Term
Reverting to a ____ point can solve problems with registry entries the application uses that have become corrupted. |
|
Definition
|
|
Term
When you see the Microsoft progress bar appear, you know the ____, including all critical services and drivers, has loaded. |
|
Definition
|
|
Term
For essential hardware devices, use the ____ to verify and replace system files. |
|
Definition
|
|
Term
If you have a laptop or a brand-name computer such as a Gateway, Dell, or IBM, most likely the manufacturer has set up a ____ on the hard drive that can be used to recover the Windows installation. |
|
Definition
|
|
Term
If the system is caught in an endless loop of restarts, boot into ____. |
|
Definition
|
|
Term
During a reinstallation, Vista setup will move all folders of the old installation into the ____ folder. |
|
Definition
|
|
Term
If you can identify the approximate date the error started and that date is in the recent past, use ____. |
|
Definition
|
|
Term
Use the ____ tool to test memory |
|
Definition
|
|
Term
Check ____ to verify that a device is enabled and Windows thinks the device should be working. |
|
Definition
|
|
Term
If you can boot to the Windows desktop when using a Windows 2000/XP boot disk, you can assume that the boot files in the root directory of drive C are missing or corrupted. |
|
Definition
|
|
Term
For a laptop or other brand-name computer, don’t forget to reinstall Windows using recovery CDs provided by ____. |
|
Definition
the computer manufacturer |
|
|
Term
To uninstall a program, in Device Manager ____ the device and select Uninstall. |
|
Definition
|
|
Term
After you boot into Safe Mode, you can use the ____ commands to verify system files and clean the hard drive. |
|
Definition
|
|
Term
As you work to solve a Windows problem, always choose the method that makes the most changes to the system as possible in order to rejuvenate the machine. |
|
Definition
|
|
Term
The error ____ is caused by a driver or service making an illegal access to memory. |
|
Definition
op 0x0A or IRQL_NOT_LESS_OR_EQUAL |
|
|
Term
Errors or warnings in Device Manager are displayed as a ____. |
|
Definition
yellow triangle or question mark |
|
|
Term
The key that loads services and drivers can be found in the ____ location |
|
Definition
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services |
|
|
Term
Sometimes a Windows update solves a problem with a hardware device. |
|
Definition
|
|
Term
The command ____ searches for and replaces corrupted system files. |
|
Definition
|
|
Term
The ____ Configuration is updated after you log on normally to Vista |
|
Definition
|
|
Term
When connecting to a private and secured wireless access point, you must provide the information that proves you have the right to use the network. |
|
Definition
|
|
Term
Delays in network transmissions are called ____. |
|
Definition
|
|
Term
The ____ command can display TCP/IP configuration information and refresh the IP address. |
|
Definition
|
|
Term
A ____ is a device that manages traffic between two networks |
|
Definition
|
|
Term
The three main protocols for encryption for 802.11 wireless networks are ____. |
|
Definition
|
|
Term
All wireless phone systems, including cellular, use ____ transmission, which means both people in a conversation can talk or transmit at the same time. |
|
Definition
|
|
Term
The IP addresses available to the Internet are called ____ IP addresses. |
|
Definition
|
|
Term
Wireless networks are either public, unsecured hotspots or private, secured hotspots. |
|
Definition
|
|
Term
The solution for securing private data traveling over a public network is a ____. |
|
Definition
|
|
Term
The ____ command tests connectivity by sending an echo request to a remote computer |
|
Definition
|
|
Term
To connect to the Internet, a network first connects to an ____. |
|
Definition
Internet Service Provider |
|
|
Term
When connecting to a network, by default Windows assumes static IP addressing and automatically configures the network connection |
|
Definition
|
|
Term
A(n) ____ is a group of four dotted decimal numbers such as 255.255.0.0 that tells TCP/IP if a computer’s IP address is on the same or a different network |
|
Definition
|
|
Term
The ____ for a cellular network is a fixed transceiver and antenna. |
|
Definition
|
|
Term
A(n) ____ is a 32-bit string used to identify a computer on a network |
|
Definition
|
|
Term
A ____ IP address is assigned for the current connection only. |
|
Definition
|
|
Term
A____ application means one computer (the remote computer) is running the Telnet server and another computer (the local computer) runs the Telnet client. |
|
Definition
|
|
Term
To use ____, you can create user accounts using the Control Panel. |
|
Definition
|
|
Term
For almost all networks today, including the Internet, the communication protocol used is called ____. |
