Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
100 Cards in this Set
- Front
- Back
Define an AFSC
|
1
|
|
What are the 5 componenets that make up an AFSC
|
1
|
|
Name three types of AFSC identifiers
|
1
|
|
What does teh AFSC identify?
|
1
|
|
What is the control AFSC used for?
|
1
|
|
Name the three AFSC modifiers
|
1
|
|
When should you be enrolled in your CDC course?
|
1
|
|
How long are retrainees placed in upgrade training before recieving a 5-skill level?
|
1
|
|
What is an AFJQS
|
1
|
|
What is an AFQTP?
|
1
|
|
When should you first be interviewed by the unit training manager?
|
1
|
|
Historically, whom did 3C wartime support responsibility belong?
|
1
|
|
What do deployable comm capabilities require of CIS equipment?
|
1
|
|
What is our role in joint and combined force opereations?
|
1
|
|
State a few differences between DSA and CSA
|
1
|
|
Which AFSC is responsible for loading software programs, files, and databases on to network servers and who also respond to trouble calls and console messages?
|
1
|
|
Which AFSC is responsible for configuring antennas and radio equipment for efficient field operations, while establishing and maintaining communications links with distant stations?
|
1
|
|
Which AFSC is responsible for coordinating plans for aquiring, funding, testing, and certifying new communications systems?
|
1
|
|
What are the requirements for obtaining a 3C 5-skill level?
|
1
|
|
Name three OJT components
|
1
|
|
What are the several types of training used in UGT and QT
|
1
|
|
What is an AF Form 623 used for?
|
1
|
|
name three basic military responsibilities that we must adhere to
|
1
|
|
What do AFOSH standards adhere to?
|
1
|
|
What must you do if you believe a safety hazard exists in your work area?
|
1
|
|
How does the AF obtain the AFOSH goal of minimizing incidences of chemically
|
1
|
|
What is ionizing radiation(radioactivity)?
|
1
|
|
With whoom would you coordinate the disposal of hazardous waste?
|
1
|
|
State six basic guid,ines for safety observers
|
1
|
|
Define ORM
|
1
|
|
Name the four principles that govern all actions associated with the ORM
|
1
|
|
What hazards do a noise area with above 85dB create?
|
1
|
|
What should you consider when cleaning raised computer room floors?
|
1
|
|
Where should emergency control switches be installed in data processing rooms; what should they disconnect/
|
1
|
|
how are electrostatic charges generated?
|
1
|
|
When handling computer memory chips, what can you do to reduce electrosttic hazrds?
|
2
|
|
State three classes of ESD
|
1
|
|
What strong preventative measures can you take against ESDs?
|
1
|
|
How do you best describe a bit? What is it equal to?
|
1
|
|
What is a byte? What does it consist of?
|
1
|
|
What is a word? What does it consist of?
|
1
|
|
How can you best describe a segment of memory?
|
1
|
|
Describe the ASCII coding system
|
1
|
|
How can you best describe a radix? What does it indicate?
|
1
|
|
What is an exponent? What does it indicate?
|
1
|
|
Explain the differece between MSD and LSD
|
1
|
|
State the purpose of a fractional point
|
1
|
|
Define a network
|
1
|
|
What is a node?
|
1
|
|
What are network interfaces?
|
1
|
|
Define packet switching
|
1
|
|
What is the difference between a hub and a switch?
|
1
|
|
State two functions of a router
|
1
|
|
How does a LAN differ from a MAN/
|
1
|
|
Define physical topology
|
1
|
|
What is a major disavantage of the star topology?
|
1
|
|
How is a dual-counter ring topology configured?
|
1
|
|
How must ends of a Bus cable be configured/
|
1
|
|
How is data transmitted in a logical bus topplogy?
|
1
|
|
State a major difference between the logical bus and logical ring topologies?
|
1
|
|
Why was the OSI model developed and what does it describe/
|
1
|
|
What are protocols and standards?
|
1
|
|
State the seven layers of the OSI model
|
1
|
|
What functions are of primary concern of the upper and lower layers of the OSI model?
|
1
|
|
List the two sublayers of the Data link layer and describe their responsibilities
|
1
|
|
What are the session layer responsibilities and for what was it primarily designed to fo?
|
1
|
|
What are defacto standards and dejure standards?
|
1
|
|
Define proprietary standards
|
1
|
|
Define protocol suite
|
1
|
|
What is a protocol stack?
|
1
|
|
What does ISO consist of and which member represents the US?
|
1
|
|
What does IANA stand for and what does it control>
|
1
|
|
What are the development goals of TCP/IP suite?
|
1
|
|
What do IP addresses identify?
|
1
|
|
List the five classes of networks and describe their purposes
|
1
|
|
What is a computer port?
|
1
|
|
What is the difference between a serial and parallel port?
|
1
|
|
What were USB ports designed to do?
|
1
|
|
What is the most exploited port?
|
1
|
|
What is port 443 used for/
|
1
|
|
What is a software lisence?
|
1
|
|
Wat documetns represent legal proof of software ownership?
|
1
|
|
What do lisence management actions ensure?
|
1
|
|
What is the most common reason for installing new software?
|
1
|
|
What is the objective DOD Enterprise Software Initiative (ESI)?
|
1
|
|
Describe an operating system and explain what purpose it serves
|
1
|
|
List some general funtions an operating system performs
|
1
|
|
Describe an operational environment
|
1
|
|
What is the main difference between an operating system and an operating environment>
|
1
|
|
Defin a file and what part of it must be uniqui?
|
1
|
|
Define encryption and decryption?
|
1
|
|
What is a voip?
|
1
|
|
How does a voip differ from traditional phone ciruits?
|
1
|
|
State one advantage of using voip
|
1
|
|
What is IPV4
|
1
|
|
What problem has been created by the prolonged use of IPV4?
|
1
|
|
How does IPV6 alleviate the Internet address shortage problem?
|
1
|
|
When was the AF information operations doctrine finalized and published/
|
1
|
|
According tot he AF operations doctrine, what are the two pillars of IO?
|
1
|
|
What are the AF network operating instructions (AFNOIS) and how do they differ from AF instructions?
|
1
|