Flashcards in cct4 Deck (237)
Good eye control serves what 2 purposes?
1. It tells the listener something about you2. It allows you to learn something about the listener
The Six Key Techniques to Selling
1. Build rapport2. Ask questions3. Listen4. Position the product5. Communicate the benefits6. Ask for the sale
It works by separating successive pictures into two types of video information- that which stays the same from picture to picture, and that which changes from picture to picture
A device or software that enables compression and or decompression for digital video
What is the major advantage of MPEG compared to other codecs?
The MPEG files are much smaller for the same quality
Video CDs are an example of what type of MPEG application?
DVD, CATV, and HDTV are examples of what type of MPEG application?
Internet streaming, video on cell phones and interactive tv are examples of what MPEG application?
A MPEG video is a sequence of what three kinds of encoded pictures?
I pictures, P pictures, and B pictures
Digital Transmission Content Protection
It defines a cryptographic protocol for protecting audio/video entertainment content from illegal copying, intercepting and tampering.
Analog Copying and Piracy
This prevents or distorts copies made over an analog connection between a source player and a DVD recorder, DVR, PC or VCR
ACP (Analog Copying and Piracy)
This is the protection of content by requiring certain criteria to be met before granting access to this content.
CA or Conditional Access
What is the speed, range, and frequency of 802.11b ?
11 Mbps, 100-150 feet indoors, 2.4 GHz
What is the speed, range, and frequency of 802.11a?
54 Mbps, 25-75 feet indoors, 5 GHz
What is the speed, range, and frequency of 802.11g?
54 Mbps, 100-150 feet indoors, 2.4 GHz
What is the speed, range, and frequency of 802.11n?
100 Mbps and higher, Up to 160 feet, 2.4 GHz
This inspects the master boot record, program files, and macro code for the presence of viruses.
This type of software installs programs in RAM that continue to operate in the background while other software applications are running. It monitors all the computer's operations for any actions associated with viruses
Memory-resident antivirus software
This is a variant of spyware that displays advertising for products it thinks might interest you, based on the website you are browsing.
It can be defined as sending unsolicited bulk email.
What is the best way to prevent a hacker from accessing a customer's system?
A hardware firewall
A term used to describe a range of malicious software example is external code that changes your browser's settings.
This type of firewall rule compares key parts of each packet to a database of known safe data.
Stateful packet Inspection
This type of firewall rule examines each packet and if the origination address of the data is on a list of banned Internet locations, the firewall blocks it.
This type of firewall rule uses a server that examines all data based on the filtering rules and only forwards packets that obey the rules
Before manually troubleshooting any IP problems, what should be done?
Run a network diagnostic check.
What type of port restricts connections speeds to about 6 Mbps?