CompTIA A+ Vocabulary & Terms
Administrators
Can perform all management tasks and generally has very high access to all files and objects
MSConfig
Microsoft Configuration
PCI
Peripheral Component Interconnect
PAL
Phase Alternating Line
PGA
Pin Grid Array
PGA2
Pin Grid Array 2
PGP
Pretty Good Protection
PRI
Primary Rate Interface
SSID
Service Set Identifier
SEC
Single Edge Connector
SPGA
Staggered Pin Grid Array
SRAM
Static Random Access Memory
TPM
Trusted Platform Module
dir/p
lists files one screen at a time
NetBIOS Datagram Service (nbdatagram)
-UDP 138 -connection-less version of nbsession
Windows 7 Editions
- Windows 7 Starter - Windows 7 Home Basic - Windows 7 Home Premium - Windows 7 Ultimate - Windows 7 Professional - Windows 7 Enterprise
MM
specifies the month in numerical or text format in cron
Remote Disc
A feature of OS X that gives other computers on the network access to the Mac's optical drive. system preferences -> Sharing
32-bit PCI Parallel Bus
-32 bits sent at the same time
Bash shell script comment
#
PCIe v3.x
- ~1 GB/s of throughput per lane in each direction
PoE Switches
-Power over Ethernet -Commonly marked on the device
Airprint (Sharing from an OS)
-Printing from an iOS device directly to a compatible printer
Micro SD card
-Smaller than Mini-SD Card
+3.3V
-provides power M.2 slots, RAM slots, mobo logic circuits
environment variable
A storage location in the environment of the operating systems command shell.
FAT12
12-bit file allocation table (FAT12) A file allocation table which uses 12 bits for addressing clusters.
WUXG
A Wide Ultra Extended Graphics Array
tasklist
A command-line version of the Task Manager
Spotlight Search
A search tool in the macOS
APM
Advanced Power Management Is an API developed by Intel and Microsoft and released in 1992[1] which enables an operating system running an IBM-compatible personal computer to work with the BIOS (part of the computer's firmware) to achieve power management.
ATA
Advanced Technology Attachment Is the official name that American National Standards Institute group X3T10 uses for what the computer industry calls Integrated Drive Electronics (IDE).
AC
Alternating Current
System Information
An application used to provide detailed diagnostic information about your mac
Power Users
Appears in legacy applications but is deprecated because the rights allocated to this account type can be abused to allow the user Administrative or System privileges
APFS
Apple File System - used in macOS High Sierra or later which supports native file encryption
Activity Monitor
Apple verstion of performance monitor
Disk Utility
App in macOS used to verify or repair a disk or file system
Remote Assistance
Assigns a port dynamically from an ephemoral range
bootrec
Attempts to fix startup problems.
BITS
Background Intelligent Transfer Service - a protocol in which the computer is enabled to browse update.microsoft.com and select updates for download and installation
Control panel
Best place to configure your system in Windows 7
BCD
Boot Configuration Data
CD
Compact Disc
CIA
Confidentiality, Integrity, Availability
Performance Monitor
Configures detailed reports on different system statistics and log performance over time(can be accessed through administrative tools, Computer Management or perfmon.exe command line)
DIN
Deutsche Industrie Norm
chkdsk C: /x
Dismounts volume C:
HTML
Hypertext Markup Language The standard markup language for documents designed to be displayed in a web browser. It can be assisted by technologies such as Cascading Style Sheets (CSS) and scripting languages such as JavaScript.
ICR
Intelligent Character Recognition
IRP
Incident Response Plan
I/O
Input/Output
IEEE
Institute of Electrical and Electronics Engineers
MBR
Master Boot Record
MSDS
Material Safety Data Sheet
MAC
Media Access Control/Mandatory Access Control
MAN
Metropolitan Area Network
MDM
Mobile Device Management
MDM
Mobile Device Management - a class of enterprise software designed to apply security policies to the use of smartphones and tablets in a business network
MFA
Multifactor Authentication
MFD
Multifunction Device
MFP
Multifunction Product
MUI
Multilingual User Interface
MIMO
Multiple Input Multiple Output
MIME
Multipurpose Internet Mail Extension
NTSC
National Transmission Standards Committee
NAC
Network Access Control
Windows key + r
Opens the Run dialog box
OS
Operating System
PVA
Patterned Vertical Alignment
PCI
Payment Card Industry
64 bit application files location
Program Files
32 bit application files location
Program Files(x86)
PHI
Protected Health Information - medical and insurance records, plus hospital lab results
Windows Registry
Provides remotely accessible database for storing, operating system, device, and software application configuration information
PKI
Public Key Infrastructure
PSTN
Public Switched Telephone Network
.py
Python
QoS
Quality of Service
nslookup -Option Host Server
Queries a dns server about a host
RJ-11
Registered Jack Function 11
RJ-45
Registered Jack Function 45
crontab -r
Removes jon from a scheduled list in cron
RIP
Routing Information Protocol
S.M.A.R.T
S.M.A.R.T. Self-Monitoring, Analysis, and Reporing Technology
SLI
Scalable Link Interface or System Level Integration ot Scanline Interleave Mode
SSH
Secure Shell is a network protocol for secure transfer of data between computers on port 22
SSL
Secure Sockets Layer
SATA
Serial Advanced Technology Attachment
SAS
Serial Attached SCSI
SMB
Server Message Block
STP
Shielded Twisted Pair
netstat -b
Shows the process that has opened the port
Three most effective types of physical data destruction?
Shredding, Incineration, Degaussing
SCSI
Small Computer System Interface
Saas
Software as a Service
SSD
Solid State Drive
SPDIF
Sony-Philips Digital Interface Format
ST
Straight Tip
SIM
Subscriber Identity Module
SFC
System File Checker
kernel
The software component that provides the core set of operating system functions
Destination Unreachable
There is no routing information
PCI 133 MB/s Throughput
Throughput for a bus running a 32-bit card at a 33MHz clock rate
TDR
Time Domain Reflectometer
TCP
Transmission Control Protocol
TCP/IP
Transmission Control Protocol/Internet Protocol
TLS
Transport Layer Security
TFTP
Trivial File Transfer Protocol
UTP
Unshielded Twisted Pair
USMT
User State Migration Tool
VoIP
Voice over Internet Protocol
ZIF
Zero-Insertion-Force
JavaScript escape character
\
Mission Control
a feature of macOS that enables a user to set up one more desktops with different sets of apps and backgrounds
ISO file
a file that contains all the contents of an optical disc
vi/vim
a text file editor in linux
workgroup
a windows peer-to-peer network
shutdown -a
aborts command prompt shutdown
hive
binary files that store the registry database
fsck
checks partition errors (partition should be unmounted before running this tool)
cls
clears the command prompt screen
dir *.*
displays all files and directories in the current directory
gpedit.msc
group policy snap in
clean install
installing an new OS that completely replaces the old one
script file
is a text document containing commands for the operating system. The commands are run in the order they are listed
dir/w/p
lists both wide format and one screen at a time
telnet
port 23
control + C
quits a running program in command prompt
rm -r
removes a directory and its contents recursively
tasklist /svc
shows a list of services within each process
kill
stops a process using its Process ID
system protection tab
tab in system properties that provides option for system restore
command
the command or script to run along with the full path to the file
confidential
the information is highly sensative, for viewing only by approved persons within the organization
apt-get upgrade
update all packages with latest versions
linux user commands
useradd, usermod, userdel
jitter
variation in delay
0
---
1
--x
USB 1.1 Full Speed
-12 megabits per second -5 meters
Blu-ray disc
-25 GB for single-layer -50 GB for dual-layer
PCIe v1.x
-250 MB/s of throughput per lane in each direction
Off-Site Email Applications
-A challenge to maintain -Need to purchase your own servers and storage -A support team will need to be trained to manage the servers -Ongoing backup and maintenance required
Zero Insertion Force (ZIF) socket
-A socket full of holes that matches the CPU -Contains a small lever that helps install the CPU without any pressure
Shielded Twisted Pair (STP)
-Additional shielding protects against interference -Shield each pair and/or the overall cable -Also contains a grounding wire / requires the cable to be grounded
Resource Pooling
-All of the computing power in one place -One large resource instead of many small resources -Small servers can be virtualized in the larger server
Safety Tips
-Always disconnect from a power source when working on a device -Never connect your body to any part of an electrical system
Windows BitLocker disk encryption
-BIOS integrated with TPM
Laptop Optical Drives
-Becoming too large for portable devices -Difficult to find -It is often removable and replaced with another component -when available, it can read and write (CD-RW/CD-ROM and DVD-RW/DVD-ROM)
Laptop Volume Settings
-Can be a standalone key to higher or lower sounds -Can be a FN key to higher or lower sounds -Often includes a mute option for both standalone or the FN key -Laptop can also have both option to higher and lower sound with standalone key and FN key
Laptop Smart Card Reader
-Can be integrated (built into the laptop) -Can be external (connected via USB)
Mobile Device Memory
-Can increase storage capacity of smartphone or tablet -Common on Android devices -Not available on iOS devices
Preferred Roaming List (PRL) Updates
-Common to CDMA networks (i.e., Sprint, Verizon) -Allows your phone to connect to the right tower -Can be updated Over-The-Air
F-Connector
-Commonly used for cable tv or cable modems -Threaded connection -RG-6 or RG-59 cable
Computer Power Supply
-Computer uses DC voltage -Most power sources provide AC voltage -Converts 115V AC or 220V AC to 3.3V DC, 5.5V DC, or 12V DC -You'll know when this isn't working
Barcode/QR code reader
-Connected with serial, USB, or 802.11 WiFi -Camera phone can also act as a reader
Managed Switches
-Contains VLAN support -Interconnect with other switches via 802.1Q -Can prioritize certain type of traffic -Redundancy support (Spanning Tree Protocol (STP)) -External management can be done using SNMP -Can configure port mirroring to capture packets
Level 3 Cache (L3 cache)
-Could be shared memory across all cores
BitLocker and EFS
-Data confidentiality is the most important asset • Encrypt important information -Encrypting File System • Protect individual files and folders • Built-in to the NTFS file system -BitLocker • Full Disk Encryption (FDE) • Everything on the drive is encrypted • Even the operating system -Home and business use • Especially on mobile devices
Micro-USB and Mini-USB Connections
-EU standardized on Micro-B USB Plug (now common worldwide) -Older devices may use Mini-B USB Plug (larger than Micro-B)
GPT partition style
-GPT (GUID Partition Table) • Globally Unique Identifier • The latest partition format standard -Requires a UEFI BIOS • Can have up to 128 primary partitions • No need for extended partitions or logical drives
Thermal Paper Replacement
-Get the exact kind and size for your thermal printer (impossible to substitute) -Paper is inexpensive (right specifications is needed) -To small or large paper can cause paper jams -Replacement process is easy (open cover, remove roll, insert new roll, and press a feed button to confirm paper is being fed)
Expansion Cards
-Graphics (Video) cards -Audio cards -Network cards (multiport ethernet for servers) -USB cards -Storage cards (SSD) -eSATA cards
Carriage and Belt
-Holds the ink cartridges in place -May include its own print head -Moves the ink cartridges over the paper
M.2 B key
-If the drive is connecting to a device that supports a B key, then it will use 2 lanes of the PCI Express bus (PCIe x2 at a maximum)
Global Positioning System (GPS)
-In Car navigation system -Requires view of the sky to receive signals from satellites -Periodic updates needed either Over the air or through a memory card
802.11 a/b/g/n/ac printer connectivity (Wireless Device Sharing)
-Many devices using an access point -known as infrastructure mode
Category 3 cable (Cat 3)
-Max Supported Ethernet Standard - 10BASE-T -Max Supported Distance - 100 meters
Windows on a mobile device
-Microsoft Windows 10 • Fully-featured tablets -Many different manufacturers • Touchscreen computer • Keyboards • Pen stylus -Windows Mobile • No longer in active development • No support after December 2019
Step 5 : Transferring
-Moves the toner from the photosensitive drum to the paper
All-In-One (AIO)
-Multifunction (printer, scanner, copier, fax)
Hyper-Threading Technology (HTT)
-One CPU acts like two -Does not work as fast as two (15% to 30% performance improvement) -OS must support it (Windows XP and later) -any modern OS
Non-ephemeral ports
-Permanent port numbers -Ports 0 through 1,023 -Usually on a server or service
Duplexing
-Printing on both sides of the paper. -Included on some printers -additional hardware flips the page to print on the other side.
Repeater
-Receives a signal, regenerates, and resends -No forwarding decisions to make -Common use to extend the length of a network such as fiber or copper network -Can convert from one network media to another -Can extend wireless network reach
Virtualization Workstation
-Requires max RAM (every OS needs its own memory) -Max CPU cores (constant processing, CPU needs to be efficient, most virtualization apps can use multiple cores)
Processor cores
-Separate CPU's -Can be dual, Quad, Octa, Multi or more -Each has its own cache and a shared cache
Signature Pad
-Small digitizer with stylus -Connected via USB -Driver may be required
Laptop DC Jack
-Specific to the power supply type
Syncing Android Mobile devices
-Syncs online with Google -Can use 3rd party apps like doubleTwist to transfer movies and music to and from the android device
Apple Filing Protocol (AFP)
-TCP 548 -File services in MacOS -Work with SLP (service location protocol) -Full feature file management (copy, move, delete, rename files, etc.)
Device Manager Applet
-The OS doesn't know how to talk directly to most hardware • You need drivers -Manage devices • Add, remove, disable -This is the first place to go when hardware isn't working • Instant feedback
Active Directory (AD)
-The centralized directory database that contains user account information and security for the entire group of computers on a network. -Centralized account management
Standard Thick Client
-Traditional computer -Desktop Applications (Executable programs running in local memory and using local CPU) -Meets recommended requirements for running the OS (CPU, Total RAM, disk space) -Local resources (OS, Drivers, Apps) -Ongoing support (security patches, OS updates, App. updates) -Device is added to microsoft domain -authentication needed to gain access
Syncing iOS Mobile devices
-Uses Apple iTunes -Creates full backups on the computer
Replacing InkJet Cartridges
-Usually separate cartridges (some printers have then combined) -easily replaceable (pulls right out)
Users Tab
-Who is connected? What are they doing? -Provides a User list Windows 7 which allows you to: • Disconnect • Logoff • Send message -In Windows 8/8.1/10, Users tab provides: • Separate processes for each user • Performance statistics for each user
SOHO NIC configuration
-Wired NIC -Not many options -Ports are configured for auto speed and duplex -Speed: 10/100/1000 -Duplex can be half or full -Wireless NIC -Enable/disable adapter -Select an SSID -enter password to gain access
+5V
-provides power to some mobo components -Many components have shifted to +3.3V
sector
512 bytes on a disk
diskpart
A Windows command to manage hard drives, partitions, and volumes.
AP
Access point Short for wireless access point (WAP). APs provide access to a wired network to wireless clients. Many APs support isolation mode to segment wireless uses from other wireless users.
AHCI
Advanced Host Controller Interface A technical standard defined by Intel that specifies the operation of Serial ATA (SATA) host bus adapters in a non-implementation-specific manner.
Phishing
An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information(combination of spoofing and social engineering)
ADF
Automatic Document Feeder
Bluetooth printer connectivity (Wireless Device Sharing)
-Limited range for connectivity -can print directly to a printer from a mobile device
Laptop GPS
-Listens to GPS signals on the wireless antennas -Enabling/Disabling airplane mode would also enable/disable the GPS functionality
Applications Tab
-Lists user-interactive applications in use • Apps on the desktop -Administratively control apps • End task, start new task -Combined with the Processes tab in Windows 8/8.1/10
Laptop Batteries
-Lithium Ion (Li-ion) -Common in consumer electronics -No "memory effect" (does not need to be discharged completely) -Charging diminishes the capacity (will not fully charge after time) -Comes in different form factors for each laptop
Other considerations
-Load alternate third party drivers when necessary • Disk controller drivers, etc. -Workgroup vs. Domain setup • Home vs. business -Time/date/region/language settings • Where are you? -Driver installation, software and windows updates • Load video drivers, install apps, update the OS -Factory recovery partition • This can help you later
Application Installation methods
-Local installation • Downloadable executable • CD-ROM / DVD-ROM, Optical media -USB • Very compatible with most devices • Supports large installation programs -Network-based installation • The default in most organizations • Applications are staged and deployed from a central server • Can be centrally managed
User Accounts Applet
-Local user accounts • Located in Control Panel under "User Accounts" • Domains accounts are stored elsewhere -Creating local account requires account name and type • Can change password • Can change picture • Can associate a certificate information for a particular user
Print Management
-Located in Control Panel under Administrative Tools -Can manage printers • Share printers from one central console -Add and manage printer drivers • Central management of 32-bit and 64-bit drivers
services.msc
-Located in Control Panel under Administrative Tools as Services • Can also open through the cmd line or Run cmd -Useful when troubleshooting the startup process -Control background applications -Services can reveal dependencies between applications
Laptop Touchpad
-Located underneath the keyboard -Contains left and right buttons similar to a mouse -Requires a finger slide to move the cursor
Single-mode Fiber
-Long-range communication -Over 80 km without additional processing -Expensive light source (laser beams)
Replacing toner cartridge
-Look for messages (low doesnt mean empty) -Toner can contain the OPC (Organic PhotoConductor) drum; It is sensitive to light, keep in the bag -Power off printer (safety first) -Remove packing strips
nslookup
-Lookup information from DNS servers • Canonical names, IP addresses, cache timers, etc. -Lookup names and IP addresses • Many different options
Clearing Jams
-Lots of turns and twists -Remove paper tray and check for loose paper -Remove paper from the path (firm pressure when removing paper so it doesnt rip) -Open the cover to check for any loose paper
24-pin Motherboard power
-Main mobo power -Provides +3.3V, ±5V, and ±12V -Can still connect to a 20pin mobo connector (some cables are 20-pin + 4-pin)
Microsoft Windows history
-Major market presence -Many different versions • Windows 10, Windows Server 2016 -Advantages • Large industry support • Broad selections of OS options • Wide variety of software support -Disadvantages • Large install base provides a big target for security exploitation • Large hardware support can create challenging integration exercises
Sync Center
-Make files available, even when you're not online • Automatically syncs when back online • Contains built-in sync conflict management -Not available in Home editions • Needs offline file functionality • Only available in Pro and higher -Mark files "Always available offline" to use this capability
TaskList and TaskKill command
-Manage tasks from the command line • No Task Manager required! -tasklist • Displays a list of currently running processes • Local or remote machine -taskkill • Terminate tasks by process id (PID) or image name • TASKKILL /IM notepad.exe - kills the notepad.exe process by image name • TASKKILL /PID 1234 /T - kills the process identifier (PID) by number
System Configuration (msconfig)
-Manages boot processes • Windows startup applications • Windows services -There are 5 tabs in system configuration • General • Boot • Services • Startup • Tools • Located in Control Panel under Administrative Tools • OR type "msconfig.exe" in cmd prompt or in search bar
Disk Management
-Manages disk or volumes in windows • Individual computers and file servers -Computer Management is located in Control Panel under Administrative Tools then Storage and Disk Management -WARNING- Data can be erased and unrecoverable
Startup tab
-Manages which programs start with a Windows login • Easily toggle on and off -Multiple reboots needed before locating the troublesome application during troubleshooting (You'll find it) -This feature has moved to the Task Manager in Windows 8/8.1/10
Pin Grid Array (PGA)
-Many pins that are underneath the CPU -CPU socket matches the pins on the CPU -Plugs into a ZIF socket -Possible damage to the CPU if not inserted correctly
Double Data Rate 4 (DDR4) SDRAM
-Max 64GB per DIMM -Faster Frequencies -Not backwards compatible with DDR3, DDR2, DDR
Category 5 cable (Cat 5)
-Max Supported Ethernet Standard - 100BASE-TX, 1000BASE-T -Max Supported Distance - 100 meters
Category 6 cable (Cat 6)
-Max Supported Ethernet Standard - 10GBASE-T -Max Supported Distance - 37 to 55 meters
Watt (W)
-Measurement of real power use -volts * amps = watts -e.g. 120V * 0.5A = 60W
Laptop Touchscreen
-Merges a laptop and tablet input -No keyboard required (but still available) -Many options for input (choose either)
Component Services
-Microsoft COM+ • Component Object Model -Distributed applications • Designed for the enterprise -Manage COM+ apps • Device COM+ Management • Event Viewer • Services -Located in Control Panel under Administrative Tools
mmc.exe
-Microsoft Management Console • Can build your own management framework • Choose from list of available "snap-ins" -Framework used for many built-in management tools - Located under C:\Windows\System32 • Can also open through the cmd line or Run cmd
mstsc.exe
-Microsoft Terminal Services Client • Remote Desktop Connection • Can also open through the cmd line or Run cmd -Access a desktop on another computer • Or connect to a Terminal Server -Common for management on servers without a keyboard or monitor connected to them • "Headless" servers - Located under C:\Windows\System32 • Can also open through the cmd line or Run cmd
Print to XPS (XML Paper Specification)
-Microsoft virtual output type -Similar use case to Adobe PDF -Available all the way back to Windows XP -Included in Windows -viewable with any system that has an XPS reader
Imaging Drum
-Middle man between the laser and printed image on the page -Image is drawn onto a photosensitive drum ("painted" with a laser) -Picks up toner and transfers it to paper -Can be separate or combined with toner cartridge
Mobile Device Speakers
-Mobile audio (battery powered) -Can connect with a bluetooth connection -More of a stereo sound
Retrieving Email on Mobile devices (Internet Message Access Protocol (IMAP4))
-More flexible protocol -Access mail on a central server -Mail is usually stored on the server -Supports folders and server-side searching -Configuration information needed is the name of the IMAP server and Username+Password *Network Ports* -Defined by your mail provider -IMAP : TCP/143 -SSL (Secure Socket Layer) settings - IMAPS : TCP/993
VM Network requirements
-Most client-side vm managers have their own virtual (internal) networks -Shared Network Address - the VM shares the same IP address as the physical host; The VM uses a private IP address internally, Which NAT is able to convert to the physical host IP. Allows communication between internal IP (VM) to the external IP (physical host) -Bridged Network Address allows the VM to have its own IP and be on the physical network. Either through DHCP or Static. -Private Address does not allow the VM to communicate outside of virtual network. Only communicates to other VM's that are on that private network.
