Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
126 Cards in this Set
- Front
- Back
PACKETS
|
ALL INFORMATION IS TRANSMITTED ACROSS THE PUBLIC INTERNET IN SMALL UNITS OF DATA CALLED PACKETS.
|
|
WHAT ARE THE 3 PIECES OF A PACKET
|
HEADER, PAYLOAD, TRAILER
|
|
HEADER
|
ADDRESS
|
|
PAYLOAD
|
THE MESSAGE
|
|
TRAILER
|
THE RETURN RECEIPT
|
|
BANDWIDTH
|
OFTEN USED SYNONYMOUSLY WITH SPEED
|
|
BIT
|
A SINGLE CHARACTER OF DATA, ALSO A BINARY DIGIT
|
|
BYTE
|
8 BITS, A LARGER AMOUNT OF DATA BUT STILL NOT VERY LARGE
|
|
Kilobit
|
roughly 1000 bits. many internet apps measure speed in kilobits
|
|
Megabit
|
rougly one million bits, this is smaller than a megabyte, but is common measurement for network bandwidth
|
|
Gigabit
|
Rougly one thousand megabits. this is the amount of data carried on very fast circuits owned by telecomm companies. they are often regional or backbone circuits
|
|
Gigabyte
|
roughly one thousand megabytes. gigabytes are common when talking about hard drive storage
|
|
private networks such as comcast can manage what
|
the transmission and arrival time of packets on their network much more efficiently than public internet networks can.
|
|
a public network has no system of
|
priority. it does not guarantee packet delivery timing.
|
|
TCP/IP
|
transmission control protocol/internet protocol
|
|
what ip address are reserved for the use on non routable networks and should never appear on the public internet
|
private ip
|
|
what type of ip address is visible to other people and devices
|
public ip
|
|
what ips are used routinely by some computers when they are configured to use IP, but do not have a static ip
|
auto config ip
|
|
what type of ip will allow a computer to establish or validate its ip using the ping command
|
loopback ip
|
|
dynamic ip
|
ip's are subject to change, sometimes frequently
|
|
static ip
|
should remain intact until changed manually
|
|
NAT
|
network address translation
|
|
DCHP
|
dynamic host configuration protocol
|
|
names for static ip address
|
manually reserved, dchp reserved
|
|
Types of IP addreses
|
dynamic IP, server assigned static IP, static IP
|
|
what is a MAC
|
unique number stored in the specific hardware used in a network, hexidecimal
|
|
what are some apps that require a static ip
|
VPN server, mail/web server, PoS terminal device, security cameras
|
|
what are static ip addresses mainly used for
|
business
|
|
169.254.x.x
|
this indicates that the dhcp client in your computer failed to contact a dhcp server on the network, and auto private ip addressing is enabled
|
|
192.168.x.x
|
this indicates that the user has a working connection to the cable modem, and that the cable modem is working, but is not in contact with the cable network.
|
|
missing or 0.0.0.0
|
the network interface is not operational
|
|
why would someone want a domain name
|
so they don't have to remember the ip address
|
|
definition of dns server
|
domain name server, names to numbers
|
|
how many root servers are there in the world
|
13
|
|
firewall
|
software/hardware used to prevent unauthorized access from a computer system or network of computer systems
|
|
what is LDAP
|
lightweight directory access protocol, enables users to locate people, orgs
|
|
what is IMAP4
|
internal mail access protocol v4 permits a client email program to access remote messages as if they were local
|
|
what is port
|
a location for passing data n and out of your computer
|
|
what is PAT
|
port address translation, PAT forwards requests for a particular IP port pair to another IP port pair.
|
|
what is SMTP
|
simple mail transfer protocol, an email protocol for sending messages between a mail clent and a server, as well as between servers.
|
|
what is POP3
|
Post Office Protocol v3, an email communication standard that allows users to download email from a server. most common configs dictate that messages will not be stored on the server.
