Term
|
Definition
| Maximum data speed of high-speed USB 2.0 |
|
|
Term
|
Definition
| IEEE standard defines the FireWire technology |
|
|
Term
|
Definition
| Maximum data rate supported by the IEEE 1394a standard |
|
|
Term
|
Definition
| Purpose of a heat sink installed on a processor |
|
|
Term
|
Definition
| A regular systematic inspection, cleaning, and replacement of worn parts, materials and systems. |
|
|
Term
|
Definition
| A systematic approach to locating the cause of a fault in a computer system |
|
|
Term
| 6 steps of troubleshooting: |
|
Definition
1. Identify the problem
2. Establish a theory of probable causes,
3. Test the theory to determine an exact cause,
4. Implement the solution,
5. Verify full system functionality, if applicable, implement preventive measures
6. Document findings, actions, and outcomes |
|
|
Term
|
Definition
| A copy of the data on a computer hard drive that is saved to media |
|
|
Term
| When should you use a liability release form? |
|
Definition
| If the customer does not have a backup and you are unable to create one, you should have the customer sign a Liability Release Form. |
|
|
Term
|
Definition
| Updated information about errors |
|
|
Term
|
Definition
| Displays all devices that are configured on a computer |
|
|
Term
|
Definition
| basic input/ output system |
|
|
Term
|
Definition
(power on self test)
Comes on when computer is turned on |
|
|
Term
| A newly installed hard drive isn't working. Where would you look first? |
|
Definition
|
|
Term
|
Definition
| The size and shape of a Motherboard |
|
|
Term
Power supply installation steps |
|
Definition
1 Insert the power supply into the case
2 Align the holes in the power supply with the holes in the case
3 Secure the power supply to the case using the proper screws |
|
|
Term
| What does a locking assembly do? |
|
Definition
| Secures CPU to socket on the motherboard |
|
|
Term
|
Definition
| Conducts heat away from the CPU |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Draws heat away from the CPU |
|
|
Term
|
Definition
| Moves the heat away from the heat sink |
|
|
Term
|
Definition
(Random access memory)
provides temorary data storage for the CPU while the computer is operating |
|
|
Term
| What happens to volatile memory? |
|
Definition
| The contents are lost when the computer is shut down |
|
|
Term
| What are plastic and metal standoffs used for? |
|
Definition
| Used to mount the motherboard and prevent it from touching the metal portions of the case |
|
|
Term
| Number of steps for installing a motherboard? |
|
Definition
|
|
Term
|
Definition
|
|
Term
| Examples of external bays |
|
Definition
| Optical and floppy disk drives (FDD) |
|
|
Term
|
Definition
| provides the optical drive with power from the power supply |
|
|
Term
PATA cable connectors
(parallel advanced technology attachment) |
|
Definition
| Uses three 40-pin connectors to connect to the motherboard from a drive |
|
|
Term
| Drives that use 3.5-inch bays |
|
Definition
|
|
Term
| NIC (network interface card) |
|
Definition
| enables a computer to connect to a network |
|
|
Term
| NIC use 2 interfaces. What are they? |
|
Definition
|
|
Term
ATX connector
(advanced technology extended) |
|
Definition
|
|
Term
SATA power connector
(serial advanced technology attachment) |
|
Definition
| uses 15 pins to connect to devices that have SATA power sockets |
|
|
Term
| SATA data cable connector? |
|
Definition
|
|
Term
| examples of external output devices |
|
Definition
| monitor, speakers, printer |
|
|
Term
|
Definition
| A storage device that reads and writes information to CDs and DVDs |
|
|
Term
|
Definition
| The interface between a computer and a display monitor |
|
|
Term
| Slots the video adapter cards use |
|
Definition
|
|
Term
|
Definition
| SATA, PATA, USB, FireWire |
|
|
Term
|
Definition
|
|
Term
| What does an Operating System do? |
|
Definition
| Control hardware access, manage files and folders, provide user interface, and manage applications |
|
|
Term
|
Definition
| Small program written by the hardware manufacturer and supplied with the hardware component |
|
|
Term
|
Definition
| The process of assigning system resources and installing drivers can be performed |
|
|
Term
| The registry contains information about: |
|
Definition
Applications
Users
Hardware
Network settings
File types |
|
|
Term
| How do you control hardware access? |
|
Definition
| To access and communicate with the hardware, the operating system installs a device driver for each hardware component |
|
|
Term
| Describe file and folder management |
|
Definition
| The operating system creates a file structure on the hard disk drive to allow data to be stored |
|
|
Term
| 2 types of user interface |
|
Definition
|
|
Term
| Describe how the Command Line Interface (CLI) works |
|
Definition