Retrieving Email on Mobile devices (Post Office Protocol 3 (POP3))
-Most commonly used protocol -Used for downloading mail to local mail client -Downloads and (optionally) deletes from server -Downloading and deleting from server makes sense if only 1 device is used -Configuration information needed is name of POP3 Server and Username+Password *Network ports* -Defined by your mail provider -POP3 : TCP/110 -SSL (Secure Socket Layer) settings - POP3S : TCP/995
ipconfig
-Most of your troubleshooting starts with your IP address • Ping your local router/gateway -Determine TCP/IP and network adapter information • And some additional IP details such as IP address, subnet mask, default gateway -View additional configuration details with typing "ipconfig /all" • Shows details for DNS servers, DHCP server, etc
Display Devices
-Most popular output device -Many different connections (different standards through the years) -Different sizes and resolutions
CPU Sockets
-Motherboards are matched with CPU's -CPUs have specific socket requirements -Usually the largest thing on the board -Usually central to everything -Not easily upgradable (and often not an option)
Serial Attached SCSI (SAS)
-Move from Parallel to Serial -Increased throughput -Point-to-Point connection (no more daisy chains) -No termination required (bus has 2 devices on it) -Same control and management as SCSI protocol, but on a high speed serial connection
Hub
-Multi-port repeater -Traffic going into one port is repeated to every other port -Everything is half-duplex (2 devices cannot communicate at the same time) -Becomes less efficient more devices begin to communicate -Only operates in 10 megabit/sec or 100 megabit/sec -This technology is difficult to find
NTFS and CDFS
-NTFS - NT File System • Extensive improvements over FAT32 • Quotas, file compression, encryption, symbolic links, large file support, security, recoverability -CDFS - Compact Disk File System • ISO 9660 standard • All operating systems can read the CD
DRAM (Dynamic Random Access Memory)
-Needs constant refreshing (data disappears if its not refreshed) -Random Access (can access any storage location directly)(unlike magnetic tape were you cannot)
Printer Sharing from an OS
-Network connected -common on windows devices -requires the IP address of the printer -Commonly uses TCP 139, TCP 445, UDP 137, and UDP 138
netstat
-Network statistics • Utility available on many different operating systems -netstat -a • Shows all active connections -netstat -b • Shows binaries (Windows) that may be sending/receiving information • Requires elevation -netstat -n • Does not resolve DNS names
USB 3.2
-New SuperSpeed+ modes over USB-C -10 Gbit/sec and 20 Gbit/sec
802.11 Ad hoc mode printer connectivity (Wireless Device Sharing)
-No access point is used -direct link between wireless devices -Additional config. settings will need to be turned on to use without an access point
UTP (Unshielded Twisted Pair)
-No additional shielding -The most common twisted pair cabling
Application Streaming (Laptops/Desktops)
-No apps are deployed to the local machine -No complex deployment process -Apps are only streamed if they are used -New apps are added to the cloud offering as they are available and also updated -Quickly manage and make changes instantly
Fanless/Passive Cooling
-No fans or noise (silent operation) -Specialized functions (TV set top box, video servers, media server) -Functions are very controlled (carefully tested) -Low-power computer (heat sinks)
Thermal Printer Heating Element
-No moving print head -Only parts are heated during printing -Paper is covered by the full length of the component
Cloud-Based Email Hosting
-No need to purchase servers or maintain the software -Flat cost per user per month -Personal email service has no costs involved -Looks and feels the same for the user -common services is MS Office 365 or Google Mail
Virtual Printers
-No physical output -Output is digital -No hardware required (no printer, ink, toner, paper) -Useful for sending electronically (email, save to hard drive, or send through the network)
Internal Cloud (shared resources)
-No resources are shared -Need to build your own cloud (need to purchase hardware and networking structure) -Upfront costs -No ongoing costs once purchased (except cooling and power)
Hard Disk Drive (HDD)
-Non-volatile magnetic storage -Rapidly rotating platters -Random-Access (retrieves data from any part of drive at anytime) -Moving parts (spinning platters, moving actuator arm) -Mechanical components limit access speed -Mechanical components can also break
Solid State Drive (SSD)
-Non-volatile memory -No Moving parts (very fast) -Fast performance -No spinning drive relays -Size for both desktop and laptops - 2.5'' -SATA interface
Wireless Access Point (WAP)
-Not a wireless router -A bridge connection device -Extends the wired network onto the wireless network -Makes forwarding decisions based on MAC address
Flavors of traceroute
-Not all traceroutes are the same • Minor differences in the transmitted payload -Windows commonly sends ICMP echo requests • Receives ICMP time exceeded messages • And an ICMP echo reply from the final/destination device • Unfortunately, outgoing ICMP is commonly filtered -Some operating systems allow you to specify the protocol used • Linux, Unix, Mac OS, etc. -IOS devices send UDP datagrams over port 33434 • The port number can be changed with extended options
Privileges
-Not all users can run all commands • Some tasks are for the administrator only -Standard privileges • Run applications as normal user • This works fine for many commands -Administrative/elevated privileges • You must be a member of the Administrators group • Right-click Command Prompt, choose "Run as Administrator" • OR by searching for cmd.exe, then pressing "Ctrl+Shift+Enter" to run as Administrator
Impact Printer Paper Replacement
-Not easy as a laser printer -Paper must be feed with a tractor feed -forms must be positioned perfectly (text needs to fit predefined space); Run test sheets to align -Paper is continuously fed (one long sheet of paper) -Must flow freely (make sure nothing is in the way)
CMOS Battery
-Not needed for today's flash-based storage -Maintains old BIOS configs -May only be used to maintain Date/Time -Bad battery will require a BIOS config or Date/Time config on ever boot -Can reset BIOS config by removing the battery on older systems (including passwords for supervisor access) -Newer mobo's have a jumper
Synchronizing Data on Mobile Devices
-Not restricted to one device (many different devices) -Access anything from anywhere (complete mobility) -Many different types of data is synced (email, calendar, apps, etc.) -All devices must be synced (invisible to the end-user) -The client and server must authenticate with each other (mutual authentication)
Managing SOHO QoS (Quality of Service)
-Not supported by all routers -Prioritize as needed -Voice is high, WoW is low (or vice versa) -High-end SOHO routers allow you to prioritize applications, ports, or MAC addresses -Be careful when making changes to QoS (you could accidentally cause applications to slow down)
ODBC Data Sources
-ODBC - Open Database Connectivity -Application independence • Database and OS doesn't matter -Configure in Control Panel / Administrative Tools • Users probably won't need this -Located in Control Panel under Administrative Tools
Laptop Video Card
-Often built into the processor -Sometimes part of the system board -Not upgradeable in smaller laptops -Can be upgradeable in larger laptops that require high-end capabilities in a mobile platform
Laptop Keyboard Backlight
-On option on many laptops -Allows you to view keys in dark lit areas -Secondary functions can be intensity (brighness), duration (length of time), or just disable completely
Virtual Application Streaming
-On-Demand applications -No need to install the app locally (globally distributed) -Components are downloaded as needed; it will not download a component if its not needed -Data is stored securely in the cloud -Easy to update from one centralized location; If some data is cached, the app with only update the changes.
Airplane Mode (Mobile Device Connectivity)
-One button to turn off all radios (cellular, WiFi, Bluetooth, NFC, etc.) -Individual features can be re-enabled without enabling cellular features (useful when WiFi is available)
Virtualization
-One computer, many OS's (Mac OS X, Win 7, Linux Ubuntu, all at the same time) -Each VM has its own set of resources (its own CPU, RAM, Storage, network, etc...) working independently of each other -Host-based virtualization runs one OS as your normal desktop and running other OS on top of that desktop -Enterprise-Level virtualization is common to run one server with many VM's running inside of it -Been around since 1967 (IBM Mainframe Virtualization)
Emulation characteristics
-One device running processes designed for a completely different architecture -A device pretending to be another -Original code is still being used from that original system -Code is used to interpret to run on the current hardware -Commonly slower than running natively -Not easy to do
OLED (Organic Light Emitting Diode) on Laptops
-Organic compound that emits light when receiving an electric current -Thinner and lighter -Flexible and mobile (no glass needed) -No backlight (organic compound provides the light) -Good representation of the color black -Not ready for laptops -Organic materials decay over time -Decayed images can remain on the screen -More costly and power hungry than an LCD
20-pin Motherboard connector
-Original ATX standard -24 pin connector was added for PCI Express power
Sound Applet
-Output options • Multiple sound devices may be available -Set input/output levels for speakers and microphone
Augmented Reality (AR)
-Overlays a virtual augmentation with the physical world -The computer provides the additional detail -Can be used in the Medical field, Travel, Gaming.
Windows 8/8.1 processor requirements
-PAE (Physical Address Extension) • 32-bit processors can use more than 4 GB of physical memory -NX (NX Processor Bit) • Allows CPU to protect against malicious software from running -SSE2 (Streaming SIMD Extensions 2) • A standard processor instruction set • Used by third-party applications and drivers
Thermal Paper
-Paper covered with a chemical -Changes color when heated -Common in receipt printers or credit card terminals (used in quiet ares) -Make sure paper is specific for the printer model that is being used (looks like normal paper)
The PATA standard
-Parallel AT Attachment, Parallel ATA, ATA -Originally called Integrated Driver Electronics (IDE) -2nd Gen. called EIDE (Enhanced IDE) -Promised faster speeds (from 16 MB/s through 133 MB/s) -Additional devices were able to connect (cd-rom drives) -Now called PATA
Integrated GPU (Graphics Processing Unit)
-Part of the video adapter, mobo or CPU (built into CPU) -This is good for basic computing -Separate video card is needed if gaming, editing video, rendering graphics.
Mobile Device Credit Card Readers
-Phone or Tablet becomes a point of sale terminal -Connection is made through audio/mic TRRS jack, lightning connector, or Bluetooth -Great for small and mobile businesses -Uses the internet connection for approval (immediate feedback) -Has additional features such as emailing receipts or signing with your finger
Laptop Frames
-Plastic -lightweight and mobile, but durable and difficult to break -inexpensive but cost-effective -Metal -More durable than plastic -Can be more difficult to replace
Riser Card
-Plugs in vertically in the motherboard -cards are plug in vertically to the motherboard -one example where the card is used is in data center servers
Power over Ethernet (PoE)
-Power provided on an ethernet cable -One wire for both network and electricity -Used for IP Phones, Wireless Access Points -Useful in difficult-to-power areas -Power can be provided at the switch -Built-in power provide at the switch (Endspans) -In-line power injector provides the power (Midspans)
Print to Image
-Print to a graphics image (for later image editing or sharing) -Output is a picture and can be viewed with any program that understands that format -Not integrated into the OS (a feature of the application) -3rd party software print drivers are available (application may export graphics formats natively/within the software)
Cloud Printing (device sharing)
-Print to the cloud -Useful for mobile devices -Cloud sends to your printer -Cloud options available from google, brother, hp, etc...
Step 1 : Processing
-Printer is not moving -Build the entire page in memory -Needs to print entire page with one single pass -Cannot print half the page, process more info. and then print the other half
Color and B&W Printers
-Produces paper documents or photos
Windows (Defender) Firewall Applet
-Protect from attacks • Scans for malicious software • Helps prevent access to resources on the local pc -Integrated into the operating system - Located in Control Panel under Windows (Defender) Firewall
Thermal Printer Feed Assembly
-Pull paper through the paper -small paper path -Roller is easily replaced
Case Fans
-Pulls cool air through the front -Warm air exits through the back -Good cable management for good air flow -Different sizes, styles, and volume levels
Quick format vs. full format
-Quick format • Creates a new file table • Looks like data is erased, but it's not • No additional checks -Quick format in Windows 7, 8/8.1, and 10 • Use diskpart for a full format within windows 7, 8/8.1/10 -Full format • Writes zeros to the whole disk • Your data is unrecoverable • Checks the disk for bad sectors - Time consuming
BIOS Component Information
-RAM (view and configure memory settings) -Hard drive / SSD (drive settings, Boot order) -Optical drive (allows you to enable/disable) -CPU information (type and settings)
Before Upgrading BIOS...
-Read the documentation (release notes) -Some updates are bland -Others are full of new features -Check OS prerequisites -Locate a reliable power source (laptop connected to AC power)
CD-ROM (compact disc read-only memory)
-Read-only compact storage disc for audio or video data -CD-ROMs are read by using CD-ROM drives and optical drives with backward compatibility, such as DVD and Blu-ray Disc drives. -700 Megabytes (MB) capacity
Processor Speed
-Real Speed: CPU clock (MHz or GHz) -Actual Speed is a combo of different factors such as clock speed, CPU Architecture, bus speed, bus width, L1 cache size, L2 cache size, operations system capabilities -Use a benchmark that works for you
Windows 7 history
-Released October 22, 2009 • Mainstream support ended January 13, 2005 • Extended support until January 14, 2020 -Very similar to Windows Vista • Maintained the look and feel of Vista • Used the same hardware and software • Increased performance over Windows Vista -Updated features • Libraries • HomeGroup • Pinned taskbar
Windows 10 history
-Released on July 29, 2015 • Windows 9 was skipped -A single platform that works on desktops, laptops, tablets, phones, all-in-one devices -Upgrades were free for the first year • From Windows 7 and Windows 8.1 -Microsoft calls Windows 10 a "service" • Periodic updates to the OS • Instead of completely new versions
Step 7 : Cleaning
-Removes the excess toner from the photosensitive drum
PCI Express (PCIe)
-Replaced PCI, PCI-X and AGP -Communicates serially (Unidirectonal serial "lanes") -Slower devices does not slow down everyone (lanes are not shared) -Size of different lanes: one, two, four, eight, sixteen, or thirty-two full-duplex serial lanes -x1, x2, x4, x8, x16, x32 ("x" is pronounced "by")
Virtual Reality (VR)
-Replaces reality with a computer generated version -Input from the real world interacts with the virtual world -Can be used in different application such as : gaming, industrial design, art, enhanced video and image viewing
Gaming PC
-Requires SSD's -High-end video/specialized GPU -High definition sound card -High-end cooling
Volume sizes
-Resize a volume • Right-click the volume for options • Can shrink or extend -Can split the hard drive space into 2 volumes • e.g. 120GB into 2 60GB volumes • Can Shrink a volume • Can format unallocated space -Can also create mirrored volumes -Configuration done in Disk Management
Display Applet
-Resolution options • Important for LCD monitor native resolutions -Can configure the color depth and refresh rate • Located in Control Panel > Display > Adjust Resolution > Advanced Settings > Adapter "list all modes" -In Windows 10, it is located in Settings > System > then choose the Display option • Different settings available
External Cloud (shared resources)
-Resources are shared with a public cloud -No hardware purchase -No upfront costs -There is a cost to use the cloud
BIOS Supervisor Password
-Restricts BIOS changes -Required to make changes to any BIOS configs
Email Configurations for Mobile Devices
-Retrieving email (uses either POP3 or IMAP protocol) -Sending email (SMTP protocol) -Corporate email (microsoft exchange) -Different process for sending and receiving emails -Integrated Providers (iCloud, Google, Exchange Online, Yahoo) -Additional steps required to configure accounts
Routers
-Routes traffic between IP Subnets -Makes forward decisions based on IP address -Inside of switches called "Layer 3 Switches" -Often connects diverse network types (Can connect a Serial WAN Link, a Ethernet copper connection and an Ethernet Fiber connection on same device)
Virtualization Support
-Run other OS's within a single hardware platform -Multiple OS's share physical hardware components -Limited in software -Added to the processor -Hardware is faster and easier to manage -Intel Virtualization Technology (VT) -AMD Virtualization (AMD-V)
Windows 7 Professional
-Same features as Home Premium -Can connect to a Windows Domain -Supports Remote Desktop Host and EFS -Missing enterprise technologies - no BitLocker is supported -Available as a x64 version and supports 192 GB of RAM
Windows 10 processor requirements
-Same requirements as Windows 8/8.1 -PAE (Physical Address Extension) • 32-bit processors can use more than 4 GB of physical memory -NX (NX Processor Bit) • Protects against malicious software -SSE2 (Streaming SIMD Extensions 2) • A standard processor instruction set • Used by third-party applications and drivers
sfc (System File Checker) command
-Scans the integrity of all protected system files • sfc /scannow
Task Scheduler
-Schedules an application or batch file to run • Plan ahead -Includes predefined schedules - Click and go -Organized - Managed through folders -Located in Control Panel under Administrative Tools
Mobile Device Protective Covers
-Screen protector to avoid scratches (may be difficult to install) --Device protectors -Wraps the entire device -Waterproofing options are available -Can create problems for docking stations and wireless chargers
Level 2 Cache (L2 cache)
-Secondary level/storage of cache memory
Laptop Physical Locks
-Security cable attached to the laptop -Contains metal-reinforced locking slots where you can insert the lock -Other end contains a loop that would gos around a solid object -Prevents laptop theft
Impact Printer Ribbon Replacement
-Self-contained -One long circle (rotates many times in its lifetime) -Replace when ink becomes too light -Designed to be modular (replaceable in less than 1 min.) -Printer specific
Laptop Speakers
-Self-contained into the laptop -Not the highest quality (very small) -Often stereo (L/R) -Larger laptop may include a subwoofer
Sending Email on Mobile devices (Simple Mail Transfer Protocol (SMTP))
-Send mail from a device to a mail server (or between mail servers) -Must be sent from a local or trusted device -Authentication usually required (may be the same or different credentials than the incoming mail) *Port Numbers* -SMTP (no authentication) : TCP/25 -SMTP with authentication : TCP/587
DVI-A (Analog)
-Sends analog signals
DVI-D Dual Link
-Sends digital signals -Dual link ; 7.4 Gbps (HDTV at 85 fps)
Near Field Communication (NFC) Connections
-Sends small amounts of data wirelessly over a limited area -Built into your phone -used in payment systems, transportation, in-person information exchange -Acts as an Access token, Identity "card" -Contains encryption support for safe data transfers
The disk partition
-Separates the physical drive into logical pieces • Useful to keep data separated • Multiple partitions are not always necessary -Useful for maintaining separate operating systems • Windows, Linux, etc. -Formatted partitions are called volumes • Microsoft's nomenclature • Volume and Partition mean the same thing
Network and Sharing Center Applet
-Shows all network adapters • Wired, wireless, etc. -All network configs • Shows the HomeGroup option (n/a in Windows 10) • Can change Adapter settings • Can change network addressing
DVD-R/RW (DVD Read and ReWritable)
-Single Layer writable
Single Data Rate (SDR)
-Single clock cycle pulls 1 bit of data
Double Data Rate (DDR)
-Single clock cycle pulls 2 bits of data
The SCSI Standard
-Small Computer Systems Interface -Designed to connect many different kinds of devices into the standard format (hard drives, optical drivers, scanners, etc.) on the same SCSI bus -Up to 16 devices in a SCSI chain -Many different formats (Fast SCSI, Ultra SCSI, Ultra Wide SCSI, Ultra2 SCSI, Ultra3 SCSI, Ultra-320 SCSI, Ultra-640 SCSI, iSCSI (SCSI over IP)) -Parallel and Serial versions of SCSI available
Laptop Memory
-Small Outline Dual In-line Memory Module (SO-DIMM) -Micro-Dual In-line Memory Module (Micro-DIMM) -Almost exclusively used in laptops and mobile devices -Also available in SFF desktops
Removing Dubris for Thermal Printers
-Small amount of paper or dust -Contains no toner -Blow it out with compressed air (outdoor) -Wipe with a damp cloth (indoor) -Avoid using vacuum cleaner (unless if its designed for computers)
Micro-ATX form factor
-Smaller than Standard ATX -Limited expansion slots -Backward compatibility (similar mounting points and power)
Wearable Technology
-Smart Watch (extension of your phone) -Fitness monitor (tracks heart rate, steps, sleep patterns, and more)
BIOS (Basic Input/Output System)
-Software/Firmware to start the computer -Also known as system BIOS or ROM BIOS -Initializes CPU and Memory -Start the POST process
Windows 7 Enterprise
-Sold only with volume licenses • Designed for very large organizations -Multilingual User Interface packages -Supports full disk encryption with bitlocker drive encryption -Supports DVD playback, Aero, ICS, Windows Domain, EFS, etc...
Print Head Cleaning
-Some printers have an automatic daily cleaning process -cleaning process can be started manually (takes a few minutes) -some components can be removed to be cleaned manually -The clogged component requires cleaning
Troubleshooting Applet
-Some problems can be easily fixed • Have you tried turning it off and on again? -Automate some of the most common fixes • Troubleshooting option are categorized -May require elevated account access to enable/disable hardware and features
Infrastructure as a Service (IaaS)
-Sometimes referred to Hardware as a Service (HaaS) -Cloud model that provides all hardware to run applications -You are responsible for installing the applications and perhaps the OS -You are in charge of managing the software and data -You are responsible for the security and maintenance of all that information -Common implementation is Web Hosting Provider
Audio/Video Editing Workstation
-Specialized audio and video card (high quality audio and powerful video) -Large fast hard drive (Constant disk writes - SSD) -Dual monitors (edit in one monitor, view output in the other)
E-Readers
-Specialized device to read books -Can play some music and apps -Uses a technology called Electronic paper -Uses a black and white screen which performs well in direct light -Exceptionally long battery life (battery is used when changing pages) -WiFi and cellular network access
Print to PDF (Portable Document Format)
-Specific format created by Adobe -One-way path from application to PDF -Cross-platform compatibility -Proprietary Adobe format (many readers available in any OS) -Many browsers have a built in viewer to read the document
Printer Drivers
-Specific to a printer model (Get this EXACTLY right) -Get the correct OS drivers (win7, win8/8.1, win10) -Get the right version, 32 bit OR 64 bit OS -You can't mix and match
Fan Specifications
-Standard Sizes (80mm, 120mm, 200mm) -Different speeds (Variable Speeds) -Different noise levels (not all fans sound the same)
External Storage Device
-Storage outside the computer -Removable -Very portable -Easy to move large files -examples USB flash drive, SSD or Hard Drive -connectivity methods USB, Thunderbolt, eSATA, etc... -Can be a security concern
Cloud-Based File Storage Services
-Store files in the cloud -Access, share, and edit from anywhere -Easy to collaborate (one place for all files) -Synchronization app allows files to store in a folder on your local drive, the app then syncs to the cloud -Common providers are Dropbox, Google Drive, MS OneDrive, Box
Nonvolatile BIOS memory
-Store the BIOS configuration (your settings) -Complementary metal-oxide semiconductor (CMOS)- -A type of memory -May be backed up with a battery -Usually flash memory theses days (easily stored and accessed)
USB 3.0
-SuperSpeed -5 gigabits per second -3 meters
USB 3.1
-SuperSpeed+ -Higher speed communication between Type-A and USB-C connectors -10 Gbit/sec speed (twice the rate of USB 3.0)
System Applet
-System properties • Provides Computer information • Including version and edition -Remote settings can be turned on or off for Remote Assistance and Remote Desktop -System protection • Can enable/disable System Restore • Select drives to allocate additional space for system restore -Performance Options located under Advance System Settings can be set for: • Configuring Virtual Memory • Configuring Visual Effects • Configuring Data Execution Prevention (DEP)
Service Location Protocol (SLP)
-TCP & UDP 427 -Populates the list of available devices
Domain Name System (DNS)
-TCP & UDP 53 -Converts names to IP addresses -These resources are very critical in which there is usually multiple servers in production in case one goes offline
NetBIOS Session Service (nbsession)
-TCP 139 -connection-oriented version of nbdatagram
Internet Message Access Protocol version 4 (IMAP4)
-TCP 143 -Receives emails from an email server (authenticate and transfer) -Includes management of email inbox from multiple clients -Provides enhanced features over POP3
File Transfer Protocol (FTP)
-TCP 20 (active mode data) -TCP 21 (control) -Transfers files between systems -Authenticates with a username and password -Some systems use a generic/anonymous login -Provides full feature functionality (you can list, add, delete, rename, etc.)