|
Definition
|
|
Term
____ is a standard for short-range wireless communication and data synchronization between devices. |
|
Definition
|
|
Term
Wireless networks are either public, unsecured hotspots or private, secured hotspots |
|
Definition
|
|
Term
____ technology uses a dedicated line from your ISP to your place of business or residence. |
|
Definition
|
|
Term
____ is the most popular cabling method for local networks |
|
Definition
|
|
Term
When connecting to a private and secured wireless access point, you must provide the information that proves you have the right to use the network |
|
Definition
|
|
Term
An on-demand broadband connection that is not always up requires that a user name and password be authenticated at the ISP each time you make the connection. |
|
Definition
|
|
Term
ny software vendors use FTP sites for downloading software to their customers |
|
Definition
|
|
Term
In order to activate your service, the cable company must know the ____ of the cable modem you have installed |
|
Definition
|
|
Term
Most broadband connections today are always up and use ____ IP addressing. |
|
Definition
|
|
Term
The logon for an on-demand broadband connection is managed by a protocol called ____. |
|
Definition
|
|
Term
Port ____ opens a port when a PC on the network initiates communication through another port |
|
Definition
|
|
Term
For port forwarding to work, the computer on your network must have a ____ IP Address. |
|
Definition
|
|
Term
____ is essential to keep others from hacking into your wireless data and to prevent unauthorized use of your wireless LAN. |
|
Definition
|
|
Term
When supporting and troubleshooting small networks, you’ll need to use ____ to test the physical connections of the network |
|
Definition
|
|
Term
To find out what your DNS server knows about the domain name www.microsoft.com, use the ____ command. |
|
Definition
|
|
Term
A(n) ____ lookup is when you use the Nslookup command to find the host name when you know a computer’s IP address. |
|
Definition
|
|
Term
Remote ____ gives a user access to his or her Windows desktop from anywhere on the Internet. |
|
Definition
|
|
Term
To prepare a computer to serve up Remote Desktop, you need to configure the computer for ____ IP addressing |
|
Definition
|
|
Term
Remote ____ can help you support users and their computers from a distance |
|
Definition
|
|
Term
A log file is kept of every Remote Assistance session in the ____ folder. |
|
Definition
C:\Users\username\Documents\Remote Assistance Logs |
|
|
Term
Networking happens in ____. |
|
Definition
|
|
Term
To disconnect a mapped network drive, use the ____ command. |
|
Definition
|
|
Term
The command to flush the DNS cache kept on the computer is ____. |
|
Definition
|
|
Term
If you have a problem with connecting to a secured Web site from a corporate network, you might be using the wrong ____ server on the network. |
|
Definition
|
|
Term
When setting up a VoIP system, know that each digital phone or ATA must be programmed with a phone number from the ____. |
|
Definition
|
|
Term
A network ____ map is one of the most powerful and versatile methods of communicating over a network. |
|
Definition
|
|
Term
(n)____ password means it is not easy to guess by both humans and computer programs designed to hack passwords. |
|
Definition
|
|
Term
(n) ____ account has complete access to the system and can make changes that affect the security of the system and other users |
|
Definition
|
|
Term
Folders and files stored on a workstation or server that contain user data need to be classified as to the ____ assigned to the data. |
|
Definition
|
|
Term
Most encryption software products use a method called ____. |
|
Definition
|
|
Term
____ is assigned by a Certification Authority, and is used to prove you are who you say you are |
|
Definition
|
|
Term
A ____ virus is a combination of a boot sector virus and a file virus and can hide in either |
|
Definition
|
|
Term
A ____ virus can hide in either of two boot areas of a hard drive |
|
Definition
|
|
Term
A ____ is made of several words with spaces allowed |
|
Definition
|
|
Term
____ is any annoying and unwanted program that might or might not mean you harm. |
|
Definition
|
|
Term
A(n) ____ account has read-write access only on its own folders, read-only access to most system folders, and no access to other users’ data |
|
Definition
|
|
Term
Generally speaking, the weakest link in setting up security in a computer environment is ____. |
|
Definition
|
|
Term
Internet Explorer includes the pop-up blocker, the ability to manage add-ons, the ability to block scripts and disable scripts embedded in Web pages, and the ability to set the general security level |
|
Definition
|
|
Term
