Hardware & Software

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Actions one might take as part of the Six-Step Troubleshooting Process...

-Asking the person who experienced the problem what they were doing on the computer when the problem occurred. -Send an e-mail, copying yourself, that recaps the problem(s) and solution(s), including what the user can do to potentially prevent it from reoccurring. -Backing up the data on the computer before re-installing an application or operating system. -Asking the person who experienced the problem to replicate the steps they performed originally as part of gathering additional information to diagnose the problem. -Having the person who experienced the problem perform the same steps they originally did to make sure the solution implemented really does work.

Some typical symptoms of viruses are...(3)

-Computer restarts or crashes frequently. -You receive strange error messages -Computer runs slower than usual

Which user/tech specialist behavior could pose an increased risk to computer security and should almost always be avoided?

-Not installing operating system updates on a regular basis -Surfing the Internet without anti-virus protection. -Falling for fake error messages (often occurring when opening a suspicious web site) -Installing unsigned drivers -Installing free software (this does not include software that is included with a hardware purchase) -Opening e-mail attachments without verifying the sender actually sent the attachment. -Not updating virus definition files -Inserting a USB drive (including an external hard drive) that comes from a source that is not verified

A virus is code that runs on a computer without the user's knowledge, and do perform all kinds of malicious activity. A virus often attaches itself to various types of files that are shared, to then infect other computers. Which of the following are ways viruses might infect your computer?

-Office documents like a Microsoft Word file -Freeware and shareware executable programs downloaded from the web -On the boot sector of a hard drive. -An executable email attachment

Error Screen (4 things to know)

1) Is one of the reasons backing up data on a regular basis is important to reduce the chances of losing your work 2) Correct Requires that the computer be re-booted 3) Correct Installing new hardware or software can cause this screen to appear "all of a sudden." 4) Correct Has been nicknamed the "Blue Screen of Death" (BSOD)

You have just received a new set of computers for your school. You turn them on for the first time and let the operating system (Mac or Windows) go through its self-configuration routine(s). The computers are now ready for use. Or...are they? In what order should the following tasks be completed to get a good balance of security and efficiency?

1. Activate the operating system's firewall software or ensure a third-party firewall software is installed and activated. 2. Connect to the wireless or wired network to make sure it can access the Internet. 3. Install necessary application software (i.e. Word, Excel, Grademinder, etc.). 4. Turn on antivirus software. 5. Allow students to try using the computers. - Antivirus software can sometimes interfere with software installation. For this reason, it may be more efficient to turn it on after trusted applications have been installed. - Installing software from physical media, like a DVD, can be slow and time consuming. It is often more efficient to install using files available on a server over the network. - Firewire software is unlikely to interfere with any installation, and should probably be done very early.

How many devices can you connect to the typical USB port?

127

Pop-up Blocker

A feature that prevents Web pages from opening additional windows automatically.

AutoComplete

A feature that remembers your typing in text boxes and helps with retyping by suggesting content.

Certificates

A feature that verifies the publisher of Web content and verifies that the content hasn't been tampered with since it was published.

peer-to-peer description

A network consisting of multiple devices where no one device has control over the network. The most common example of this is a "SOHO" network. Given its size and typical uses, it requires a relatively limited set of security management tools.

Your monitor is displaying a dark pink color. What could be the problem?

A pin is bent on the video cable connector. *If all pins are not connecting to the video port correctly, you will not see all three RGB (Red/Green/Blue) colors that monitors use to display.

History

A record of the Web sites visited, in reverse chronological order (newest to oldest).

Content Advisor

A screening utility that blocks pages that might contain objectionable content.

When someone uses the term "802.11" it refers to...

A set of standard related to wireless technologies.

IP definition

A set of standards established to maintain consistency on how computers will be linked to the Internet. The most common use of these standards is how each network-enabled device (computers, printers, smartphones, etc.) is given a network address.

Which of the following is the best definition of a "signed driver?"

A signed driver is a driver that is tested by Microsoft to ensure that it won't corrupt the operating system when installed.

IP Address

A string of numbers (called "octets") that identify a computer or other network-accessible device on a network (internal network or Internet). It is akin to the address of a home or business.

LAN definition

A term used to describe multiple network-enabled devices (computers, printers, smartphones, etc.) connected together. Typically, this term refers to situations where these devices are located relatively close in proximity.

WEP definition

A type of security used with wireless networking; specifically the security that exists between the user's device and the Wireless Access Point (WAP or AP). While not the most robust security method, it is still an effective "first line of defense" in securing the data being transmitted and received between the two devices. Its relative ease of configuring makes it a practical means of "throwing together" a wireless network at a moment's notice.

