Help Desk Support Multiple Choice – Flashcards
151 test answers
Unlock all answers in this set
Unlock answers 151question
Incomplete coverage of a topic violates which of these four writing criteria?
answer
Content
Unlock the answer
question
The usual sequence of incident escalation during help desk incident management is ____.
answer
from incident screener to product specialist
Unlock the answer
question
A procedure or feature than accomplishes the same result as another feature that does not work correctly due to a software bug is called a ____.
answer
workaround
Unlock the answer
question
The incident management step in which a user's problem is satisfactorily dealt with is called incident ____.
answer
resolution
Unlock the answer
question
Which of these software packages includes features to present graphical information?
answer
Desktop publishing program, Word processing program, Spreadsheet program
Unlock the answer
question
When a troubleshooter must select from among several diagnostic tests to gather information about a problem, the selection is based on ____ skills.
answer
decision making
Unlock the answer
question
A telephone system that can answer calls, greet callers, provide menus, and route calls is a(n) ____.
answer
automated call distributor
Unlock the answer
question
One measure of whether a support agent understands a problem is that they can express the user's problem in ____.
answer
the support agent's own words
Unlock the answer
question
Viewing a system as a group of subsystems begins the search for a problem at ____.
answer
the beginning of a sequence of subsystems, the end of a sequence of subsystems, the middle of a sequence of subsystems
Unlock the answer
question
Classifying end users as internal versus external is a classification by ____.
answer
relationship
Unlock the answer
question
An automated service that consolidates and distributes information from newsgroups, blogs, forums and news websites is called ____.
answer
ListServ
Unlock the answer
question
Performance problems in a PC are usually due to ___ problems.
answer
Hardware and Software
Unlock the answer
question
A hardware device that was a first step toward decentralized computing was the ____.
answer
Terminal
Unlock the answer
question
"Technical writing should be concise and it should be informative." is an example of a ____.
answer
Compound Sentence
Unlock the answer
question
A cross-reference or link to where a reader can find additional information about a topic is called a(n) ____.
answer
Pointer
Unlock the answer
question
The concept that similar items should be handled consistently throughout a document is called ____.
answer
Parallel Structure
Unlock the answer
question
A document that is organized as a step-by-step introduction to the features of a software application is called a ____ manual.
answer
Tutorial
Unlock the answer
question
Which of these is generally considered security threats?
answer
Virus, Spam email, Keystroke logger
Unlock the answer
question
Which of these is not a recommended incident management strategy for support agents?
answer
Don't admit that you're wrong or don't know
Unlock the answer
question
A situation where two software packages use resources in incompatible ways is called a(n) ____.
answer
Conflict
Unlock the answer
question
A writer who performs each procedure or technical step in a document and tests each step with the hardware and software is doing a(n) ____ check.
answer
Technical Accuracy
Unlock the answer
question
Which type of nonverbal behavior is the least effective posture for support agents?
answer
Fold arms
Unlock the answer
question
Effective communication skills are important primarily to support agents who communicate ____.
answer
via telephone, face-to-face, via email
Unlock the answer
question
A help desk software package that includes asset management can help a support staff control ____.
answer
an organization's equipment inventory
Unlock the answer
question
Most hardware devices that malfunction today are ____.
answer
replaced
Unlock the answer
question
The ability to step back from a troubleshooting situation and analyze one's own thinking process is called ____.
answer
Metacognition
Unlock the answer
question
A PC that operates, but does not work as efficiently as it should, has a ____.
answer
Performance problem
Unlock the answer
question
A user who presses the wrong sequence of keys in a software program is a victim of ____.
answer
user mistake
Unlock the answer
question
A user who expects a software product to be able to perform a task for which it was not intended is a victim of a ____.
answer
user misunderstanding
Unlock the answer
question
A user's first impression of a support agent comes from the ____.
answer
incident greeting
Unlock the answer
question
Which of these devices is not a peripheral?
answer
Internal Memory
Unlock the answer
question
The first PCs were used in businesses and homes in the ____.
answer
1970s
Unlock the answer
question
One way to organize user support services that provides a single point of contact for an organization's workers or customers uses a(n) ____.
answer
help desk
Unlock the answer
question
Which of these is not a service you would expect of a help desk or hotline?
answer
Operate a local network
Unlock the answer
question
Which of these is an advantage to outsourcing as a way to provide user support?
answer
Outsourcing takes advantage of expertise a company does not have.