Telecommunication Network (Telnet)
-TCP 23 -Used when older equipment does not support SSH -Login to device remotely -Console access -In-the-clear communication (no encryption) -Not the best choice for production systems
Simple Mail Transfer Protocol (SMTP)
-TCP 25 -Server to Server email transfer -Also used to send mail from a device to a mail server (commonly configured on mobile devices and email) -POP3 or IMAP are used when receiving emails
Remote Desktop Protocol (RDP)
-TCP 3389 -Can share a desktop from a remote location -Available on many windows versions -Can connect to an entire desktop or just an application -Many clients for Windows, MacOS, Linux, Unix, iPhone, Android, and others
Lightweight Directory Access Protocol (LDAP)
-TCP 389 -Associated with corporate networks -Store and retrieve in a network directory (commonly used in Microsoft Active Directory) -
Hypertext Transfer Protocol Secure (HTTPS)
-TCP 443 -Communication in the browser and by other applications -Web Server Communication with encryption -Encrypted version -Supported by nearly all web servers and clients
Server Message Block (SMB)
-TCP 445 -Protocol used by Microsoft Windows -Used for file sharing, printer sharing -Also called Common Internet File System (CIFS) -Direct SMB communication over TCP without the NetBIOS transport -Direct over TCP (NetBIOS-less)
Ephemeral ports
-Temporary port numbers -Ports 1,024 through 65,535 -Determined in real-time by the client
AMD (Advanced Micro Devices)
-Tends to be less expensive -CPU is geared towards value
Intel
-Tends to be more expensive -CPU is geared toward performance -Has a large portfolio of laptop options
regedit.exe
-The Windows Registry • The big huge master database • Hierarchical structure • Use to configure different parts in Windows • Use to configure different applications in Windows -Used by almost everything in Windows • Kernel, Device drivers • Services • Security Account Manager (SAM) • User Interface, Applications -Backup your registry! • Also called a hive • Use "export" to backup the registry • Built into regedit - Located under C:\Windows • Can also open through the cmd line or Run cmd
Windows 10 Pro
-The business version of Windows • Additional management features -Remote Desktop host • Remote control each computer -Supports: • Hyper-V • Bitlocker (Full Disk Encryption (FDE)) • Can join a Windows domain (Group Policy management) -Does not support: • AppLocker • BranchCache -Max x86 RAM 4 GB -Max x64 RAM 2048 GB
Windows 7 Home Premium
-The consumer edition • DVD playback, • Windows Aero • Internet Connection Sharing • IIS Web Server -No enterprise technologies • No domain connection, BitLocker, EFS, etc. -Available as a x64 version and supports 16 GB of RAM and 2 processors
Disk partitioning
-The first step when preparing disks • May already be partitioned • Existing partitions may not always be compatible with your new operating system -An MBR-style hard disk can have up to four partitions -GUID partition tables support up to 128 partitions • Requires UEFI BIOS or BIOS-compatibility mode • BIOS-compatibility mode disables UEFI SecureBoot • You'll probably have one partition -BE CAREFUL! • Serious potential for data loss • This is not an everyday occurrence
USB-C
-The newest, and most versatile, type of USB connector. -24-pin double sided USB Connector (used for both hosts and devices)
Even Parity Bit
-The number of bits in the sequence that add up to an even number.
SNMP v1
-The original -Structured tables -In-the-clear (no encryption)
Legacy BIOS
-The original / traditional BIOS (been around for more than 25 yrs) -Limited hardware support (No drivers for modern network, video, and storage devices) -Older OS's talked to hardware through the BIOS (instead of access hardware directly)
Windows 8/8.1 Pro
-The professional version • Similar to Windows 7 Professional / Ultimate -Full support for BitLocker and EFS • Full-disk and file-level encryption -Can join a Windows Domain • Support for IT management • Group Policy support • Centralized management of Windows devices -Does not support AppLocker or Branchcache -Available in 32-bit (Max 4 GB RAM) and 64-bit (Max 512 GB RAM)
Ampere (amp, A)
-The rate of electron flow past a point in one second -e.g. diameter of the hose
WiFi Antennas
-The wires wrap around the laptop screen at the highest point -Contains a main, aux, and bluetooth connection
Security considerations
-There's a reason we are careful when installing applications • Applications have the same rights and permissions as the user • An unknown application can cause significant issues -Impact to device with unknown application • Application upgrade stops working • Slowdowns • Deleted files -Impact to network with unknown application • Access to internal services • Rights and permissions to file shares
Laser Printer Maintenance Kit
-They wear out (all those moving parts; lots of heat and pressure involved) -Standard maintenance kit (replaces feed rollers, new fuser unit, etc..) -Check printers page counter to see when maintenance is required -Power down to replacements components (fuser units are hot) -Reset page counter when done
Laptop
-Thick client that is mobile -Touchpad configuration -sync and backup can be cloud-based or local drive -Wireless connectivity -Additional security (VPN connectivity or local drive encryption)
PCI 533 MB/s Throughput
-Throughput of a bus running a 64-bit card at 66 MHz clock rate
Plenum-rated cable
-Traditional Cable Jacket --Polyvinyl chloride (PVC) -Fire-rated cable jacket --Flourinated ethylene polymer (FEP) or low-smoke polyvinyl chloride (PVC) -Plenum-rated cable may not be as flexible (may not have same bend radius)
Magnetic Disk
-Traditional spinning drive platters -Larger capacity available in this format -Inexpensive compared to SSD
Optical Fiber Communication
-Transmission by light -No RF signal (difficult to monitor or tap) -Signal slow to degrade (can transmit over long distances) -Immune to radio interference
TCP and UDP
-Transported inside of IP (encapsulated by the IP Protocol) -Two ways to move data (different features for different applications) -Referred to OSI Layer 4 (Transport Layer) -Multiplexing allows you to use many different applications at the same time
Identifying the current BIOS version
-Try to catch the version during system boot-up (difficult to catch) -Bring up System Information (msinfo32) -Compare the current to the existing (upgrade might not be available) -Get a copy of the current version to downgrade if needed
Hotspot Connections
-Turns the phone into a WiFi hotspot -Your own personal wireless router -Extends the cellular data network to all of the devices -Dependent on phone type and provider (may require additional charges and data costs)
Hotspot (Mobile Device Connectivity)
-Turns the phone into a WiFi router -Extra charges may apply -Other devices can connect to your phone via WiFi
Double Data Rate 2 (DDR2) SDRAM
-Twice as fast as DDR (Faster speeds) -Not backwards compatible with DDR slots
Double Data Rate 3 (DDR3) SDRAM
-Twice the data rate of DDR2 -Larger chip capacities -Max 16GB per DIMM -Not backwards compatible with DDR2, DDR
Thunderbolt v1
-Two channels -10 Gbit/s per channel -20 Gbit/s total throughput -Mini DisplayPort connector
Coaxial cable (coax)
-Two or more forms share a common axis -RG6 used in TV/Digital Cable (and high-speed Internet over cable) -RG59 used as patch cables (not designed for long distances)
Multiple BIOS versions
-Two separate versions (main and backup) -easily switch between them -easy to upgrade one version without corrupting the other
NetBIOS Name Service (nbname)
-UDP 137 -Use to locate a device on the network by its name
Simple Network Management Protocol (SNMP)
-UDP 161 (queries devices) -UDP 162 (traps/alarms) -Used to gather statistics from network devices
Dynamic Host Configuration Protocol (DHCP)
-UDP 67 & 68 -automated configuration of IP address, subnet mask, and other options -IP addresses are assigned in real-time from a pool -Each system is given a lease and must renew at set intervals -Addresses can be assigned by MAC addresses in the server (reservations) -Quickly manage addresses from one location
Types of installations
-Unattended installation • Answers Windows questions in a file (unattend.xml) • No installation interruptions • No user intervention -In-place upgrade • Maintain existing applications and data -Clean install • Data backup required • Wipe the slate clean and reinstall • Migration tool can help -Image • Deploy a clone on every computer • Quick installation on many computers -Repair installation • Fixes problems with the Windows OS • Does not modify user files • Re-installs the OS • Multiboot • Run two or more operating systems from a single computer • Can you 2 OS's from 1 hard drive -Recovery partition • Creates hidden partition with a copy of Windows installation files • Commonly used with repair installation • Installation media not needed -Refresh / restore • Windows 8/10 feature to clean things up • Requires a recovery partition • No installation media needed
-5V
-Uncommon to find this voltage on mobo -Power supply might not provide this voltage -provided power for ISA adapter cards (most cards didnt use it) -Todays mobo's dont have ISA slots
-12V
-Uncommon to find this voltage on mobo -provides power to Integrated LAN, older serial ports, some PCI cards
Upgrading to Windows 10
-Upgrade from the Windows 10 installation media • Downloadable versions are available from Microsoft • Includes a media creation tool -You cannot upgrade x86 to x64 OR x64 to x86 • Applies to all Windows versions • You'll have to migrate instead
Why upgrade?
-Upgrade vs. Install • Upgrade - Keep files in place • Install - Start over completely fresh -Upgrading allows you to maintain consistency • Upgrades save hours of time • Can keep customized configurations and multiple local user accounts on the PC • Avoids application reinstallations • Keeps user data intact • Get up and running quickly • Seamless and fast • Run from the DVD-ROM or USB flash
Command line troubleshooting
-Use "help" if you're not sure • > help dir • > help chkdsk -Also use: • [command] /? -Close the prompt with exit -Useful when additional information is needed for a certain command
KVM (Keyboard, Video, and Mouse) switch
-Use many computers with a single keyboard, video display, and mouse
Laser Printer Cleaning
-Use water, isopropyl alcohol -Don't use harsh chemicals -Outside of printer use damp cloth -Inside of printer wipe dust away -Don't use vacuum or compressed air -Wash off skin with cold water -Dirty rollers can be clean with isopropyl alcohol
Laptop Keyboard
-Used on laptop computers -More compact -10-key touch available in larger laptops
Bridge
-Used to connect Hub networks in early networking -A switch with 2 to 4 ports -Makes forwarding decisions in software -Can connect different physical networks (different topologies) and network size limitations/collisions. -Distributes traffic based on MAC address -An example of a modern bridge is a wireless access point (bridges wired ethernet to wireless)
User Authentication (Printer Data Privacy)
-User authentication -Everyone can print -you can set rights and permissions -Printing vs managing the printer
Local users and groups
-Users • Administrator - the Windows super-user • Guest -Limited access • Most users are "Regular" Users -Groups • Administrators, Users, Backup Operators, Power Users, etc. • Users can be added to groups • Permissions are easier to manager by groups instead of individual user access.
Virtual Desktop Infrastructure (VDI)
-Users connect to a pre-built desktop -Access from almost any OS (Windows, MacOS, Linux, iOS, Chromebook, Web Browser) -All communication in the desktop stays local to the virtual desktop -No sensitive info. sent from the local device
Synchronization connections for iOS Devices
-Uses a USB standard Type A plug if connecting to a computer -USB - Proprietary (30-pin or 8-pin Lightning) -USB-C -802.11 wireless -Mobile network
Synchronization connections for Android Devices
-Uses a USB standard Type A plug if connecting to a computer -USB Micro-B -USB-C -802.11 wireless -Mobile network
Laptop Digitizer
-Uses a pen-like device as input (Stylus input) -Useful for graphical input -Becoming more common on laptops/tablets or hybrid devices
Fuser Assembly
-Uses heat and pressure to melt plastic toner powder and bond it to the paper.
Step 6 : Fusing
-Uses heat and pressure to melt the toner to the paper permanently -Reason why the paper is warm
Tablets
-Usually runs iOS or Android OS -Larger than ~7in diagonally -Designed for touch input (virtual input, drawing interfaces) -Can support wide range of applications (gaming, specialized productivity/utility apps) -Can take pictures or watch movies
Windows 10 Education and Enterprise
-Very similar features in both • Minor features differences • Both are managed by using Windows Volume licensing -Granular User Experience (UX) control • an administrator can define the user environment • Useful for kiosk and workstation customization -Supports: • Hyper-V • Bitlocker • Can join a domain • AppLocker (an administrator can control what applications can run) • BranchCache (remote site file caching) -Max x86 RAM 4 GB -Max x64 RAM 2048 GB
Webcams
-Video capture -Either external or built-in camera (laptop) -Connected via USB or 802.11 WiFi -Includes both audio and video -Specialized drivers and software required
Media Center
-Video, music, and television portal • Perfect for watching at home • Record shows from a TV tuner • Play music • Watch DVDs -The center of your home entertainment center • Cable companies and other technologies were strong competition -Discontinued by Microsoft • Not officially available in Windows 10
Notepad
-View and edit text files • You'll use a lot of text files -Included with almost any version of Windows
Dual-Voltage input options
-Voltage varies by country -Manually switch between 110V/115 and 220V/230V -Switch is located in back of power supply -Get a meter and measure voltage -Auto-switching power supply are available -Connecting 230V power supply to 115V power source might not cause permanent damage -DO NOT PLUG a 115V power supply into a 230V power source; will cause serious damage.
SOHO IP Adressing
-WAN Interface is assigned through DHCP from ISP -May require authentication -LAN Interface assign internal IP and subnet mask -Provides IP's through DHCP -DNS IP(s) are obtained by the WAN DHCP
Windows 8 and 8.1 history
-Windows 8 • Available October 26, 2012 • New user interface - no traditional "Start" button -Windows 8.1 • Released October 17, 2013 • A free update to Windows 8 - not an upgrade -Mainstream support ended January 9, 2018 • Extended support ends January 10, 2023
Fast Startup
-Windows 8 and 10 does not shut down all the way -Starts up very quickly -Unable to open BIOS config -Disable in Control Panel > Power Options -Most mobo's have a separate process (hold F2 then press power button to enter BIOS)
Explorer
-Windows Explorer / File Explorer (Windows 10) • File management -View, copy, launch files from File Explorer • Granular control -Easy access to network resources • Browse and view
msinfo32.exe
-Windows System Information • A wealth of knowledge -Shows information on Hardware Resources • Memory, DMA, IRQs, conflicts -Shows information on Components • Multimedia, display, input, network -Shows information on the Software Environment • Drivers, print jobs, running tasks - Located under C:\Windows\System32 • Can also open through the cmd line or Run cmd
System Restore
-Windows creates frequent restore points • Goes back-in-time to correct problems • Creates restore points after a windows update or after installing new software -Start by pressing F8 - Advanced Boot Options - Repair -In Windows 7/8/8.1/10 it is located in Control Panel under Recovery -Doesn't guarantee recovery from viruses and spyware/malware • All restore points might be infected
net command
-Windows network commands -Views network resources • net view \\<servername> • net view /workgroup:<workgroupname> -Map a network share to a drive letter • net use h: \\<servername>\<sharename> -View user account information and reset passwords • net user <username> • net user <username> * /domain
Graphics Workstation
-Works with software that allows Computer Aided Design (CAD) / Computer Aided Manufacturing (CAM) -Requires SSD (High speed storage) -High-end video (complex graphics) -Maximum RAM
Step 3 : Exposing
-Writes the image with the laser -Laser neutralizes every negative charge where the image will go
Laptop Touchpad On/Off Setting
-You can enable or disable this function with a FN key -Turning this option off avoids inadvertent mouse clicks and movements
Desktop styles
-Your computer has many different uses • Those change depending on where you are -Work styles • Standard desktop • Common user interface • Customization very limited • You can work at any computer due to Active Directory -Home • Complete flexibility; No restrictions • Background photos, colors, UI sizing
RAID (Redundant Array of Independent Disks)
-a method of storing data on two or more hard drives that work together -Different types of levels -Some redundant, some not
Hypervisor
-a.k.a Virtual Machine Manager -Manages the virtual platform and guest OS's -The CPU can provide better virtualization performance if it is supported -In charge of hardware management (CPU, Networking, Storage, Security, etc...)
Internal USB Connector
-allows connectivity to computer case USB interfaces -located on the motherboard
RJ45 printer connector (wired device sharing)
-allows you to connect the printer to the wired network
Software as a Service (SaaS)
-also referred to as On-Demand software -No local installation -Application and data is maintained by 3rd party provider -Cloud-based provider is responsible for maintenance, security, and everything else associated with the application - No development work required, just log in and it is available -Common implementation is Google Mail
PCI 64-bit expansion card
-card slot is a bit longer -Slot provides power at 3.3V or 5V -device can use either available power -3rd notch signifying that it is a 64-bit card -Card should be able to slide in without much force. -Confirm notches are lined up
The Windows command line
-cmd • The "other" Windows • Can start utilities from the cmd line • Many options available under the hood • Faster to do tasks on the cmd line compared to GUI
RAID 1+0 - A Stripe of Mirrors (a.k.a RAID 10)
-combines striping (RAID 0) with mirroring (RAID 1) -RAID 0 stripes data across the drives, RAID 1 mirrors that data -High disk space utilization -High redundancy -Minimum of 4 drives
Scanner
-connected via USB or 802.11 WiFi -Different form factors (AIO or Flatbed) -May include Automatic Document Feeder (ADF) -Scan scan large amount of papers with ADF
Motherboard Jumpers
-contains jumpers for pwr, hdd, etc... -connects from pc case to the motherboard -allows connection to interfaces at the front of the case, such as Power LED, HDD LED, Reset SW, etc..
File management
-dir • Lists files and directories in cmd prompt -cd • Change working directory in cmd prompt • Use backslash \ to specify volume or folder name -.. • Two dots/periods in cmd prompt • The folder above the current folder
Impact Printer Print Head Replacement
-directly hits ribbon and paper (Takes a lot of abuse) -Need to replace when pins stop working -Gets very hot -Look for a release lever or bar to take out component (Designed to be modular) -Can also replace ribbon for best effect
Other file systems
-ext3 • Third extended file system • Commonly used by the Linux OS -ext4 • Fourth extended file system • An update to ext3 • Commonly seen in Linux and Android OS -NFS • Network File System • Access files across the network as if they were local • NFS clients is available across many operating systems -HFS+ / HFS Plus • Hierarchical File System • Also called Mac OS Extended • Replaced by Apple File System (AFPS) in macOS High Sierra (10.13) -Swap partition • Memory management • Frees memory by moving unused pages onto disk • Copies back to RAM when needed • Usually a fast drive or SSD
TIA/EIA 568A
-green-white, green -orange-white, blue -blue-white, orange -brown-white, brown
Separation Pad
-helps pick up the top sheet of paper from your paper tray, not multiples sheets -Small and inexpensive, easy to clean or replace
PC 64-bit slots
-longer slots -extra notch
TIA/EIA 568B
-orange-white, orange -green-white, blue -blue-white, green -brown-white, brown
+12V
-provides power to large components such as PCIe adapters, hard drive motors, cooling fans, most modern components
Conventional PCI (Peripheral Component Interconnect)
-referred to as PCI bus -Parallel communication -32-bit and 64-bit bus width
Shutdown command
-shutdown • Shutdown a computer • And optionally restart "shutdown /r" -shutdown /s /t nn • Wait nn seconds, then shutdown -shutdown /r /t nn • Shutdown and restart after nn seconds -shutdown /a • Abort the countdown!
FAT16
16-bit File Allocation Table A file allocation table which uses 16 bits for addressing clusters.
DB-25
5 Serial Communications D-Shell Connector, 25 pins
robocopy (robust file copy)
A Windows command that is similar to and more powerful than the xcopy command, used to copy files and folders.
service
A Windows process that does not require any sort of user interaction and so runs in the background
Event Viewer
A management console snap in for viewing and managing system logs (accessed through computer managment, administrative tools, or eventvwr.msc)
Local Users and Groups
A managment console that provides an interface for managing user and group accounts.(not available in Starter or Home editions)
BranchCache
A new feature of Windows 7 that enables users to rapidly access data from remotely located file and web servers. This enables users at a small branch to cache copies of frequently accessed files from head office servers on a local computer.
Factory Recovery Partition
A partition that contains an image of the bootable partition created when the computer was built.(Restores OS to factory settings)
net localgroup Administrators dmartin /add
Add dmartin to the Administrators local group
crontab -1
Add or delete a scheduled job in cron
ARP
Address Resolution Protocol Resolves IP addresses to MAC addresses. ARP poisoning attacks can redirect traffic through an attacker's system by sending false MAC address updates. VLAN segregation helps prevent the scope of ARP poisoning attacks within a network.
net user dmartin Pa$$w0rd /add /fullname: "David Martin" /Logonpasswordchg:yes
Adds a new user account and forces user to change password at first logon (have to enter these commands in administrative command prompt)
bootrec /rebuildbcd
Adds missing Windows installations to the BCD
ACPI
Advanced Configuration Power Interface. Power management specification that far surpasses its predecessor, APM, by providing support for hot- swappable devices and better control of power modes.
