Kalian punya Nokia s60v3? Jika memilikinya, pasti sudah tahu betapa
jengkelnya setiap mau pasang aplikasi selalu gagal. Sudah keluar biaya
pulsa buat unduh filenya, gagal dipasang! Oke, ada triknya jika ingin
pasang aplikasi yang tidak ada sertifikatnya alias unsigned biar bisa
dipasang ke ponsel yaitu dengan cara hack ponsel Anda! Saya sudah
mencoba trik ini di Nokia E63 dan berhasil.
Jalani langkah-langkah di bawah ini dengan teliti, jika tidak teliti akan gagal buat hack ponsel:
1. Anda unduh aplikasi dan file di bawah berurutan dalam format file
.zip dan .sisx. Jadi Anda harus meng-ekstrak nya terlebih dahulu file
zip nya, dan selalu gunakan aplikasi X-plore untuk langkah-langkahnya.
2. Unduh dulu Norton Symbian Hack disini.
3. Pasang aplikasi Norton nya.
4. Buka aplikasi Norton.
5. Pilih Option, Quarantine list, Restore all, keluar dari Norton.
6. Buka Manager Aplikasi, lalu hapus aplikasi "Symantec Symbian Hack".
Setelah berhasil dihapus, keluar dari Manager Aplikasi dan buka X-plore,
cari lalu hapus c:\shared\folder.
7. Selanjutnya unduh file Patches nya disini, buka X-plore dan ekstrak folder Patches ke drive C:\ (memori telepon).
8. Unduh aplikasi ROMPatcher nya disini, lalu pasang aplikasi ROMPatcher nya ke drive C:\ (memori telepon).
9. Buka aplikasi ROMPatcher nya, lalu klik Pilihan, pilih "Add to Auto"
Open4All RP+, lalu tekan tengah tombol navigasi ponsel supaya berubah
menjadi cek list berwarna hijau.
"Matikan dan hidupkan kembali ponsel Anda!"
10. Unduh Install Servers nya disini,
lalu buka X-plore, klik file Install Server.zip, pilih Install
Servernya sesuai dengan ponsel Anda, selanjutnya ekstrak file
installserver.exe yang sesuai dengan ponsel Anda ke C:\sys\bin (gunakan X-plore).
11. Selanjutnya "matikan lalu hidupkan kembali ponsel Anda". Buka
X-plore, periksa apakah folder private, sys, yang ada di drive C:\ dan
E:\ sudah bisa dibuka isi foldernya? Jika bisa terbuka semua isi di
dalam folder tersebut.
Selamat ponsel Anda sekarang telah berstatus hack dan bisa memasang aplikasi sepuasnya tanpa gagal lagi.
Penting:
- Kadang setelah pasang aplikasi Norton, ponsel menjadi hang alias tombol keypad ditekan tapi ponsel tidak meresponnya.
Solusinya??? Cabut lalu pasang lagi baterainya, dan nyalakan ponselnya. Kalau ponsel masih hang, ulangi langkah tadi.
- Untuk file install server pilih salah satu saja yang sesuai dengan ponsel Anda.
1. Installserver91: for E60, E61i, E62, E65, E70, N71, N73, N75, N77, N80, N91, N91, N92 dan lainnya (Symbian 9.1).
2. Installserver92: for E51, E90, N76, N81, N81 8GB, N82, N93, N93i,
N95, N95-2, 6290, 5700, 6120, 6110, i520, i550, i400, i450, i560, G810,
N78, N96, 6220 dan lainnya (Symbian 9.2, 9.3).