A ____ is a small program contained in a document that can be automatically executed either when the document is first loaded or later by pressing a key combination |
|
Definition
|
|
Term
For the health care industry, the ____ includes regulations to secure patient data that apply to all health care companies and professionals |
|
Definition
|
|
Term
A Trojan sometimes installs a ____ in the system, which is a hidden way to allow malware to reach the system in secret even after the Trojan has been removed. |
|
Definition
|
|
Term
In the computer arena, ____ is the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer |
|
Definition
|
|
Term
Because of the problem of losing encrypted data and Internet passwords when a user password is reset, each new user should create a password ____ disk for use in the event the user forgets the password. |
|
Definition
|
|
Term
As a defensive and offensive measure to protect against malicious software, install and run ____ software and keep it current. |
|
Definition
|
|
Term
Don’t use the same password on more than one system (computer, network, or application). |
|
Definition
|
|
Term
Don’t use the same password on more than one system (computer, network, or application). |
|
Definition
|
|
Term
The ____ command can be used to encrypt, decrypt, or recover an encrypted file when the certificates are lost |
|
Definition
|
|
Term
If you cannot access an encrypted file because the certificate is corrupted and there are no backup certificates, you might be able to recover the file using a(n) ____ certificate. |
|
Definition
|
|
Term
When you share folders on the network, the ____ permissions for remote users need to be set |
|
Definition
|
|
Term
Certificates are managed using the ____ console |
|
Definition
|
|
Term
It is necessary that all computers belong to the same workgroup in order to share resources |
|
Definition
|
|
Term
The term ____ applies to a kit or set of tools used originally on UNIX computers |
|
Definition
|
|
Term
The best way to change inherited permissions is to change the permissions of the ____. |
|
Definition
|
|
Term
Use ____ to search for malware processes, especially those that mask themselves as core Windows processes and elude AV software |
|
Definition
|
|
Term
Many notebook computers have a chip on the motherboard called the ____. |
|
Definition
|
|
Term
Permissions manually set for a subfolder or file cannot override inherited permissions. |
|
Definition
|
|
Term
A $ at the end of the folder name creates a(n) ____ share. |
|
Definition
|
|
Term
If an infected computer will not boot, it might be that the boot sectors of the hard drive are infected or damaged or the BIOS code might be corrupted |
|
Definition
|
|
Term
For a stand-alone computer that is not part of a Windows domain, the EFS encrypting process generates a ____ digital certificate to be used for the encryption. |
|
Definition
|
|
Term
To know for sure exactly which permissions for a file or folder are in effect, see the ____ tab of the Advanced Security Settings box. |
|
Definition
|
|
Term
To know for sure exactly which permissions for a file or folder are in effect, see the ____ tab of the Advanced Security Settings box. |
|
Definition
|
|
Term
____ on a motherboard offers security features including power-on passwords, support for intrusion-detection devices, and support for a TPM chip |
|
Definition
|
|
Term
When controlling access to data folders or files, permissions to these resources are assigned to individual user accounts or user groups |
|
Definition
|
|
Term
Windows XP uses ____ file sharing by default, which means you have no control over who has access to a shared folder or file |
|
Definition
|
|
Term
A(n) ____ computer is not allowed to use the network, is put on a different network dedicated to them, or is only allowed to access certain network resources |
|
Definition
|
|
Term
To see a list of services managed by Svchost, enter this command in a command-prompt window: ____. |
|
Definition
|
|
Term
____ cards include one or more variations of PC Card, CardBus, and ExpressCard. |
|
Definition
|
|
Term
A MicroDIMM that contains DDR SDRAM has ____ pins. |
|
Definition
|
|
Term
A(n) ____ is about the size of a credit card, but thicker. |
|
Definition
|
|
Term
In a notebook, replacing the motherboard probably means you’ll need to fully disassemble the entire notebook except the LCD assembly. |
|
Definition
|
|
Term
Most notebook manufacturers provide ____ software that can help you test components to determine which component needs replacing. |
|
Definition
|
|
Term
Notebook computer cases tend to be similar to one another, and components in notebook systems tend to be interchangeable among manufacturers. |
|
Definition
|
|
Term
IBM and Lenovo ThinkPad notebooks use a unique and popular pointing device embedded in the keyboard called a ____ or point stick. |
|
Definition
|
|
Term
