Term
| Reverting to a ____ point can solve problems with registry entries the application uses that have become corrupted. |
|
Definition
|
|
Term
| When you see the Microsoft progress bar appear, you know the ____, including all critical services and drivers, has loaded. |
|
Definition
|
|
Term
| For essential hardware devices, use the ____ to verify and replace system files. |
|
Definition
|
|
Term
| If you have a laptop or a brand-name computer such as a Gateway, Dell, or IBM, most likely the manufacturer has set up a ____ on the hard drive that can be used to recover the Windows installation. |
|
Definition
|
|
Term
| If the system is caught in an endless loop of restarts, boot into ____. |
|
Definition
|
|
Term
| During a reinstallation, Vista setup will move all folders of the old installation into the ____ folder. |
|
Definition
|
|
Term
| If you can identify the approximate date the error started and that date is in the recent past, use ____. |
|
Definition
|
|
Term
| Use the ____ tool to test memory |
|
Definition
|
|
Term
| Check ____ to verify that a device is enabled and Windows thinks the device should be working. |
|
Definition
|
|
Term
| If you can boot to the Windows desktop when using a Windows 2000/XP boot disk, you can assume that the boot files in the root directory of drive C are missing or corrupted. |
|
Definition
|
|
Term
| For a laptop or other brand-name computer, don’t forget to reinstall Windows using recovery CDs provided by ____. |
|
Definition
| the computer manufacturer |
|
|
Term
| To uninstall a program, in Device Manager ____ the device and select Uninstall. |
|
Definition
|
|
Term
| After you boot into Safe Mode, you can use the ____ commands to verify system files and clean the hard drive. |
|
Definition
|
|
Term
| As you work to solve a Windows problem, always choose the method that makes the most changes to the system as possible in order to rejuvenate the machine. |
|
Definition
|
|
Term
| The error ____ is caused by a driver or service making an illegal access to memory. |
|
Definition
| op 0x0A or IRQL_NOT_LESS_OR_EQUAL |
|
|
Term
| Errors or warnings in Device Manager are displayed as a ____. |
|
Definition
| yellow triangle or question mark |
|
|
Term
| The key that loads services and drivers can be found in the ____ location |
|
Definition
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services |
|
|
Term
| Sometimes a Windows update solves a problem with a hardware device. |
|
Definition
|
|
Term
| The command ____ searches for and replaces corrupted system files. |
|
Definition
|
|
Term
| The ____ Configuration is updated after you log on normally to Vista |
|
Definition
|
|
Term
| When connecting to a private and secured wireless access point, you must provide the information that proves you have the right to use the network. |
|
Definition
|
|
Term
| Delays in network transmissions are called ____. |
|
Definition
|
|
Term
| The ____ command can display TCP/IP configuration information and refresh the IP address. |
|
Definition
|
|
Term
| A ____ is a device that manages traffic between two networks |
|
Definition
|
|
Term
| The three main protocols for encryption for 802.11 wireless networks are ____. |
|
Definition
|
|
Term
| All wireless phone systems, including cellular, use ____ transmission, which means both people in a conversation can talk or transmit at the same time. |
|
Definition
|
|
Term
| The IP addresses available to the Internet are called ____ IP addresses. |
|
Definition
|
|
Term
| Wireless networks are either public, unsecured hotspots or private, secured hotspots. |
|
Definition
|
|
Term
| The solution for securing private data traveling over a public network is a ____. |
|
Definition
|
|
Term
| The ____ command tests connectivity by sending an echo request to a remote computer |
|
Definition
|
|
Term
| To connect to the Internet, a network first connects to an ____. |
|
Definition
| Internet Service Provider |
|
|
Term
| When connecting to a network, by default Windows assumes static IP addressing and automatically configures the network connection |
|
Definition
|
|
Term
| A(n) ____ is a group of four dotted decimal numbers such as 255.255.0.0 that tells TCP/IP if a computer’s IP address is on the same or a different network |
|
Definition
|
|
Term
| The ____ for a cellular network is a fixed transceiver and antenna. |
|
Definition
|
|
Term
| A(n) ____ is a 32-bit string used to identify a computer on a network |
|
Definition
|
|
Term
| A ____ IP address is assigned for the current connection only. |
|
Definition
|
|
Term
| A____ application means one computer (the remote computer) is running the Telnet server and another computer (the local computer) runs the Telnet client. |
|
Definition
|
|
Term
| To use ____, you can create user accounts using the Control Panel. |
|
Definition
|
|
Term
| For almost all networks today, including the Internet, the communication protocol used is called ____. |
