How can we help?

You can also find more resources in our Help Center.

78 terms

IT essentials final exam review

STUDY
PLAY
3 rules of beginning customer call
Be polite. Get to the problem quickly. Stay on task
54 Mbps
Max Data rate of AN/TSC-178 WPPL
Active listening
empathic listening in which the listener echoes, restates, and clarifies. A feature of Rogers' client-centered therapy.
Adware
any software package which automatically plays, displays, or downloads advertisements to a computer
Ammonia
a pungent gas compounded of nitrogen and hydrogen (NH3)
Antistatic packaging
packaging that does not conduct electricity
kurds
Nationality of 25 million people. The Kurds are NOT Arab, Turkic or Persian, yet their traditional homelands are located in Iraq, Turkey and Iran. The Kurds have waged an ongoing rebellion for autonomy in these three countries, with limited success. Saddam Hussein has waged extensive military campaigns against the Kurds in Iraq, including gas attacks in 1988. After the Persian Gulf War, under the protection of a U.S. and UK maintained no-fly zone, the Kurds enjoy relative autonomy and prosperity in northern Iraq. The prospects for an independent Kurdistan are minimal, given the refusal of Turkey, Iran and Iraq to grant independence to their Kurdish minorities.
backlight
light behind tv screen that projects led screen
BIOS
A coded program that is executed when the computer system is first turned on the provides low-level access to the hard disk, video, and keyboard.
Bluetooth
A wireless technology that uses short-range radio frequency transmissions.
Afgans
Kurds are better than_______
Broadband
responding to or operating at a wide band of frequencies
Caching
storing frequently access data locally
Close with the customer
Thank them. Clarify that there happy
Compressed air
Pressurized and Filtered air
credibility
The level of trust that an audience has or will have in the speaker
CRU
Customer replacement unit. Customer can replace unit
custom installation
When you click on the Customize... button in the Mac OS X Installer, you are presented with the following options for installation customization:

Essential System Software
Additional Fonts
Language Translations
Printer Support (By popularity)
X11
Rosetta
QuickTime 7

Custom installation options are available to include or exclude items when installing Mac OS X. You have to start up the computer from the disc to see them
Daisy chain
(figurative) a series of associated things or people or experiences
default installation
Standard instillation
disk cleanup
Used to clear space on a hard drive by searching for files that can be safely deleted
disk defrag
goes out and finds files that are broken up into chunks and puts them together which speeds it up; when it defrags it slows the computer down
disk management
System utility used to manage hard drives and partitions, such as initializing disks, creating partitions, and formatting partitions.
EEPROM
erased by applying a slightly higher than normal voltage to the chip. Unlike the other types, EEPROM can be erased a byte at a time rather than all at once, and then written to. This type of ROM is found in devices like printers. (source:http://www.ecscolorado.com/faqs/rom.htm)
electrostatic discharge
The sudden flow of electric current between two objects that can destroy electronic equipment
Ethical
Having to do with morals, values, right and wrong
Expansion cards
provides connections to other devices; sound card, video card
firewire
cable, also known as IEEE-1394, that carries digital video signals, which include audio, video, and control (stop, start, etc.) signals
flame war
Back and forth insults sent over the internet
FRU
Field Replaceable Unit; any whole assembly in a computer that would be replaced rather than repaired.
hardware
(computer science) the mechanical, magnetic, electronic, and electrical components making up a computer system
heat sink fan
moves heat away from the CPU
input device
a device that can be used to insert data into a computer or other computational device
inverter
A device that converts DC to AC.
Lithium ion
the newest rechargeable battery, used in cell phones and laptop computers
login
the process of identifying oneself to gain computer access, esp. with a username and password.
netiquette
The rules for good manners on the Internet
NI-card
network interface card
nickel cadmium
a type of rechargeable battery commonly used to power cameras.
nickel metal hydride
Rechargeable, cameras, laptops,etc.
open-ended
Not having fixed limits; unrestricted; broad.
Original equipment manufacturer
initial producer of a product who agrees to allow another entity to include remanufacture, or label products under their name and sell through their distribution channels
outlook express
an email software application that comes with the installation of Internet Explorer.
output device
displays or prints information produced by a computer. Printers and monitors are examples of output devices. A printer produces a hard copy output while a monitor produces a soft copy output.
partition
divides or separates
Phishing
a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail
POP3
Post Office Protocol 3; a component of TCP/IP that recieve and hold your mail at the Internet mail server
POST
Alberto's last name; in BIOS
preventive maintenance
Periodic inspection and repair designed to keep equipment reliable.
RAID
an attempt by speculators to defraud investors
registry
a Microsoft Windows database that stores settings and options for the operating system
Restore point
a saved point in your system in which the running condition is good
RIS
radiology information system; a database of images and pt records specific to the imaging dept.
security policy
A written document that states how an organization plans to protect the company's information technology assets
service level agreement
formal contractually obligated agreement between two parties
signature
your name written in your own handwriting
SMTP
Short for Simple Mail Transfer Protocol, a protocol for sending e-mail messages between servers.
social engineer
A person who is able to gain access to equipment or a network by tricking people into providing the necessary access information.
SODIMM
Small outline dual inline memory module, Laptop computer memory with 100, 144 and 200-pin modules.
spoofing
a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network
spyware
computer software that is designed to collect personal info about users without their informed consent
static electricity
electricity produced by friction
stealth virus
A virus that temporarily erases its code from the files where it resides and hides in the active memory of the computer
SYN flood
Randomly opens TCP ports, tying up the network equipment or computer with a large amount of false requests, causing sessions to be denied to others
temp files
Any files that are temporarily written to disk during processing and can be deleted as soon as the process has completed its calculations
thermal compound
A creamlike substance that is placed between the bottom of the cooler heatsink and the top of the processor to eliminate air pockets and to help to draw heat off the processor.
things to avoid with customers
Arguing, Laughing, Getting off topic, Killing people, Eating people(big no-no), Discussing politics, Religion, and/or Sexuality
Trojan
a program that appears desirable but actually contains something harmful; virus
troubleshooting steps
1. Identify the problem
2. Establish a theory
3. Test theory to determine cause
4. Establish plan of action & implement a solution
5. Verify solution
6. Document findings`
unattend.txt
installation of an operating system with minimal user intervention.
unethical
not adhering to ethical or moral principles
USB 2.0 speed
480 Mbps
USB port
Short for Universal Serial Bus, an external bus standard that supports data transfer rates of 12 Mbps. A single USB port can be used to connect up to 127 peripheral devices, such as mice, modems, and keyboards
verify obvious issue
Figure out the obvious issue
Virus
a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer
WEP
Wired Equivalent Privacy, an encryption algorithm used to protect data on Wi-Fi Networks
worm
a software program capable of reproducing itself that can spread from one computer to the next over a network
zombies
What the computers hackers take control of are referred to as.