Commtech 4 Flashcards

1
Q

Codec

A

Compression/decompression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Mpeg

A

Moving picture expert group

Name of a family of standards for coding video and audio information in a digital compressed format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

I-picture

A

Intra-coded picture

Single compressed picture that contains all the spatial information of a video picture

Encoded as free standing image (no B-pic or P-pic reference)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

P-picture

A

Predictive

Computed based on nearest previous I- or P-pic

More compressed than I- pictures and provide a reference for the calculations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

B-pictures

A

Bi-directional pictures

Use both past and subsequent pictures as references to calculate the compressed picture data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

DTCP

A

Digital transmission content protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

ACP

A

Analog copying & piracy

Prevents or distorts copies made over an analog connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

CA

A

Conditional access

The protection of content by requiring certain criteria to be met before granting access to this content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

HTIB

A

Home theater in a box

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Direct view tv

A

CRT
Least expensive
Highest quality picture
Size limitations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Rear projection tv

A

CRT,DLP, LCD,LCos

Larger screen size
Lower profile
Affordable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Front projection tv

A

CRT, DLP, LCFD, LCos

Largest size
Needs highly reflective screen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Flat panel

A

LCD, Plasma

Larger size screen
Lowest profile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Four actions performed by a virus

R,Ew,C,D

A

Replication, event watching, camouflage, delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Main types of viruses

E,Em,W,Th

A

Executable, email, worms, Trojan horses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Replication

A

Inserts copies of itself into other program files

Replicates itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Event watching

A

Checks for conditions (usually a specific date)

When conditions exist, virus delivers its destructive payload.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Camouflage

A

Disguise themselves to avoid antivirus detection

May falsify information in header so program file appears to be the correct size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Delivery

A

When triggering condition is met
, virus unleashes payload

May be harmless or destructive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Executable virus

A

Software that piggybacks on rep programs

When program runs, the virus runs too

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

E-mail virus

A

Contained in an email or its attachments or both

Usually replicates itself by mailing itself to dozens of people in victims email address book

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Worms

A

Software: uses computer networks and security holes to replicate itself

A copy of the worm scans the network for another machine that has a specific security hole.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Trojan horses

A

Small program

Claims to be something it’s not (like a game) but when it runs it does damage (sending e,ails, erasing files)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Spyware