You want to wirelessly share a broadband internet connection in your home. You subscribe to a service, purchase a cable modem and put wireless adapters into all the machines in your house. What do you still need?

Access point *Without a wireless access point, there is no "point" at which the "wireless" device can "access" the network. Without a wireless access point, there is no "point" at which the "wireless" device can "access" the network.

Static Address

An address assigned to a computer or other network-accessible device that does not change each time the computer is restarted.

Joe Teacher calls and complains that his computer is "not working at all today." What would be the first response on your part?

Ask what he means by "not working at all"

A computer in the lab refuses to connect to the network, stating that the network cannot be found. You notice that the NIC (Network Interface Card) status lights are not lit or flashing. You connect a different cable to the network port on the computer. What would your next step be?

Attempt to establish a connection to the network through the appropriate network software system settings, again observing the NIC status lights. *However, it should be noted not all computers have status lights where you plug an Ethernet cord. So, you may not be able to rely on status lights all the time.

Which of the following is the verification of a person's identity?

Authentication

The letters "BSOD" stand for...

Blue Screen of Death - A term used to describe a system that cannot be recovered without completely restarting the computer

Which is NOT an input device?

CPU - central processing unit

You are unable to download the desired software from the Internet and suspect your network connection. Which of the following would NOT help you to ascertain the problem?

Check the power supply

A _______ is a common graphical representation of the Internet.

Cloud

An electronics store ad has a sale on 21-inch monitors. Exactly what dimension is that a measure of?

Diagonal length

You have decided to do away with a few applications and their respective data that you haven't used in a while to free up some free space on your hard disk on your Windows PC system. After completing this task, it is advisable to execute which of the following programs before you begin to use the HDD to store data further?

Disk defragmenter

ActiveX controls

Downloaded applets that provide enhanced functionality and interactivity on some Web sites.

The principal has a set of files with sensitive personal information on her computer. You tell her she should use file __________ to make sure those files cannot be opened by someone without the appropriate password.

Encryption

Which of these printer interfaces are "hot-pluggable" (able to be plugged in while the computer is on and configurable without damaging the components)?

Ethernet USB FireWire

A typical phone cable (RJ-11) is a suitable substitute for an Ethernet cable (RJ-45).

False

It is good practice to have multiple anti-virus software programs installed on a given machine. If one doesn't catch a virus, the other one will.

False

It is legal for schools / districts to provide teachers a personal copy of Microsoft Office to use at home without a proper license agreement.

False

User authentication is only useful when a computer is connected to a network.

False

You can still access the Internet if you boot up a PC in Safe Mode.

False

Emptying the Recycle Bin (on a Windows machine) permanently deletes all items in it, never to be retrieved no matter what is tried.

False - Although Microsoft states that emptying the Recycle Bin permanently deletes all items, it is not true. The deleted files will still be on the drive until the space they use is overwritten and using the right software the files can be retrieved.

It is safe to use household glass cleaner to clean your monitor as there are no harmful chemicals.

False - If the glass cleaner contains ammonia, it can damage the anti-glare coating.

It is good practice for the principal to have the passwords for all of his/her staff.

False - Passwords are used to authenticate the user performing functions on a given computer/network. That way, when there is a question of who made a change to official data, there is a clear audit trail.

You should remove the Memory Module before installing any other device.

False - You only need to remove Memory Modules if you are replacing them.

Suppose you want to scan a picture using your scanner and you are ready to save the file. What format is most suitable for using in web pages?

JPG

On many sound cards, external ports are color-coded. Match the most common color for each of the following: Line out, Surround sound speaker out, Microphone, Line In, Digital Out

Line out - Green Surround sound speaker out - Black Microphone - Red or pink Line In - Blue Digital Out - Yellow

What is the MOST LIKELY consequence of a sudden power outage?

Lost data

Which of the following is an example of an output device?

Monitor because it provides the user with the results of the inputs and processing of the computer.

ntbtlog.txt - nt means

Network Technology

What is the simplest method of testing a device?

Observe the device and check if it functions properly

The ntbtlog.txt file assists in troubleshooting _______.

Problems with the boot-up activities of a PC

Which type of memory cannot be written to during normal operation of a computer (Apple and PC)?

ROM - read only memory

What is the first step in installing a device on any computer?

Read the installation instructions

A teacher is having a problem with the network. She cannot log on from her computer although the computer is fine. You log on from her workstation using her username and password. Everything works fine. What is most likely the problem?

She is entering the username and password incorrectly.

Cookies

Small text files stored on the hard drive to remember settings for re-visits to Web sites.

