3 rules of beginning customer call
Be polite. Get to the problem quickly. Stay on task
Max Data rate of AN/TSC-178 WPPL
empathic listening in which the listener echoes, restates, and clarifies. A feature of Rogers' client-centered therapy.
any software package which automatically plays, displays, or downloads advertisements to a computer
a pungent gas compounded of nitrogen and hydrogen (NH3)
packaging that does not conduct electricity
Nationality of 25 million people. The Kurds are NOT Arab, Turkic or Persian, yet their traditional homelands are located in Iraq, Turkey and Iran. The Kurds have waged an ongoing rebellion for autonomy in these three countries, with limited success. Saddam Hussein has waged extensive military campaigns against the Kurds in Iraq, including gas attacks in 1988. After the Persian Gulf War, under the protection of a U.S. and UK maintained no-fly zone, the Kurds enjoy relative autonomy and prosperity in northern Iraq. The prospects for an independent Kurdistan are minimal, given the refusal of Turkey, Iran and Iraq to grant independence to their Kurdish minorities.
light behind tv screen that projects led screen
A coded program that is executed when the computer system is first turned on the provides low-level access to the hard disk, video, and keyboard.
A wireless technology that uses short-range radio frequency transmissions.
Kurds are better than_______
responding to or operating at a wide band of frequencies
storing frequently access data locally
Close with the customer
Thank them. Clarify that there happy
Pressurized and Filtered air
The level of trust that an audience has or will have in the speaker
Customer replacement unit. Customer can replace unit
When you click on the Customize... button in the Mac OS X Installer, you are presented with the following options for installation customization:
Essential System Software
Printer Support (By popularity)
Custom installation options are available to include or exclude items when installing Mac OS X. You have to start up the computer from the disc to see them
(figurative) a series of associated things or people or experiences
Used to clear space on a hard drive by searching for files that can be safely deleted
goes out and finds files that are broken up into chunks and puts them together which speeds it up; when it defrags it slows the computer down
System utility used to manage hard drives and partitions, such as initializing disks, creating partitions, and formatting partitions.
erased by applying a slightly higher than normal voltage to the chip. Unlike the other types, EEPROM can be erased a byte at a time rather than all at once, and then written to. This type of ROM is found in devices like printers. (source:http://www.ecscolorado.com/faqs/rom.htm)
The sudden flow of electric current between two objects that can destroy electronic equipment
Having to do with morals, values, right and wrong
provides connections to other devices; sound card, video card
cable, also known as IEEE-1394, that carries digital video signals, which include audio, video, and control (stop, start, etc.) signals
Back and forth insults sent over the internet
Field Replaceable Unit; any whole assembly in a computer that would be replaced rather than repaired.
(computer science) the mechanical, magnetic, electronic, and electrical components making up a computer system
heat sink fan
moves heat away from the CPU
a device that can be used to insert data into a computer or other computational device
A device that converts DC to AC.
the newest rechargeable battery, used in cell phones and laptop computers
the process of identifying oneself to gain computer access, esp. with a username and password.
The rules for good manners on the Internet
network interface card
a type of rechargeable battery commonly used to power cameras.
nickel metal hydride
Rechargeable, cameras, laptops,etc.
Not having fixed limits; unrestricted; broad.
Original equipment manufacturer
initial producer of a product who agrees to allow another entity to include remanufacture, or label products under their name and sell through their distribution channels
an email software application that comes with the installation of Internet Explorer.
displays or prints information produced by a computer. Printers and monitors are examples of output devices. A printer produces a hard copy output while a monitor produces a soft copy output.
divides or separates
a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail
Post Office Protocol 3; a component of TCP/IP that recieve and hold your mail at the Internet mail server
Alberto's last name; in BIOS
Periodic inspection and repair designed to keep equipment reliable.
an attempt by speculators to defraud investors
a Microsoft Windows database that stores settings and options for the operating system
a saved point in your system in which the running condition is good
radiology information system; a database of images and pt records specific to the imaging dept.
A written document that states how an organization plans to protect the company's information technology assets
service level agreement
formal contractually obligated agreement between two parties
your name written in your own handwriting
Short for Simple Mail Transfer Protocol, a protocol for sending e-mail messages between servers.
A person who is able to gain access to equipment or a network by tricking people into providing the necessary access information.
Small outline dual inline memory module, Laptop computer memory with 100, 144 and 200-pin modules.
a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network
computer software that is designed to collect personal info about users without their informed consent
electricity produced by friction
A virus that temporarily erases its code from the files where it resides and hides in the active memory of the computer
Randomly opens TCP ports, tying up the network equipment or computer with a large amount of false requests, causing sessions to be denied to others
Any files that are temporarily written to disk during processing and can be deleted as soon as the process has completed its calculations
A creamlike substance that is placed between the bottom of the cooler heatsink and the top of the processor to eliminate air pockets and to help to draw heat off the processor.
things to avoid with customers
Arguing, Laughing, Getting off topic, Killing people, Eating people(big no-no), Discussing politics, Religion, and/or Sexuality
a program that appears desirable but actually contains something harmful; virus
1. Identify the problem
2. Establish a theory
3. Test theory to determine cause
4. Establish plan of action & implement a solution
5. Verify solution
6. Document findings`
installation of an operating system with minimal user intervention.
not adhering to ethical or moral principles
USB 2.0 speed
Short for Universal Serial Bus, an external bus standard that supports data transfer rates of 12 Mbps. A single USB port can be used to connect up to 127 peripheral devices, such as mice, modems, and keyboards
verify obvious issue
Figure out the obvious issue
a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer
Wired Equivalent Privacy, an encryption algorithm used to protect data on Wi-Fi Networks
a software program capable of reproducing itself that can spread from one computer to the next over a network
What the computers hackers take control of are referred to as.