Study sets, textbooks, questions
Upgrade to remove ads
Ch04, Ch05, Ch06, Ch07
Terms in this set (92)
An e-mail hoax is itself a pest because it overloads network traffic when naïve users pass it on.
A hard drive is organized into one or more ____.
You can use and manage the phishing filter in Internet Explorer 7 using the ____ menu.
____ is anti-adware and anti-spyware software integrated into Windows Vista.
For best security, a ____ or password can be required at every startup in addition to TPM.
Because Windows Vista backup gives you so little control over the folders you choose to back up, many people turn to third-party backup utilities.
If your Control Panel is set to the Classic View, you can change it to the default view by going to Control Panel and clicking ____.
Control Panel Home
A user on the network can access a hidden folder by entering ____ in the Start Search box.
One popular ____ technique to spread a virus or worm is to mask a malicious program as a picture file, music file, or other type of multimedia file.
A(n) ____ defines a user to Windows and records information about the user, including the username, password used to access the account, groups that the account belongs to, and rights to use certain Windows features, utilities, and commands.
A ____ profile offers moderate protection when you are connected to a private network.
Worms on the Internet routinely perform "____," meaning that they are constantly looking for open, unprotected ports through which they can invade a system.
A user, including an administrator, can create a ____, which he can use to reset his own password if it is forgotten.
password reset disk
The Windows Vista backup utility limits your decisions about which files and folders on a Vista system you can back up.
A ____ is a device that stands between a network and another network such as the Internet, or it can stand between a single computer and a network.
If ____ is turned on, you might have a problem when you try to download something from a Web site.
The NNTP news servers are assigned to port ____.
The least protection is used for a ____ profile when your PC is on a domain and security is managed by the domain's operating system, such as Windows Server 2008.
By default, Internet Explorer runs in ____ to help prevent malware from secretly installing itself in the system.
Complete PC backup is only available in Vista Starter or Vista Home versions.
Many notebook computers have a chip on the motherboard called the ____ chip.
Keep Windows updates current by using the Web site ____.
Secure Shell, which is used to remotely control a networked computer, is assigned to port ____.
A network is normally secured by a software firewall and a single computer is normally secured by a hardware firewall.
FTP file transfer data is assigned to port ____.
Wireless devices can communicate directly, such as from one PC to another called ____ mode.
The latest and best wireless encryption standard is ____.
The group, or suite, of communication protocols used by operating systems to communicate is collectively called ____.
A ____ cable is used to connect a computer to a switch or other network device.
A ____ is one of the most powerful and versatile methods of communicating over a network.
network drive map
802.11g runs at up to ____ Mbps.
When setting up a new network connection to the Internet, first log onto the system using a(n) ____ account.
The rules for communication are predetermined and these rules are called ____.
When a window is open, you can press ____ to refresh the contents of that window.
Many beginners tend to use wizards to configure a network without really understanding what they are doing.
A(n) ____ server serves up IP addresses to computers on the network each time a computer attempts to initiate a connection to the network and requests an IP address.
DSL service and an older technology, ISDN, are provided by ____.
the local telephone company
A ____ stands between a local network and the Internet and manages traffic between them.
When you connect a cable modem or a DSL modem to a PC and to the ISP, Vista automatically creates a(n) ____ network connection.
Cable modems are the cheapest and slowest method of connecting to the Internet.
For individual computers and for small networks at home or in a small office, the entry point to the Internet is an ____.
Internet Service Provider
The key to successful wireless networking is ____.
If a network drive does not work, go to the ____ window, and verify that the network connection is working properly.
The four most popular methods of connecting to the Internet are DSL, cable modem, satellite, and ____.
Most broadband connections today are always up and use dynamic IP addressing, which are the assumptions that Vista makes when it automatically creates and configures a new network connection.
A VPN uses a technique called cresting, in which a packet of data is encrypted.
Most encryption software products use a method called ____.
Public Key Encryption
For local wired or wireless networks, a(n) ____ inside your computer is part of the physical network.
When a problem occurs, ____ displays an error screen and invites you to check for a solution.