Unlock the answer
question
Experienced technology users who need information on advanced topics are likely to need a ____.
answer
Reference manual
Unlock the answer
question
When one hardware device conflicts with another device's use of system resources, the problem can often be diagnosed effectively by ____.
answer
examining the configuration
Unlock the answer
question
During the development of a first draft, a technical writer is probably least concerned with ____.
answer
correct spelling
Unlock the answer
question
Which of these was not a primary characteristic of computer use in the 1950s and 1960s?
answer
Served as an Internet host computer
Unlock the answer
question
Hardware or software products that have been announced by vendors, but do not actually exist, are ____.
answer
vaporware
Unlock the answer
question
Software with harmful or malicious intent to disrupt the business operation of a PC or network or to steal information or money is called ____.
answer
malware
Unlock the answer
question
The ____ position is unlikely to exist in a help desk that is organized in a multi-level support model.
answer
Needs Assessment Analyst
Unlock the answer
question
When a sequence of facts or steps is described, technical writers try to avoid which of these?
answer
Narrative Passage
Unlock the answer
question
Application software that is intended for use in a specialized business environment is called ____.
answer
industry-specific applications
Unlock the answer
question
The cognitive skills a troubleshooter uses to understand and explain an event or a situation are called ____.
answer
Critical thinking
Unlock the answer
question
An incident management step, in which an incident is transferred to a support staff member who has greater experience or resources to handle difficult questions, is incident ____.
answer
escalation
Unlock the answer
question
Which of these help desk positions is often staffed by an employee with programming or product development experience?
answer
Technical Support
Unlock the answer
question
Put the numbered versions of a software package in sequence from the most significant change to the least significant. 1 - build#, 2 - release#, 3 - version#, 4 - update #
answer
3 - 2 - 4 - 1
Unlock the answer
question
Support websites that use Web 2.0 technologies differ from earlier support websites primarily in ____.
answer
an emphasis on collaboration and communication among users
Unlock the answer
question
An organization that provides a wide range of support services to users is called a(n) ____.
answer
user support center
Unlock the answer
question
____ is not a category of management issues covered by the ITIL (Information Technology Infrastructure Library).
answer
personnel management
Unlock the answer
question
Tools a troubleshooter uses to get a description of a technology problem, learn a user's perspectives on the problem, and explain the solution to the user are called ____.
answer
communication skills
Unlock the answer
question
____ is not a common source of job stress among user support workers.
answer
inadequate training, abusive users, inadequate resources
Unlock the answer
question
Which of these sources of hardware problems is not one of the primary categories that account for most hardware support problems?
answer
Component design problems
Unlock the answer
question
The Myers-Briggs Type Indicator (MBTI) measures ____.
answer
personality and work style preferences
Unlock the answer
question
Troubleshooting technology problems can best be described as a(n) ____.
answer
iterative, repetitious procedure
Unlock the answer
question
Analysis and evaluation of a user's message is likely to occur during which type of listening?
answer
critical
Unlock the answer
question
Peripheral devices are part of a computer system's ____.
answer
hardware
Unlock the answer
question
A feature of a website where discussions are posted by members of a user community is called a ____.
answer
user forum
Unlock the answer
question
Another name for needs analysis is ____.
answer
needs assessment
Unlock the answer
question
The ____ help desk position is normally staffed by an entry-level employee.
answer
incident screener
Unlock the answer
question
KSA stands for ____.
answer
knowledge, skills, and abilities
Unlock the answer
question
A troubleshooting activity where there is a current state of events X, a future desired state of events Y, and the troubleshooter's objective is to move from X to Y is called ____.
answer
problem solving
Unlock the answer
question
A document with misspelled words violates which of these four general writing criteria?
answer
mechanics
Unlock the answer
question
Dissatisfied clients are more likely than satisfied clients to ____.
answer
contact the help desk repeatedly for assistance
Unlock the answer
question
Which category of help desk incident is: "My PC runs slowly when I access the Internet with a modem in the evenings"?
answer
a problem
Unlock the answer
question
When a support agent does not know the answer to a question, a good incident management strategy is to tell the user ____.
answer
you will research the question and get back to the user
Unlock the answer
question
Fine lines that extend from the top and bottom of a font's letters are called ____.
answer
serifs
Unlock the answer
question
Root cause analysis is an iterative process that asks a series of ____ questions.
answer
Why?
Unlock the answer
question
Which of these is not a primary strategy for a support organization that aims for customer service excellence?
answer
Meet all of a client's demands.