|
Definition
|
|
Term
| ____ is a standard for short-range wireless communication and data synchronization between devices. |
|
Definition
|
|
Term
| Wireless networks are either public, unsecured hotspots or private, secured hotspots |
|
Definition
|
|
Term
| ____ technology uses a dedicated line from your ISP to your place of business or residence. |
|
Definition
|
|
Term
| ____ is the most popular cabling method for local networks |
|
Definition
|
|
Term
| When connecting to a private and secured wireless access point, you must provide the information that proves you have the right to use the network |
|
Definition
|
|
Term
| An on-demand broadband connection that is not always up requires that a user name and password be authenticated at the ISP each time you make the connection. |
|
Definition
|
|
Term
| ny software vendors use FTP sites for downloading software to their customers |
|
Definition
|
|
Term
| In order to activate your service, the cable company must know the ____ of the cable modem you have installed |
|
Definition
|
|
Term
| Most broadband connections today are always up and use ____ IP addressing. |
|
Definition
|
|
Term
| The logon for an on-demand broadband connection is managed by a protocol called ____. |
|
Definition
|
|
Term
| Port ____ opens a port when a PC on the network initiates communication through another port |
|
Definition
|
|
Term
| For port forwarding to work, the computer on your network must have a ____ IP Address. |
|
Definition
|
|
Term
| ____ is essential to keep others from hacking into your wireless data and to prevent unauthorized use of your wireless LAN. |
|
Definition
|
|
Term
| When supporting and troubleshooting small networks, you’ll need to use ____ to test the physical connections of the network |
|
Definition
|
|
Term
| To find out what your DNS server knows about the domain name www.microsoft.com, use the ____ command. |
|
Definition
|
|
Term
| A(n) ____ lookup is when you use the Nslookup command to find the host name when you know a computer’s IP address. |
|
Definition
|
|
Term
| Remote ____ gives a user access to his or her Windows desktop from anywhere on the Internet. |
|
Definition
|
|
Term
| To prepare a computer to serve up Remote Desktop, you need to configure the computer for ____ IP addressing |
|
Definition
|
|
Term
| Remote ____ can help you support users and their computers from a distance |
|
Definition
|
|
Term
| A log file is kept of every Remote Assistance session in the ____ folder. |
|
Definition
| C:\Users\username\Documents\Remote Assistance Logs |
|
|
Term
| Networking happens in ____. |
|
Definition
|
|
Term
| To disconnect a mapped network drive, use the ____ command. |
|
Definition
|
|
Term
| The command to flush the DNS cache kept on the computer is ____. |
|
Definition
|
|
Term
| If you have a problem with connecting to a secured Web site from a corporate network, you might be using the wrong ____ server on the network. |
|
Definition
|
|
Term
| When setting up a VoIP system, know that each digital phone or ATA must be programmed with a phone number from the ____. |
|
Definition
|
|
Term
| A network ____ map is one of the most powerful and versatile methods of communicating over a network. |
|
Definition
|
|
Term
| (n)____ password means it is not easy to guess by both humans and computer programs designed to hack passwords. |
|
Definition
|
|
Term
| (n) ____ account has complete access to the system and can make changes that affect the security of the system and other users |
|
Definition
|
|
Term
| Folders and files stored on a workstation or server that contain user data need to be classified as to the ____ assigned to the data. |
|
Definition
|
|
Term
| Most encryption software products use a method called ____. |
|
Definition
|
|
Term
| ____ is assigned by a Certification Authority, and is used to prove you are who you say you are |
|
Definition
|
|
Term
| A ____ virus is a combination of a boot sector virus and a file virus and can hide in either |
|
Definition
|
|
Term
| A ____ virus can hide in either of two boot areas of a hard drive |
|
Definition
|
|
Term
| A ____ is made of several words with spaces allowed |
|
Definition
|
|
Term
| ____ is any annoying and unwanted program that might or might not mean you harm. |
|
Definition
|
|
Term
| A(n) ____ account has read-write access only on its own folders, read-only access to most system folders, and no access to other users’ data |
|
Definition
|
|
Term
| Generally speaking, the weakest link in setting up security in a computer environment is ____. |
|
Definition
|
|
Term
| Internet Explorer includes the pop-up blocker, the ability to manage add-ons, the ability to block scripts and disable scripts embedded in Web pages, and the ability to set the general security level |
|
Definition
|
|
Term