|
|
what is an operating system
|
OS that manages software and hardware resources of a computer
|
|
what operating system does comcast currently support
|
Mac OS 10, windows 7, vista, xp, 2000
|
|
you can use either or for modem verification
|
serial # or mac address
|
|
what is a cold boot
|
the start up of a computer from a powered off state
|
|
what would you say to a customer if a device is not working
|
im sorry, cannot continue this install
|
|
there are three potential provisioning scenerios related to xfinity internet install in this system
|
top down, bottom up, self provisioning
|
|
what is easychange
|
powered by trueswitch, service that customers can use to transfer their email info to comcast email
|
|
what is the rule of three for xfinity internet
|
provide comcast.net email address and password and wite it down in the welcome kit, establish comcast.net as web browser home page, mention comcast.net benefits to get norton security
|
|
what term is used to described an external component of a computer that is attached to the computer, such as a printer, speaker, or web cam
|
peripheral device
|
|
what is the name for memory that provides a temp workspace while you use a computer
|
RAM, random access memory
|
|
what is the name of a program tha allows apps on a computer to control an internal or external device
|
a driver
|
|
space + visibility =
|
time
|
|
what is the component of a computer that contains the cpu, bios, memory, ports and connectors for attatching additional boards
|
motherboard
|
|
what is the 3-4 second rule
|
space between you and the vehicle in front of you
|
|
what is the name for a computer curcuit board that enables the computer to be connecte to a network when installed
|
NIC, network interface card
|
|
ISA is a standard bus architecture associated with IBM AT motherboard
|
PCI, peripheral component interconnect
|
|
rear tire rule
|
seeing the rear tires in front touching the ground
|
|
what is the name for a program that after initially being loaded into the computer by a boot program, manages all the other programs in the computer
|
operating system
|
|
where do you find the properly inflated tire PSI
|
the door jam
|
|
what is the name of the protocol used by internet service providers to assign IP addresses to their users when they log in
|
dynamic host configuration protocol (DHCP)
|
|
what are the two reasons for not wearing a seatbelt
|
i was only going a short distance, i forgot
|
|
what term is used to describe the brain of the computer
|
central processing unit, (CPU)
|
|
if the speed limit is 35, how fast should you go
|
35
|
|
what is the typical return path frequency range in MHz
|
5 to 42 MHz
|
|
a typical mid split system has a frequency range between
|
5 to 100 MHz
|
|
a typical high split system has a frequency range between
|
5 to 175 MHz
|
|
to troubleshoot the return path, you need two pieces of equipment, one is a signal generator, what is the other
|
signal level meter
|
|
what term refers to the ability to carry and individually select different channels on a single cable by their unique frequency
|
frequency division multiplexing (FDM)
|
|
what term is used to describe ingress caused by electromagnetic interference from items such as microwave ovens, hair dryers, and air conditioners
|
impuls noise
|
|
calculate the min signal level necessary for a proper return amplifier output if the amplifier input is 10 dBmV and the tap value is 26 dB
|
36 dBmV
|
|
what type of distortion is typically caused by amplified reflection
|
common path distortion
|
|
when you verify the return path drop continuity, you set the signal level output from the signal generator to what in order to provide an output similar to the cable modem
|
40
|
|
what is the formula for calculating total cable loss
|
total cable loss = footage x cable loss per foot
|
|
what is the name of the process that collects and associates customer equipment and account information to create and register their data account for xfinity internet services
|
provisioning
|
|
what voltage does the FVM detect voltage
|
50 volts
|
|
how do you approach the strand
|
underneath
|
|
at what slope should you have fall protection
|
4 feet rise, for 12 feet run
4/12 slope |
|
what is the most likely cause of the service problem when the modem's cable light is off and the power light is on
|
insufficient RF signal
|
|
according to OSHA, what types of shirts should we be using
|
cotton or woal
|
|
which server located in the head end provides customers with ip addresses
|
dhcp server
|
|
what is the first step you perform to troubleshoot a RF problem
|
inspect the existing drop, also accept: take signal readings at the tap and ground block