Unlock the answer
question
A support agent who feels that a user needs substantial assistance with the organization of files on their PC should ____.
answer
point the user to useful information about file organization
Unlock the answer
question
In a telephone communication, which of the following is the least likely telephone activity a support agents needs to develop?
answer
a way to hang up on abusive users
Unlock the answer
question
What is the sequence of these steps in the technical writing process? A) proofread the document B) generate a list of ideas C) arrange for an outside reviewer D) write a first draft
answer
B, D, C, A
Unlock the answer
question
Software that is developed collaboratively by a loose-knit team of programmers who agree to distribute the source code without cost is called ____.
answer
open source
Unlock the answer
question
The goal of the multi-level support model is to handle most support incidents at ____.
answer
the lowest support level
Unlock the answer
question
A substantially rewritten software package that contains major new features is called a(n) ____.
answer
new release
Unlock the answer
question
Which of these is not one of the four goals of incident management?
answer
Complete the incident in the least amount of time possible
Unlock the answer
question
Which of these words is least descriptive of the information on a webpage?
answer
comprehensive
Unlock the answer
question
Computer technology generally doubles in capacity every two ____.
answer
years
Unlock the answer
question
Hardware components that cannot operate together in the same PC are called ____.
answer
incompatible
Unlock the answer
question
A reading level that is appropriate for most technical documentation is ____.
answer
10th grade
Unlock the answer
question
Which of these technology trends may permit a support agent to answer questions about multiple operating systems from a single PC?
answer
virtualization
Unlock the answer
question
Which of these forms of documentation often contains hyperlinks to related topics?
answer
online help
Unlock the answer
question
Complete information on a particular end-user topic is usually organized together, in one document, organized in a(n) ____.
answer
reference format
Unlock the answer
question
A website that contains large numbers of misspelled words and grammatical errors fails which of these general criteria ____.
answer
mechanics
Unlock the answer
question
Which of these sequences is the order of the steps below in the iterative problem-solving process? a) formulate and test hypothesis b) collect information c) analyze results d) consider alternative explanations
answer
b, d, a, c
Unlock the answer
question
Which of these types of documents is often used to describe the steps to install a software package?
answer
user guide or manual
Unlock the answer
question
Application software used to prepare printed materials that include graphic images, such as newsletters, flyers, brochures, and posters, is called ____.
answer
desktop publishing
Unlock the answer
question
"I can give you a workaround for this problem, then later we can diagnose the cause of the problem so you don't encounter it again." is an example of ____.
answer
empathy
Unlock the answer
question
Due to increased use of the Internet, which of these are likely to increase in the future as a percentage of the total cost of a computer system?
answer
Information costs
Unlock the answer
question
The position description for the Level 1 Help Desk Agent in this chapter illustrates that ____.
answer
network support and user support may be combined in a single position
Unlock the answer
question
The intended audience of a document is generally described in the ____.
answer
introduction
Unlock the answer
question
A software package feature that periodically checks the vendor's website for software updates is called ____.
answer
automatic update
Unlock the answer
question
The U.S. Bureau of Labor Statistics predicts that the demand for user support workers in the next 10 years will ____.
answer
increase significantly
Unlock the answer
question
Detailed steps on how to perform a task are generally described in which part of a document?
answer
Body
Unlock the answer
question
If a PC, over a period of time, takes longer and longer to perform a task such as a File Save operation, it likely has a ____.
answer
performance problem
Unlock the answer
question
The user support staff is most likely to experience conflict with the IT department over ____.
answer
application software development
Unlock the answer
question
A series of letters that represent a phrase is called ____.
answer
an acronym or initialism
Unlock the answer
question
A computer user who enters an incorrect formula in a spreadsheet that results in a serious error is a victim of which common problem?
answer
User mistake
Unlock the answer
question
Major coding mistakes made by programmers when they write software are called ____.
answer
bugs
Unlock the answer
question
The purpose of support standards is to accomplish all but which of the following?
answer
expand supported products
Unlock the answer
question
Most software problems that impact end users occur ____.
answer
during the installation and configuration of the software
Unlock the answer
question
The ____ technology trend may change the way users access software and data.
answer
cloud computing
Unlock the answer
question
Which of these is not one of the trends that led to growth in decentralized computing during the 1980s and 1990s?
answer
Increase in the cost of large-scale computer systems
Unlock the answer
question
The most effective strategy for using a script is to ____.
answer
restate the scrip in your own words
Unlock the answer
question
Which of these hardware devices is more likely to fail during the operation of a PC?
answer
CD or DVD drive
Unlock the answer
question
A 48- to 72-hour period during which a PC or component is operated nonstop prior to installation at a user site is ____.
answer
a burn-in test
Unlock the answer
question
Posts to a user forum with commentary on a single topic, arranged in date order, are called _____.
answer
thread
Unlock the answer
question
The principle concept in the multi-level support help desk model is ____.
answer
lower level help desk staff can refer difficult problems to higher levels
Unlock the answer
question
In order to make effective use of a new or upgraded technology, a user may require ____.
answer
training
Unlock the answer
question
A company that contracts with another organization that specializes in user support is using ____.