3. Installserver3250: for 3250.
4. Installserver5500: for 5500.
5. Installservere50: for E50.
6. Installservere61: for E61 or 3250 (if first file won't work only).
7. Installserver934: for newest 9.3 and all 9.4.
8. InstallserverS3: for all Symbian^3 (and Symbian Anna, Symbian Belle).
Semoga bermanfaat :D
2012-01-26
2012-01-25
IT Essentials Chapter 10
Answers
|
Questions
|
Listen
to the complaint, apologize for the incident, and then offer to
help the customer.
|
A
customer calls to complain that another technician was rude to
them. In the past, the technician has received many complaints
about rudeness regarding this coworker. How should the
technician handle this complaint?
|
1-
Check grammar and spelling before
sending e-mail
2-
Use mixed case in e-mail instead of
all upper case or all lower case
|
Which
two actions are examples of good netiquette? (Choose two.)
|
Step
away from the computer and ask the user to close the document
|
While
servicing a computer, a technician notices that a document
labeled "confidential" is open on the computer. What should the
technician do?
|
resolving computer problems that require opening up the computer
|
Which
task would be the responsibility of a level-two technician?
|
1-
Use
simple step-by-step instructions.
2-
Speak
in plain terms.
|
Which
two techniques should be used when
dealing with an inexperienced customer? (Choose two.)
|
1-
Go for
a quick walk.
2-
Listen
to soothing sounds.
3-
Practice relaxed breathing.
|
Which
three relaxing techniques can help relieve the stress caused
from helping customers in a call center? (Choose three.)
|
Ask and
wait for permission before placing customers on hold
|
What is
the recommended way to place customers on hold?
|
A
customer wants two new computers added to the existing SLA
without additional cost.
|
Which
issue is an example of an exception to an SLA that
should be escalated to a manager?
|
Wait
until the customer has finished speaking, and then explain the
possible solution
|
While a
technician is listening to a lengthy explanation of a problem,
the technician identifies the solution to the problem. How
should the technician proceed?
|
1-
your
name
2-
ticket
number
3-
customer name
|
Which
three pieces of information should be given
to the next technician when transferring a customer? (Choose
three.)
|
speaking directly with the customer
|
For a
computer technician, what is the first step in resolving a
customer problem?
|
Reducing stress helps customers provide more useful information
|
Which
statement is true about the role of stress when troubleshooting
customer computer problems?
|
It
helps technicians learn important details from the customer.
|
Why is
good communication a critical part of successfully
troubleshooting customer problems?
|
1-
sending chain letters
2-
sending anonymous e-mails
|
What
are two examples of technician interactions with a customer that
are considered to be either unethical
or illegal? (Choose two.)
|
SLA
|
Where
would legal details be found that
describe proper handling of information for a specific customer?
|
to
gather pertinent customer information
|
What is
the primary responsibility of a level-one helpdesk technician?
|
1-
The
computer case must be opened.
2-
The
problem cannot be resolved in less than ten minutes.
|
What
are two examples of situations where a helpdesk call
should be escalated to a level-two
technician? (Choose two.)
|
1-
customer e-mails
2-
hard
copies of files on the customer desk
|
A
technician works on a customer computer at the customer site
after answering a support call. Which two items should the
technician regard as being the property of the customer? (Choose
two.)
|
remote
diagnostics utility
|
Which
common feature of helpdesk software allows a technician to
control a customer computer from a call center desk?
|
Follow
up with the customer to verify that the problem has been
resolved.
|
A
computer technician wants to make sure that a customer, who had
been experiencing a problem with a hard drive, is satisfied that
the problem has been resolved. Which of these rules would help
accomplish this desire?
|
IT Essentials Chapter 9
Answers
|
Questions
|
1-
spyware
2-
grayware
|
What
are two examples of malware? (Choose
two.)
|
1-
Enable
WEP.
2-
Enable
MAC filtering
|
Which
two actions improve security on a wireless network? (Choose
two.)
|
Implement lockout rules upon consecutive unsuccessful attempts
at accessing the system.
|
Which
best practice should be included in a password protection
policy?
|
1-
What
items need to be protected?
2-
What
is to be done in the case of a
security breach?
