Like this study set? Create a free account to save it.

Sign up for an account

Already have a Quizlet account? .

Create an account

3 rules of beginning customer call

Be polite. Get to the problem quickly. Stay on task

54 Mbps

Max Data rate of AN/TSC-178 WPPL

Active listening

empathic listening in which the listener echoes, restates, and clarifies. A feature of Rogers' client-centered therapy.


any software package which automatically plays, displays, or downloads advertisements to a computer


a pungent gas compounded of nitrogen and hydrogen (NH3)

Antistatic packaging

packaging that does not conduct electricity


Nationality of 25 million people. The Kurds are NOT Arab, Turkic or Persian, yet their traditional homelands are located in Iraq, Turkey and Iran. The Kurds have waged an ongoing rebellion for autonomy in these three countries, with limited success. Saddam Hussein has waged extensive military campaigns against the Kurds in Iraq, including gas attacks in 1988. After the Persian Gulf War, under the protection of a U.S. and UK maintained no-fly zone, the Kurds enjoy relative autonomy and prosperity in northern Iraq. The prospects for an independent Kurdistan are minimal, given the refusal of Turkey, Iran and Iraq to grant independence to their Kurdish minorities.


light behind tv screen that projects led screen


A coded program that is executed when the computer system is first turned on the provides low-level access to the hard disk, video, and keyboard.


A wireless technology that uses short-range radio frequency transmissions.


Kurds are better than_______


responding to or operating at a wide band of frequencies


storing frequently access data locally

Close with the customer

Thank them. Clarify that there happy

Compressed air

Pressurized and Filtered air


The level of trust that an audience has or will have in the speaker


Customer replacement unit. Customer can replace unit

custom installation

When you click on the Customize... button in the Mac OS X Installer, you are presented with the following options for installation customization:

Essential System Software
Additional Fonts
Language Translations
Printer Support (By popularity)
QuickTime 7

Custom installation options are available to include or exclude items when installing Mac OS X. You have to start up the computer from the disc to see them

Daisy chain

(figurative) a series of associated things or people or experiences

default installation

Standard instillation

disk cleanup

Used to clear space on a hard drive by searching for files that can be safely deleted

disk defrag

goes out and finds files that are broken up into chunks and puts them together which speeds it up; when it defrags it slows the computer down

disk management

System utility used to manage hard drives and partitions, such as initializing disks, creating partitions, and formatting partitions.


erased by applying a slightly higher than normal voltage to the chip. Unlike the other types, EEPROM can be erased a byte at a time rather than all at once, and then written to. This type of ROM is found in devices like printers. (source:

electrostatic discharge

The sudden flow of electric current between two objects that can destroy electronic equipment


Having to do with morals, values, right and wrong

Expansion cards

provides connections to other devices; sound card, video card


cable, also known as IEEE-1394, that carries digital video signals, which include audio, video, and control (stop, start, etc.) signals

flame war

Back and forth insults sent over the internet


Field Replaceable Unit; any whole assembly in a computer that would be replaced rather than repaired.


(computer science) the mechanical, magnetic, electronic, and electrical components making up a computer system

heat sink fan

moves heat away from the CPU

input device

a device that can be used to insert data into a computer or other computational device


A device that converts DC to AC.

Lithium ion

the newest rechargeable battery, used in cell phones and laptop computers


the process of identifying oneself to gain computer access, esp. with a username and password.


The rules for good manners on the Internet


network interface card

nickel cadmium

a type of rechargeable battery commonly used to power cameras.

nickel metal hydride

Rechargeable, cameras, laptops,etc.


Not having fixed limits; unrestricted; broad.

Original equipment manufacturer

initial producer of a product who agrees to allow another entity to include remanufacture, or label products under their name and sell through their distribution channels

outlook express

an email software application that comes with the installation of Internet Explorer.

output device

displays or prints information produced by a computer. Printers and monitors are examples of output devices. A printer produces a hard copy output while a monitor produces a soft copy output.


divides or separates


a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail


Post Office Protocol 3; a component of TCP/IP that recieve and hold your mail at the Internet mail server


Alberto's last name; in BIOS

preventive maintenance

Periodic inspection and repair designed to keep equipment reliable.


an attempt by speculators to defraud investors


a Microsoft Windows database that stores settings and options for the operating system

Restore point

a saved point in your system in which the running condition is good


radiology information system; a database of images and pt records specific to the imaging dept.

security policy

A written document that states how an organization plans to protect the company's information technology assets

service level agreement

formal contractually obligated agreement between two parties


your name written in your own handwriting


Short for Simple Mail Transfer Protocol, a protocol for sending e-mail messages between servers.

social engineer

A person who is able to gain access to equipment or a network by tricking people into providing the necessary access information.


Small outline dual inline memory module, Laptop computer memory with 100, 144 and 200-pin modules.


a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network


computer software that is designed to collect personal info about users without their informed consent

static electricity

electricity produced by friction

stealth virus

A virus that temporarily erases its code from the files where it resides and hides in the active memory of the computer

SYN flood

Randomly opens TCP ports, tying up the network equipment or computer with a large amount of false requests, causing sessions to be denied to others

temp files

Any files that are temporarily written to disk during processing and can be deleted as soon as the process has completed its calculations

thermal compound

A creamlike substance that is placed between the bottom of the cooler heatsink and the top of the processor to eliminate air pockets and to help to draw heat off the processor.

things to avoid with customers

Arguing, Laughing, Getting off topic, Killing people, Eating people(big no-no), Discussing politics, Religion, and/or Sexuality


a program that appears desirable but actually contains something harmful; virus

troubleshooting steps

1. Identify the problem
2. Establish a theory
3. Test theory to determine cause
4. Establish plan of action & implement a solution
5. Verify solution
6. Document findings`


installation of an operating system with minimal user intervention.


not adhering to ethical or moral principles

USB 2.0 speed

480 Mbps

USB port

Short for Universal Serial Bus, an external bus standard that supports data transfer rates of 12 Mbps. A single USB port can be used to connect up to 127 peripheral devices, such as mice, modems, and keyboards

verify obvious issue

Figure out the obvious issue


a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer


Wired Equivalent Privacy, an encryption algorithm used to protect data on Wi-Fi Networks


a software program capable of reproducing itself that can spread from one computer to the next over a network


What the computers hackers take control of are referred to as.

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions and try again


Reload the page to try again!


Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

Voice Recording