A

A program that sends information about you and how you use your PC to makers and advertisers, usually without you being aware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Spammers target
``` Email Instant messaging Newsgroup Search engines Blogs Mobile phones ```
17
3 main types of firewall rules
Packet filtering Proxy Stateful inspection
18
MPOE
Minimum point of entry | Commercial demarcation point for business class digital voice
19
Telemetry cable *Color sequence WBBOG
White brown blue orange green
20
Network
A system of computers, peripherals, terminals, and databases connected by communications lines
21
LAN
Local area network Close set of computers on a single network
22
WAN
Wide area network Example Internet
23
Firewall
A firewall permits and blocks traffic Hardware or software
24
VPN
Virtual private network Uses a public network to establish a secure connection with an organization private network
25
NAT
Network address translation Technique by which several computers share a single IP address for access to the Internet
26
PAT
Port address translation Forwards requests for a particular ip port pair to another ip port pair
27
Subnetworks
Subnetting is the concept of partitioning large networks into smaller segments 255.255.255.0
28
Consider IP address 150.215.017.009 The first set (150.215) represents? The second set (017.009) represents?
First set network | Second set define host (device)
29
IP address contained within a subnetwork N,R,G,B
Network, routable, gateway, broadcast
30
Subnet mask
Combined with the IP address the sub IP subnet mask allows a device to know which other addresses are local to it and which must be reached through a gateway or router. a number that explains which part of an IP address comprises the network address and which part is the host address on that network. 255.255.255.0
31
Signal leakage limits at 30 m
15 µV per meter
32
Signal leakage limits at 3 m
20 µV per meter
33
Ghosts
Caused when a TV signal of the same frequency and video content arrives at the receiver just before or just after the desired TV signal
34
Thermal noise
Caused by random electron activity of the atoms that make up the conductor, resistor or any part of the passive circuit in question Happens at any temperature above absolute zero
35
Carrier to noise | (C/N) ratio
The difference NP carrier level, to the noise level Levels both are measured in dBmv -59.2dBmv
36
Cross modulation | XMOD
Crossing of modulation from one channel to another
37
CTB
Composite triple beat The tv carriers on a cable system are spaced in 6 MHz increments Channels 5&6 are more than 6 MHz apart.
38
Interference threshold of beats
57 dB below the carrier
39
Hum mod
Horizontal bar 60 cycle and 120 cycle modulation of the TV carriers Carrier to him ratio of 30 DB or better is considered acceptable
40
QPSK
Quadrature phase shifting keying Modulation algorithm where in the carrier is shifted in 90° Steps
41
QAM
Quadrature amplitude modulation Allows two channels of information to be transmitted at the same time on a particular frequency by changing the phase and amplitude
42
Signal-to-noise ratio
A measure of signal strength relative to background noise in analog and digital communications
43
NPR
Noise power ratio Measures activity levels in the unused portion of multi-channel system when there is random activity in the active channel
44
MER
Modulation error ratio | Measures the ratio of the airpower to the average power in an ideal QAM signal
45
FEC
Forward error correction A method where additional data bits are added to the digital video bit stream to help identify and correct any errors that may be caused by the transmission system
46
BER
Bit error rate Measures how often an error occurs in a given amount of data
47
POP
Proof of performance
48
Funneling effect
Problems in the return path adding together
49
FDM
Frequency division multiplexing Being able to carry and individually select different channels on a single cable by their unique frequency
50
AP
Access point
51
POS
Point of sale | Baud rate 9600
52
LPSU
Local power supply unit
53
CPE
Customer premise equipment
54
eMTA
Embedded multimedia terminal adapter
55
C-RAN
Converged regional area network Provides a single common infrastructure in which all services are delivered via IP over a consistent transport and routing architecture. CRAN connects regional markets using HE, hubs
56
LCFD
Liquid crystal front display
57
LCos
Liquid crystal on silicone
57
DCT
Digital consumer terminal
57
DSL
Digital subscriber line
57
NAS
Network attached storage
57
DMZ
Demilitarized zone
57
MAC
Media access control
58
DHCP
Dynamic host configuration protocol
59
Tracert
Trace route
60
FQDN
Fully qualified domain name
61
Power diplex
Separates or combines the AC currents two parts: AC power and RF signal
62
Diplex filter
Separates forward and return frequency
63
Response equalizer
Used to try and correct for any undesired peaks or valleys within the passband of the amplifier
64
AGC
Automatic gain control Used to come it's safer fluctuations of the input signal
65
ALS
Automatic level and slope control Maintains the proper tilt and output level despite changes in the input signal
66
Feedermaker
Signal splitter device that plugs into a trunk/bridger chassis
67
TP
Test point
68
Inline conditioner
Contains diplex filters but allows attenuator pads to be installed in the return portion of the spectrum.
69
Fiber system components Fc,T,R
Fiber cable, transmitter, receiver
70
Three parts of fiber optic cable C,C,C
Coating, cladding, core
71
Wavelengths of light used in broadband telecommunication are centered at ...... nanometers and ...... nanometers
1550 & 1310 Nanometers
72
Cbone
The Comcast private backbone
73
Ibone
Internet backbone
73
Virus protection types Hd,Mra,Ss
Signature scanners Heuristic detectors Memory-resident antivirus
74
Main security threats V,A,S
Virus Spyware Adware
75
Mpeg picture types
I pictures P pictures B pictures
76
Six key techniques for selling B,A,L,Pp,Cb,Afs
``` Build rapport Ask questions Listen Position the product Communicate the benefits Ask for the sale ```
77
Three learning styles V,A,T
Visual Auditory Tactile
78
110 punch down block is used for?
Data applications
79
Video modulator does what?
Places baseband signal onto standard rf channel carrier
80
Patch bay
Connects building data wiring to Ethernet switch! Which is a focal point in the data network.
81
/29 subnet
255.255.255.248 5 static ip address
82
/28 subnet
255.255.255.240 13 static ip address
83
/30 subnet
255.255.255.252 1 static IP address
84
What what a data only | Be used for
Fax, point of sale
84
What is the MTTR for business-class voice customers
4 hours
85
What is the maximum power consumption of an eight line EMTA
60 watts
86
Channel deletion filter does what?
Deletes unused channel for the insertion of a local feed
87
RJ-11 is used for what?
1 line telephone jack
88
RJ-14 is used for what?
2 line telephone jack
89
RJ-25 is used for what?
3 line telephone jack
90
RJ-21x is used for what?
It interfaces with multiple line telephone equipment
91
RJ-45 is used for what?
Ethernet Straight (PC to Router) 568A Crossover (PC to PC) 568B
92
RJ-31x is used for what?
Connecting a monitored alarm system with line seizure.
93
Beats
The unwanted signal entering the network can create a number of beat patterns on the tv.
94
HFC
Hybrid fiber coax
95
Core components of CRAN H,U,S,R,R,
``` Hub sites U ring S ring Regional core Regional network ```
96
Name the two backbones
The Comcast private backbone (Cbone) comcast | The second logical backbone (Ibone) Internet
97
Name the five types of maps used in designing a cable network B,A,B,D,S
``` Base Strand Design Amp Build ```
98
Name the 5keys to receive information BERVS
Brevity, experience, relevance, variety, self discovery.
99
When verifying proper loop current for off hook status what should it be
33mA
99
What does REN stand for?
Ringer equivalency number
100
A basic set up rule for a 66 block is?
In from left out to right Lead with the tip Only one wire per terminal
101
Heuristic detectors looks for?
Sections of code triggered by time or date events, searches for files such as .com, .exe, .bat, .vbs