Mary installed a new sound card and speakers; however, she cannot get any sound from the speakers. What could the problem be? 4 options.

Speaker power is not plugged in Sound card driver is not installed Sound card is plugged into the wrong slot Speaker connector is in the wrong jack.

A program that secretly tracks user activity including web sites visited to even keystrokes, is known as __________.

Spyware

How can a tech specialist reduce the introduction of viruses and other malware on your school's computers while still allowing the computers to be used in practical educational ways?

Students and teachers in general should not be allowed to install software on school computers without the knowledge and permission of the school's tech staff. pg. 475-483

HTTPS definition

The "S" at the end of this protocol is an indicator that data is being transmitted "S"ecurely on the Internet. It is most commonly used when we make purchases online and want to transmit sensitive information like credit card numbers without the risk of having a hacker "lurking" in on the transmission of that data. This protocol is displayed on secure web pages and appears prior to the actual web address (URL).

DNS Address

The address of the computer/server that converts domain names into numeric IP addresses. Example: converts www.bestbuy.com to 69.22.138.122.

Gateway Address

The address of the server that allows access to the Internet.

Internet description

The most commonly used wide area network (WAN)

DNS definition

These servers function as translators between the address we typically type into a web browser's URL/Address box and the addressing protocol used on the Internet. Without these types of servers, the Web would not nearly be as popular, especially by commercial entities since it would make remembering website addresses more difficult, if not downright impossible.

Someone on staff wants to install hardware on her computer. Assuming you have vetted the device for compatibility and security against attack from hackers, which tool would you use to give her the permissions to add hardware to the system?

To allow her to install hardware you need to give her the Load and Unload Device Drivers right found in the Local Security Policy of the system.

"Strong passwords" is a term used to describe the strength of its protection against others guessing the password.

True

It is important to keep the vents clear of debris and objects that could block proper ventilation, otherwise the Central Processing Unit (CPU) could over heat.

True

It is possible for a tech specialist/director to limit an end user's ability to add hardware or software to a Windows PC, whether or not it is connected to the network.

True

SCSI (pronounced "Scuzzy") is a set of communication standards often used for connecting devices like a hard disk drive.

True

The Windows Device Manager and the Mac System Profiler are tools to troubleshoot system problems.

True

One advantage of a DHCP server is it can eliminate the need for a tech coordinator to keep an inventory of IP addresses used so no two computers will be configured with the same IP address.

True - Actually, this is one of the most practical benefits of a DHCP server. Otherwise, imagine a time when tech coordinators had to manually configure each computer with a static IP address and either keep meticulous records on each computer's IP address or operate on hope that no two computers would get the same address, causing a "collision." It wasn't pretty when it happened.

Microsoft recommends that peer-to-peer networks have no more than 10 computers connected to it.

True - More than 10 computers on a peer-to-peer network, and users will notice a very significant degradation in performance.

A computer lab has been upgraded to the newest operating system version. Even if the operating system does not flag any components or software as incompatible, it is good practice to test all applications and devices for proper functionality.

True - There's almost no such thing as too much testing.

You've been called in to replace a CD-ROM drive for the school's library. The librarian asks you to also install a piece of software, "while you're at it." Select the most appropriate response to that request.

Verify that the software is properly licensed to the school or district and be sure the librarian understands the terms of the license. Furthermore, make sure it is cataloged in a central location (perhaps use the district's library circulation system for that ???). Consider maintaining a printed or online guide for authorized software and Internet usage. Refer to these guides to ensure that you are respecting the policies of the building/district. Furthermore, consider documenting all changes made to a computer, including the license code(s) used when installing software.

Temporary Internet files

Web pages cached on the hard drive so that the page can be more quickly redisplayed when revisited.

Offline content

Web pages cached on the hard drive so that the page can be redisplayed even when the Internet isn't available.

You have moved your computer, using an optical mouse, to a new glass top table. Now the mouse stops responding, but you do not see any related error messages either during boot up or in the device manager. What is the likely cause for the problem?

You need a mouse pad.

TCP/IP properties - Which command would you type on a Windows PC to determine if the server that allows access out to the Internet is running?

ping 131.107.1.254


Kaugnay na mga set ng pag-aaral

Java 8 Programming I - Chapter 3

View Set

Chapter 5: Evaluating Research Review

View Set

Sir Gawain and the Green Knight Parts 3 Study Guide

View Set

Chem152: Chapter 6, Thermodynamics (& Chapter 9.10 Bond Energies and Lengths)

View Set

history final multiple choice and t/f

View Set

Chapter 28: Nursing Management: Patients With Urinary Disorders

View Set