Mike Meyers A+ Certification Flash Cards
How Linux names partitions:
/dev/sda is a drive; /dev/sdb; optical media is /dev/sr0
Hexadecimal Values
0000 - 0h 0001 - 1h 0010 - 2h 0011 - 3h 0100 - 4h 0101 - 5h 0110 - 6h 0111 - 7h 1000 - 8h 1001 - 9h 1010 - Ah 1011 - Bh 1100 - Ch 1101 - Dh 1110 - Eh 1111 - Fh Example: 11011101 = DDh h isn't in the address, so it would actually show up as DD
Parity RAM
1 of the 8 chips can be bad and it will still work
Capacity Stuff
1,000 = kilo 1,000,000 = mega 1,000,000,000 = giga 12 zeros = tera 15 zeros = peta 18 zeros = exa Can't use this to count in binary
Which is fastest: CPU, RAM, Hard Drive
1. CPU 2. RAM 3. Hard Drive
How to Setup Classic Email Account on mobile device:
1. FQDN of SMTP server 2. Username & password for SMTP server 3. Port number for SMTP (usually port 25) 4. FQDN for IMAP server 5. Username and password 6. Port number for IMAP (usually port 143)
To get computer on the internet...
1. Give it an IP Address 2. Give it a subnet mask 3. Give it a default gateway
CompTIA's 7-Step Malware Management Process:
1. Identify and research malware symptoms 2. Quarantine the infected systems 3. Disable System Restore (in Windows); if left on, you'll create restore points that are already infected 4. Remediate the infected systems - Update the anti-malware software - Scan and use removal techniques (safe mode, pre-installation environment) 5. Schedule scans and run updates 6. Enable System Restore; also and create a restore point (in Windows) 7. Educate the end user
Intel Microarchitectures Generation Names
1st Gen: Nehalem 2nd Gen: Sandy Bridge 3rd Gen: Ivy Bridge 4th Gen: Haswell 5th Gen: Broadwell 6th Gen: Skylake 7th Gen: Kaby Lake 8th Gen: Coffee Lake
ECC Ram
2 of the other 8 chips can go bad and it will still work
Thunderbolt 2
20 Gbps Used as mini display port
Common Port Numbers
21 - FTP 22 - SSH 23 - TELNET 25 - SMTP 53 - DNS 80 - HTTP 110 - POP3 161/162 - SNMP 143 - IMAP 443 - HTTPS 3389 - RDP 137-139 - NETBIOS/NETBT 445 - SMB/CIFS 427 - SLP 548 - AFP 67/68 - DHCP 389 - LDAP
DDR2
240 pins DDR2 speed rating is 4x fast as clock speed or double the DDR speed rating DDR2 speed X 8 = PC Speed Rating
DDR3
240 pins Double DDR2 speed rating DDR3 speed X 8 = PC Speed Rating
DDR4
288 pin stick; fastest and most common Bandwidth (MT/s = megatransfers per second) Clock Speed X 8 = bandwidth = DDR4 speed rating DDR4 Speed X 8 = PC Speed Rating
Structured Query Language (SQL)
A language used to create and manipulate databases.
End User License Agreement (EULA)
A legal contract between the author of software and the end user that defines how the software can be used Defines who the owner actually is and defines how you can use the software
Enterprise License
A license to use software that allows an organization to install multiple instances of the software.
Personal License
A license to use software that gives the right to install one instance of the software. Licensed on a per person basis
If Statement
A line that determines whether or not you run a certain chunk of code if this, then that
Blacklist/Whitelist
A list of addresses, ports, or applications that should be denied (blacklist) or allowed (whitelist) by a firewall, spam filter, or other software.