AES
Advanced Encryption Standard. A symmetric algorithm used to encrypt data and provide confidentiality. AES is quick, highly secure, and used in a wide assortment of cryptography schemes. It includes key sizes of 128 bits, 192 bits, or 256 bits.
ATAPI
Advanced Technology Attachment Packet Interest An interface between your computer and attached CD-ROM drives and tape backup drives. Most of today's PC computers use the standard Integrated Drive Electronics (IDE) interface to address hard disk drives. ATAPI provides the additional commands needed for controlling a CD-ROM player or tape backup so that your computer can use the IDE interface and controllers to control these relatively newer device types.
ATX
Advanced Technology eXtended Is a motherboard configuration specification developed by Intel in 1995 to improve on previous de facto standards like the AT design. -Older versions = 20 pin pwr -Newer version = 24 pin pwr -Ports are integrated -Is not compatible with Baby AT or LPX -12x9.6 inches or 12x10 inches but may vary slightly
Differential backup
All data modified since last full backup(moderate backup time, moderate restore time uses no more than two tape sets)
full backup
All selected data regardless of when it was previously backed up (high backup, time low restore time uses one tape set)
Event Viewer
Allows monitoring of Windows logs. System, security, application, and service events are recorded in these logs
Business client
An OS designed to work as a client in a business network
EULA
End User License Agreement
popular linux GUIs
Gnome, KDE, Cinnamon, Xfce
IDS
Intrusion Detection System
KB
Knowledge Base
MIDI
Musical Instrument Digital Interface
OCR
Optical Character Recognition
POST
Power-On Self-Test
ipconfig /release AdapterName
Release the IP address obtained from a DHCP server so the network adapter will no longer have an IP address
ren
Renames a file or directory
Transmit Power
Sets radio power level, typically set to the highest level by default
Creator Owner Group
The account that created or "owns" an object, usually a user account.
LPL
Windows Logo'd Product List- catalog of tested devices and drivers
Everyone Group
Windows group that includes all users
mkfs
linux command-line program used to format a partition
ext
linux file system
WIndows Memory Diagnostic
tool to test the memory chips for errors
Upgrading from Windows 7
• Keeps Windows settings, personal files, and applications • Must upgrade to a similar Edition
PowerShell Script comment
#
Services tab
- Can enable and disable Windows services • Determine what starts during boot -Easier to manage than the Services applet • Click/unclick -Useful for trial and error • It may take many reboots to find your problem
Task Manager
- Provides Real-time system statistics • CPU, memory, disk access, etc. -Starting the Task Manager: • Ctrl-Alt-Del, select Task manager • Right mouse click the taskbar and select Task Manager • Ctrl-Shift-Esc -Enhancements since Windows 7 • More information and features
Windows 8/8.1 Editions
- Windows 8/8.1 (Core) - Windows 8/8.1 Pro - Windows 8/8.1 Enterprise
PCIe V4.x
- ~2 GB/s of throughput per lane in each direction
PCIe V5.x (expected in 2019)
- ~4 GB/s of throughput per lane in each direction
3D Printers
-"Prints" in three dimensions -Create an item based on an electronic model -Additive manufacturing (start with nothing and melt some filament layer by layer to create an object) -No machining process required -Rapid prototyping (design and create, make changes as needed; relatively quickly and inexpensively) -Designs can be deployed anywhere in the world or in space on the International Space Station
Laptop LCD Switch
-"Refrigerator door" effect means which screen will be used depending whether the laptop screen is open or closed -Can be a physical switch on older systems -Internal magnetic switch on newer systems -Can cause the system to go into suspend mode, functionality can be set in BIOS or a utility to either stay on or to turn off
PowerShell escape character
--%, ', \,
PCI 266 MB/s Throughput
--Bus version running at: -32-bit card running at 66 MHz (clock rate) or -64-bit card running at 33 MHz (clock rate)
PCI Express x1 Lane
-1 lane (1 lane in one direction and another 1 lane in the opposite direction)
SATA Revision 1.0
-1.5 Gbit/s -Max cable size : 1 meter
USB 1.1 Low Speed
-1.5 megabits per second -3 meters
PCI Express x12 Lane
-12 lanes (12 lanes in one direction, another 12 lanes in the opposite direction)
SATA Revision 3.2
-16 Gbit/s -Max cable size : 1 meter
Thunderbolt v2
-20 Gbit/s aggregated channels -Mini DisplayPort connector
USB-C Connections
-24-pin double sided USB connector -Used for both hosts and devices -Acts as a USB 3.1 connection or 2.0 connection -Can also act as an analog audio option with an adapter (headset support through a 3.5mm jack)
SATA Revision 2.0
-3.0 Gbit/s -Max cable size : 1 meter
Operating system technologies
-32-bit vs. 64-bit • Processor specific -32-bit processors can store 2³² = 4,294,967,296 values -64-bit processors can store 2⁶⁴ = 18,446,744,073,709,551,616 values • 4 GB vs. 17 billion GB • The OS has a maximum supported value -Hardware drivers are specific to the OS version (32-bit / 64-bit) • 32-bit (x86), 64-bit (x64) -32-bit OS cannot run 64-bit apps • But 64-bit OS can run 32-bit apps -Apps in a 64-bit Windows OS • 32-bit apps: \Program Files (x86) • 64-bit apps: \Program Files
Molex connector
-4-pin peripheral power connector -Created by Molex Connecter Company -AMP MATE-N-LOK -Provides +12v and +5V -Power for many devices in the computer case (Storage, Optical drives, Fans, Other peripherals)
DVD-ROM (digital versatile disc read-only memory)
-4.7 gigabytes (GB) for single-layer -8.5 gigabytes (GB) for dual-layer
Thunderbolt v3
-40 Gbit/s aggregated channels -USB-C connector
USB 2.0
-480 megabits per second -5 meters
PCIe v2.x
-500 MB/s of throughput per lane in each direction
64-Bit PCI Parallel Bus
-64 bits sent at the same time -wider bus
RJ45 Connector
-8 position, 8 conductor connector (8P8C) -8 wires available, All 8 are used -Associated with wired-ethernet connection -Similar in shape to an RJ48C
Laptop Wireless Cards
-802.11 Wireless connection -WWAN - Cellular based wireless connection -WPAN - Bluetooth wireless network -Comes in Mini-PCI or Mini-PCIe cards -Make sure the antennas are plugged in
BD-RE (Blu-ray disc Recordable Erasable)
-A Blu-ray disc that can be rewritten to multiple times.
CD-RW (Compact Disc-ReWritable)
-A CD that can be written to multiple times
Windows 8/8.1 Core
-A basic version for the home • x86 and x64 versions -Microsoft account integrates into the OS • Login to your computer and all of your services -Includes Windows Defender • Integrated anti-virus and anti-malware -Uses Windows Media Player to Play audio CDs and DVDs -Does not support EFS, Bitlocker, Domain Member, AppLocker, BranchCache -Available in 32-bit (Max 4 GB RAM) and 64-bit (Max 128 GB RAM)
User Datagram Protocol (UDP)
-A connection-less protocol -No formal process when starting or ending the connection -Unreliable for of delivery -No error recovery -No reordering of data or retransmissions -No Flow Control -Sender determines amount of data transmitted -No ACK needed
Transmission Control Protocol (TCP)
-A connection-oriented protocol -There is a formal process when starting and ending the connection -A reliable form of delivery -Can recover from errors and can re-transmit the data -Can manage out-of-order message or retransmissions -There is Flow Control where the receiver can manage how much data is sent (slow or speed things up) -Station A ACKnowledges received data (ACK) from Station B -Data is resent if Station A does not receive an ACK from Station B
Metered Cloud Services
-A cost for almost anything -upload a file, download a file, store a file on that cloud service have costs associated to it -A way to look at costs associated with using that app in the cloud
Burners
-A device that is used to read and create make CD and DVDs -Information is written to the CD/DVD by darkening the photosensitive dye
Software-based RAID
-A feature of the OS -Does not required special hardware -Lower performance than hardware-based
Hardware-based RAID
-A feature of the hard drive controller -Configured outside of the OS (usually invisible to the OS) -Higher performance, designed for speeds
Non-Metered Cloud Services
-A flat costs over certain amount of time -A flat fee to upload and download files
eMMC (embedded MMC)
-A form of embedded flash memory widely seen in mobile devices.
Laptop Rotating/Removable Screens
-A laptop keyboard and tablet screen combined (can be twisted around with keyboard facing us) -Can be used for presentations -May include a stylus for input -Can be detached from keyboard and use the stylus for input
Hybrid Cloud Deployment Model
-A mix of public and private -Part of the cloud-based services running in a private data center; other aspects of the service running in a public provided cloud
Virtualization characteristics
-A native OS -Performs native OS processes -Identical to using a non-virtual system
Computer Management
-A pre-built Microsoft Management Console • A predefined mix of plugins • Control Panel / Administrative Tools - To create your own Microsoft Management Console, you can do the following: • Go to "C:\Windows\System32" and click on "mmc.exe" • Click on Start and search for mmc.exe • cmd prompt and type in mmc.exe • You can add or remove snap-ins as needed -A handy starting point • Events • User accounts • Storage management • Services • And more!
SNMP v3
-A secure standard -Message integrity -Authentication method -Encryption
Duplexing Assembly
-A two step process to print on both sides -a mechanism to flip the page automatically -Can be built-in to the printer or added as an add-on.
Secure Digital (SD) card
-A type of memory card used in digital cameras, tablets, cell phones, MP3 players, digital camcorders, and other portable devices. -The three standards used by SD card -regular SD - Up to 2GB using FAT 12 and 16 file systems -SD High Capacity or SDHC - over 2GB to 32GB using FAT32 file system -SD eXtended Capacity or SDXC - over 32GB-2TB using exFAT file system
xD-Picture Card
-A type of memory card, typically used with digital cameras
HomeGroup Applet
-A way to easily share information • Windows 7 / Windows 8 • No HomeGroup options on Windows 10 • Documents, pictures, music, video -A network for the home • Must be set to "Home" in Windows -Enable HomeGroup • A single password is created for everyone to use
Storage spaces
-A windows feature -Storage primarily designed for data centers, cloud infrastructures to easily add storage space • Multiple tiers of available spaces • Different types of administrative control that can be assigned to those spaces -Storage pool • A group of storage drives • Can combine different storage devices into a single pool • Easy to add or remove space in the pool -Storage space • Virtual disks are allocated from available space in the pool • Can specify if its a standalone, mirrored, or striped virtual disk • Includes options for mirroring and parity • Hot spare available as a replacement drive
SOHO Access Point Settings
-Ability to enable/disable frequencies (2.4 GHz and/or 5 GHz) -Configure SSID (each frequency is different) -Choose the type of security mode -WPA2 (preferable) -Configure a pre-shared key -Configure enterprise mode (Username and password required) -Configure the bandwidth channel(s) for this connectivity
Network Attached Storage (NAS)
-Accessible from anywhere -Central location for media storage -Central location for file storage -Gigabit NIC -RAID Array -High-capacity hard drives
Domain Services
-Active Directory Domain Services • Large database of your network • Contains info. on users, computers, and the systems they connect to. -Distributed architecture • Many servers • Not suitable for home use -Everything documented/managed in one place • User accounts, servers, volumes, printers -Many different uses • Authentication • Centralized management
Motherboard PATA Interface
-Actually has 39 pins (1 pin removed to plug cable one particular way)
hot-swappable drive
-Add or remove drives while the system is running -Connection is "hot" -USB is an example -FireWire is also an example -SATA, eSATA - Part of the standard -Combine with RAID for 100% uptime
Step 4 : Developing
-Adds toner to the charged areas that have been neutralized on the imaging drum -Toner has a negative charge associated to it, so it wont stick to the negatively charged areas from Step 2.
InkJet Printer Calibration
-Aligns the nozzles to the paper -Lines should be crisp and color shouldn't overlap -Menu options are available on the printer itself (does not need to be connected to a system) -Minor adjustments can be made
HDMI (High-Definition Multimedia Interface)
-All digital connection (no analog) -Sends both audio and video -20 meter distance before losing too much signal -19-pin (type A) connector
Private Cloud Deployment Model
-All hardware is self own -Your own virtualized local data center -All cloud-based services will be virtualized in an environment control by you
Replacing Laptop Storage
-All internal (either open a small cover OR remove the whole cover to locate the hard drive) -Can be very modular once the drive is located (remove a few screws and the drive slides out)
SSD (Solid-State Drive)
-All memory, no moving parts -Silent, fast access time, less latency -Better performance
Windows Firewall with Advanced Security
-Allows for a more detailed control of inbound/outbound traffic -Can configure: • Inbound rules • Outbound rules • Connection security rules -Can also configure granular rules to specify: • Program • Port number • Predefined services • Custom Variables -Custom variables can include options for the rule such as: • Program • Protocol/Port • Scope • Action • Profile
SOHO UPnP (Universal Plug and Play)
-Allows network devices to automatically configure and find other network devices -Zero Configuration -Applications on the internal network can open inbound ports using UPnP -No approval needed -Used for many peer-to-peer (P2P) applications -Best practice would be to disable UPnP -Only enable if the application requires it (and maybe not even then)
Laptop Docking Station
-Allows you to use an external kebyoard and mouse -You can extend existing laptop interfaces that are always plugged in (printers, monitors) -Expansion cards can also be connected to this device (if available) -Helps avoid cabling issues when connecting to other devices
Ethernet over Power (EoP)
-Also called Power-Line Communication (PLC) -Operates at 500 Mbps -Uses existing electrical system of the building -One adapter connects to the power outlet and close to the router/modem. Other adapter connects close to the PC that needs network connectivity -Works similarly to DSL technology (electricity and data are carried at different frequencies) -No software/hardware configuration needed -Plug and Play
DSL modem
-Also known as ADSL (Asymmetric Digital Subscriber Line) -uses telephone lines for connectivity -It is Asymmetric due to download speed being faster than upload speed -~10,000 foot limitation from the central office (CO) -52 Mbit/s downstream ; 16Mbit/s upstream are common -Possible faster speeds if closer to the CO
BIOS Important Tips
-Always have a backup of the config -Do not make changes unless you are certain of a setting -Upgrade for a specific reason -Always have a backup of the config (Important!)
Small Office/Home Office (SOTO) Router
-An all-in-one device -It is a modem, router, switch, wireless AP, firewall, etc...
DVI (Digital Visual Interface)
-An interface used with displays. -It includes DVI-A for analog displays, DVI-D for digital, and DVI-I integrated for both analog and digital. -Single link; 3.7 Gbps (HDTV at 60 fps) -Dual link ; 7.4 Gbps (HDTV at 85 fps)
BD-R (Blu-ray Disc-Recordable)
-An optical Blu-ray disc that can be written to once.
Computer Speakers
-Analog output devices -Connected via TRS (Tip/Ring/Sleeve) jacks -option available to connect via speaker output or audio adapter
Tethering (Mobile Device Connectivity)
-Anchored to your mobile device -Connection can be made to the laptop via USB or Bluetooth -Creates a single connection -May require additional services from phone provider
Laptop Trackpoint
-Another method to move the cursor -Requires a push to move the cursor
Apple iOS history
-Apple iPhone and Apple iPad OS • Based on Unix • Closed-source - No access to source code • Exclusive to Apple products -iOS Apps • Apps are developed with iOS SDK on Mac OS X • Apps must be approved by Apple before release • Apps are available to users in the Apple App Store
Lighting Connector
-Apple proprietary -8-pin digital signals -Used for iPhones, iPads, iPod devices --Advantages over Micro-USB -Higher power output for phones and tablets -Can be inserted either way -Simpler design, more durable
Lightning Cable
-Apple proprietary -8-pin digital signals (iPhone, iPad, iPod devices) -Some advantages over Micro-USB --Higher power output for phones and tablets --Can be inserted either way --Simpler design, a bit more durable than traditional USB cable
SOHO Configuring NAT
-Automatic for SOHO devices -also known as Source NAT (Also called PAT - Port Address Translation) -All internal devices are translated to a single external address
Windows 8/8.1 Enterprise
-Available to "Software Assurance" customers • Large volume licenses -Supports enterprise features • AppLocker • Windows To Go • DirectAccess • BranchCache • EFS • Bitlocker • Can join Windows domain -Available in 32-bit (Max 4 GB RAM) and 64-bit (Max 512 GB RAM)
Public Cloud Deployment Model
-Available to everyone over the internet -Example is Amazon Web Services or Microsoft Azure
Services
-Background process • No user interaction • File indexing, anti-virus, network browsing, etc. -Useful when troubleshooting the startup process • Many services startup automatically -Command-line control • net start, net stop -Services is located in Control Panel under Administrative Tools • Type in "services.msc" through search or cmd prompt
LED-backlit LCD display
-Backlight is LEDs instead of florescent -LED's are either placed around the edge of the screen OR in an array (matrix) behind the screen -The latest laptops are LED-backlit -Uses same DC voltage (no voltage conversion is needed) -If display stops working, look closely (use a flashlight) to still see information on the screen -Inverter or whole display will need to be replaced
UEFI BIOS (Unified Exentensible Firmware Interface)
-Based on Intel's EFI (Extensible Firmware Interface) -A defined standard (implemented by mobo Mfr.'s) -Designed to replace legacy BIOS -Provides support for modern hardware -Graphical front-end -Also options for text based front end
Thin Client
-Basic Application Usage (applications run on a remote server) -Very little configuration (all work done on server) -Referred to as Virtual Desktop Infrastructure (VDI) -Local devices is a keyboard, mouse, and screen -Meets minimum requirements for running OS (no huge memory or CPU needs) -Network Connectivity is a must -Inexpensive to buy (easy to replace) -No local permissions required
File systems
-Before data can be written to the partition, it must be formatted -Operating systems expect data to be written in a particular format • FAT32 and NTFS is popular -Many operating systems can read (and perhaps write) multiple file system types • FAT, FAT32, NTFS, exFAT, etc.