3-
What
are the possible threats to the items?
|
Which
three questions should be addressed
by organizations developing a security policy? (Choose three.)
|
Download the latest signature files on a regular basis
|
What
must be done to ensure that the
antivirus software on a computer is able to detect and eradicate
the most recent viruses?
|
Create
a restore point
|
A
technician has downloaded the latest Windows XP updates from the
Microsoft website. What should the technician do before
installing the updates?
|
The
update will be installed as soon as the computer is powered on
|
A
computer that is configured for
automatic updates is shut down during a scheduled update.
However, the update is downloaded
successfully without any file being corrupted in the process.
What will happen to the update as a result
of this shutdown?
|
guiding
visitors within the premises and escorting them personally when
they leave
|
Which
precaution helps protect against social engineering in the
workplace?
|
spam
|
A large
number of e-mail messages are appearing in the inbox of a home
computer user. The messages relate to products for which the
user has never requested information. Which name
is given to this type of e-mail?
|
replay
|
A
company network was subjected to
several security attacks after TCP/IP had been installed on the
company computers. Analysis has shown that in most of the
attacks, attackers used network sniffers
to extract user names and passwords of critical accounts on the
network. Which type of TCP/IP attack did these attackers deploy?
|
by
installing unwanted programs on a computer
|
How
can web tools, such as Java or ActiveX, be
used for a malicious attack?
|
a
biometric sensor
|
Which
security device stores user physical characteristics to provide
a user level of facility access?
|
poor
wireless device security
|
What
condition can allow unauthorized access to a network for users
who are not physically connected to
the network?
|
because
everyone can be affected by computer and network security
problems
|
Why
should everyone in an organization give high priority to
computer and network security?
|
1-
keep
equipment functioning
2-
provide access only to authorized users
|
What
are two important outcomes of good computer and network
security? (Choose two.)
|
a
programming code pattern
|
What is
a signature as
the term is used in antivirus and
antispyware software development?
|
2.5.4.3.6.1
|
Refer
to the exhibit. What is the correct order for the steps in the
troubleshooting process?
|
1-
What
problems are you experiencing?
2-
What
websites have you visited recently?
|
Which
two questions are examples of open-ended questions that
could be used in the security
troubleshooting process? (Choose two.)
|
Establish a plan of action for resolution.
|
For
troubleshooting security problems, what
should be done immediately after the exact cause of the
problem is determined?
|
Identify the problem
|
At
which step of the troubleshooting process will a computer
technician ask the customer a series of open-ended and
closed-ended questions?
|
IT Essentials Chapter 8
Answers
|
Questions
|
WAN
|
The
Internet is an example of which type of network?
|
TCP/IP
|
Which
suite of protocols is used to
transmit data across the Internet?
|
subnet
mask
|
Which
dotted decimal number is used to
distinguish the network portion of an IP address from the host
portion?
|
ADSL
|
What is
the most commonly used DSL technology?
|
1-
The
company network requires secure access to confidential
information.
2-
The
users need a central database to store inventory and sales
information.
3-
The data
gathered by the employees is critical and should be backed up on
a regular basis
|
Which
three factors are reasons to choose a client/server model for a
network instead of peer-to-peer? (Choose three.)
|
1-
The
number of twists in the wires inside the cable
2-
The
number of wires inside the cable.
|
Which
two factors are used to determine the
different categories of UTP cabling? (Choose two.)
|
tracert
|
Which
Windows XP command displays the route taken by packets crossing
an IP network?
|
328 ft
(100 m)
|
What is
the maximum range a data signal can travel through a 1000BASE-T
network segment?
|
1-
supported by IEEE 802.3 standards
2-
uses a
bus logical topology
|
Which
two characteristics describe Ethernet technology? (Choose two.)
|
hub
|
Which
device enables computers to be attached
to a network without segmenting the network?
|
a bad
network cable
|
A
student is helping a friend with a home computer that can no
longer access the Internet. Upon investigation, the student
discovers that the computer has been
assigned the IP address 169.254.100.88. What could cause
a computer to get such an IP address?
|
the
available wireless networks within range
|
A
student brings a laptop to a school that has wireless access.
