What is the first thing IT usually asks users to do before deeper troubleshooting
what is reboot/restart your computer
This type of cyberattack tricks users into revealing passwords through fake emails.
“What is phishing?”
This Epic environment is typically used for training end users.
“What is the Playground or Training Environment?”
What does VPN stand for?
“What is Virtual Private Network?”
This device distributes internet connectivity wirelessly.
“What is a wireless router/access point?”
A user says my computer is frozen. What keyboard shortcut opens task manager in Windows?
“What is Ctrl + Shift + Esc?”
Using both a password and phone verification is called this.
“What is Multi-Factor Authentication (MFA)?”
This Epic role often provides at-the-elbow support during go-live events.
“What is an Epic analyst or Nursing informatists?”
What does CPU stand for?
“What is Central Processing Unit?”
This command checks connectivity between two devices on a network.
“What is ping?”
This ticket priority level is used when a system outage impacts many users.
“What is Critical or Severity 1?”
This malicious software locks files until payment is made.
“What is ransomware?”
Dragon Medical One and DAX are examples of this type of healthcare technology.
“What is speech recognition/ambient documentation AI?”
What does SQL stand for?
“What is Structured Query Language?”
Servers may be hosted physically on-site or in this virtual hosting model.
“What is the cloud?”
A printer issue is often resolved by clearing this waiting list of print jobs.
“What is the print queue?”
A strong password should include uppercase, lowercase, numbers, and these special characters.
“What are symbols?”
This is the process of validating that interfaces between systems exchange data correctly.
“What is interface/integration testing?”
What does API stand for?
“What is Application Programming Interface?”
This practice creates duplicate copies of data for disaster recovery.
“What is backup/redundancy?”