Local Security Policy
-Big companies have big security policies • Managed through Active Directory Group Policies • Affects many computers at once -Stand-alone computers aren't managed through AD • Local policies are managed by Local Security Policy -Not available in Home editions • Available in Professional / Pro, Ultimate, Enterprise -Local Security Policy is located at: • C:\Windows\system32 and click on secpol.msc • Click on Start and search for secpol.msc or local security policy • cmd prompt and type in secpol.msc
Choosing a Power Supply
-Bigger isn't necessarily better (More expensive doesn't make your computer faster) -Physical size is relatively standard (older systems may have proprietary sizes) -Calculate the watts required for all components (CPU, Storage devices, Video adapter) -Video cards are usually the largest power draw -50% capacity is a good rule of thumb
UEFI Advantages
-Boot from large (>2.2 TB) that were formatted with GUID partition table (GPT) disks -Can support (boot) from FAT and removable media -Includes a pre-boot environment (not an OS) -Has its own drivers, shell, applications -Can browse the internet, backup a storage drive -Remote diagnostics
SSHD (Solid State Hybrid Drive)
-Both a spinning drive and SSD -SSD caches the slower spinning hard drive data -Increases speed without cost of a SSD-only system -Looks like a normal hard drive or SSD (same form factor and interfaces)
Switches
-Bridging done in hardware -Application-specific integrated circuit (ASIC) -Forwards traffic based on data link address -Contains many ports and features -The core of an enterprise network -May provide Power over Ethernet (POE) -Can include routing functionality (Multilayer or Layer 3)
Cable Modems
-Broadband (transmission across multiple frequencies) -Sends data on the cable network using DOCSIS (Data Over Cable Service Interface Specification) -High-speed networking -4 Mbits/s through 250 Mbits/s are common -Gigabit speeds are possible -Supports multiple services such as data, voice, video
Windows 7 Starter
-Built for netbooks -No DVD playback or Windows Media Center -No Windows Aero -No Internet Connection Sharing (ICS) -No IIS Web Server -No enterprise technologies • No Domain connection, BitLocker, EFS, etc. -Only a 32-bit version, maximum of 2 GB of RAM • Not supported in 64-bit version
LoJack for Laptops
-Built into the BIOS -Software installed into the OS -Reinstalls itself if removed or new storage drive installed -"Phone home" function provides location information -Theft mode remotely locks the laptop and/or delete files and can force a startup password
Computer Microphone
-Built-in (laptop) or external -Analog connectivity - TRS (Tip/Ring/Sleeve) Jack -Digital connectivity - USB
Smart Card Reader
-Built-in or external (USB connectivity) -reads cards with embedded circuitry
Laptop Microphone
-Built-in to the laptop -Useful for video conferencing calls -Not good for non-casual use (not high quality) -Analog or USB options can help gaming or creating content
Virtualization requirements
-CPU Processor Support (Intel VT or AMD-V) -Memory (above and beyond Host OS requirements) -Disk Space (each guest OS will have its own image) -Network (Configurable on each guest OS such as a standalone, provide NAT, Bridged, etc.) -More advanced virtualization systems allow you to create virtual switches to have separate VLAN's configured for the different VM's on the desktop
BranchCache
-Caching for branch offices • Without additional hardware or external services -Conserves bandwidth over slower links • Seamless to the end-user • Same protocols • Same network connection • Same authentication methods -Activates when round-trip latency exceeds 80 milliseconds
Folder Options / File Explorer Options Applet
-Can Manage Windows Explorer • Many options -General Tab • Can change how folders open in each Window • How folders expand • Can set privacy settings -View Tab • Advanced settings for files and folders (can view hidden files, can hide extensions, etc..) -Search Tab • Can configure how the search Index is used when searching for files • Search Options when searching for files • Options when searching non-indexed areas
On-Demand Self-Service
-Can add a new virtual server, network, application when needed -No need to purchase a new server or install it into the rack -Instant resource provisioning provided by the cloud-based services
TPM (Trusted Platform Module)
-Can be added to many motherboards -Built-in to some systems -Adds advanced cryptographic functions -Integrates with BIOS
How Port numbers are used by TCP/UDP
-Can be any number between 0 and 65,535 -Most servers (services) use non-ephemeral (not- temporary) port numbers -Some servers (services) might use a port outside of the non-ephemeral range to indicate where the data needs to be delivered. (perfectly fine) -They are used for communication, not security -Service port numbers need to be "well known" -TCP port numbers are not the same as UDP port numbers (TCP 80 will not communicate with UDP 80)
SOHO End-User Device Configuration
-Can be configured automatically -Auto speed and Duplex -DHCP Addressing -IP Address, Subnet Mask, Default Gateway, DNS Servers are all populated on the devices based on the router configurations
Phone / Tablet
-Can be managed centrally through Mobile Device Management (MDM) -Touchscreen configuration (lock codes or biometric access) -Application installs (set by policy and requirement) -Sync and backup can be cloud-based -Wireless enabled (can include VPN connectivity)
SOHO Port Forwarding
-Can be used to allow 24x7 access to services hosted internally (such as web servers, gaming server, security system, etc) -External IP/Port number maps to an Internal IP/Port -Does not need to be the same port number -Also called Destination NAT or Static NAT -Destination address is translated from a public IP to a private IP -Does not expire or timeout
Example of how TCP/IP works
-Can be viewed as a series of moving trucks -A truck can be used to efficiently move large amounts of data -The network topology is the road (ethernet, DSL, Cable System) -The truck is the TCP/IP -The boxes being carried by the truck are either TCP or UDP data -Inside the boxes are more things such as application information
Mobile Device Game Pads
-Can connect to a mobile phone or tablet over bluetooth connectivity -Gives the gaming console feel on a mobile phone or tablet
Laptop Screen Brightness
-Can control the backlight -Can increase/decrease brightness -More light requires more power (shorter battery life) -Less light requires less power (longer battery life)
Wireless Networks (Mobile Device Connectivity)
-Can enable or disable cellular, WiFi, and Bluetooth independently -Can enable/disable in iOS in the settings or from the Control Center -Can enable/disable in Android under settings/Wireless & network settings
Laptop Screen Orientation
-Can rotate the screen -Useful on rotating tablets/laptops -Landscape or Potrait mode -Can enable with a FN key or a Hotkey (depends on manufacturers)
Rapid Elasticity
-Can scale up or scale down application resources as needed -Done behind the scenes; Invisible to end-users -It is seamless to everyone
Processes Tab
-Can view all running processes • Interactive and system tray apps • View services and processes from other accounts -Manage the view • Can move columns, add metrics -Later versions combine all apps, processes, and services into a single tab • Easy to view and sort
Event Viewer
-Central event consolidation • What happened? -Broken down into different categories • Application • Security • Setup • System -Then each one is broken down into a different priority such as: • Information • Warning • Error • Critical • Successful Audit • Failure Audit -Can obtain detailed information when troubleshooting an application or OS
Wireless LAN Controllers
-Centralized management of WAPs -Its management functions allows you to deploy new access points -Monitor performance and security -Configure and deploy changes to all sites -Report on access point use -Usually a proprietary system (wireless controller is paired with the access points) -Can also be cloud-based (manage the console from anywhere)
Credential Manager Applet
-Centralized management of web and Windows credentials • Each site can have a different username and password -Can add additional Windows credentials • Such as Certificates
Before the installation
-Check minimum OS requirements • Memory, disk space, etc. • And the recommended requirements -Run a hardware compatibility check • Runs when you perform an upgrade • Run manually from the Windows setup screen • Windows 10 Upgrade Checker -Plan for installation questions • Drive/partition configuration, license keys, etc. -Application compatibility - Check with the app developer
Driver Installation
-Check web for latest version -Uninstall existing drivers through Windows Device Manager -Mfr. provide their own driver installation software -Check device manager to confirm device status
Level 1 Cache (L1 cache)
-Closest to the processor -Provides the first storage of data (first check)
Printers
-Color and B&W -All-In-One (AIO) -Connectivity via USB, Ethernet, 802.11 Wifi, or Bluetooth/Infrared
Transfer Belt and Roller
-Color laser printers have 4 different colors that they use (cyan, yellow, magenta, black) -Four separate cartridges -color is transferred from all cartridges to a single belt and then to a single transfer roller
Patch Panels
-Combination of punch-down blocks and RJ-45 connectors -Cable runs from desks are made once -Permanently punched down panel -Connection from panel to switch can be easily changed -No special tools to create new connections -Can use existing cables
Laser Printer
-Combines a laser, high voltage, charged ions, powdered ink, heat and paper -Very high quality output -Very fast printing -Complex (many moving parts) -Requires on-printer memory -Messy on the inside if toner cartridge leaks
Headset
-Combines headphones and microphones (one unit) -Desk and mobile use -Connected via USB, TRS Plug, Wireless/Bluetooth -Allows you to be handsfree while on the phone or communicate to others while gaming
BNC connector (Bayonet Neill-Concelman)
-Common type of coaxial connector typically DS3 WAN links -Plugs in and twists to lock (not easy to disconnect) -Rigid and bulky (difficult to work with)
Print to File
-Commonly done when working at home or away from the office -Located in the print dialog window -Prints to the work printer driver (saves it as a file) -File will be in an output format specific to that printer (wont open in another program) -Must use command line to copy the file to the printer (i.e. copy filename LPT1:)
Parallel Printer connector (wired device sharing)
-Commonly referred to DB-25 -Available in legacy systems -Centronics interface on the printer -DB-25 interface on the computer
Feed Rollers
-Commonly used by inkjet and laser printers to pull paper -Need to be clean, not worn to pull paper properly
Windows 7 Ultimate
-Complete functionality -Domain support, Remote Desktop, EFS -Supports all enterprise technologies • Including BitLocker -Available as a x64 version and supports 192 GB of RAM -Same features as Windows 7 Enterprise • But for the home user
Mobile Device Synchronizing to the Cloud
-Completely hands-off -No physical cables, no local files -May be integrated into your Exchange or Gmail -Sync can be done through the service provider and or WiFi -Apple iOS syncs to the iCloud -Complete backup and recovery -Android syncs to the google account
SOHO Wireless Channels and Encryption
-Configure with highest encryption possible -WPA2-AES (available on most modern routers) -Choose WPA2 over WPA -WEP (older encryption) is not an appropiate option -Check all access points to make sure all are using the highest encryption -Use an open frequency (some access points will automatically find good frequencies)
Keyboard
-Connected via USB or an adapter for PS/2 -Additional features may require additional drivers/software
Mouse
-Connected via USB or an adapter for PS/2 -Few moving parts -Needs the right surface -Glass may cause problem
Syncing Mobile devices to the automobile
-Connection is done either through bluetooth or wired cable (extends the phone functionality into the vehicle) -Can display maps, control phone calls, play music from the mobile device -Can use iOS carplay for apple devices or Android auto for android devices -Syncs contact info., music, and other details -Phone information is shared in real-time -This could be a security issue in a rental car or shared car since information is transferred into the car
IoT (Internet of Things) configurations
-Consists of home automation -mostly wireless -Security can be an issue -Devices such as thermostats, light switches, security cameras, door locks, voice-enabled smart speakers / digital assistants -No special port-mapping/NAT configurations required (almost all devices communication outbound)
Alternating Current (AC; ∿)
-Constantly reversing direction as it flows through electrical lines -Efficiently distributes electricity over long distances -Frequency of cycle is important: •In US/Canada it is common to see 110-120 volts of AC (VAC) with a frequency of change at 60 hertz (Hz) •In Europe it is common to see 220-240 VAC with a frequency of change at 50 hertz (Hz)
Data types that are synced on Mobile devices
-Contacts -Applications -Email -Pictures, Music, Video -Calendar -Bookmarks -Documents -Location Data -Social Media Data -eBooks -Passwords -All the above are shared on different mobile devices
Digital Projectors
-Contains Metal-Halide lamps -Very bright (very hot) light -Brightness measured in lumens -Relatively expensive -Always let bulbs cool (fan will keep running) -Keep it plugged in
Portable LCD (Liquid Crystal Display)
-Contains a backlight that shines through liquid crystals and color filters and other components to show you an image --Advantages -Lightweight -Relatively lower power and inexpensive --Disadvantages -Black levels are a challenge -Requires a separate backlight (Flourescent, LED, etc...) -Difficult to replace
Example of how Internet Protocol (IP)
-Contains an Ethernet header, payload, trailer (in that order) -Inside Ethernet payload contains an IP header and its own IP payload -Inside IP payload contains TCP header and its own TCP payload -Inside of the TCP payload is the application information
Laptop Function Keys
-Contains an FN key -Allows secondary functions of the keyboard -Can allow to toggle between LCD/external monitor/both
Small Office/Home Office (SOHO)
-Contains multi-function devices (printer, scanner, fax, Network connectivity, phone line connection, and prints from the web) -Small number of employees
Laptop Storage
-Contains smaller hard drives compared to desktops -2.5in and 1.8in form factors
Product Release Instructions (PRI) Updates
-Contains specific radio settings such as ID numbers, Network codes, Country codes, etc., so the phone knows how to use the wireless network -Can be updated Over-The-Air
SOHO Whitelist/Blacklist
-Content filtering, IP address ranges (Or a combination) -Whitelisting -Nothing will pass through the firewall unless it is approved -Very restrictive -Blacklisting -Nothing on the "bad list" is allowed -All traffic is allowed except those on the "bad list" -Specific URLS -Domains -IP addresses
Laptop Media Options
-Control audio and video from the keyboard (no mouse clicking) -You can play, stop, rewind, fast forward, Mute, Volume -No FN keys needed
Boot tab
-Controls the boot location • Multiple locations and operating systems -Advanced options • Number of processors, maximum memory, etc. -Boot options • Safe boot, remove the GUI, create a log file, base video, OS boot information (shows drivers as they load), set timeout for booting
Why do you need an OS?
-Controls the interaction between components • Memory, hard drives, keyboard, CPU -A common platform for applications -A way for humans to interact with the machine • The "user interface" (either command line or GUI) • Hardware can't do everything! Software is required
General tab
-Controls the startup process • Normal, Diagnostic, Selective -Normal startup • Nothing to see here, go about your business -Diagnostic startup • Similar to Safe Mode, but not quite the same -Selective startup • You decide what to load
Laptop AC power adapters
-Converts AC to DC -Can be either auto-switching or fixed input -Input voltage can be 110 volts or 220 volts -Replacement needs to be compatible with your system
Liquid Cooling
-Coolant is circulated through a computer -Used in cars and mainframe computers -High-End systems -Gaming/Graphics processing -Used for Overclocking -CPU heatsink is different -Contains radiator and a fan
Copy command
-Copy files from one location to another • copy (/v, /y) -copy /v • Verifies that new files are written correctly -copy /y • Suppresses prompting to confirm you want to overwrite an existing destination file
Community Cloud Deployment Model
-Cost associated with the cloud is shared -Many orgs. create a larger cloud and share those resources within the members of the community
Measured Services
-Costs and utilization are very closely tracked -Resource planning and granular charge-backs -Can measure in and outs of bandwidth -Can measure the storage that is being used -Can measure how many people are using that application -Billing can be done with these metrics
DB-9 serial cable connector
-D-subminiature or D-sub -Different sizes, A through E -Sends serial data over an RS-232 connection -Built for modem or management port communication (Commonly used as a console port or management port on these devices)
VGA (Video Graphics Array)
-DB-15 connector (accurately called DE-15) -Blue color -Analog signal (no digital option) -Image degrades after 5 to 10 meters
DVI to HDMI cable/adapter
-DVI-D and HDMI are electrically compatible -HDMI is backward-compatible with DVI-D -No signal conversion required -No loss of video quality
SNMP v2
-Data type enhancements -Bulk transfers -Still in-the-clear (no encryption)
NAT (Network Address Translation)
-Designed for IP address conservation. It enables private IP networks that use unregistered IP addresses to connect to the Internet. NAT operates on a router, usually connecting two networks together, and translates the private (not globally unique) addresses in the internal network into legal addresses, before packets are forwarded to another network. As part of this capability, NAT can be configured to advertise only one address for the entire network to the outside world. This provides additional security by effectively hiding the entire internal network behind that address. NAT offers the dual functions of security and address conservation and is typically implemented in remote-access environments.
Windows 10 Home
-Designed for home user, retail customer -Integrates with Microsoft account • Microsoft OneDrive is used to backup your files -Windows Defender is included • Anti-virus and anti-malware -Cortana is included • Talk to your operating system -Does not support: • Hyper-V • Bitlocker • Cannot join the domain • AppLocker • BranchCache -Max x86 RAM 4 GB -Max x64 RAM 128 GB
Laptop CPU
-Designed for mobility -Uses less power and creates less heat -Integrates features such as memory controller and video controller to save space -Not very upgradeable -Replaceable but not upgradeable -Often slower than desktops -Size and heat are disadvantages
On-board fans
-Designed to cool and entire adapter card -Can be bulky (may take additional adapter card space) -Usually seen on high-end graphics cards
Error Correcting Code (ECC) Memory
-Detects errors -Corrects on the fly -Ideal for servers
tracert
-Determines the route a packet takes to a destination • Maps the entire path -Takes advantage of ICMP Time to Live Exceeded message • The time in TTL refers to hops, not seconds or minutes • TTL=1 is the first router, TTL=2 is the second router, etc. -Not all devices will reply with ICMP Time Exceeded • Some firewalls filter ICMP • ICMP is low-priority for many devices
VR headset
-Determines what you see -Motion tracking (X, Y, and Z axis) -Interacts with virtual environment -Used in gaming, education, art, travel applications
PATA Cabling (40 Wire)
-Device 0 (master) is closer to the PATA interface -Device 1 (slave) is further away from the PATA interface -Only supports 2 drives -Additional drives requires another PATA interface
PATA Cabling (80 Wire)
-Device 0 (master) is further away from the PATA interface -Device 1 (slave) is closer to the PATA interface -Only supports 2 drives -Additional drives requires another PATA interface -Most recent, added in newer versions of PATA for higher throughput -Additional wires are used for grounding to reduce crosstalk
Baseband Radio Processor (Mobile Device Connectivity)
-Different from WiFi, Bluetooth, NFC radios -Design to communicate with providers of cellular networks -Contains its own firmware and memory (quite proprietary) -We cannot see this part of the phone operating when making phone calls -Uses a real-time OS which allows the phone to set a priority to communicate over that cellular network -Firmware can be updated Over-The-Air (OTA) and it is invisible to the end user
Laptop System Boards
-Different models have different sizes -All proprietary (built to fit that laptop model) -Replacement isn't easy -Any issues with a specific component on the mobo will require the whole component to be replaced
Laser Printer Calibration
-Different toner cartridges print with different densities (some dark, some light) -Density can be adjusted to make it look perfect -Can be automated or manually (check documentation)
Power Supply Output Voltages
-Different voltages for different components -Voltages are references are positive or negative voltage -Voltage is a difference in potential -Electrical ground is a common measuring point (depends where you measure from)
dxdiag.exe
-DirectX Diagnostic Tool • Manage your DirectX installation • It is an application programming interface used by developers to create applications that requires multimedia or graphics within Windows -Multimedia API Overview for: • System • Display (3D graphics) • Audio • Input options -Also makes a very nice generic diagnostic tool when having issues with graphics or sound • Not just for testing DirectX - Located under C:\Windows\System32 • Can also open through the cmd line or Run cmd
Bonjour (Sharing from an OS)
-Discover apple devices on the LAN -Part of MacOS -Can be added to windows (itunes, etc..)
defrag.exe
-Disk defragmentation • Moves file fragments so they are contiguous (so that they can be stored next to each other) • Improves read and write time on spinning hard drives -Not necessary for solid state drives • Windows won't defrag an SSD • Option will not be available -Graphical version in the drive properties -Requires elevated permissions at the command line to run • defrag <volume> • defrag C: - Located under C:\Windows\System32 • Can also open through the cmd line or Run cmd • Graphical version in the drive properties
Heat Sink
-Dissipate heat through thermal conduction (copper or aluminum alloy) -Fins/Grid increase the surface area (heat is then transferred to the air) -Thermal paste creates a good contact between heat sink and chip. -VERY hot. Don't touch. -May find a fan on top of the heat sink in order to dissipate heat even faster.
Windows post-installation
-Does it work? • If it doesn't boot, there are bigger problems • Some testing is useful for unknown hardware configurations -Additional installations • Service packs • Security patches • Security applications • Driver updates • Application updates
Thermal Printer
-Does not have ink or toner -Contains special type of paper -Paper is heated when passing through the printer, the heated spots are then turned black -Common use for receipts -Very quiet (almost silent) -Paper is very sensitive to heat (turns the paper black) or light/clear tape (page will fade over time) -Not used to archive important docs due to sensitivity
Multi-channel Memory
-Dual-channel, triple-channel, quad-channel -Should always match (exact matches are best) -Memory modules slots are often colored differently -Maximizes throughput
Printer Configuration Settings
-Duplex; printing on both sides (not all MFP's can do this) -Collate ; Printing multiple copies in order (useful for many copies of large documents) -Non-collated prints as page 1,1,1,1,2,2,2,2,3,3,3,3 -Collated prints as page 1,2,3,4,1,2,3,4,1,2,3,4 -Orientations ; portrait or landscape -Quality ; Resolution can be changed; can print in color or grayscale; ability to print in color saving mode.
Guest Operating System Security
-Each vm is self-contained OS and needs same controls and security as a physical OS -Use traditional security controls - Host-based firewall, anti-virus, anti-spyware -Watch out for rogue VM's -Downloaded 3rd party self-contained VM's can be dangerous -Make sure you are running trusted VM's on your system
Tools tab
-Easy access to popular administrative tools • UAC settings, System Information, Computer Management, etc. -Faster than searching through menus or typing • A static (but comprehensive) list
DIMM (dual inline memory module)
-Electrical contacts are different on each side -64 bit data width -Found in Desktop computers -Available in DDR2, DDR3, DDR4 SDRAM
Direct Current (DC; ⎓)
-Electrical current moves in one direction with a constant voltage
Bluetooth Pairing Process (Mobile Device Connectivity)
-Enable BT on both devices -Set devices in discoverable mode (may require key sequence on BT device) -Select discovered device (many may appear) -Enter or confirm PIN (numbers should be the same) -Pin may not be required -Test connectivity once paired
Vendor-specific limitations
-End-of-life • Different companies set their own EOL policies -Updating • iOS, Android, and Windows 10 check and prompt for updates • Chrome OS will update automatically -Compatibility between operating systems • Some movies and music can be shared -Almost no direct application compatibility • Fortunately, many apps have been built to run on different OSes • Some data files can be moved across systems • Web-based apps have potential
Microsoft Exchange on Mobile devices
-Enterprise email (not a service at home) -Integrates email, contacts, calendars, reminders -Integrates with mobile device database such as contacts, calendars, etc. -Configuration options needed are email address, server, domain, username, password. -Contains integrated message encryption with S/MIME (Secure/Multipurpose Internet Mail Extensions) -Can both encrypt and digital sign sent and received messages from MS Exchange.
SOHO Firewall and DMZ Ports
-Every SOHO router is also a firewall -No external devices can directly access the internal network -This normally cannot be disabled -Demilitarized Zone ports can be configured to allow unrestricted access (almost always a bad idea) -need to consider creating more specific port forwarding rules OR dont allow any access
Network Interface Card (NIC)
-Every device on the network has one whether its wired or wireless that allows connectivity to the network (such as computers, servers, printers, routers, switches, phones, tablets, cameras, etc.) -Specific to the network type such as wired or wireless -Often built-in to the mobo -Many options such as single port, multi-port, copper, fiber, WAN, etc.
Full Disk Encryption (FDE)
-Everything is encrypted (not just individual files) -Whole OS is encrypted
Devices and Printers Applet
-Everything on the network • Desktops, laptops, printers, multimedia devices, storage -Quick and easy access • Much less complex than Device Manager • Can right mouse click and view Properties and make device configurations
Mounting drives
-Extend available storage space • Mount a separate storage device as a folder -Mount in an empty folder • Instant storage space • Seamless to the user -Configuration done in Disk Management: • Right click on the new drive • Change drive letter and paths • Select "mount" option and browse to the location
Installing applications
-Extend the functionality of your operating system • Specialized applications extend system functionality such as word processing, spreadsheets, graphics capabilities, etc... -Available everywhere • Find the application you need • Install on your operating system -Not every computer can run every application • Some simple checks can help manage your desktop
RAID 1 (Mirroring)
-File blocks are duplicated between physical drives -High disk space utilization (every file is duplicated; required disk space is doubled) -High redundancy (drive failure does not affect data availability) -Minimum of 2 drives
RAID 0 (Striping)
-File blocks are split between physical drives -High performance (data written quickly) -Zero redundancy (drive failure breaks the array) -Minimum of 2 drives
Standard OS features
-File management • You can Add, Delete, Rename files -Application support • Memory management, swap file management -Input and Output support • Printers, keyboards, hard drives, USB drives -Operating system configuration and management tools
Firewalls
-Filters traffic by TCP/UDP port number (OSI Layer 4 filtering) -Some can filter based on the application -Can encrypt traffic in/out of the network (protect traffic between sites) -Can proxy traffic (common security technique) -Can be used as a Layer 3 device (routers) -Usually sits on the ingress/egress of the network to do routing or NAT'ing
Check Disk (chkdsk) command
-Fixes logical file system errors on the disk • chkdsk /f -Locates bad sectors and recovers readable information • chkdsk /r • Implies /f -If volume is locked, run during startup
USB flash drive
-Flash memory -EEPROM (electrically erasable programmable read-only memory) -Limited number of writes - can still read data -Not designed for archival storage -Very small, Easy to lose or damage -Always have a backup
Solid State Hybrid-Drive (SSHD)
-Flash memory and hard drive storage -Contains spinning components from a hard drive and components from SSD -Data is cached to the SSD and then written to the hard drive
Local user permissions for application installs
-Folder/file access will be required • Installation programs will be copying a lot of files -The user needs permission to write application files to the storage drive • This may not be the default in an office -May need to run as Administrator • Some applications will install additional drivers or services • Be careful when allowing this level of access!