The laptop is not connecting to the school network. What is the
first thing that the student should check?
|
Attach a
cable that has an RJ-45 connector.
|
Which
procedure is normally performed when
connecting a computer to an Ethernet network for the first time?
|
VPN
|
Workers
are required to access the company LAN when traveling. Which
networking technology can provide secure and encrypted access to
the LAN?
|
1-
Fewer
peripherals are needed
2-
Centralized administration capabilities are
enhanced.
|
Which
two statements are true of network computing in contrast to
non-network computing? (Choose two.)
|
It
developed standards to replace proprietary standards after U.S.
telephone industry deregulation.
|
What is
true about the TIA/EIA?
|
1-
faulty
NIC
2-
faulty
patch cord
|
A
technician installs a new NIC in a PC and connects an Ethernet
patch cord from the NIC to a wall jack. The technician then
notes that the link lights are not active on the NIC. Which two
problems could be indicated by this
lack of activity? (Choose two.)
|
to save
troubleshooting time
|
Why
should network cables always be labeled?
|
Purchase
equipment only through manufacturer-authorized partners.
|
Which
method is recommended in order to
avoid problems with counterfeit network equipment?
|
DNS
|
Which
networking protocol translates a network name such as
www.cisco.com to a unique IP address?
|
IT Essentials Chapter 7
Answers
|
Questions
|
electrophotographic
|
Which
technology is used by laser printers?
|
drum
|
Which
laser printer component is a metal cylinder that
is coated with a light-sensitive
insulating material?
|
firmware
|
Which
software, embedded in a printer, controls how the printer
operates and can be upgraded?
|
Optical
Character Recognition
|
Which
software converts scanned pages into text?
|
website
for scanner manufacturer
|
What is
the best source for a Windows-compatible scanner driver?
|
print
example.txt
|
Which
Windows XP command sends a file named example.txt to
the default printer?
|
inkjet
|
Which
printer technology is used in
low-cost, photo-quality printers?
|
the use
of Ethernet or wireless
|
What is
typical of a network printer installation?
|
Send
the print job again. If that fails to work, turn the printer off
and back on, then resend the print job. If the problem still
exists, reinstall or upgrade the print driver.
|
Instead
of the document that was expected, a printer is printing unusual
characters. What should be the next steps in solving this
printer problem?
|
damage
to the UPS
|
What
problem might be encountered if a
laser printer is plugged into a UPS?
|
1-
Paper
Type
2-
Print
Quality
|
Refer
to the exhibit. Which two printer configuration settings
should be modified when changing from
standard paper to photo paper? (Choose two.)
|
1-
USB
2-
FireWire
|
Which
two interface types can supply power to a scanner or printer?
(Choose two.)
|
Remove
power to the printer.
|
What is
the recommended first step in performing printer maintenance?
|
removing impurities collected on internal components
|
Which
routine maintenance procedure can extend the life of a printer?
|
1-
rebooting the computer
2-
restarting the print spooler
|
Which
two methods can restart a stopped print service? (Choose two.)
|
Identify the symptoms.
|
What is
the first step in troubleshooting a printing problem?
|
moving
parts
|
What is
a feature that causes printers to require higher levels of
maintenance than other electrical devices require?
|
1-
internal leaks
2-
reduced life of the printer
|
What
are two possible negative results from refilling ink cartridges
on a printer? (Choose two.)
|
1-
wiping
the glass with cloth
2-
removing the glass during cleaning
|
What
are two recommended procedures for proper scanner care and
maintenance? (Choose two.)
|
drum
|
A
museum possesses several old paintings that the curators wish to
reproduce and sell in the museum gift shop. Which type of
scanner can be used to produce the
highest-quality reproduction?
|