Term
| Includes a radio transmitter and receiver that operates in either 2.4 GHz or 5 GHz radio band |
|
Definition
|
|
Term
| The other wireless nodes in a network are called ___________ and each has a transmitter/receiver working in a matching bandwidth. |
|
Definition
|
|
Term
| Uses an attenna-equipped expansion cord or a USB antenna attachment. |
|
Definition
|
|
Term
| Uses a PC card, USB attachement, or have built-in radio components |
|
Definition
|
|
Term
| The 802.11 range covers a ____________ radius. The range is a factor of frequencies, transmitter signal strengths, and the sensitivity of the receivers. |
|
Definition
| 25 foot to 125 foot radius |
|
|
Term
| If an AP within range picks up the probe request, the AP broadcasts an acknowledgement and the two go through whatever ______________ the network has set up. |
|
Definition
| Security or Payment arrangement. |
|
|
Term
| If 2 APs reply to the probe, the laptop will use which ever has the ________ signal |
|
Definition
|
|
Term
| Many access points are also ________, using the internet access among several stations on the WLAN. |
|
Definition
|
|
Term
| The network can extend beyond the range of routers, provided there are occasional ____________ that pick up fading communications to and from access points and rebroadcast the signals with renewed strength. |
|
Definition
|
|
Term
| Areas where 802.11 networks are open to the public, and are found in coffee shops, airports, universities, hotels, and office lobbys are called? |
|
Definition
|
|
Term
| Refers to how quickly computers on the network can communicate and share information. |
|
Definition
|
|
Term
| Wired networks have a transfer speed of up to ___________ because the data is transferred over a network cable. |
|
Definition
|
|
Term
| Wireless connection speeds of _______ or________ do not refer to the download times or internet conniction speeds. |
|
Definition
|
|
Term
| In a wireless network, data is transmitted via ____________ , so obstructions like walls can affect the transmission speed. |
|
Definition
|
|
Term
| A virus performs these 4 actions: |
|
Definition
| Replication, Event Watching, Camouflage, Delivery |
|
|
Term
| The four types of virus are: |
|
Definition
| Executable, E-Mail, Worms, Trojan Horse |
|
|
Term
| This virus is a small piece of software that piggybacks on real programs. Each time the program runs, the virus runs too. |
|
Definition
|
|
Term
| This virus is contained in an e-mail or attachments or both. It usually replicates itself by automatically mailing itself to dozens of people in the victims e-mail address book. |
|
Definition
|
|
Term
| This virus is a small piece of software that uses the computer networks and security holes to replicate itself. |
|
Definition
|
|
Term
| This virus claims to be one thing, but instead does damage when you run it. |
|
Definition
|
|
Term
| Looks for sections of code triggered by time or date events, routines to search for files such as .exe, .com, .bat, and .vbs; as well as, disk writes that bypass the operating system. |
|
Definition
|
|
Term
| A program on your hard drive the sends information about you and how you use your PC to marketers and advertisers, usually without you being aware |
|
Definition
|
|
Term
| What are some pieces of info a spyware program might collect? |
|
Definition
| Keystrokes, snoop through documents, track each page you visit,scour your files for a credit card number. |
|
|
Term
| What are some sites that use spyware? |
|
Definition
| Gator, Bonzi Buddy, DirectRevenue, CoolWebSearch |
|
|
Term
|
Definition
| E-mail, Instant Messaging, Newsgroups, Search Engines, Blogs, Mobile phones. |
|
|
Term
| What are some common ways of fighting spam? |
|
Definition
| Delete email from unknown senders, report spam to your email program,install anti-spam program,create a black list on your email |
|
|
Term
A variant of spyware that displays advertising for products it thinks might interest you, based on the web site you are browsing |
|
Definition
|
|
Term
| What is the best way to prevent a hacker from accessing a customers system? |
|
Definition
|
|
Term
| Placed between a PC and the internet to block a hackers attempts to break into the computer. |
|
Definition
|
|
Term
| The 3 main types of firewall rules are? |
|
Definition
| Packet Filtering, Proxy, Stateful Inspection. |
|
|
Term
| What are some ways to troubleshoot printing problems? |
|
Definition
| Check that printer is connected correctly to a functioning port, make sure no other devices such as scanners,copiers, are connected between the computer and the printer, reboot printer, print test page, print smaller file |
|
|
Term
| Indicates a problem with a device or driver. |
|
Definition
|
|
Term
| Blue screen errors with a cryptic set of hexadecimal addresses. Indicates a major problem with the OS. |
|
Definition
|
|
Term
| What are some of the causes of no sound coming from a computer? |
|
Definition
| Some applications contain their own volume control panel, volume muted, sound card not seated, bad or missing drivers. |
|
|
Term
| What are the 2 main ways to troubleshoot IP issues? |
|
Definition
| Automated (running a diagnostic check) and Manual(ipconfig). |
|
|
Term
According to the CHSI installation task list, what do you do immediately after checking peripherals? A. Set-up network connections B. Have the customer perform a cold boot C. Perform drop cable checks D. Check for minimum requirements. |
|
Definition
| D. Check for minimum requirements. |
|
|
Term
According to the CHSI installation task list, what do you immediately do after performing a system backup? A. Install modem B. Connect the modem to the computer C. Verify Internet connectivity D. Close security applications. |
|
Definition
| B. Connect the modem to the computer. |
|
|
Term
The CHSI minimum requirement for memory is? A. 128 B. 256 C. 512 D. 1 GB |
|
Definition
|
|
Term
Which of the following is not a part of the CHSI Rule of Three? A. Provide customer with comcast.net email address and password. B. Mention the benefits and features on comcast.net C. Establish comcast.net as homepage D. Encourage customer to consider buying the Triple Play. |
|
Definition
| D. Encourage customer to consider purchasing the Triple Play. |
|
|
Term
Which task is NOT included when setting up network connections for a windows operating system? A. Turn on file and print sharing B. Create a new broadband connections C. Configure TCP/IP settings D. Configure authentication settings |
|
Definition
| A. Turn on file and print sharing. |
|
|