Use the ____ box to adjust pointer speed, mouse trails, pointer size, how the touch pad buttons work, and other settings for pointing devices. |
|
Definition
|
|
Term
To substitute an internal device with an external device, first go into ____ setup and disable the internal device. |
|
Definition
|
|
Term
A notebook drive is ____ inches wide. |
|
Definition
|
|
Term
You can adjust the way the touch pad or works on a laptop using the ____ box. |
|
Definition
|
|
Term
In ____ sleep, all work is saved to the hard drive, but the system still maintains a trickle of power. |
|
Definition
|
|
Term
The latest PCMCIA standard is ____, which uses the PCI Express bus standard or the USB 2.0 standard |
|
Definition
|
|
Term
When you first purchase a notebook, make sure you have a ____ CD containing the installed OS so you can recover from a failed hard drive. |
|
Definition
|
|
Term
For tablet PCs, the stylus can be controlled from the ____ box. |
|
Definition
|
|
Term
The brightness is a function of the ____ component of the LCD panel. |
|
Definition
|
|
Term
A(n) ____ is an electrical device that changes DC to AC. |
|
Definition
|
|
Term
A ____ station provides the same functions as a port replicator, but provides additional slots for adding secondary storage devices and expansion cards |
|
Definition
|
|
Term
A mouse, graphics tablet, or other input device is likely to use a(n) ____ port |
|
Definition
|
|
Term
A tablet PC has more features than a notebook, including a touch screen that also allows you to handwrite on it with a stylus. |
|
Definition
|
|
Term
____ printers use wax-based ink that is heated by heat pins that melt the ink onto paper. The print head containing these heat pins is as wide as the paper. |
|
Definition
|
|
Term
____ printers tend to smudge on inexpensive paper, and they are slower than laser printers. |
|
Definition
|
|
Term
A(n) ____ printer uses solid dyes embedded on different transparent films. |
|
Definition
|
|
Term
____ is a language used to communicate how a page is to print and was developed by Adobe Systems |
|
Definition
|
|
Term
Check ____ for recorded events that have to do with the printer or the port it is using. |
|
Definition
|
|
Term
A printer ____ page generally prints some text, some graphics, and some information about the printer, such as the printer resolution and how much memory is installed |
|
Definition
|
|
Term
Routine printer maintenance procedures are generally the same from manufacturer to manufacturer and printer to printer |
|
Definition
|
|
Term
A laser printer can produce better-quality printouts than a dot matrix printer, even when printing at the same dpi, because it can vary the size of the dots it prints, creating a sharp, clear image using a technology called ____. |
|
Definition
|
|
Term
A ____ printer connects directly to a computer by way of a USB port, parallel port, serial port, wireless connection (Bluetooth, infrared, or Wi-Fi), IEEE 1394 (FireWire) port, SCSI port, PC Card, or ExpressCard connection |
|
Definition
|
|
Term
When cleaning a printer, to prevent the inkjet nozzles from drying out, don’t leave the ink cartridges out of their cradle for longer than ____ minutes |
|
Definition
|
|
Term
Automatically printing on both sides of the page is called ____ printing |
|
Definition
|
|
Term
A dedicated device or computer called a print ____ can control several printers connected to a network. |
|
Definition
|
|
Term
To know the IP address of a network printer, direct the printer to print a ____ page. |
|
Definition
|
|
Term
Printer ____ is updated by replacing the printer’s DIMM that contains the code or by downloading the update from the manufacturer’s Web site. |
|
Definition
|
|
Term
If you can afford it, the best practice is to purchase one machine for one purpose, instead of bundling many functions into a single machine |
|
Definition
|
|
Term
____ printers work by placing toner on an electrically charged rotating drum and then depositing the toner on paper as the paper moves through the system at the same speed the drum is turning. |
|
Definition
|
|
Term
If loose toner comes out with your printout, the fuser is not reaching the proper temperature and professional service is required. |
|
Definition
|
|
Term
If symbols or other special characters don’t print correctly on a laser printer, try using ____ printing rather than asking the printer to interpret the characters |
|
Definition
|
|
Term
Several print jobs can accumulate in the queue, which you can view in the Vista Printers window or the XP Printers and Faxes window in a process called ____. |
|
Definition
|
|
Term
Manufacturers of high-end printers provide ____ kits, which include specific printer components, step-by-step instructions for performing maintenance, and any special tools or equipment you need to do maintenance. |
|
Definition
|
|