answer
outsourcing
Unlock the answer
question
A mental model to help a computer troubleshooter understand and explain a problem situation is based on ____.
answer
critical thinking
Unlock the answer
question
Which of these forms of knowledge bases is the least interactive?
answer
vendor manuals
Unlock the answer
question
Which of these categories of computer software can add thousands of dollars to the cost of a computer system?
answer
specialized software
Unlock the answer
question
Remote access to a user's PC can be implemented with a ____.
answer
virtual private network
Unlock the answer
question
Effective communication skills are based primarily on a support agent's ability to ____.
answer
listen and read effectively, understand a user's problem, communicate solutions to a user
Unlock the answer
question
Businesses and organizations first began to use data communications and network technology to connect computer systems in the ____.
answer
1980s
Unlock the answer
question
Software that helps users to communicate with family, friends and business colleagues by posting personal information, status updates, and photos is called ____.
answer
social media
Unlock the answer
question
LBE Helpdesk, featured in this chapter, is an example of a(n) ____.
answer
a commercial help desk package
Unlock the answer
question
The development of mass-market application software and personal computer operating became available in the ____.
answer
1980s
Unlock the answer
question
"Development of software is not a frequent user support function" is an example of ____.
answer
nominalization
Unlock the answer
question
The abbreviation CPU for central processing unit is an example of a(n) _____.
answer
initialism
Unlock the answer
question
A software package used to prepare budgets, reports, forecasts, and financial statements is a ____.
answer
spreadsheet program
Unlock the answer
question
Documentation that describes the steps to perform a task or a checklist of steps is ____.
answer
procedural documentation
Unlock the answer
question
Network problems are often traceable to ____.
answer
a combination of hardware, operating systems, and application software
Unlock the answer
question
Inexperienced support agents tend to speak ____ when they experience stress in a conversation with a user.
answer
too fast
Unlock the answer
question
In critical thinking, a hypothesis is usually based on a ____.
answer
mental model
Unlock the answer
question
A user who purchases an image scanner that is incompatible with the PC to which he or she wants to connect it is a victim of a ____.
answer
wrong product purchase
Unlock the answer
question
Which of these version numbers is likely the most recent version of a software package?
answer
3.61
Unlock the answer
question
Which of these categories of workers increased during the 1980s and contributed to growth in the number of computer users?
answer
workers in offices who create and use information
Unlock the answer
question
Which type of nonverbal behavior is suggested for effective voice quality?
answer
use inflection to add interest, speak at a normal pitch, use a warm, upbeat tone of voice
Unlock the answer
question
Which of these responsibilities would you least expect to find in a position description for a user support specialist?
answer
operates a large-scale computer
Unlock the answer
question
Which of these is a collection of interconnected computers with large, networked storage devices that hosts cloud computing services?
answer
storage gateway
Unlock the answer
question
In help desk jargon, ACD stands for ____.
answer
automated call distributor
Unlock the answer
question
Tools to manage service level agreements (SLAs) in a help desk software package probably are of greatest use by ____.
answer
a help desk manager
Unlock the answer
question
Most components today use which of these strategies to maximize hardware compatibility?
answer
plug and play standards
Unlock the answer
question
A follow-up question a troubleshooter asks to get additional information about a problem situation is called a(n) ____.
answer
probe
Unlock the answer
question
Theft of information, use of a computer to commit sabotage or embezzlement, and fraudulent use of a computer are examples of ____.
answer
computer crimes
Unlock the answer
question
Use of a computer for unauthorized access to information about a customer, patient, or student is called ____.
answer
invasion of privacy
Unlock the answer
question
The incident management step in which a closed incident is stored for later use in a knowledge base of solved problems is ____.
answer
archive the incident
Unlock the answer
question
Under normal circumstances, the body of a document should be formatted in a ____ typeface.
answer
serif
Unlock the answer
question
Reinstalling a software package to fix a problem with an inoperative program is an example of the ____ troubleshooting strategy.
answer
module replacement
Unlock the answer
question
In a troubleshooting situation, a modem failed to work when a replacement USB cable was installed. Which of these critical questions would likely lead a troubleshooter to the source of the modem failure?
answer
have you made any recent changes to your PC?
Unlock the answer
question
Which of these is not a characteristic of technical writing?
answer
Concludes with the most important point at the end of a section
Unlock the answer
question
____ is not one of the five critical questions suggested in the chapter.
answer
How much experience do you have using this system?
Unlock the answer
question
Rebooting a system in an attempt to fix a problem is an example of the ____ problem-solving strategy.
answer
Look for an obvious solution.
Unlock the answer
question
Theft of information, use of a computer to commit sabotage or embezzlement, and fraudulent use of a computer are examples of ____.
answer
computer crimes
Unlock the answer