| The user types commands at a prompt |
|
|
Term
| Describe how the Graphical User Interface (GUI) works |
|
Definition
| the user interacts with menus and icons |
|
|
Term
| Application Programming Interface (API) |
|
Definition
| a set of guidelines used by programmers to ensure that the application they are developing is compatiable with an operating system |
|
|
Term
|
Definition
|
|
Term
| Open Graphics Library (OpenGL) |
|
Definition
| cross-platform standard specification for multimedia graphics |
|
|
Term
|
Definition
| collection of APIs related to multimedia tasks for Microsoft Windows |
|
|
Term
|
Definition
| two or more users can work with programs and share peripheral devices at the same time |
|
|
Term
|
Definition
| the computer is capable of operating multiple applications at the same time |
|
|
Term
|
Definition
| the computer can have two or more CPUs that programs share |
|
|
Term
|
Definition
| a program can be broken into smaller parts that can be loaded as needed by the operating system |
|
|
Term
|
Definition
| to the capability of the CPU and the operating environment |
|
|
Term
| 4 types of modes of operation |
|
Definition
| real mode, protected mode, virtual real mode, and compatible mode |
|
|
Term
|
Definition
| only execute one program at a time, and it can only address 1 MB of system memory |
|
|
Term
|
Definition
| access to all of the memory in the computer and manage multiple programs simultaneously |
|
|
Term
|
Definition
| hard disk space that is used to emulate RAM |
|
|
Term
| operating systems that use 32 bit |
|
Definition
| Windows XP and Windows 2000 |
|
|
Term
|
Definition
| allows a real-mode application to run within a protected-mode operating system |
|
|
Term
|
Definition
| creates the environment of an earlier operating system for applications that are not compatible with the current operating system |
|
|
Term
| 2 common architectures used by CPUs to process data |
|
Definition
| x86 (32 bit architecture) and x64 (64 architecture) |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Apple MAC OS, Microsoft Windows, and Unix/Linux |
|
|
Term
|
Definition
| Microsoft windows, Novell NetWare, Linux, and Unix |
|
|
Term
| Hardware Compatibility List (HCL) |
|
Definition
| lists provide a detailed inventory of hardware that has been tested and is known to work with the operating system |
|
|
Term
|
Definition
| used on most computers that will connect to a Windows Server on a network |
|
|
Term
|
Definition
| used on home computers and has very limited security |
|
|
Term
|
Definition
| used on entertainment computers for viewing movies and listening to music |
|
|
Term
| Windows XP Tablet PC Edition |
|
Definition
|
|
Term
| Windows XP 64-bit Edition |
|
Definition
| used for computers with 64-bit processors |
|
|
Term
| Windows 2000 Professional |
|
Definition
| older Windows operating system that has been replaced by Windows XP Professional |
|
|
Term
|
Definition
| used on home computers for basic computing |
|
|
Term
| Windows Vista Home Premium |
|
Definition
| used on home computers to expand personal productivity and digital entertainment beyond the basics |
|
|
Term
|
Definition
| used on small business computers for enhanced security and enhanced mobility technology |
|
|
Term
|
Definition
| used on computers to combine all the needs of both home and business users |
|
|
Term
|
Definition
| Windows 2000 operating system path |
|
|
Term
|
Definition
| the installation and initial booting of the operating system |
|
|
Term
|
Definition
| cannot be subdivided into smaller sections |
|
|
Term
|
Definition
| the partition used by the operating system to boot the computer |
|
|
Term
|
Definition
| normally uses the remaining free space on a hard drive or takes the place of a primary partition |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| make directory- creates new folder |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
| what can be updated to reduce the risk of new exploits |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
| long beep after installing RAM? |
|
Definition
| defective RAM or icorrectly installed |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
| minimum number of disks need for raid 5? |
|
Definition
|
|
Term
| what is used to configure a pc to run at 100%? |
|
Definition
|
|
Term
|
Definition
| helps prepare answer files |
|
|
Term
| what does ipconfig/all show? |
|
Definition
| dns, ip address, mac address, default gateway |
|
|
Term
|
Definition
|
|
Term
|
Definition
| info about file extensions map to particular app |
|
|
Term
|
Definition
| info such as desktop settings; history related to current user |
|
|
Term
|
Definition
| info about users who have logged onto the system |
|
|
Term
|
Definition
| info relating to hardware & software |
|
|
Term
|
Definition