| A ____ is a small program contained in a document that can be automatically executed either when the document is first loaded or later by pressing a key combination |
|
Definition
|
|
Term
| For the health care industry, the ____ includes regulations to secure patient data that apply to all health care companies and professionals |
|
Definition
|
|
Term
| A Trojan sometimes installs a ____ in the system, which is a hidden way to allow malware to reach the system in secret even after the Trojan has been removed. |
|
Definition
|
|
Term
| In the computer arena, ____ is the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer |
|
Definition
|
|
Term
| Because of the problem of losing encrypted data and Internet passwords when a user password is reset, each new user should create a password ____ disk for use in the event the user forgets the password. |
|
Definition
|
|
Term
| As a defensive and offensive measure to protect against malicious software, install and run ____ software and keep it current. |
|
Definition
|
|
Term
| Don’t use the same password on more than one system (computer, network, or application). |
|
Definition
|
|
Term
| Don’t use the same password on more than one system (computer, network, or application). |
|
Definition
|
|
Term
| The ____ command can be used to encrypt, decrypt, or recover an encrypted file when the certificates are lost |
|
Definition
|
|
Term
| If you cannot access an encrypted file because the certificate is corrupted and there are no backup certificates, you might be able to recover the file using a(n) ____ certificate. |
|
Definition
|
|
Term
| When you share folders on the network, the ____ permissions for remote users need to be set |
|
Definition
|
|
Term
| Certificates are managed using the ____ console |
|
Definition
|
|
Term
| It is necessary that all computers belong to the same workgroup in order to share resources |
|
Definition
|
|
Term
| The term ____ applies to a kit or set of tools used originally on UNIX computers |
|
Definition
|
|
Term
| The best way to change inherited permissions is to change the permissions of the ____. |
|
Definition
|
|
Term
| Use ____ to search for malware processes, especially those that mask themselves as core Windows processes and elude AV software |
|
Definition
|
|
Term
| Many notebook computers have a chip on the motherboard called the ____. |
|
Definition
|
|
Term
| Permissions manually set for a subfolder or file cannot override inherited permissions. |
|
Definition
|
|
Term
| A $ at the end of the folder name creates a(n) ____ share. |
|
Definition
|
|
Term
| If an infected computer will not boot, it might be that the boot sectors of the hard drive are infected or damaged or the BIOS code might be corrupted |
|
Definition
|
|
Term
| For a stand-alone computer that is not part of a Windows domain, the EFS encrypting process generates a ____ digital certificate to be used for the encryption. |
|
Definition
|
|
Term
| To know for sure exactly which permissions for a file or folder are in effect, see the ____ tab of the Advanced Security Settings box. |
|
Definition
|
|
Term
| To know for sure exactly which permissions for a file or folder are in effect, see the ____ tab of the Advanced Security Settings box. |
|
Definition
|
|
Term
| ____ on a motherboard offers security features including power-on passwords, support for intrusion-detection devices, and support for a TPM chip |
|
Definition
|
|
Term
| When controlling access to data folders or files, permissions to these resources are assigned to individual user accounts or user groups |
|
Definition
|
|
Term
| Windows XP uses ____ file sharing by default, which means you have no control over who has access to a shared folder or file |
|
Definition
|
|
Term
| A(n) ____ computer is not allowed to use the network, is put on a different network dedicated to them, or is only allowed to access certain network resources |
|
Definition
|
|
Term
| To see a list of services managed by Svchost, enter this command in a command-prompt window: ____. |
|
Definition
|
|
Term
| ____ cards include one or more variations of PC Card, CardBus, and ExpressCard. |
|
Definition
|
|
Term
| A MicroDIMM that contains DDR SDRAM has ____ pins. |
|
Definition
|
|
Term
| A(n) ____ is about the size of a credit card, but thicker. |
|
Definition
|
|
Term
| In a notebook, replacing the motherboard probably means you’ll need to fully disassemble the entire notebook except the LCD assembly. |
|
Definition
|
|
Term
| Most notebook manufacturers provide ____ software that can help you test components to determine which component needs replacing. |
|
Definition
|
|
Term
| Notebook computer cases tend to be similar to one another, and components in notebook systems tend to be interchangeable among manufacturers. |
|
Definition
|
|
Term
| IBM and Lenovo ThinkPad notebooks use a unique and popular pointing device embedded in the keyboard called a ____ or point stick. |
|
Definition
|
|
Term