Vista Error Reporting
If you have a problem with installing or updating a device or application, or if a problem arises and you don't understand its source, you can use ____ to return to a previous point in time before the problem occurred.
When troubleshooting a failed system, if the Windows Vista desktop cannot load, you can run the memory diagnostic test from the Windows Vista ____.
After you delete cookies, you can use the ____ Wizard to import cookies back into Internet Explorer.
If the ____ tab is missing in Windows Explorer, the program is not digitally signed.
To eliminate the hard drive as the source of an application error, use the ____ command to check the drive.
An IDE to USB adapter or a SATA to USB adapter costs more than $30 but is extremely handy when a hard drive won't boot but still has valuable data on it.
For good performance, Windows Vista needs at least ____ GB of RAM.
Internal hard drives use one of two types of cables and connectors to connect the drive to the motherboard: an IDE connector and cable (the newer, faster method) or SATA connector and cable (the older method).
Any device that shows up in ____ setup should also be listed in Device Manager.
Sometimes IE problems are caused by a corrupted index file in the ____ folder.
When Windows is updating or installing drivers, it is looking for a folder on the CD, hard drive, or other media that has a file in it with a(n) ____ file extension.
With normal Vista settings, if a(n) ____ error occurs during startup, the system displays the error screen for a moment and then automatically restarts the system.
Today's motherboards are likely to have at least two IDE connector and one or more SATA connectors.
Use the ____ window to install and uninstall a printer, configure it, share it, and manage its print queue.
At a command prompt, the command to run Chkdsk is ____.
chkdsk C: /r
You should always make ____ before making changes to your computer.
To solve the problem of a corrupted index file in the cache file, you need to delete the hidden file ____.
A ____ costs from $25 to $100 and can be used to display error codes at startup to diagnose a startup problem with hardware.
To use the System File Checker utility to scan all system files and verify them, first close all applications and then enter the command ____ in an elevated command prompt window.
If you have problems running the System File Checker utility, try the command ____, which scans files immediately after the next reboot.
Deleting the browser history is a good best practice to protect your privacy when you are finished using Internet Explorer on a public computer.
You access the Group Policy Editor console using the ____ command.
The easiest way to delete a corrupted index file in the cache folder is to delete the entire IE cache folder for the user account that has the problem.
The command ____ searches for and replaces corrupted system files.
Drivers for required hardware are known as ____ drivers.
Using the ____ system, you can have up to four partitions on a hard drive, although one of them can be an extended partition with multiple volumes.
If you can't hear the spinning drive or see lights on the front of the case, suspect the electrical system.
The ____ is a table that maps out what partitions are on the drive, where on the drive they are located, and which partition is the active partition.
If the computer belongs to a domain, policies set at the local level override any domain policies.
The key that loads services and drivers can be found in ____.
A Windows Vista system has successfully started when you can log onto Windows and the network drives have mounted.
If Windows is corrupted and the system will not boot, recovering windows should always be your first priority.
The ____ disk partitioning system can support up to 128 partitions.
The ____ contains a short program to locate and load the bootloader program.
____ can automatically fix many Windows problems including those caused by a corrupted BCD file and missing system files.
You can use ____ to manage startup programs.
The easiest way to view the Ntbtlog.txt log is to boot into Safe Mode and view the file with ____.
Generally, if you belong to a domain, the ____ manages all policies at the domain level.
To restore a file in the Recycle Bin, right-click the file and click ____ on the shortcut menu.
A video card or video chip embedded on the motherboard is called a(n) ____ video chip.
To successfully start, a computer needs the bare-bones minimum of hardware and software.
When you first turn on a system, ____ takes control, checks essential hardware devices, and searches for an OS to load.
The first 512-byte sector of the active partition is called the ____ and is used to help the MBR find and load the OS.
NOT master boot file
Other sets by this creator
Ch05, Ch06, Ch07
Other Quizlet sets
Final Pharm FINAL
FHM Unit 1
Vocabulary and Spelling List #11
#1 - Conceitos Iniciais, histórico, funções e font…