| info reltaing to all active devices on a system |
|
|
Term
| Path to change settings in boot.ini |
|
Definition
| right click MY COMPUTER>PROPERTIES>ADVANCED TAB in start up & recovery area select SETTINGS>OK>EDIT |
|
|
Term
| Displays or manages remote connections? |
|
Definition
|
|
Term
| IP address used to test functionality of a NIC |
|
Definition
|
|
Term
| in a 64-bit OS where are the program files for 32-bit programs located? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| verify that the new files were written correctly |
|
|
Term
|
Definition
| surpress confirmation prompt (windows 2000 only) |
|
|
Term
|
Definition
| effectively a count of the maximum number of lines to the destination host |
|
|
Term
|
Definition
|
|
Term
|
Definition
| used to securely connect to a remote network device |
|
|
Term
|
Definition
|
|
Term
|
Definition
| provides services for file transfer and manipulation |
|
|
Term
| Safe Mode with Networking |
|
Definition
| Starts windows identically to safe mode and also loads the drivers for network components |
|
|
Term
|
Definition
| starts windows but only loads drivers for base components i.e. keyboard and display |
|
|
Term
| Command used to trace a network |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| creates dynamic hardware configuration in the registry |
|
|
Term
|
Definition
| used to test connections between computers |
|
|
Term
|
Definition
| allows users to edit registry |
|
|
Term
|
Definition
| shows details about all of the DirectX components and drivers that are installed in your computer (ensures Direct X is installed correctly) |
|
|
Term
| What is the highest level of security for PC's running Vista Enterprise or Ultimate? |
|
Definition
| bit locker drive encryption |
|
|
Term
| How do you show file extensions? |
|
Definition
| my computer>tools>folder options>view>uncheck hide file extensions |
|
|
Term
|
Definition
| displays a comprehensive view of your hardware, system components, and software environment |
|
|
Term
|
Definition
| prepares computer for imaging |
|
|
Term
| Hard Disk Drives shows "unreadable" |
|
Definition
| hardware failure, corruption of I/O errors |
|
|
Term
| Which group should a user be added to in order to restore files without granting ownership privileges? |
|
Definition
|
|
Term
| What is the purpose of HKEY's |
|
Definition
| reads registry files, chooses a hardware profile and loads the device driver |
|
|
Term
|
Definition
|
|
Term
| Where are the 64-bit programs located in a 64-bit OS? |
|
Definition
|
|
Term
|
Definition
| releases the current DCHP address |
|
|
Term
| What would be used to secure a companies wireless network? |
|
Definition
|
|
Term
| TRUE/FALSE CAT5 cable (1-1, 2-2) is a straight patch cable |
|
Definition
|
|
Term
| Which protocol runs commands on a remote PC? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| request/response connection to the internet |
|
|
Term
|
Definition
|
|
Term
|
Definition
| download e-mail messages from e-mail server |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| uses authentication and encryption to secure data as it travels between client and web server |
|
|
Term
|
Definition
|
|
Term
| Which windows partition is refered to as the c:\ drive? |
|
Definition
|
|
Term
| What two characteristics are determined by the chipset on the motherboard? |
|
Definition
|
|
Term
|
Definition
| scans the drive immediately |
|
|
Term
|
Definition
| Remote access application used to provide remote terminal access between host links |
|
|
Term
| In Vista, where are the users information stored? |
|
Definition
|
|
Term
| Name 5 non routable IP addresses |
|
Definition
| 1) 10.0.0.0 2) 127.0.0.1 3) 169.254.0.0 4) 172.16.0.0 5) 192.168.0.0 |
|
|
Term
|
Definition
| Sends abnormally large amounts of requests to a system preventing access to services |
|
|
Term
|
Definition
| Uses "zombies" to make tracing the origin of the DoS attack difficult to locate |
|
|
Term
|
Definition
| gains access to resources on devices by pretending to be a trusted computer |
|
|
Term
|
Definition
| intercepts or inserts false information in traffic between two hosts |
|
|
Term
|
Definition
| uses network sniffer to extract usernames and passwords to be used at a later date to gain access |
|
|
Term
|
Definition
| changes the dns records on a system to point to false servers where the data is recorded. |
|
|
Term
| Safe Mode with Command Prompt |
|
Definition
| starts windows and loads the command prompt instead of the gui |
|
|
Term
| How many logical drives are on a single NTFS? |
|
Definition
|
|
Term
| What should a Liability release form contain? |
|
Definition
#1- *Customers signature *
-Permission to work on computer without a backup.
-Release from liability in case data is lost.
-Description of work to be performed. |
|
|