| Use the ____ box to adjust pointer speed, mouse trails, pointer size, how the touch pad buttons work, and other settings for pointing devices. |
|
Definition
|
|
Term
| To substitute an internal device with an external device, first go into ____ setup and disable the internal device. |
|
Definition
|
|
Term
| A notebook drive is ____ inches wide. |
|
Definition
|
|
Term
| You can adjust the way the touch pad or works on a laptop using the ____ box. |
|
Definition
|
|
Term
| In ____ sleep, all work is saved to the hard drive, but the system still maintains a trickle of power. |
|
Definition
|
|
Term
| The latest PCMCIA standard is ____, which uses the PCI Express bus standard or the USB 2.0 standard |
|
Definition
|
|
Term
| When you first purchase a notebook, make sure you have a ____ CD containing the installed OS so you can recover from a failed hard drive. |
|
Definition
|
|
Term
| For tablet PCs, the stylus can be controlled from the ____ box. |
|
Definition
|
|
Term
| The brightness is a function of the ____ component of the LCD panel. |
|
Definition
|
|
Term
| A(n) ____ is an electrical device that changes DC to AC. |
|
Definition
|
|
Term
| A ____ station provides the same functions as a port replicator, but provides additional slots for adding secondary storage devices and expansion cards |
|
Definition
|
|
Term
| A mouse, graphics tablet, or other input device is likely to use a(n) ____ port |
|
Definition
|
|
Term
| A tablet PC has more features than a notebook, including a touch screen that also allows you to handwrite on it with a stylus. |
|
Definition
|
|
Term
| ____ printers use wax-based ink that is heated by heat pins that melt the ink onto paper. The print head containing these heat pins is as wide as the paper. |
|
Definition
|
|
Term
| ____ printers tend to smudge on inexpensive paper, and they are slower than laser printers. |
|
Definition
|
|
Term
| A(n) ____ printer uses solid dyes embedded on different transparent films. |
|
Definition
|
|
Term
| ____ is a language used to communicate how a page is to print and was developed by Adobe Systems |
|
Definition
|
|
Term
| Check ____ for recorded events that have to do with the printer or the port it is using. |
|
Definition
|
|
Term
| A printer ____ page generally prints some text, some graphics, and some information about the printer, such as the printer resolution and how much memory is installed |
|
Definition
|
|
Term
| Routine printer maintenance procedures are generally the same from manufacturer to manufacturer and printer to printer |
|
Definition
|
|
Term
| A laser printer can produce better-quality printouts than a dot matrix printer, even when printing at the same dpi, because it can vary the size of the dots it prints, creating a sharp, clear image using a technology called ____. |
|
Definition
|
|
Term
| A ____ printer connects directly to a computer by way of a USB port, parallel port, serial port, wireless connection (Bluetooth, infrared, or Wi-Fi), IEEE 1394 (FireWire) port, SCSI port, PC Card, or ExpressCard connection |
|
Definition
|
|
Term
| When cleaning a printer, to prevent the inkjet nozzles from drying out, don’t leave the ink cartridges out of their cradle for longer than ____ minutes |
|
Definition
|
|
Term
| Automatically printing on both sides of the page is called ____ printing |
|
Definition
|
|
Term
| A dedicated device or computer called a print ____ can control several printers connected to a network. |
|
Definition
|
|
Term
| To know the IP address of a network printer, direct the printer to print a ____ page. |
|
Definition
|
|
Term
| Printer ____ is updated by replacing the printer’s DIMM that contains the code or by downloading the update from the manufacturer’s Web site. |
|
Definition
|
|
Term
| If you can afford it, the best practice is to purchase one machine for one purpose, instead of bundling many functions into a single machine |
|
Definition
|
|
Term
| ____ printers work by placing toner on an electrically charged rotating drum and then depositing the toner on paper as the paper moves through the system at the same speed the drum is turning. |
|
Definition
|
|
Term
| If loose toner comes out with your printout, the fuser is not reaching the proper temperature and professional service is required. |
|
Definition
|
|
Term
| If symbols or other special characters don’t print correctly on a laser printer, try using ____ printing rather than asking the printer to interpret the characters |
|
Definition
|
|
Term
| Several print jobs can accumulate in the queue, which you can view in the Vista Printers window or the XP Printers and Faxes window in a process called ____. |
|
Definition
|
|
Term
| Manufacturers of high-end printers provide ____ kits, which include specific printer components, step-by-step instructions for performing maintenance, and any special tools or equipment you need to do maintenance. |
|
Definition
|
|