Create an account
empathic listening in which the listener echoes, restates, and clarifies. A feature of Rogers' client-centered therapy.
any software package which automatically plays, displays, or downloads advertisements to a computer
Nationality of 25 million people. The Kurds are NOT Arab, Turkic or Persian, yet their traditional homelands are located in Iraq, Turkey and Iran. The Kurds have waged an ongoing rebellion for autonomy in these three countries, with limited success. Saddam Hussein has waged extensive military campaigns against the Kurds in Iraq, including gas attacks in 1988. After the Persian Gulf War, under the protection of a U.S. and UK maintained no-fly zone, the Kurds enjoy relative autonomy and prosperity in northern Iraq. The prospects for an independent Kurdistan are minimal, given the refusal of Turkey, Iran and Iraq to grant independence to their Kurdish minorities.
A coded program that is executed when the computer system is first turned on the provides low-level access to the hard disk, video, and keyboard.
When you click on the Customize... button in the Mac OS X Installer, you are presented with the following options for installation customization:
Essential System Software
Printer Support (By popularity)
Custom installation options are available to include or exclude items when installing Mac OS X. You have to start up the computer from the disc to see them
goes out and finds files that are broken up into chunks and puts them together which speeds it up; when it defrags it slows the computer down
System utility used to manage hard drives and partitions, such as initializing disks, creating partitions, and formatting partitions.
erased by applying a slightly higher than normal voltage to the chip. Unlike the other types, EEPROM can be erased a byte at a time rather than all at once, and then written to. This type of ROM is found in devices like printers. (source:http://www.ecscolorado.com/faqs/rom.htm)
The sudden flow of electric current between two objects that can destroy electronic equipment
cable, also known as IEEE-1394, that carries digital video signals, which include audio, video, and control (stop, start, etc.) signals
Field Replaceable Unit; any whole assembly in a computer that would be replaced rather than repaired.
(computer science) the mechanical, magnetic, electronic, and electrical components making up a computer system
the process of identifying oneself to gain computer access, esp. with a username and password.
Original equipment manufacturer
initial producer of a product who agrees to allow another entity to include remanufacture, or label products under their name and sell through their distribution channels
an email software application that comes with the installation of Internet Explorer.
displays or prints information produced by a computer. Printers and monitors are examples of output devices. A printer produces a hard copy output while a monitor produces a soft copy output.
a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail
Post Office Protocol 3; a component of TCP/IP that recieve and hold your mail at the Internet mail server
A written document that states how an organization plans to protect the company's information technology assets
Short for Simple Mail Transfer Protocol, a protocol for sending e-mail messages between servers.
A person who is able to gain access to equipment or a network by tricking people into providing the necessary access information.
Small outline dual inline memory module, Laptop computer memory with 100, 144 and 200-pin modules.
a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network
computer software that is designed to collect personal info about users without their informed consent
A virus that temporarily erases its code from the files where it resides and hides in the active memory of the computer
Randomly opens TCP ports, tying up the network equipment or computer with a large amount of false requests, causing sessions to be denied to others
Any files that are temporarily written to disk during processing and can be deleted as soon as the process has completed its calculations
A creamlike substance that is placed between the bottom of the cooler heatsink and the top of the processor to eliminate air pockets and to help to draw heat off the processor.
things to avoid with customers
Arguing, Laughing, Getting off topic, Killing people, Eating people(big no-no), Discussing politics, Religion, and/or Sexuality
1. Identify the problem
2. Establish a theory
3. Test theory to determine cause
4. Establish plan of action & implement a solution
5. Verify solution
6. Document findings`
Short for Universal Serial Bus, an external bus standard that supports data transfer rates of 12 Mbps. A single USB port can be used to connect up to 127 peripheral devices, such as mice, modems, and keyboards
a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer
a software program capable of reproducing itself that can spread from one computer to the next over a network
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Click the icon above to update your browser permissions and try again
Reload the page to try again!Reload
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together