Linux history
-Free Unix-compatible software system • Unix-like, but not Unix -Many (many) different distributions • Ubuntu, Debian, Red Hat / Fedora -Advantages • Cost. Free! • Works on wide variety of hardware • Passionate and active user community -Disadvantages • Limited driver support, especially with laptops • Limited support options
BitLocker
-Full Disk Encryption • The operating system and all files -A TPM is recommended on the motherboard • Trusted Platform Module • Use a flash drive or password if there's no TPM -Runs Seamlessly • Works in the background • You never know it's there • Used for laptops or mobile devices
Gaming Input
-Game pad and Joystick -USB connected -Used exclusively for games
Performance Monitor
-Gather long-term statistics • Located in the Control Panel under Administrative Tools -Provides OS metrics - Disk, memory, CPU, etc. -Can set an alert and automated actions -Monitor and act •Counters are added to monitor metrics -Store statistics to analyze any long-term trends -Built-in reports allows you to create detailed reports from the data -To bring up Performance Monitor: • Go to "C:\Windows\system32" and click on perfmon.msc • Click on Start and search for perfmon.msc • cmd prompt and type in perfmon.msc
Internet Options Applet
-General Tab • Basic display • Shows options for browser such as home page, how the browser starts up, and change the display of the tabs -Security Tab • Contains zones where security levels are set (Internet, Local Intranet, Trusted Sites, Restricted Sites) • Different security levels for each zone (Between High and Low) -Privacy Tab • Can control settings for cookies, pop-up blocker, InPrivate browsing -Content Tab • Can view information on encryption and identification certificates • Can view auto-complete information -Connections Tab • Can configure VPN, proxy settings, and LAN settings -Programs Tab • Can manage how the browser opens links • Can set default browser • Manage add-ons, plugins, etc. -Advanced Tab • Detailed configuration options for the browser • Can reset all settings back to default
Cleaning The Heating Element
-Gets dirty over time -Use IPA (Isopropyl alcohol) -Get a cleaning pen/swab and clean gently -Check manufacturers recommendations -Can also use a cleaning card to clean the component and the paper path
Google Android history
-Google Android • Open Handset Alliance • Open-source OS, based on Linux • Supported on many different manufacturer's devices -Android Apps • Apps are developed on Windows, Mac OS X, and Linux with the Android SDK • Apps available from Google Play • Apps also available from third-party sites (i.e., Amazon Appstore)
Commercial Email Providers for Mobile Devices
-Google email allows you to split inbox into multiple tabs. -Can configure using IMAP4 and POP3 -Exchange Online (Hosted email) -Supports IMAP4 and POP3 -iCould Mail (Apple Mail) -IMAP4 support only -Yahoo Mail -Supports IMAP4 and POP3
Chrome OS history
-Google's operating system • Based on the Linux kernel -Centers around Chrome web browser • Most apps are web-based -Many different manufacturers - Relatively less expensive -Relies on the cloud - connect to the Internet
Managing Group Policy
-Group Policy • Manage computers in an Active Directory Domain • Group Policy is usually updated at login -gpupdate • Forces a Group Policy update • gpupdate /target:{computer|user} /force • gpupdate /target:professor /force -gpresult • Verify policy settings for a computer or user • gpresult /r -- generic command • gpresult /user sgc/professor /v -- a more specific comand for gpresult
Mobile Device Headsets
-Hands-free audio -Earphones and microphone --Wired connections -Connects to 3.5mm TRRS connector -Tip-Ring-Ring-Sleeve -Also referred to as analog audio jack -iPhone can use lightning port --Wireless connections -Connects using bluetooth
System requirements for application installs
-Hard Drive space • Initial installation space required • Application use space required • Some applications use a LOT of drive space after installation -RAM • This would be above and beyond the OS requirements • Very dependent on the application • Consider all of the other running applications -OS compatibility • Operating system (Windows, macOS, Linux) • Version of the OS
Disk status
-Healthy • The volume is working normally -Healthy (At Risk) • The volume has experienced I/O errors • Drive may be failing -Initializing • Normal startup message for a new drive -Failed • Cannot be started automatically • The disk is damaged, or the file system is corrupted -Failed redundancy • A drive has failed in a RAID 1 or RAID 5 array -Resynching • Mirrored (RAID 1) volume is synching data between the drives -Regenerating • RAID 5 volume is recreating the data based on the parity data
Thunderbolt Connection
-High Speed Serial Connection -Data and power on the same cable -Based on Mini DisplayPort -Max 3 meters (Copper) -60 meter Optical -Daisy Chain up to 6 devices
Bluetooth Connections
-High speed communication over short distances -also referred as PAN (Personal Area Network) --Connects to our mobile devices -Smartphones -Tethering -Headsets and headphones -Health monitors -Automobile and phone integration -Smartwatches -External speakers
CCFL (Cold Cathode Fluorescent Lamp)
-Higher voltage and power needed -Uses a power inverter for DC to AC -Added thickness to the display -No longer a common backlight -Used in older laptops -If display stops working, look closely (use a flashlight) to still see information on the screen -Inverter or whole display will need to be replaced
M.2 M key
-If the drive is connecting to a device that supports a M key, then it will use 4 lanes of the PCI Express bus (PCIe x4 at a maximum)
Platform as a Service (PaaS)
-In charge of building your own application -Do not need to worry about servers, software, or data center -All applications are in the cloud (no control of the people managing the applications or hardware) -Only responsible for the development process of the application -Develop the app from what is available on the platform -Example is SalesForce.com
Upgrade methods
-In-place upgrade • Upgrades the existing OS • Keeps all applications, documentations, and settings • Start the setup from inside the existing OS -Clean install • Wipes everything and reload • Backup your files • Start the setup by booting from the installation media
Infrared (IR) Connections
-Included in many smartphones, tablets, and smartwatches -Not really used for file transfers and printer -Found mostly on android devices -Mostly controls entertainment centers (almost exclusively)
Overclocking
-Increase the clock speed past the rated value -Requires more power, creates more heat -System become unstable at some point -Base clock (BCLK) needs to be changed -requires unlocked CPU -Run stress test to confirm stability -This will void warranty -Can break other components other than your CPU
POST (Power-On Self-Test)
-Initiated by BIOS at boot-up -Looks for CPU and Memory -Checks to see if there is a display connected and keyboard -If all passes, it then begins to look for a boot loader (to start the OS)
DVI-I Dual Link
-Integrated connector -Sends both analog and digital signals on the same connector -Dual link ; 7.4 Gbps (HDTV at 85 fps)
DVI-I Single Link
-Integrated connector -Sends both analog and digital signals on the same connector -Single link; 3.7 Gbps (HDTV at 60 fps)
Touchpad
-Integrated into keyboard -Connected via USB or Bluetooth for external connectivity -May be standalone device -Replaces a mouse
Print head
-Integrated into the ink cartridges on consumer printers -A new one comes with the cartridge when it is swapped out -Does not come integrated with the ink cartridges with larger commercial printers -Can be swapped out individually
Windows (Defender) Firewall
-Integrated into the operating system -Located in Control Panel / Windows Firewall In Windows 7 & 8 -Located in Control Panel / Windows Defender Firewall in Windows 10 -Windows Firewall with Advanced Security • Click "Advanced settings" -Fundamental firewall rules (basic functionality) • Allows apps to send/receive traffic • Based on applications • No detailed control -No scope can be set • All traffic applies (inbound/outbound) -No connection security rules • Can't encrypt with IPsec tunnels
Virtual Private Network (VPN) - (Mobile Device Connectivity)
-Integrated into the phone OS (No additional software required) -Can use 3rd party party software -Can create a secure channel between the phone and another device -May require additional setup (detailed configuration settings)
Intel Virtualization Technology (VT)
-Intel's version of virtualization
How TCP/UDP is delivered
-Internet Protocol sends data from one IP address to another IP address -Data arrives at the IP address which contains the port number that indicates where the data is headed.
Wireless/Cellular Data Network
-Internet connectivity is available on your phone -This connection/service is provided by mobile carrier service
Memory diagnostics
-Is your memory working? • I don't remember -May be launch automatically • Or launched manually - Will run multiple passes • Will Try to find the bad chip/module -Located in Control Panel under Administrative Tools
Windows Update
-Keeps your OS up to date - Security patches, bug fixes -Can be configured to be installed automatically - Updates are always installed -Can be configured to download but wait for install - You control the time -Can be configured to check but not to download • Saves bandwidth -Can be configured to never check - Don't do this -Windows 10 has the option to schedule a restart after updates are completed.
Prepare the boot drive
-Know your drive • Is there data on the drive? • Has the drive been formatted? • What partitions are on the drive? -Backup any old data - You may need that back someday -Most partitioning and formatting can be completed during the installation • Clear the drive and start fresh
Standard ATX
-Large form factor (ATX Form Factor) -Advanced Technology Extended -Power : Either 20 or 24 pins withn an additional 4/8 pin connector
Windows at work
-Large-scale support • Thousands of devices supported by IT -Security concerns • Mobile devices with important data that needs to stay safe • Local file shares -Wide varieties of purposes such as the Accounting Dept. working on a spreadsheet • Or Marketing Dept. having the need to play videos -Geographical sprawl - Not all systems are in the same building • Need a way to managed cache data between the sites slow WAN connections
BIOS Secret Buttons
-Launches BIOS at system startup: Del, F1, F2, Ctrl-S, Ctrl-Alt-S
Storage types
-Layered on top of the partition and file system • A Windows thing -Basic disk storage • Available in DOS and Windows versions • Primary/extended partitions, logical drives • Basic disk partitions can't span separate physical disks -Dynamic disk storage • Available in all modern Windows versions • Span multiple disks to create a large volume • Split data across physical disks (striping) • Duplicate data across physical disks (mirroring) • Not all Windows versions support all capabilities
Laptop LCD (Liquid Crystal Display)
-Light and High-Resolution -Very fragile (a good case is needed to protect) -Resolutions are fixed (cannot buy a larger screen or change resolutions inside the laptop) -changes to native resolution with look blurry and not crisp -Use native resolution to have best possible viewing on the screen
DVD-RAM
Digital Versatile Disc-Recordable Can be recorded over many times, but will only play back in a DVD-RAM drive. Perceived to be better at long term storage.
DVD-RW
Digital Versatile Disc-Rewritable DVD format that can be erased and recorded over numerous times without damaging the medium
DVI-D Connector
Digital Visual Interface digital only, single link or dual link
DVI Connector
Digital Visual Interface. Integrated, combines digital and analog in the same connector; digital may be single or dual link
DMA
Direct Memory Access Access to memory and devices without the direct control of the processor. This is most often used for hard disk access and screen display. Part of Southbridge communication.
ipconfig /all
Displays DHCP, DNS server, MAC address, and NetBIOS status
ipconfig /displaydns
Displays DNS resolver cache
Reliability Monitor
Displays a log of "system reliability" events
netstat -a
Displays all connections and listening ports.
netstat -n
Displays ports and addresses in numerical format. Skipping name resolution speeds up each query
gpresult
Displays the RSoP for a computer and user account /s - specifies a host name by name or IP address /u - specifies a host name by user account /p - specifies a host name by password
apple menu items
Displays, Storage, Service
DDoS Attack
Distributed denial of service attacks that overwhelm a web server and shut it down
DFS
Distributed file system A set of client and server services that allow an organization using Microsoft Windows servers to organize many distributed SMB file shares into a distributed file system.
Full Control
Do anything with the object, including change its permissions and its owner
Modify
Do most things with an object but not to change its permissions or owner
DDR
Double Data Rate Twice the data rate of SDRAM
ESD
Electrostatic discharge. Release of static electricity. ESD can damage equipment and low humidity causes a higher incidence of electrostatic discharge (ESD). High humidity can cause condensation on the equipment, which causes water damage.
EFS
Encrypting File System - a windows feature that can encrpyt a folder or a file
EFS
Encrypting File System. A feature within NTFS on Windows systems that supports encrypting individual files or folders for confidentiality.
EFS
Encrypting File System. A feature within NTFS on Windows systems that supports encrypting individual files or folders for confidentiality.
EIDE
Enhanced Integrated Drive Electronics Interface used in controllers that can support up to four hard disks at 137 GB per disk, transfer data at speeds up to 66 MBps, and provide connections for CD, DVD, and tape drives.
EPP
Enhanced Parallel Port - A half-duplex bi-directional interface designed to let devices like printers or storage devices to transmit large amounts of data while quickly being able to switch channel direction. EPP is about 15 times faster than normal parallel-port communication with less CPU overhead.
FPM
Fast page-mode A type of Dynamic RAM (DRAM) that allows faster access to data in the same row or page. Page-mode memory works by eliminating the need for a row address if data is located in the row previously accessed. It is sometimes called page mode memory.
ipconfig /renew AdapterName
Forced DHCP client to renew lease it has for an IP address(if AdapterName is omitted it releases or renews ALL adapters on the network)
FSB
Front Side Bus A computer communication interface (bus). It carrys data between the CPU and a memory controller hub, known as the northbridge.
GPT
GUID Partition Table, part of EUFI, successor to MBR. Windows allows up to 128 partitions at 2TB each. It also has a back up copy for parition entries
GUI
Graphical user interface Interface that relies on graphics to communicate with the user. IE windows, menus, icons, etc
GDI
Graphics Device Interface A Microsoft Windows application programming interface and core operating system component responsible for representing graphical objects and transmitting them to output devices such as monitors and printers.
GDDR
Graphics Double Data Rate A type of synchronous dynamic random-access memory (SDRAM) specifically designed for graphics processing units (GPUs).
GPU
Graphics Processing Unit Dedicated graphics processor on a graphics card, used to render images stored in the RAM of the graphics card.
shutdown -h
Halt or power off the system
HDD
Hard disk drive An electro-mechanical data storage device that uses magnetic storage to store and retrieve digital information using one or more rigid rapidly rotating disks (platters) coated with magnetic material.
HCL
Hardware Compatibility List A list of computer hardware (typically including many types of peripheral devices) that is compatible with a particular operating system or device management software.
HDMI Connector
High Definition Media Interface. A standard for connecting high-definition video devices.
HPFS
High Performance File System Is a file system designed especially for the IBM OS/2. It is known for handling large files of up to 2 GB across multiple hard disks, as well as for handling long file names of up to 256 bytes. HPFS was designed to improve on the weaknesses of the file allocation table file system.
HDCP
High-bandwidth Digital Content Protection A form of digital copy protection developed by Intel Corporation to prevent copying of digital audio & video content as it travels across connections.
HTTPS
Hypertext Transfer Protocol Secure. Encrypts HTTP traffic with SSL or TLS using port 443.
IrDA
Infrared Data Association
IaaS
Infrastructure as a Service A form of cloud computing that provides virtualized computing resources over the internet.
IDE
Integrated Development Environment - programming environment that includes features to help you write and edit code as well as debugging tools
IDE
Integrated Drive Electronics
ISDN
Integrated Services Digital Network
IPP
Internet Printing Protocol
IP
Internet Protocol
IPS
Intrusion Prevention System
MT-RJ
JMechanical Transfer Registered Jack
.js
JavaScript
JBOD
Just a Bunch of Disks
KVM
Kernel-based Virtual Machine
KVM
Keyboard-Video-Mouse
LED
Light Emitting Diode
LDAP
Lightweight Directory Access Protocol
LPT
Line Printer Terminal
MAU
Media Access Unit/Media Attachment Unit
MAPI
Messaging Application Programming Interface
mATX
Micro Advanced Technology Extended
MicroDIMM
Micro Dual Inline Memory Module
MBSA
Microsoft Baseline Security Analyzer
workgroup
Microsoft peer to peer network model in which computers are grouped together with access to shared resources
DISM
Microsoft's Deployment Image Servicing and Management - a tool that reads the contents of a drive and writes the output to a .WIM format file.
Sysprep
Microsoft's System Perperation Tool - a utility to be run before imaging a disk to solve possible configuration problems
NLA
Network Level Authentication - Authenticates user before committing any resources to RDP session preventing denial of service attacks
NOS
Network Operating System - an OS designed to run on servers in business networks
NTP
Network Time Protocol
NaaS
Network as a Service
NAS
Network-Attached Storage
NetBIOS
Networked Basic Input/Output System
NLX
New Low-profile Extended
NTFS
New Technology File System
NTLDR
New Technology Loader
Incremental backup
New files and files modified since last backup(low backup time, high restore time uses multiple tape sets)
Control
Not the apple equivalent of the Ctrl button
dir/o:d
Order by date
dir/o:s
Order by size
OLED
Organic Light Emitting Diode
PPM
Pages Per Minute
PS/2
Personal System/2 connector
PII
Personally Identifiable Information
PII
Personally Identifiable Information - data that is used to identify, contact, locate, or impersonate an individual
.ps1
PowerShell
taskkill /pid
Process ID used to specify a process to kill
Windows 7 Minimum Hardware Requirements (x86)
Processor/CPU - 1 GHz processor Memory - 1 GB RAM Free disk space - 16 GB Video - DirectX 9 graphics device with WDDM* 1.0 or higher driver *Windows Display Driver Model
Windows 10 Minimum Hardware Requirements (x64)
Processor/CPU - 1 GHz processor with support for PAE, NX, and SSE2 Memory - 2 GB RAM Free disk space - 20 GB Video - Microsoft DirectX 9 graphics device with WDDM* driver *Windows Display Driver Model
PROM
Programmable read-only memory. A memory chip on which data can be written only once. Once a program has been written onto a PROM, it remains there forever. Unlike main memory, PROMs retain their contents when the computer is turned off.
Inkjet (ink-dispersion) printers
Pros: -Inexpensive technology compared to laser printers -Quiet when printing -Can print in high-resolution; Can print in color for nice looking documents or photographs Cons: -Ink is expensive (proprietary) -Ink eventually fades -printer clogs easily
msinfo32
Provides information about hardware resources, components, and thesoftware environment. Also known as System Information.
RFI
Radio Frequency Interference
RSSI
Received Signal Strength Indicator - an index level calcuated from signal strength. If it the connection speed is below the RSSI minimum the wireless adapter will drop the signal
RAID
Redundant Array of Independent Disks
RDP
Remote Desktop Protocol
RDP
Remote Desktop Protocol - Runs on on TCP port 3389.
SSH
Secure Shell
DB-9
Serial Communications D-Shell Connector, 9 pins
SP
Service Pack
Print Management
Set properties and monitor local printers and manage print sharing on a network
Network reset in Windows 10
Settings->Network&Internet->Status
SMTP
Simple Mail Transfer Protocol
SNMP
Simple Network Management Protocol
sfc
System File Checker - a utility that provides a manual interface for verifying system files and restoring them from cache if they are corrupt or damaged
to adjust settings of an apple track pad
System Preferences -> Trackpad
adding a new account in MacOS
System Preferences ->users and groups
end-of-life system
System for which vendors have dropped all support for security updates due to the system's age.
system partition
The active partition of the hard drive containing the boot record and the specific files required to start the Windows launch.
Active directory
The database that contains the users, groups, and computer accounts in a Windows Server Domain
Security Log
This log holds the audit data for the system
TN
Twisted Nematic
UAC
User Account Control. Informs you when a program makes a change that requires administrator-level permission, also adjusts the permission level of your user accounts
UDF
User Defined Functions or Universal Disk Format
VA
Vertical Alignment
VESA
Video Electronics Standards Association
VGA
Video Graphics Array A computing standard that has a resolution of 640 × 480 pixels with 16 colours or of 320 × 200 pixels with 256 colours.
VRAM
Video Random Access Memory
Read/list/execute
View the contents of a file or folder or start a program
Reliability and Performance Monitoring
View the performance of the local computer
VDI
Virtual Desktop Infrastructure
VDC
Volts DC
Low Level Format
When a new harddisk leaves the manufacturer, creates cylinders, tracks and sectors on the platters
WPS
WiFi Protected Setup
WAN
Wide Area Network
WINS
Windows Internet Name Service
WSUS
Windows Server Update Services - a program on a server that allows the network administrator to approve updates for certain groups
.bat
Windows batch file
Moving files and folders on the same NTFS volume
Write permission is required for the destination folder and Modify for the source folder. NTFS permissions are retained
Copying files and folders on the same NTFS volume or different volumes
Write permission is required for the destination folder and read for the source folder. NTFS permissions are inherited from the destination folder and the user becomes the Creator/Owner
ZIP
Zigzag Inline Package
Linux Bash shell script escape character
\
Python escape character
\
homegroup
a feature to secure access to shared folders and printers. (exists in windows 7 and 8 but not in later versions of windows 10)
Eavesdropping
capturing and reading data packets as they move over a network
chown
change ownership in linux
chgrp
changes the group in linux
format D: /v: E
changes the name of drive D to drive E
dir *.
displays all files without an extension.
ps
displays linux processes that are currently running
ifconfig/iwconfig
displays the current state of network interfaces within linux
crontab -e
enters the editor
Scan engine/components
fixes problems and makes improvements to the scan software itself
FDD
floppy disk drive A personal computer storage device that reads data from and writes data to removable disks made of flexible Mylar plastic covered with a magnetic coating, and enclosed in a stiff, protective, plastic case. It is a legacy technology.
format D: /fs:NTFS /x
forces the volume to dismount
format D: /fs:EXFAT
formats D drive to an exfat file system
linux group commands
groupadd, groupmod, groupdel
taskkill /t /pid processid
halts any child processes
Force Quit
in Apple menu or press command+option+esc
in-place upgrade
installing on top of an existing version of OS
Network resent in Windows 7/8
ipconfig /flushdns netsh int ip reset resetlog.txt netsh winsock reset
mkswap
linux command-line program used to format a swap partition
cron
linux task scheduler
dir/t:c
list by date created
dir/o:e
list by extension
dir/t:w
list by last modified
diskmgmt.msc
opens disk management console from runline
compmgmt.msc
opens the Computer Management console from runline
MAC flooding
overloading a switch's MAC cache preventing genuine devices from connecting and forcing the switch into "hub" or "flooding" mode
PCI DSS
payment card industry data security standard - governs the processing of credit card and other bank payments
format D: /fs:EXFAT /q
performs a quick format that doesn't scan for boot sectors
popular linux distros
redhat/CentOS, SUSE, Debian/Ubuntu, Knoppix
hibernate mode
saves the current session to disk before powering off the computer
chkdsk C: /r
scans and attempts to recover bad sectors on drive C
sfc /scanonce
schedules a scan when the computer is next restarted
sfc /scanboot
schedules scans whenever the PC boots
Activation Lock/Device Protection
services that work in the device firmware that prevents restores or the disabling of location services
weekday
sets the day of the week in cron in either numerical or text format
net user dmartin
shows the properties of the dmartin account
image
template containing the OS and required software
taskkill /f /pid processid
terminates process without any user notification
Windows + Ctrl + Shift + B
tests whether or not a system is responsive
bootrec /fixboot
to attempt repair of the boot sector
bootsect
tool to copy code to make the parition bootable
diskpart
tool to setup partitions on a hard drive. Sets up active partition
network mapping
tools used to gather information about the way a network is built and configured
asymmetric encryption
used in public key encryption, it is scheme in which the key to encrypt data is different from the key to decrypt.(uses an RSA cipher)
Logical controls
user authentication login, firewalls, anti-virus software
xcopy
utility that allows you to copy the contents of more than one directory at a time and retain the directory structure
classified
viewing is restricted to the owner organization or to third parties under a Non-disclosure Agreement
VFAT
virtual file allocation table - file system for linux
VMM
virtual memmory monitor - manages the memmory mappings and assignments
xcopy command
• Copies files and directory trees • xcopy /s Documents m:\backups -- Copies directories and subdirectories except empty ones in the documents folders to drive "M:\backups" folder
FAT
• FAT - File Allocation Table • One of the first PC-based file systems (circa 1980) -FAT32 - File Allocation Table • Larger (2 terabyte) volume sizes • Maximum file size of 4 gigabytes • Most common file type -exFAT - Extended File Allocation Table • Microsoft flash drive file system • Files can be larger than 4 gigabytes
Upgrading from Windows 8.1
• Keeps Windows settings, personal files, and applications • Must upgrade to a similar Edition • You cannot upgrade directly from Windows 8 to Windows 10
MBR partition style
• MBR (Master Boot Record) • The old standby, with all of the old limitations -Primary partition • Bootable partitions • Maximum of four primary partitions per hard disk • One of the primary partitions can be marked as Active -Extended partition • Used for extending the maximum number of partitions • One extended partition per hard disk (optional) • Contains additional logical partitions • Logical partitions inside an extended partition are not bootable
DiskPart command
• Manage disk configurations • "diskpart" - start the DiskPart command interpreter at the cmd prompt
dism (Deployment Image Servicing and Management tool)
• Manages Windows Imaging Format (WIM) files -You can make changes to your image with DISM • Get information about an image • Update applications • Manage drivers • Manage updates • Mount an image -All command-line based • Many different options • Easy to automate
Power options Applet
• Power plans • Power usage can be customized -Sleep (standby) Option • Open apps are stored in memory • Save power, startup quickly • Switches to hibernate if power is low -Hibernate Option • Open docs and apps are saved to disk, allows system to shutdown completely • Common on laptops
Programs and Features Applet
• Shows Installed applications • Can Uninstall applications, view size and version -Can also enable/dislable Windows features that were/were not installed by default
ping
• Test reachability of a device • Determine round-trip time • Uses Internet Control Message Protocol (ICMP) -One of your primary troubleshooting tools • Can you ping the host? -Written by Mike Muuss in 1983 • Named similar to the sound made by sonar • Not an acronym for Packet INternet Groper
ASR
Automated System Recovery A feature of the Windows XP operating system that can be used to simplify recovery of a computer's system or boot volumes.