|
|
for many modems, the RF signal level range at the customer's terminal should between -5 and
|
+5 dBmV
|
|
what type of connector is used to connect a cable modem to a computer's network interface card port via an ethernet cable
|
RJ-45 connector
|
|
if none of the lights on a cable modem are lit, what are the possible causes
|
hardware failure or no power available
|
|
when a cable modm receives a good upstream and downstream connection, it is said to be
|
locked
|
|
if the computer and cable modem do not appear to be communicating, what should be checked first
|
check the physical connections of the hardware
|
|
how would you define home networking
|
ability to share stuff, one hard wired and up to 4 wireless computers
|
|
what type of customers would want comcats to network their home computers
|
not tech savvy, no time, no patience, insurance of liable customer service
|
|
what are some of the benefits of comcast home networking
|
shared internet access, shared printers, shared files, sync up wireless devices, protected data, parental control, all wireless
|
|
what is WEP
|
wired equivalency privacy, 64 bit, 128 bit
|
|
what is NAT
|
network address translation
|
|
abbreviation for wireless fidelity
|
wifi
|
|
what is WPA and WPA2
|
wifi protected access, higher level security that WEP
|
|
what types of adapaters are used for home networking
|
PC cards, USB adapters, PCI cards, Home Plug
|
|
what should the drop be checked for
|
proper bonding, connections, signal leakage, solid return path, workmanship
|
|
includes web site blocking, internet acces time limits and an activity log for the primary user to view parental control activity
|
parent control
|
|
allows customer to change the password to the customer interface
|
password setup
|
|
view the setup configurations for gateway, network, and wireless security
|
gateway settings and information
|
|
an area that is partically secured by the firewall. this feature automatically forwards all internet traffic to the computer the customer specifies and is commonly used for gaming and video conferencing
|
demilitarized zone (DMZ)
|
|
allows customer to regulate the network traffic by setting specific rules for port forwarding and port blocking/application blocking
|
port configuration
|
|
view wireless security settings and learn more about wep encryption
|
security/enhanced encryption
|
|
you will use this section during the intial installation
|
tech setup
|
|
information on all available features on the gateway
|
help
|
|
one of the IEEE standards for wireless networking hardware
|
802.11
|
|
what is boot
|
start up
|
|
a data transmission scheme in which multiple signals share the bandwidth
|
broadband
|
|
a browser is n application program, internet explorer
|
browser
|
|
caching allows you to do more
|
cache
|
|
the routing device used to forward all traffic that is not addressed to a computer withing the local subnet
|
default gateway
|
|
a sub network comprised of a group of clients and servers under the control of one security database
|
domain
|
|
to receive a file transmitted over a network
|
download
|
|
a security method that applies a specific alorithm to data in order to alter the data's appearance and preven other devices from reading the information
|
encryption
|
|
IEEE standard network protocol that specifies how data is placed on and retrieved form a common transmission medium
|
ethernet
|
|
an industry standard for interconnecting computers within a home using existing telephone lines
|
HPNA (home phone line networking alliance)
|
|
the IEEE describes itself as the world's largest technical professional society.
|
IEEE (the institute of electrical and electronics engineers)
|
|
the address that defines the route to a file on the web or any other internet facility.
|
URL (uniform resource locator)
|
|
what is the major difference inbetween the teleworker service levels
|
SPEED
|
|
teleworker offers to levels of service
|
standard - par time
enhanced - full time |
|
what priority support is handed to teleworker
|
priority scheduling, four hour fix time, weekends and holidays included
|
|
what type of configuration changes will you have to make to the customer's computer
|
NONE
|
|
business class internet, levels of service
|
standard, enhanced, extreme
|
|
key features of IP gateway
|
protect the internal network w/firewall, support customer's apps while maintaining security, provides basic network services
|
|
what is a cableCard
|
securiy card that decodes encrypted channels
|
|
how do you know if the internet connection is working properly
|
surf the web
|
|
what ways can you launch Windows media center
|
express setup, custom setup, set up later
|