Term
Includes a radio transmitter and receiver that operates in either 2.4 GHz or 5 GHz radio band |
|
Definition
|
|
Term
The other wireless nodes in a network are called ___________ and each has a transmitter/receiver working in a matching bandwidth. |
|
Definition
|
|
Term
Uses an attenna-equipped expansion cord or a USB antenna attachment. |
|
Definition
|
|
Term
Uses a PC card, USB attachement, or have built-in radio components |
|
Definition
|
|
Term
The 802.11 range covers a ____________ radius. The range is a factor of frequencies, transmitter signal strengths, and the sensitivity of the receivers. |
|
Definition
25 foot to 125 foot radius |
|
|
Term
If an AP within range picks up the probe request, the AP broadcasts an acknowledgement and the two go through whatever ______________ the network has set up. |
|
Definition
Security or Payment arrangement. |
|
|
Term
If 2 APs reply to the probe, the laptop will use which ever has the ________ signal |
|
Definition
|
|
Term
Many access points are also ________, using the internet access among several stations on the WLAN. |
|
Definition
|
|
Term
The network can extend beyond the range of routers, provided there are occasional ____________ that pick up fading communications to and from access points and rebroadcast the signals with renewed strength. |
|
Definition
|
|
Term
Areas where 802.11 networks are open to the public, and are found in coffee shops, airports, universities, hotels, and office lobbys are called? |
|
Definition
|
|
Term
Refers to how quickly computers on the network can communicate and share information. |
|
Definition
|
|
Term
Wired networks have a transfer speed of up to ___________ because the data is transferred over a network cable. |
|
Definition
|
|
Term
Wireless connection speeds of _______ or________ do not refer to the download times or internet conniction speeds. |
|
Definition
|
|
Term
In a wireless network, data is transmitted via ____________ , so obstructions like walls can affect the transmission speed. |
|
Definition
|
|
Term
A virus performs these 4 actions: |
|
Definition
Replication, Event Watching, Camouflage, Delivery |
|
|
Term
The four types of virus are: |
|
Definition
Executable, E-Mail, Worms, Trojan Horse |
|
|
Term
This virus is a small piece of software that piggybacks on real programs. Each time the program runs, the virus runs too. |
|
Definition
|
|
Term
This virus is contained in an e-mail or attachments or both. It usually replicates itself by automatically mailing itself to dozens of people in the victims e-mail address book. |
|
Definition
|
|
Term
This virus is a small piece of software that uses the computer networks and security holes to replicate itself. |
|
Definition
|
|
Term
This virus claims to be one thing, but instead does damage when you run it. |
|
Definition
|
|
Term
Looks for sections of code triggered by time or date events, routines to search for files such as .exe, .com, .bat, and .vbs; as well as, disk writes that bypass the operating system. |
|
Definition
|
|
Term
A program on your hard drive the sends information about you and how you use your PC to marketers and advertisers, usually without you being aware |
|
Definition
|
|
Term
What are some pieces of info a spyware program might collect? |
|
Definition
Keystrokes, snoop through documents, track each page you visit,scour your files for a credit card number. |
|
|
Term
What are some sites that use spyware? |
|
Definition
Gator, Bonzi Buddy, DirectRevenue, CoolWebSearch |
|
|
Term
|
Definition
E-mail, Instant Messaging, Newsgroups, Search Engines, Blogs, Mobile phones. |
|
|
Term
What are some common ways of fighting spam? |
|
Definition
Delete email from unknown senders, report spam to your email program,install anti-spam program,create a black list on your email |
|
|
Term
A variant of spyware that displays advertising for products it thinks might interest you, based on the web site you are browsing |
|
Definition
|
|
Term
What is the best way to prevent a hacker from accessing a customers system? |
|
Definition
|
|
Term
Placed between a PC and the internet to block a hackers attempts to break into the computer. |
|
Definition
|
|
Term
The 3 main types of firewall rules are? |
|
Definition
Packet Filtering, Proxy, Stateful Inspection. |
|
|
Term
What are some ways to troubleshoot printing problems? |
|
Definition
Check that printer is connected correctly to a functioning port, make sure no other devices such as scanners,copiers, are connected between the computer and the printer, reboot printer, print test page, print smaller file |
|
|
Term
Indicates a problem with a device or driver. |
|
Definition
|
|
Term
Blue screen errors with a cryptic set of hexadecimal addresses. Indicates a major problem with the OS. |
|
Definition
|
|
Term
What are some of the causes of no sound coming from a computer? |
|
Definition
Some applications contain their own volume control panel, volume muted, sound card not seated, bad or missing drivers. |
|
|
Term
What are the 2 main ways to troubleshoot IP issues? |
|
Definition
Automated (running a diagnostic check) and Manual(ipconfig). |
|
|
Term
According to the CHSI installation task list, what do you do immediately after checking peripherals? A. Set-up network connections B. Have the customer perform a cold boot C. Perform drop cable checks D. Check for minimum requirements. |
|
Definition
D. Check for minimum requirements. |
|
|
Term
According to the CHSI installation task list, what do you immediately do after performing a system backup? A. Install modem B. Connect the modem to the computer C. Verify Internet connectivity D. Close security applications. |
|
Definition
B. Connect the modem to the computer. |
|
|
Term
The CHSI minimum requirement for memory is? A. 128 B. 256 C. 512 D. 1 GB |
|
Definition
|
|
Term
Which of the following is not a part of the CHSI Rule of Three? A. Provide customer with comcast.net email address and password. B. Mention the benefits and features on comcast.net C. Establish comcast.net as homepage D. Encourage customer to consider buying the Triple Play. |
|
Definition
D. Encourage customer to consider purchasing the Triple Play. |
|
|
Term
Which task is NOT included when setting up network connections for a windows operating system? A. Turn on file and print sharing B. Create a new broadband connections C. Configure TCP/IP settings D. Configure authentication settings |
|
Definition
A. Turn on file and print sharing. |
|
|