APIPA
Automatic Private Internet Protocol Addressing Assigns a class B IP address from 169.254.0.0 to 169.254.255.255 to the client when a DHCP server is either permanently or temporarily unavailable.
Upgrade Windows 8.1 Enterprise to Windows 10
Can upgrade to: • Windows 10 Enterprise Cannot upgrade to (requires clean installation): • Windows 10 Home • Windows 10 Pro
Upgrade Windows 7 Home Basic to Windows 10
Can upgrade to: • Windows 10 Home • Windows 10 Pro Cannot upgrade to (requires clean installation): • Windows 10 Enterprise
Upgrade Windows 7 Home Premium to Windows 10
Can upgrade to: • Windows 10 Home • Windows 10 Pro Cannot upgrade to (requires clean installation): • Windows 10 Enterprise
Upgrade Windows 7 Starter to Windows 10
Can upgrade to: • Windows 10 Home • Windows 10 Pro Cannot upgrade to (requires clean installation): • Windows 10 Enterprise
Upgrade Windows 8.1 Core to Windows 10
Can upgrade to: • Windows 10 Home • Windows 10 Pro Cannot upgrade to (requires clean installation): • Windows 10 Enterprise
Upgrade Windows 7 Ultimate to Windows 10
Can upgrade to: • Windows 10 Pro Cannot upgrade to (requires clean installation): • Windows 10 Home • Windows 10 Enterprise
Upgrade Windows 7 Professional to Windows 10
Can upgrade to: • Windows 10 Pro • Windows 10 Enterprise Cannot upgrade to (requires clean installation): • Windows 10 Home
Upgrade Windows 8.1 Professional to Windows 10
Can upgrade to: • Windows 10 Pro • Windows 10 Enterprise Cannot upgrade to (requires clean installation): • Windows 10 Home
gpupdate /force
Causes all policies(new and old to be reapplied)
CIDR
Classless Inter-Domain Routing -Technique supported by the BGP4 protocol and based on route aggregation. -CIDR enables a router to group routes together to reduce the quantity of routing information carried by the core routers. -With CIDR, a group of IP networks appear to be a single entity to networks outside of the group.
ipconfig /flushdns
Clears the DNS resolver cache
CIFS
Common Internet File System A file-sharing protocol that provides an open and cross-platform mechanism for requesting network server files and services. CIFS is based on the enhanced version of Microsoft's Server Message Block (SMB) protocol for Internet and intranet file sharing.
CNR
Communications networking riser. A slot found on certain PC motherboards and used for specialized networking, audio, and telephony equipment. A motherboard manufacturer can choose to provide audio, networking, or modem functionality in any combination on a CNR card.
CD-RW
Compact Disc - ReWritable A CD that allows data to be erased and written again several times.
CDFS
Compact Disc File System Is a file system for read-only and write-once CD-ROMs
CD-ROM
Compact Disc Read-Only Memory The read-only data format that is stamped onto a CD, usually by the manufacturer.
CMOS
Complementary metal-oxide-semiconductors A technology for constructing integrated circuits.
CAPTCHA
Completely Automated Public Turing test to Tell Computers and Humans
CAD
Computer Aided Design. The use of computers in converting the initial idea for a product into a detailed engineering design.
CERT
Computer Emergency Response Team A group of experts that respond to security incidents. Also known as CIRT, SIRT, or IRT.
CGA
Computer Graphics and Applications
Network Group
Contains user accounts of any users connected to a computer over the network
IPv4 Socket
- Server IP address, protocol, server application port number. -Client IP address, protocol, client port number.
RJ14 Connector
-6 Position, 4 conductor connectors (6P4C) -6 wires available, only 4 are used -Used for dual-line use for 2 telephones -Interchangeable with RJ11
SATA Revision 3.0
-6.0 Gbit/s -Max cable size : 1 meter
International Mobile Station Equipment Identity (IMEI)
-Identifies a physical mobile device -Every phone has a different number -The wireless carrier can use this number to allow or disallow access based on this number -Verify if the phone is unlocked so that it can be used with that wireless carrier
International Mobile Subscriber Line (IMSI)
-Identifies the user of a mobile network -Associated to the user (not the mobile device) -Can be provisioned to the sim card -Sim cards can be swapped to different phones and still maintain access to the wireless provider
SO-DIMM (small outline DIMM)
-About half the width of DIMM -Available in DDR2, DDR3, DDR4 SDRAM -Used in Laptop and Mobile devices
BIOS built-in diagnostics
-Part of the BIOS (always available) -Runs from BIOS menu (no additional media or software required) -Focused on hardware checks -Does not touch the OS -Can gather statistics (CPU/Memory information)
Secure Boot
-Part of the UEFI specification -Digitally sign known-good software -Cryptographically secure -Software won't run without the proper signature -Support in many different OS's (Windows and Linux)
BIOS password / User password
-Password is needed to start the OS -System/OS wont load
Bluetooth (Mobile Device Connectivity)
-Personal Area Network (PAN) -Short range (about 10 meters) -Can connect different devices (mouse, keyboards, headsets, speakers) -Needs to be pair (connections are remembered)
Laptop Wireless Control
-Physical switch or FN Key to enable or disable connectivity -May be a switch that turns off 802.11, Bluetooth and cellular -May have the ability to specify which connection to disable/enable
Tethering Connections
-Physically connect a device to your phone -Can use the internet/data connection -Computer uses USB to connect -Can access the internet from almost anywhere (may require service or configuration from wireless carrier)
Pickup Rollers
-Picks up paper, single page at a time -Picks up the top sheet of the feeder -possibly problems if its not picking up any paper or multiple sheets -Should be periodically cleaned or replaced
ink cartridge
-Places a drop of ink onto the page as needed -4 different colors -Cyan, Magenta, Yellow, Key (black) = CYMK
Magnetic / Chip Reader
-Point of sale terminal -Uses integrated circuit (insert card into reader) -Strip reader (swipe card) -connected via USB if associated to POS terminal
Application Streaming (Mobile phones/Tablets)
-Can run an app (or a portion of an app) in real-time -Apps or components can be used without installing physically on device -Can be cached locally for later use -Common to see with Online Ads that allow you to use the app as if it was installed
The Run line
-Can start an application as a command • Instead of the graphical interface -Can use the run/search or command prompt • Options can be specified as part of the command
Networking Tab
-Can view network performance • Separate tab in Windows 7 • Integrated into the Performance tab in Windows 8/8.1/10 -View utilization, link speeds, and interface connection state
Laptop Webcam
-Captures video with built-in camera and microphone -Usually includes both audio and video -Requires specialized drivers and software
PCI 32-bit expansion card
-Card slot provides power at 3.3V or 5V -device can use either available power -Card should be able to slide in without much force. -confirm notches are lined up to the PCI slot
Smart Card
-Card with embedded circuitry -Used in payment cards, identification cards -Useful form of authentication (username, password, physical card)
DVI-A to VGA connector
-DVI-A includes analog signals -Backward compatible with VGA -Only 640 x 480 is officially supported -Adapter only needed when analog to analog -VGA to DVI digital requires a converter
Land Grid Array (LGA)
-Does not contain any pins -CPU is completely flat -All pins are located on the motherboard CPU socket -Possible damage to the CPU socket if objects are dropped onto it (pins can bend)
Expansion Card installation
-Extends functionality of the computer -Simple to install (Install the hardware then install the software or vice versa) -Check mobo documentation (make sure it supports the type and size of card) -Check adapter card documentation for hardware and software requirements
RAID 5 (Striping with Parity)
-File blocks are striped along with a parity block -Efficient use of disk space (files aren't duplicated but space is still used for parity) -High redundancy (data available after drive failure; parity calculation may affect performance) -Minimum of 3 drives
Format command
-Formats a disk for use with Windows • format c: • BE CAREFUL - YOU CAN LOSE DATA
BYOD
Bring your own device. A policy allowing employees to connect personally owned devices, such as tablets and smartphones, to a company network. Data security is often a concern with BYOD policies and organizations often use VLANs to isolate mobile devices.
CFS
Central File System, Common File System, or Command File system
CPU
Central Processing Unit The key component of a computer system, which contains the circuitry necessary to interpret and execute program instructions
System Log
Contains information about service load failures, hardware conflicts, and driver load failures
Application Log
Contains information regarding the application errors
remote settings location
Control Panel ->System -> Advanced system settings ->System Properties->Remote Settings
DaaS
Data as a Service An information provision and distribution model in which data files (including text, images, sounds, and videos) are made available to customers over a network, typically the Internet.
DLP
Data loss prevention. A strategy for making sure that end users do not send sensitive or critical information outside the corporate network. A network-based DLP system can examine and analyze network traffic. It can detect if confidential company data or any PII data is included in email and reduce the risk of internal users emailing sensitive data outside the organization. End-point DLP systems can prevent users from copying or printing sensitive data.
DBaaS
Database as a Service Offers full database functionality to application developers
SCSI Advantages
-Pre-dates USB -Could connect many devices on a single bus -8 devices on a narrow bus -16 devices on a wide bus -No much configuration needed (just assign ID # to a device), SCSI will then handle the rest -SCSI is still used in data centers such as VM's or drive arrays
Step 2 : Charging
-Prepares the drum with a negative electrostatic charge (negative ions) -Older printers charge with a corona wire, newer printers with a primary charging roller -Entire photosensitive drum will have negative sets of ions associated with the entire printing area
Integrated print server (device sharing)
-Print directly to the printer -Jobs are queued on the printer -Jobs are managed on the printer -Web based front end (access through the browser) or through Client software
Syncing Mobile devices to the Desktop
-Requires an application that will use the OS and disk space -The backup application might require minimal memory usage, but will require much storage space (to store backups, video pictures) -Might be gigabytes in size
Hard Disk Drive Speeds
-Rotational Speed (RPM) 5,400 ; Avg. rotational speed 5.55 ms -Rotational Speed (RPM) 7,200 ; Avg. rotational speed 4.16 ms -Rotational Speed (RPM) 10,000 ; Avg. rotational speed 3 ms -Rotational Speed (RPM) 15,000 ; Avg. rotational speed 2 ms
SOHO Routing and Switching
-Routes to the outside world through DSL/WAN Port -One VLAN (LAN 1, LAN 2, LAN 3, etc..) -Routes and switches by default (not much to configure)
M.2 Interface
-Smaller storage device -As fast (or faster than SATA) -No SATA data or power cables -Interface is directly on the motherboard -Direct access to PCI Express bus -4 GByte/Second throughput or faster -Different types of interface (B key, M key, or B and M key) -Some drives will support both
Mini-ITX form factor
-Smaller than MicroATX -A series of low-power mb's -Screw compatible with ATX and MicroATX -Single use computing (i.e., streaming media)
Mini-SD Card
-Smaller than SD Card
USB to Ethernet
-Some laptops don't have an Ethernet connection -Convert USB to Ethernet
Optical/DVD Drive
-Stores and reads data with light -Small bumps are read with a laser beam -Microscopic binary storage -Read/Write media (store backups and docs) -Read-only media (data cant be deleted; common for video distribution) -Limited storage sizes
CPU Cache
-Super fast memory -Holds data, instructions, and/or results -Temporary holding space for the transactions going thru the processor
Post Office Protocol version 3 (POP3)
-TCP 110 -Receives emails from an email server (authenticate and transfer) -Basic mail transfer functionality
Secure Shell (SSH)
-TCP 22 -Encrypted communication link -Looks and acts the same as Telnet
Hypertext Transfer Protocol (HTTP)
-TCP 80 -Communication in the browser and by other applications -Web Server Communication -In-the-clear non encrypted version -Supported by nearly all web servers and clients
SOHO MAC (Media Access Control) Filtering
-The "hardware" address -access can be limited through the physical hardware address -Additional administration needed -All MAC addresses are viewable by capturing packets going through the networks -MAC addresses can be easily spoofed -Not a security method
Device Manager
-The OS doesn't know how to talk directly to most hardware -Device drivers are hardware specific and operating system specific • Windows 7 device drivers may not necessarily work in Windows 10 -Technical Support FAQ starting point • "Have you updated the drivers?" -Complete control of the hardware • Can update, uninstall, or disable drivers • Can scan for hardware changes OR dive into the driver properties -Computer Management or devmgmt.msc
USB Type B Printer Connector (wired device sharing)
-USB Type B Printer Connector -Printer common connector -This connector connects to the printer -USB Type A connects to the computer
Boot methods
-USB storage • USB drive must be bootable • Computer must support booting from USB drive -CD-ROM and DVD-ROM • A common media -PXE ("Pixie") - Preboot eXecution Environment • Performs a remote network installation • Computer must support booting with PXE -NetBoot • Apple technology to boot macOS from the network • Similar concept to PXE boot -If you need to install many types of OS's • Considered using external media that connects via USB • Solid state drives / hard drives • Store many OS installation files -External / hot swappable drive • Some external drives can mount an ISO (DVD-ROM image) which the PC will see as a DVD-ROM drive • Can boot from USB -Installing on the Internal hard drive • Install and boot from separate drive • Create and boot from new partition
Hypervisor Security
-VM escaping is malware recognizing it's on a virtual machine, compromised the hypervisor and jump from one guest OS to another -Malware on one customer's server can gather info. from another since many hosted services are virtual environments -A sweet spot for the bad guys (No significant vulnerabilities yet)
Unmanaged Switches
-Very few configuration options (Plug & Play) -No VLANs (fixed configuration) -Very little integration with other devices -No management protocols -Low price point (simple is less expensive)
Performance Tab
-What's happening? • Can view CPU, memory, etc. -Statistical views • Historical, real-time -Newer versions include CPU, memory, disk, Bluetooth, and network in the Performance tab
Print and Scan Caching (Printer Data Privacy)
-When you click print, the local system creates a file of the output -The output file is then sent to the print server located in the printer itself, file is then placed inside the print spooler -Print spooler manages which jobs print and which order. It then prints the file. -Spool file is usually deleted when done -Some printers keep that file until space is needed. file is accessible if someone gains access to those files.
Apple macOS history
-macOS • Desktop OS running on Apple hardware -Advantages • Easy to use • Extremely compatible • Relatively fewer security concerns -Disadvantages • Requires Apple hardware • Less industry support than the PC platform • Higher initial hardware cost
Running BIOS upgrade program
-older computers required a boot floppy or optical media -Modern upgrades run as an executable -May run from a flash drive -Most upgrade apps will check for prerequisites (dont rely on this) -Do not reboot/shutdown pc during upgrade -Requires a reboot (save your documents)
Robust Copy
-robocopy • A better xcopy • Has the ability to resume a file transfer if it is interrupted • Looks and acts similar to xcopy • Most syntax is the same as xcopy • Shows results, time taken, and throughput of the copy process -Included with Windows 7, 8.1, and 10
PCI 32-bit slots
-smaller slots
2
-w-
3
-wx
NFC (Near Field Communication) / Tap-to-Pay device
-~10 centimeter wireless range -Built into many phones -Many terminals accept this payment method -Identify key/door key (can be used to unlocked a door)
JavaScript comment
//
HOSTS file location in Linux
/etc/hosts
Windows Batch file comment
::
DDoS
A distributed denial of service An attack that attempts to make an online service, like a website, unavailable by overwhelming it with a flood of traffic from a team of computers.
Replay Attack
A type of network attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.
Boot Camp
A utility on macOS that allows a full windows installation to be made on a Mac. Applications ->Utilities folder
regsvr32
A utility that is used to register component services used by an installed application.
counter logs
Allow you to collect statistics about resources such as memory, disk, and processor
phishing
An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
gpupdate
Applies a new or changed policy to a computer immediately
chkdsk C: /f
Fixes file system errors on the disk drive C
FQDN
Fully Qualified Domain Name www.hostgator.com. The first part ('www') is the host name. The second part ('hostgator') is the domain name. The last part ('com') is the TLD (top-level domain).
GPT
GUID partition table A newer partition type that is used to create drives larger than 2 TB.
GPO
Group Policy Object - a means of applying security settings and other administrative settings across a range of computers and users
GPO
Group Policy Objects - a windows policy in which a computer remotely installs an application from a network folder without any administrator intervention
Users
Group is able to perform most common tasks such as shutdown, running applications, and using printers. They can also change time zone and install printers
HTTP
HyperText Transfer Protocol The underlying protocol used by the World Wide Web and this protocol defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands.
SCSI
ID Small Computer System Interface Identifier
Local Security Policy(secpol.msc)
In administrative tools. You would use this to configure password and account policies with out going into the registry
.sh
Linex shell script
LCD
Liquid Crystal Display
DHCP
Dynamic Host Configuration Protocol. A service used to dynamically assign TCP/IP configuration information to clients. DHCP is often used to assign IP addresses, subnet masks, default gateways, DNS server addresses, and much more.
DRAM
Dynamic Random Access Memory. Dynamic RAM. The slowest type of RAM, which requires frequent electrical refreshes to keep contents valid.
FAT
File Allocation Table Used by the operating system (OS) to manage files on hard drives and other computer systems.
FTP
File Transfer Protocol Uses a TCP-based network to pass files from host to host.
Fragmentation
Files written in non contiguous clusters reducing read performance
Normal Startup
Load all device drivers and services
MMC
Microsoft Management Console
domain
Microsoft client/server network model that groups computers together for security and to centralize administration
SAM
Security Accounts Manager - where the local accounts are stored
MPEG
Moving Picture Experts Group
MP3
Moving Picture Experts Group Layer 3 Audio
MP4
Moving Picture Experts Group Layer 4
NTFS
New Technology File System - proprietary file system used exclusively with Windows
NiCd
Nickel Cadmium
NiMH
Nickel Metal Hydride
PoS
Point of Sale
PPP
Point-to-Point Protocol
PPTP
Point-to-Point Tunneling Protocol
Windows 8/8.1 7 Minimum Hardware Requirements (x64)
Processor/CPU - 1 GHz processor with support for PAE, NX, and SSE2 Memory - 2 GB RAM Free disk space - 20 GB Video - Microsoft DirectX 9 graphics device with WDDM* driver *Windows Display Driver Model
RF
Radio Frequency
RFID
Radio Frequency Identification
RAM
Random Access Memory
RPO
Recovery Point Objective
RT
Recovery Time Objective
RGB
Red Green Blue
RISC
Reduced Instruction Set Computer
RAS
Remote Access Service
RADIUS
Remote Authentication Dial-In User Server
RADIUS
Remote Authentication Dial-In User Service - a type of authentication suitable for server and domain based networks
RADIUS
Remote Authentication Dial-In User Service - under this protocol Authentication, Authorization, and Accounting are performed by a seperate server
RIS
Remote Installation Service
Services
Start, stop, and pause services
SAN
Storage Area Network
SC
Subscription Channel
SXGA
Super Extended Graphics Array
UXGA
Ultra Extended Graphics Array
TKIP
Temporal Key Integrity Protocol
TACACS
Terminal Access Controller Access-Control System
VLAN
Virtual LAN
VM
Virtual Machine
VNC
Virtual Network Computer
VNC
Virtual Network Computing - freeware that works over TCP port 5900 with similary functionality to RDP. Screen Sharing is based on VNC
VPN
Virtual Private Network
Procedural controls
incident response processes, management oversight, security awareness, and training
WoL
Wake on LAN - Allows you to start up the computer remotely
WoWLAN
Wake on Wireless LAN
ARP poisoning
an attack that convinces the network that the attacker's MAC address is the one associated with an allowed address so that traffic is wrongly sent to the attacker's machine
answer file
an xml text file that contains all the instructions a Windows Setup program would need to install and configure an OS with out any administrator intervention
Option
apple equivalent of Alt
Command
apple equivalent of Ctrl button
Rainbow Table Attack
attempts to discover the password from the hash using databases of precomputed hashes
bootrec /fixmbr
attempts to repair MBR
ext3 vs ext4
both 64 bit file systems that suppor journaling but ext 4 delivers better performance
dock
bottom of screen gives one-click access to favorite apps and files in macOS
dd
can be used to specify that date within the month(0-31) in cron
trace logs
can collect statistics about services, providing detailed reports about about resource behavior
CRT
cathode ray tube A type of display device that uses electron beams within a vacuum tube to create images on a fluorescent screen.
chmod
change permission modifiers in linux
ERD
emergency repair disk A windows XP troubleshooting tood that stores the contents of the \Windows\ Repair folder.
