78 terms

IT essentials final exam review

3 rules of beginning customer call
Be polite. Get to the problem quickly. Stay on task
54 Mbps
Max Data rate of AN/TSC-178 WPPL
Active listening
empathic listening in which the listener echoes, restates, and clarifies. A feature of Rogers' client-centered therapy.
any software package which automatically plays, displays, or downloads advertisements to a computer
a pungent gas compounded of nitrogen and hydrogen (NH3)
Antistatic packaging
packaging that does not conduct electricity
Nationality of 25 million people. The Kurds are NOT Arab, Turkic or Persian, yet their traditional homelands are located in Iraq, Turkey and Iran. The Kurds have waged an ongoing rebellion for autonomy in these three countries, with limited success. Saddam Hussein has waged extensive military campaigns against the Kurds in Iraq, including gas attacks in 1988. After the Persian Gulf War, under the protection of a U.S. and UK maintained no-fly zone, the Kurds enjoy relative autonomy and prosperity in northern Iraq. The prospects for an independent Kurdistan are minimal, given the refusal of Turkey, Iran and Iraq to grant independence to their Kurdish minorities.
light behind tv screen that projects led screen
A coded program that is executed when the computer system is first turned on the provides low-level access to the hard disk, video, and keyboard.
A wireless technology that uses short-range radio frequency transmissions.
Kurds are better than_______
responding to or operating at a wide band of frequencies
storing frequently access data locally
Close with the customer
Thank them. Clarify that there happy
Compressed air
Pressurized and Filtered air
The level of trust that an audience has or will have in the speaker
Customer replacement unit. Customer can replace unit
custom installation
When you click on the Customize... button in the Mac OS X Installer, you are presented with the following options for installation customization:

Essential System Software
Additional Fonts
Language Translations
Printer Support (By popularity)
QuickTime 7

Custom installation options are available to include or exclude items when installing Mac OS X. You have to start up the computer from the disc to see them
Daisy chain
(figurative) a series of associated things or people or experiences
default installation
Standard instillation
disk cleanup
Used to clear space on a hard drive by searching for files that can be safely deleted
disk defrag
goes out and finds files that are broken up into chunks and puts them together which speeds it up; when it defrags it slows the computer down
disk management
System utility used to manage hard drives and partitions, such as initializing disks, creating partitions, and formatting partitions.
erased by applying a slightly higher than normal voltage to the chip. Unlike the other types, EEPROM can be erased a byte at a time rather than all at once, and then written to. This type of ROM is found in devices like printers. (source:http://www.ecscolorado.com/faqs/rom.htm)
electrostatic discharge
The sudden flow of electric current between two objects that can destroy electronic equipment
Having to do with morals, values, right and wrong
Expansion cards
provides connections to other devices; sound card, video card
cable, also known as IEEE-1394, that carries digital video signals, which include audio, video, and control (stop, start, etc.) signals
flame war
Back and forth insults sent over the internet
Field Replaceable Unit; any whole assembly in a computer that would be replaced rather than repaired.
(computer science) the mechanical, magnetic, electronic, and electrical components making up a computer system
heat sink fan
moves heat away from the CPU
input device
a device that can be used to insert data into a computer or other computational device
A device that converts DC to AC.
Lithium ion
the newest rechargeable battery, used in cell phones and laptop computers
the process of identifying oneself to gain computer access, esp. with a username and password.
The rules for good manners on the Internet
network interface card
nickel cadmium
a type of rechargeable battery commonly used to power cameras.
nickel metal hydride
Rechargeable, cameras, laptops,etc.
Not having fixed limits; unrestricted; broad.
Original equipment manufacturer
initial producer of a product who agrees to allow another entity to include remanufacture, or label products under their name and sell through their distribution channels
outlook express
an email software application that comes with the installation of Internet Explorer.
output device
displays or prints information produced by a computer. Printers and monitors are examples of output devices. A printer produces a hard copy output while a monitor produces a soft copy output.
divides or separates
a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail
Post Office Protocol 3; a component of TCP/IP that recieve and hold your mail at the Internet mail server
Alberto's last name; in BIOS
preventive maintenance
Periodic inspection and repair designed to keep equipment reliable.
an attempt by speculators to defraud investors
a Microsoft Windows database that stores settings and options for the operating system
Restore point
a saved point in your system in which the running condition is good
radiology information system; a database of images and pt records specific to the imaging dept.
security policy
A written document that states how an organization plans to protect the company's information technology assets
service level agreement
formal contractually obligated agreement between two parties
your name written in your own handwriting
Short for Simple Mail Transfer Protocol, a protocol for sending e-mail messages between servers.
social engineer
A person who is able to gain access to equipment or a network by tricking people into providing the necessary access information.
Small outline dual inline memory module, Laptop computer memory with 100, 144 and 200-pin modules.
a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network
computer software that is designed to collect personal info about users without their informed consent
static electricity
electricity produced by friction
stealth virus
A virus that temporarily erases its code from the files where it resides and hides in the active memory of the computer
SYN flood
Randomly opens TCP ports, tying up the network equipment or computer with a large amount of false requests, causing sessions to be denied to others
temp files
Any files that are temporarily written to disk during processing and can be deleted as soon as the process has completed its calculations
thermal compound
A creamlike substance that is placed between the bottom of the cooler heatsink and the top of the processor to eliminate air pockets and to help to draw heat off the processor.
things to avoid with customers
Arguing, Laughing, Getting off topic, Killing people, Eating people(big no-no), Discussing politics, Religion, and/or Sexuality
a program that appears desirable but actually contains something harmful; virus
troubleshooting steps
1. Identify the problem
2. Establish a theory
3. Test theory to determine cause
4. Establish plan of action & implement a solution
5. Verify solution
6. Document findings`
installation of an operating system with minimal user intervention.
not adhering to ethical or moral principles
USB 2.0 speed
480 Mbps
USB port
Short for Universal Serial Bus, an external bus standard that supports data transfer rates of 12 Mbps. A single USB port can be used to connect up to 127 peripheral devices, such as mice, modems, and keyboards
verify obvious issue
Figure out the obvious issue
a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer
Wired Equivalent Privacy, an encryption algorithm used to protect data on Wi-Fi Networks
a software program capable of reproducing itself that can spread from one computer to the next over a network
What the computers hackers take control of are referred to as.