 1. Ignoring 2. Pretending 3. Selecting – minimum level that can actually help us 4. Attending – full attention and focus and energy 5. Empathizing level – strive to get to this level. Understanding the person. Section D: Effective Listening Techniques · Empathy Listening – understand the perspective of the person you are listening to. Be open minded so you can decide what information is missing Decide to be understanding. · Seek Synergy · Five Steps of Listening · Asking Questions · Customer Service Principles Two young engineers applied for a single position at a computer company. They both had the same qualifications. In order to determine which individual to hire, the applicants were asked to take a test by the Department Manager. Upon completion of the test, both men missed only one of the questions. The manager went to the first applicant and said, "Thank you for your interest, but we`ve decided to give the job to the other applicant." "And why would you be doing that ? We both got 9 questions correct," asked the rejected applicant. "We have based our decision not on the correct answers, but on the question you missed," said the Department manager. "And just how would one incorrect answer be better than the other?" the rejected applicant inquired. "Simple, "said the Department manager, "Your fellow applicant put down on question No. 5, `I don`t know` and You put down, `Neither do I.` " Section E: Translating Your Knowledge · Comparison Method · Contrast Method · Construction Method · Combination Method · Things to Remember Section F: Building Rapport · Three Rapport Elements · Use Their Names · Discover Their Interests · Let Them Talk · Pacing · Match Conversational Modalities