Term
|
Definition
Maximum data speed of high-speed USB 2.0 |
|
|
Term
|
Definition
IEEE standard defines the FireWire technology |
|
|
Term
|
Definition
Maximum data rate supported by the IEEE 1394a standard |
|
|
Term
|
Definition
Purpose of a heat sink installed on a processor |
|
|
Term
|
Definition
A regular systematic inspection, cleaning, and replacement of worn parts, materials and systems. |
|
|
Term
|
Definition
A systematic approach to locating the cause of a fault in a computer system |
|
|
Term
6 steps of troubleshooting: |
|
Definition
1. Identify the problem
2. Establish a theory of probable causes,
3. Test the theory to determine an exact cause,
4. Implement the solution,
5. Verify full system functionality, if applicable, implement preventive measures
6. Document findings, actions, and outcomes |
|
|
Term
|
Definition
A copy of the data on a computer hard drive that is saved to media |
|
|
Term
When should you use a liability release form? |
|
Definition
If the customer does not have a backup and you are unable to create one, you should have the customer sign a Liability Release Form. |
|
|
Term
|
Definition
Updated information about errors |
|
|
Term
|
Definition
Displays all devices that are configured on a computer |
|
|
Term
|
Definition
basic input/ output system |
|
|
Term
|
Definition
(power on self test)
Comes on when computer is turned on |
|
|
Term
A newly installed hard drive isn't working. Where would you look first? |
|
Definition
|
|
Term
|
Definition
The size and shape of a Motherboard |
|
|
Term
Power supply installation steps |
|
Definition
1 Insert the power supply into the case
2 Align the holes in the power supply with the holes in the case
3 Secure the power supply to the case using the proper screws |
|
|
Term
What does a locking assembly do? |
|
Definition
Secures CPU to socket on the motherboard |
|
|
Term
|
Definition
Conducts heat away from the CPU |
|
|
Term
|
Definition
|
|
Term
|
Definition
Draws heat away from the CPU |
|
|
Term
|
Definition
Moves the heat away from the heat sink |
|
|
Term
|
Definition
(Random access memory)
provides temorary data storage for the CPU while the computer is operating |
|
|
Term
What happens to volatile memory? |
|
Definition
The contents are lost when the computer is shut down |
|
|
Term
What are plastic and metal standoffs used for? |
|
Definition
Used to mount the motherboard and prevent it from touching the metal portions of the case |
|
|
Term
Number of steps for installing a motherboard? |
|
Definition
|
|
Term
|
Definition
|
|
Term
Examples of external bays |
|
Definition
Optical and floppy disk drives (FDD) |
|
|
Term
|
Definition
provides the optical drive with power from the power supply |
|
|
Term
PATA cable connectors
(parallel advanced technology attachment) |
|
Definition
Uses three 40-pin connectors to connect to the motherboard from a drive |
|
|
Term
Drives that use 3.5-inch bays |
|
Definition
|
|
Term
NIC (network interface card) |
|
Definition
enables a computer to connect to a network |
|
|
Term
NIC use 2 interfaces. What are they? |
|
Definition
|
|
Term
ATX connector
(advanced technology extended) |
|
Definition
|
|
Term
SATA power connector
(serial advanced technology attachment) |
|
Definition
uses 15 pins to connect to devices that have SATA power sockets |
|
|
Term
SATA data cable connector? |
|
Definition
|
|
Term
examples of external output devices |
|
Definition
monitor, speakers, printer |
|
|
Term
|
Definition
A storage device that reads and writes information to CDs and DVDs |
|
|
Term
|
Definition
The interface between a computer and a display monitor |
|
|
Term
Slots the video adapter cards use |
|
Definition
|
|
Term
|
Definition
SATA, PATA, USB, FireWire |
|
|
Term
|
Definition
|
|
Term
What does an Operating System do? |
|
Definition
Control hardware access, manage files and folders, provide user interface, and manage applications |
|
|
Term
|
Definition
Small program written by the hardware manufacturer and supplied with the hardware component |
|
|
Term
|
Definition
The process of assigning system resources and installing drivers can be performed |
|
|
Term
The registry contains information about: |
|
Definition
Applications
Users
Hardware
Network settings
File types |
|
|
Term
How do you control hardware access? |
|
Definition
To access and communicate with the hardware, the operating system installs a device driver for each hardware component |
|
|
Term
Describe file and folder management |
|
Definition
The operating system creates a file structure on the hard disk drive to allow data to be stored |
|
|
Term
2 types of user interface |
|
Definition
|
|
Term
Describe how the Command Line Interface (CLI) works |
|
Definition