Host Firewall
firewall implemented as software on the individual host computer
VFAT
Virtual File Allocation Table
mstsc
opens a Remote Desktop connection from command line
devmgmt.msc
opens device manager from runline
4
r--
5
r-x
shutdown now, +10
reboot 10 minutes from now
apt-get update
refresh the local database with information about the packages available from the repository
mm
specifies minutes past the hour in cron(0-59)
hh
specifies the hour in cron(0-23)
format D: /a:512
specifies the size of allocation units
taskkill /im
specify image name to kill
shutdown 17:30
shutdown at 5:30
shutdown -t 30
shuts the computer down in 30 seconds
Windows Settings
Interface for managing a Windows 10 computer
IMEI
International Mobile Equipment Identity
IMSI
International Mobile Subscriber Identity
ISO
International Organization for Standardization
ICMP
Internet Control Message Protocol
IIS
Internet Information Services
IMAP
Internet Mail Access Protocol
IPConfig
Internet Protocol Configuration
IPSec
Internet Protocol Security
ISP
Internet Service Provider
IRQ
Interrupt Request
SSO
Single Sign-on
Authenticated Users Group
All user accounts that have been authenticated to access the system
dir/t:a
list by last time accessed
help netsat
lists all switches for the netstat command
netstat /?
lists all switches for the netstat command
WOW64
acts as the emulator for allowing 32-bit applications to run seamlessly on a Windows 64-bit OS
dir/w
lists files using a wide format with no file details
WWAN
(Wireless Wide Area Network) A computer network that enables users to wirelessly connect to their offices or the Internet via a cellular network. Sometimes referred to as wireless broadband.
Laptop Port Replicator
-Does have similar interfaces compared to a docking station -Smaller in size compared to a docking station -Do not have an expansion card option
python comment
#
windows batch file escape character
%%
HOSTS file location in Windows
%SYSTEMROOT%\System32\drivers\etc\hosts
Where are the log files stored?
%SystemRoot%\System32\Winevt\Logs folder
VBScript comment
'
AMD Virtualization (AMD-V)
-AMD's version of virtualization
DVD-R DL, DVD+R DL
-Dual Layer writable
Voltage (Volt, V)
-Electrical "pressure" pushing the electrons -e.g. how open the faucet is
SmartPhone
-Most popular mobile device -Can make calls, text, emails, instant message -Can take pictures, see movies, hear music -From ~3.5in to 6in diagonally -Can view maps and travel information -Can support specialized, productivity, gaming apps.
malware removal process
1. Identify and research malware symptoms 2. Quarantine infected systems 3. Disable system restore 4. Remediate infected systems: -update anti-malware software -scan and use removal techniques 5. Schedule scans and run updates 6. Enable system restore 7. Educate end user
IPv4 Loopback Address
127.0.0.1
FAT32
32-bit File Allocation Table A file allocation table which uses 32 bits for addressing clusters.
exFAT
64 bit Extended File Allocation Table used for large capacity removable hard drives and flash media.
security group
A collection of user accounts that can be assigned permissionsin the same way as a single user object
set command
A command used to view all variables in the shell, except special variables.
Power Supply
A component that provides power to a computer
swap partition
A disk partition disignated for swap space in linux
LocalService
A limited account used to run services that cannot make system wide changes. Also it can access the network anonymously
hash
A number generated by an algorithm from a text string.
zero-day exploit
A vulnerability that is exploited before the software creator/vendor is even aware of its existence.
Default Programs
An applet to set the programs you wish to use, or choosing which application is used to open files of a particular extension
AUP
Acceptable Use Policy Rules or guidelines for the proper use of technology or digital devices within an organization.
ACL
Access control list. A list of rules used to grant access to a resource. In NTFS, a list of ACEs makes up the ACL for a resource. In a firewall, an ACL identifies traffic that is allowed or blocked based on IP addresses, networks, ports, and some protocols (using the protocol ID).
ACL
Access control list. Rules applied by packet filter firewalls that filter data by IP address, Protocol ID, and Port Numbers
Local Security Policy
Allows you to view and edit currenty security policy
Credential Manager
Allows you to view cached passwords for websites and Windows/network accounts
Home Client
An OS designed to work on standalone or workgroup PCs in a home or small office
LocalSystem account
An account in which if a process is executed it is unrestricted in terms of making changes to the system configuration and file system (better than administrator account)
NetworkService
An account that has the same privileges as LocalService but can access the network using the computer's machine account's credentials
shell
An interface between the user and computer and software
Finder
Apple equivalent of file explorer in Windows
Time Machine
Apple equivalent of system restore
ADSL
Asymmetrical Digital Subscriber Line A type of digital subscriber line (DSL) technology, a data communications technology that enables faster data transmission over copper telephone lines than a conventional voiceband modem can provide.
ATM
Asynchronous Transfer Mode A cell-switching-based physical layer protocol. It supports high-bandwidth data needs and works well for time-sensitive applications. Because the switching process occurs in hardware, delays are minimized. ATM uses a fixed cell size of 53-bytes. ATM can be implemented on LANs or WANs.
A/V
Audio Video
AAA
Authentication, Authorization, and Accounting
BIOS
Basic Input/ Output System. A computer's firmware used to manipulate different settings such as the date and time, boot drive, and access password.
BNC
Bayonet Neill-Concelman A connector
BD-RE
Blu-ray Disc Recordable Erasable Similar to the BD-R Blu-ray format, however the user can record and reuse and erase data from the disc multiple times.
BD-R
Blu-ray disc recordable A Blu-ray disc that can be recorded on one time.
BSOD
Blue Screen of Death An error screen which appears on a Windows PC after a fatal system error.
Upgrade Windows 7 Enterprise to Windows 10
Can upgrade to: • Windows 10 Enterprise Cannot upgrade to (requires clean installation): • Windows 10 Home • Windows 10 Pro
CA
Certificate Authority - a third party that vouches for certificates
chkdsk
Check Disk - checks the integrity of disks and can repair any problems detected
COMx
Communication Port (x=port number). See serial port.
DMZ
Demilitarized Zone (Sometimes referred to as a perimeter network or screened subnet) A physical or logical subnetwork that contains and exposes an organization's external-facing services to an untrusted network, usually a larger network such as the Internet.
DoS
Denial of Service An interruption in an authorized user's access to a computer network, typically one caused with malicious intent.
DoS attack
Denial of Service Attack - causes a service at a given host to fail or become unavailable to legitimate users
DLT
Digital Linear Tape Previously called Compac Tape. A magnetic tape data storage technology developed by Digital Equipment Corporation (DEC) from 1984 onwards.
DSL
Digital Subscriber Line. A method of connecting to the Internet via a phone line. A DSL connection uses copper telephone lines but is able to relay data at much higher speeds than modems and does not interfere with telephone use.
DVD
Digital Versatile Disc
DVD-ROM
Digital Versatile Disc - Read Only Memory DVD format in which data can only be read
-
Digital Versatile Disc-Random Access Memory
DC
Direct Current
net user dmartin /active:no
Disables dmartin account
DAC
Discretionary Access Control. An access control model where all objects have owners and owners can modify permissions for the objects (files and folders). Microsoft's NTFS uses the DAC model. Other access control models are MAC and RBAC.
DNS
Domain Name System The Internet's system for converting alphabetic names into numeric IP addresses.
DDR RAM
Double Data-Rate Random Access Memory A class of memory integrated circuits used in computers. RAM that transfers data on both 0-1 and 1-0 clock transitions, theoretically yielding twice the data transfer rate of normal RAM or SDRAM.
DIMM
Dual Inline Memory Module These are available in 168-pin, 184-pin, and 240-pin versions. Dual refers to each side of the module having a different pinout.
NetBEUI
EUI Networked Basic Input/Output System Extended User Interface
man/ --help
Either parameter will generate a detailed explanation of the command in Linux
EEPROM
Electrically Erasable Programmable Read Only Memory A type of non-volatile memory used in computers, integrated in microcontrollers for smart cards and remote keyless systems, and other electronic devices to store relatively small amounts of data but allowing individual bytes to be erased and reprogrammed with an electrical charge.
EMP
Electromagnetic Pulse An electromagnetic pulse (EMP), also sometimes called a transient electromagnetic disturbance, is a short burst of electromagnetic energy.
EMI
Electromagnetic interference. Interference caused by motors, power lines, and fluorescent lights. Cables can be shielded to protect signals from EMI. Additionally, EMI shielding prevents signal emanation, so it can prevent someone from capturing network traffic.
format D: /fs:NTFS /x
Enables file compression using NTFS
Drive wiping
Ensures old data on a hard drive is destroyed by writing zereos or a random patter to each location on the drive. Makes disk suitable for re-use
EPROM
Erasable programmable read-only memory. A special type of PROM that can be erased by exposing it to ultraviolet light
ECC
Error Correcting Code Used for controlling errors in data over unreliable or noisy communication channels.
Local Group Policy(gpedit.msc)
Exposes the whole registry configuration using a dialog-based interface(Offers a wider range of settings than Local Security Policy)
ECP
Extended Capabilities Port A parallel port for personal computers (PCs) that supports bi-directional communication between a computer and a peripheral device such as a printer.
exFAT
Extended File Allocation Table. Microsoft flash drive file system. Files can be larger than 4 gigabytes.
XGA
Extended Graphics Array A high-resolution video display mode that provides screen pixel resolution of 1,024 by 768 in 256 colors or 640 by 480 in high (16-bit) color.
HFS Plus
Extended Hierarchical File System - the file system older macOS uses
EVGA
Extended Video Graphics Array - A display standard introduced by VESA in 1991 that offers a max resolution of 1024 x 768 pixels. EVGA should not be confused with the older EGA (Enhanced Graphics Array) or XGA (eXtended Graphics Array).
eSATA
External Serial advanced technology attachment An external interface for SATA. Transfer rate of 3Gbps
GPS
Global Positioning System Uses a system of satellites, tracking stations, and receivers to determine precise absolute locations on earth.
GSM
Global System for Mobile Communications A standard developed by the European Telecommunications Standards Institute (ETSI) to describe the protocols for second-generation (2G) digital cellular networks used by mobile devices such as mobile phones and tablets.
GUID
Globally Unique Identifier A 128-bit number used to identify information in computer systems
HAV
Hardware Assisted Virtualization Is a platform virtualization approach that enables efficient full virtualization using help from hardware capabilities, primarily from the host processors. Full virtualization is used to simulate a complete hardware environment, or virtual machine, in which an unmodified guest operating system (using the same instruction set as the host machine) executes in complete isolation.
HAL
Hardware abstraction layer A layer in the Windows operating systems in which assembly language code is isolated. It is used to write device-independent applications.
HTPC
Home Theater PC Designed to attach to a TV or projector for movie and TV viewing.
HIPS
Host intrusion prevention system A system or a program employed to protect critical computer systems containing crucial data against viruses and other Internet malware. Starting from the network layer all the way up to the application layer, HIPS protects from known and unknown malicious attacks.
Screen Sharing
In OS X, a utility to remotely view and control a Mac and is similar to Remote Assistance in Windows.
ISA
Industry Standard Architecture
Event types
Information Warning Error Critical Successful Audit Failure Audit
ICM
Information Content Management - the process of managing information over its life cycle
footprinting
Information gathering threat in which the attacker attempts to learn about the configuration of the network and security systems
Footprinting
Information gathering threat in which the attacker attempts to learn about the configuration of the network and security systems.
IR
Infrared
Guests
Limited rights such as browsing network and shutdown, but they cannot save changes made to the desktop
LPD/LPR
Line Printer Daemon/Line Printer Remote
Diagnostic start up
Load basic devices and services only
LAN
Local Area Network
secpol.msc
Local Security Policy snap in
Administrative Tools
Located in Control Panel in Windows 7, is a collection of predefined Microsoft Management Consoles
LBA
Logical Block Addressing
LVD
Low Voltage Differential
screen sharing
MacOS version of remote desktop functionality
Computer Management
Management console with multiple snap-ins to configure local users and groups, disks, services, and devices
Moving files and folders to a FAT or FAT32 partition
Modify permission is required for the destination folder. All permissions and NTFS attributes(such as encryption) are lost, FAT does not support permissions or special attributes
NFC
Near Field Communication
NAC
Network Access Control - allows administrators to devise policies or profiles defining the minimum security configuration required of devices for network access
NAT
Network Address Translation
NFS
Network File System
NFS
Network File System - used to mount storage devices into a local file system in linux
NIC
Network Interface Card
NNTP
Network News Transfer Protocol
NVMe
Non-volatile Memory Express
chkdsk C: /i /c
On NTFS volumes only skips part of the checking process
OU
Organizational Unit - Provide a way of dividing up a domain into different administrative realms
OEM
Original Equipment Manufacturer
PnP
Plug and Play
PCIe
Peripheral Component Interconnect Express
PCIX
Peripheral Component Interconnect Extended
PVC
Permanent Virtual Circuit
PAN
Personal Area Network
PC
Personal Computer
PCMCIA
Personal Computer Memory International Association
PHI
Personal Health Information
PIN
Personal Identification Number
POTS
Plain Old Telephone Service
PaaS
Platform as a Service
PAT
Port Address Translation
PNAC
Port-based network access control - means that the switch or router performs authentification of the attached device before activating the port
POP3
Post Office Protocol 3
PSU
Power Supply Unit
PoE
Power over Ethernet
PSK
Pre-Shared Key - 256 bit cryptographic hash generated from a passphrase. This authentication method is suitable for SOHO networks
PXE
Preboot Execution Environment
PE
Preinstallation Environment
PCL
Printer Control Language
Windows 7 Minimum Hardware Requirements (x64)
Processor/CPU - 1 GHz processor Memory - 2 GB RAM Free disk space - 20 GB Video - DirectX 9 graphics device with WDDM* 1.0 or higher driver *Windows Display Driver Model
Windows 10 Minimum Hardware Requirements (x86)
Processor/CPU - 1 GHz processor with support for PAE, NX, and SSE2 Memory - 1 GB RAM Free disk space - 16 GB Video - Microsoft DirectX 9 graphics device with WDDM* driver *Windows Display Driver Model
Windows 8/8.1 7 Minimum Hardware Requirements (x86)
Processor/CPU - 1 GHz processor with support for PAE, NX, and SSE2 Memory - 1 GB RAM Free disk space - 16 GB Video - Microsoft DirectX 9 graphics device with WDDM* driver *Windows Display Driver Model
file attributes
R - read only H - hidden S - system, can not be deleted A - archive, modified since last backup
Write
Read a file and change it, or create a file within a folder, but not to delete it
ROM
Read-Only Memory
RTC
Real-Time Clock
shutdown -r
Reboot after shutdown
Setup
Records events generated during installation
Pharming
Reroutes requests for legitimate websites to false websites
pharming
Reroutes requests for legitimate websites to false websites
ping -a IPaddress
Resolves address to hostnames
RSoP
Resultant Set of Policies
RMA
Returned Materials Authorization
SCP
Secure Copy Protection
SD Card
Secure Digital Card
SFTP
Secure File Transfer Protocol
SIMM
Single In-Line Memory Module
SFF
Small Form Factor
SOHO
Small Office/Home Office
SoDIMM
Small Outline Dual Inline Memory Module
boot partition
The hard drive partition where the Windows OS is stored. The system partition and the boot partition may be different partitions.
Top Secret
The highest level of classification
No reply (request timed out)
The host cannot route a reply back to your computer
Secret
The info is too valuable to permit any risk of its capture. Viewing is severely restricted
Ext2
The second extended file system Supports Access Control Lists to control individual permissions, but it does not support journaling.
latency
The time it takes for a signal to reach the recipient
boot sector virus
These attack the boot sector, partition table, and file system
Interactive Group
This group contains the user account of the person currently working at the computer
UEFI
Unified Extensible Firmware Interface
UTM
Unified Threat Management
URL
Uniform Resource Locator
UPS
Uninterruptible Power Supply
UDF
Universal Disk Format - updated file system for optical media with support for multi-session writing
UNC
Universal Naming Convention
UPnP
Universal Plug and Play
UPnP
Universal Plug and Play: Enables network-ready devices to discover each other automatically. Also allows configurations for devices to work with firewalls
USB
Universal Serial Bus
System Configuration Utility(msconfig)
Used to modify settings and files that effect the affect the way the computer boots in windows
UAC
User Account Control
UDP
User Datagram Protocol
.vbs
VBScript
Macro viruses
Virus that takes advantage of the macro programming languages built into some software.(affect an Office Document)
WPA2
WiFi Protected Access 2
WEP
Wired Equivalent Privacy
WAP
Wireless Access Protocol/Wireless Access Point
WIFI
Wireless Fidelity
WLAN
Wireless Local Area Network
WMN
Wireless Mesh Network
WPA
Wireless Protected Access
WWAN
Wireless Wide Area Network
Moving files and folders to a different NTFS volume
Write permission is required for the destination folder and Modify for the source folder. NTFS permissions are inherited from the destination folder and the user becomes the Creator/Owner
cluster
a group of sectors
Bitlocker
a microsoft utility to encrypt a drive
Trojan Horse
a program that appears desirable but actually contains something harmful
Rootkits
a set of software tools that enable an unauthorized user to gain control of a computer system without being detected.
Rootkit
a set of tools designed to gain control of a computer without revealing its prescence
symmetric encryption
a single key is used to encrypt and decrypt data
Worm
a software program capable of reproducing itself that can spread from one computer to the next over a network
df and du
check free space and report usage by directories and files
Adapter properties
clients - Provide connections to types of file servers such as Linux, Unix, or Windows Protocols - Provide the format for addressing and delivering data messages between systems Services - Allow your machine to provide network functionality to other machines
CDFS
compact disc file system - legacy file system used for optical disc media
Data Sources
control connection to databases set up on the local computer
Remote Settings location
control panel -> system properties -> remote settings
DRM
digital rights management The term for any one of several technologies designed to limit the number of digital copies can be made of a file.
dir *.doc
displays all files with the DOC extension in the current directory
dir let *.doc
displays all files with the DOC extension that start with the letters LET
dir let *.doc /s
displays all files with the DOC extension that start with the letters LET and searches for subdirectories
apt-get install (package name)
install new application
Component Services
located in Administrative Tools, enables you to register new server applications or reconfigure security permissions for existing services
dd
linux command that makes a copy of an input file to an output file
route
linux command that shows the default gateway because ifconfig does not
swapon
linux command used to activate the partition swap space
grep
linux command used to search and filter contents of files displaying the lines that match the search string
fdisk
linux command-line program used to create and manage partitions on a hard disk
Resource Monitor
shows an enhanced version of the sort of snapshot monitoring provided by task manager
privacy screen
prevents anyone but the user from viewing the screen
legal and regulatory or compliance controls
privacy laws, policies, and clauses
virtual memory
process of optimizing RAM storage by borrowing hard drive space
secure boot
restricts OS installation to trusted software
rstrui
runline command for system restore
sfc /scannow
runs a scan immediately
6
rw-
7
rwx
Standby/Sleep Mode
saves current session to memory and put the computer into a minimal power state
multiboot
the capability for choosing between two or more operating systems to boot from when a computer is turned on. A separate partition is required for each operating system.
802.1x
the standard that defines a Port-based Network Access Control mechanism
LC
ucent Connector
ugo
user group others
printenv or env command
view and change environment variables
Multi-mode fiber
-Short-range communication -Up to 2 km for 100 Mbit/s -550 meters for 10 Gbit/s -Inexpensive light source (i.e. LED)
SDRAM (Synchronous DRAM)
-Synchronous with common system clock -Queues up one process while waiting for another
DisplayPort
-VESA standard -Royalty-free standard -Data is sent in packetized form (like ethernet and pci express) -Compatible with HDMI and DVI
Mini DisplayPort
-VESA standard -Royalty-free standard -Data is sent in packetized form (like ethernet and pci express) -Compatible with HDMI and DVI -Smaller compared to DisplayPort
RJ11 Connector
-6 position, 2 conductor connectors (6P2C) -6 wires available, only 2 are used -used for modems or telephones -Interchangeable with RJ14
RJ48C Connector
-8 position, 4 conductor connector (8P4C) -8 wires availabe, only 4 are used -Similar to RJ45 -Used with T1 or WAN data lines
Parity Memory
-Additional parity bit -Can't correct an error -Wont always detect an error
miniHDMI
-All digital connection (no analog) -Sends both audio and video -20 meter distance before losing too much signal -19-pin (type A) connector -Type C connector -Designed for smaller devices
Category 5e (enhanced)
-Max Supported Ethernet Standard - 100BASE-TX, 1000BASE-T -Max Supported Distance - 100 meters
Category 6A (augmented)
-Max Supported Ethernet Standard - 10GBASE-T -Max Supported Distance - 100 meters
DVI-D Single Link
-Sends digital signals -Single link; 3.7 Gbps (HDTV at 60 fps)
SATA
-Serial Advanced Technology Attachment; interface that uses serial signals to transfer data, instructions, and information. -Power connector (15 pins)(A) -Data connector (7 pins)(B)
RS-232 (Recommended Standard 232)
-Serial communications standard -The USB of its time -Used to connect modems, printers, mice, networking, or devices. -Commonly used as a configuration port on a switch, firewall, router (serial console interface) -25 pin version is referred to as DB-25 -9 pin version is a modern version. It is referred to as DB-9 or DE-9 (same connection)