The user types commands at a prompt |
|
|
Term
Describe how the Graphical User Interface (GUI) works |
|
Definition
the user interacts with menus and icons |
|
|
Term
Application Programming Interface (API) |
|
Definition
a set of guidelines used by programmers to ensure that the application they are developing is compatiable with an operating system |
|
|
Term
|
Definition
|
|
Term
Open Graphics Library (OpenGL) |
|
Definition
cross-platform standard specification for multimedia graphics |
|
|
Term
|
Definition
collection of APIs related to multimedia tasks for Microsoft Windows |
|
|
Term
|
Definition
two or more users can work with programs and share peripheral devices at the same time |
|
|
Term
|
Definition
the computer is capable of operating multiple applications at the same time |
|
|
Term
|
Definition
the computer can have two or more CPUs that programs share |
|
|
Term
|
Definition
a program can be broken into smaller parts that can be loaded as needed by the operating system |
|
|
Term
|
Definition
to the capability of the CPU and the operating environment |
|
|
Term
4 types of modes of operation |
|
Definition
real mode, protected mode, virtual real mode, and compatible mode |
|
|
Term
|
Definition
only execute one program at a time, and it can only address 1 MB of system memory |
|
|
Term
|
Definition
access to all of the memory in the computer and manage multiple programs simultaneously |
|
|
Term
|
Definition
hard disk space that is used to emulate RAM |
|
|
Term
operating systems that use 32 bit |
|
Definition
Windows XP and Windows 2000 |
|
|
Term
|
Definition
allows a real-mode application to run within a protected-mode operating system |
|
|
Term
|
Definition
creates the environment of an earlier operating system for applications that are not compatible with the current operating system |
|
|
Term
2 common architectures used by CPUs to process data |
|
Definition
x86 (32 bit architecture) and x64 (64 architecture) |
|
|
Term
|
Definition
|
|
Term
|
Definition
Apple MAC OS, Microsoft Windows, and Unix/Linux |
|
|
Term
|
Definition
Microsoft windows, Novell NetWare, Linux, and Unix |
|
|
Term
Hardware Compatibility List (HCL) |
|
Definition
lists provide a detailed inventory of hardware that has been tested and is known to work with the operating system |
|
|
Term
|
Definition
used on most computers that will connect to a Windows Server on a network |
|
|
Term
|
Definition
used on home computers and has very limited security |
|
|
Term
|
Definition
used on entertainment computers for viewing movies and listening to music |
|
|
Term
Windows XP Tablet PC Edition |
|
Definition
|
|
Term
Windows XP 64-bit Edition |
|
Definition
used for computers with 64-bit processors |
|
|
Term
Windows 2000 Professional |
|
Definition
older Windows operating system that has been replaced by Windows XP Professional |
|
|
Term
|
Definition
used on home computers for basic computing |
|
|
Term
Windows Vista Home Premium |
|
Definition
used on home computers to expand personal productivity and digital entertainment beyond the basics |
|
|
Term
|
Definition
used on small business computers for enhanced security and enhanced mobility technology |
|
|
Term
|
Definition
used on computers to combine all the needs of both home and business users |
|
|
Term
|
Definition
Windows 2000 operating system path |
|
|
Term
|
Definition
the installation and initial booting of the operating system |
|
|
Term
|
Definition
cannot be subdivided into smaller sections |
|
|
Term
|
Definition
the partition used by the operating system to boot the computer |
|
|
Term
|
Definition
normally uses the remaining free space on a hard drive or takes the place of a primary partition |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
make directory- creates new folder |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
what can be updated to reduce the risk of new exploits |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
long beep after installing RAM? |
|
Definition
defective RAM or icorrectly installed |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
minimum number of disks need for raid 5? |
|
Definition
|
|
Term
what is used to configure a pc to run at 100%? |
|
Definition
|
|
Term
|
Definition
helps prepare answer files |
|
|
Term
what does ipconfig/all show? |
|
Definition
dns, ip address, mac address, default gateway |
|
|
Term
|
Definition
|
|
Term
|
Definition
info about file extensions map to particular app |
|
|
Term
|
Definition
info such as desktop settings; history related to current user |
|
|
Term
|
Definition
info about users who have logged onto the system |
|
|
Term
|
Definition
info relating to hardware & software |
|
|
Term
|
Definition
info reltaing to all active devices on a system |
|
|
Term
Path to change settings in boot.ini |
|
Definition
right click MY COMPUTER>PROPERTIES>ADVANCED TAB in start up & recovery area select SETTINGS>OK>EDIT |
|
|
Term
Displays or manages remote connections? |
|
Definition
|
|
Term
IP address used to test functionality of a NIC |
|
Definition
|
|
Term
in a 64-bit OS where are the program files for 32-bit programs located? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
verify that the new files were written correctly |
|
|
Term
|
Definition
surpress confirmation prompt (windows 2000 only) |
|
|
Term
|
Definition
effectively a count of the maximum number of lines to the destination host |
|
|
Term
|
Definition
|
|
Term
|
Definition
used to securely connect to a remote network device |
|
|
Term
|
Definition
|
|
Term
|
Definition
provides services for file transfer and manipulation |
|
|
Term
Safe Mode with Networking |
|
Definition
Starts windows identically to safe mode and also loads the drivers for network components |
|
|
Term
|
Definition
starts windows but only loads drivers for base components i.e. keyboard and display |
|
|
Term
Command used to trace a network |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
creates dynamic hardware configuration in the registry |
|
|
Term
|
Definition
used to test connections between computers |
|
|
Term
|
Definition
allows users to edit registry |
|
|
Term
|
Definition
shows details about all of the DirectX components and drivers that are installed in your computer (ensures Direct X is installed correctly) |
|
|
Term
What is the highest level of security for PC's running Vista Enterprise or Ultimate? |
|
Definition
bit locker drive encryption |
|
|
Term
How do you show file extensions? |
|
Definition
my computer>tools>folder options>view>uncheck hide file extensions |
|
|
Term
|
Definition
displays a comprehensive view of your hardware, system components, and software environment |
|
|
Term
|
Definition
prepares computer for imaging |
|
|
Term
Hard Disk Drives shows "unreadable" |
|
Definition
hardware failure, corruption of I/O errors |
|
|
Term
Which group should a user be added to in order to restore files without granting ownership privileges? |
|
Definition
|
|
Term
What is the purpose of HKEY's |
|
Definition
reads registry files, chooses a hardware profile and loads the device driver |
|
|
Term
|
Definition
|
|
Term
Where are the 64-bit programs located in a 64-bit OS? |
|
Definition
|
|
Term
|
Definition
releases the current DCHP address |
|
|
Term
What would be used to secure a companies wireless network? |
|
Definition
|
|
Term
TRUE/FALSE CAT5 cable (1-1, 2-2) is a straight patch cable |
|
Definition
|
|
Term
Which protocol runs commands on a remote PC? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
request/response connection to the internet |
|
|
Term
|
Definition
|
|
Term
|
Definition
download e-mail messages from e-mail server |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
uses authentication and encryption to secure data as it travels between client and web server |
|
|
Term
|
Definition
|
|
Term
Which windows partition is refered to as the c:\ drive? |
|
Definition
|
|
Term
What two characteristics are determined by the chipset on the motherboard? |
|
Definition
|
|
Term
|
Definition
scans the drive immediately |
|
|
Term
|
Definition
Remote access application used to provide remote terminal access between host links |
|
|
Term
In Vista, where are the users information stored? |
|
Definition
|
|
Term
Name 5 non routable IP addresses |
|
Definition
1) 10.0.0.0 2) 127.0.0.1 3) 169.254.0.0 4) 172.16.0.0 5) 192.168.0.0 |
|
|
Term
|
Definition
Sends abnormally large amounts of requests to a system preventing access to services |
|
|
Term
|
Definition
Uses "zombies" to make tracing the origin of the DoS attack difficult to locate |
|
|
Term
|
Definition
gains access to resources on devices by pretending to be a trusted computer |
|
|
Term
|
Definition
intercepts or inserts false information in traffic between two hosts |
|
|
Term
|
Definition
uses network sniffer to extract usernames and passwords to be used at a later date to gain access |
|
|
Term
|
Definition
changes the dns records on a system to point to false servers where the data is recorded. |
|
|
Term
Safe Mode with Command Prompt |
|
Definition
starts windows and loads the command prompt instead of the gui |
|
|
Term
How many logical drives are on a single NTFS? |
|
Definition
|
|
Term
What should a Liability release form contain? |
|
Definition
#1- *Customers signature *
-Permission to work on computer without a backup.
-Release from liability in case data is lost.
-Description of work to be performed. |
|
|