Proxy Server
A computer system (or an application program) that intercepts internal user requests and then processes that request on behalf of the user. A proxy server acts as a go-between (a proxy) between a client and a server; proxy servers are application-specific (e.g., a Web proxy for HTTP and HTTPS) proxy server provide firewalling, check for malware, ban bad URLs; applications must know the adddress of the proxy server Whenever anything is sent out to the Web instead of directly to a router, it will go to the proxy server and then out the router Anything done on any web browser will go through proxy server when configured Proxy servers can do caching, so you can get to websites more quickly
USB 3.0
5 Gbps; lots of compatibility issues; Blue tab; later updated to USB 3.1
802.11g
54 mbps; 2.4 GHz
802.11a
54 mbps; 5 GHz One of the earliest extensions to 802.11
60 Hz =
60 cycles/second
x64
64-bit CPU Program Files holds 64-bit programs
HDTV Resolutions
720p; stood for progressive scan; 1280x720, 1366x768; 2560x1440 was QHD or WQHD 1080p was 1920x1080 4K was 3840x2160 5K was 5120x2880
Binary
8 different values; 8 bits = 1 byte
TIA 568A Cable Order
8 pins green-white, green, orange-white, blue, blue-white, orange, brown-white, brown
TIA 568B Cable Order
8 pins orange-white, orange, green-white, blue, blue-white, green, brown-white, brown
Popular Public DNS Servers
8.8.8.8 8.8.4.4 These two come from Google
MicroATX Form Factor
9.6 inches X 9.6 inches
Virtualization Workstation
A computer system that hosts guest operating systems and that must have maximized RAM and CPU enhancements in the form of multiple CPUs with multiple cores. Maximum RAM and CPU cores; need storage
Bridged Network
A connection type that allows a virtual machine adapter to have a direct connection to the physical network with a unique IP address. Virtual Machine uses network card of computer; Virtual Machine installs virtual network card onto same network that goes through computer; basically, virtual machine joins same network as host computer
UDP (User Datagram Protocol)
A connectionless Transport-layer protocol that is one of the protocols in the Internet protocol suite, and is used with IP. It is also known as the Universal Datagram Protocol. A connectionless protocol; data is already ready for you before you've even made a connection
RJ-11
A connector that contains two to four wires and usually attaches phone cables to modems and to wall-mounted phone jacks Has 4 contacts
RJ-45
A connector that is slightly larger than an RJ-11 connector and contains eight wires. RJ-45 connectors most commonly attach twisted-pair cables to Ethernet network cards Has 8 contacts
ICMP (Internet Control Message Protocol)
A core protocol in the TCP/IP suite that notifies the sender that something has gone wrong in the transmission process and that packets were not delivered. Single-packet only
1 GHz =
= 1 billion cycles/second
1 Hertz =
= 1 cycle/second
Block =
= 4096 bytes
Bus Speed (base motherboard speed) X Multiplier =
= Core Speed
Volts X Amps =
= Watts
Chkdsk =
= check disk
WPA2 (Wi-Fi Protected Access 2)
A data encryption standard compliant with the IEEE802.11i standard that uses the AES (Advanced Encryption Standard) protocol. WPA2 is currently the strongest wireless encryption standard.
Redundant Array of Independent Disks (RAID)
A data storage scheme that uses multiple hard drives to share or replicate data among the drives. Provide speed and data redundancy. Can setup RAID through hardware, system setup, software.
Registry
A database that Windows uses to store hardware and software configuration information, user preferences, and setup information. Registry Editor (regedit.exe) is used to manually edit the Registry Regedit organizes registry files into five root keys; HKey: Classes Root, Current User, Local Machine, Users, Current Config
Worm
A destructive computer program that bores its way through a computer's files or through a computer's network. first generation of malware that would use networking to replicate (sometimes through e-mail, netview computers and connect to them); most malware today is a worm
Hardware Token
A device held by a user that displays a number or a password that changes frequently, such as every 60 seconds. The number is synchronized with a server and used as a onetime password.
Smart Card Reader
A device that can read a smart card used to authenticate a person onto a network.
Mantrap
A device that monitors and controls two interlocking doors to a small room (a vestibule), designed to separate secure and nonsecure areas.
Patch Panel
A device that provides multiple network ports for cables that converge in one location such as an electrical closet or server room.
Router
A device that transfers data from one network to another Routers connect multiple LANs together in a WAN Routers are sensitive to different local area networks (LANs) Uses number system to allow it identify LANs; Logical Addressing MAC Address is a physical address Logical Address defines LAN as particular LAN Routers use Logical Addressing (IP Addressing) to determine local vs. remote traffic
Hub
A device that uses its ports to connect devices (computers, printers, etc.) together Hub takes a signal (frame) from a computer and repeats it and sends it back out where everyone is connected; everyone receives the data Problem is data sent is shared by 10 megabits/sec, so it slows stuff down Hubs repeat all traffic on the LAN to all nodes Hubs are not modern
PoE Injector
A device which uses PoE to transmit electrical power over Ethernet cables. can plug in AC adapter to injector, then ethernet cable from injector to a device to power it and another ethernet cable to a switch
Upstream vs. Downstream
A Connectors are downstream B Connectors are upstream B connectors starts at device; A connector connects to motherboard Sautured connector is still a B connector
Root Server
A DNS server maintained by ICANN and IANA that it is an authority on how to contact top-level domains, such as those ending with .com, .edu, .net, .us, and so on. ICANN oversees the operation of 13 root servers around the world. Control domain name. These servers are authoritative
Event Viewer
A GUI application that allows users to easily view and sort events recorded in the event log on a computer running a Windows-based operating system. tells you about events that happen on your computer; can tell you what went wrong when a computer malfunctions
Windows Recovery Environment (Windows RE)
A diagnostic and recovery tool included with Windows PE.
dd command
A Linux command that can be used to write image files to a device such as a USB flash memory drive or hard disk. A bit by bit copier. Ex: dd if=/dev/sda of=/dev/sdb "if" is source; "of" is destination Can make an image file: Ex: dd if=/dev/sda2 of=~/backup.img Wiping a drive: ex: dd if=/dev/zero of=/dev/sdb; zero means that you just write zeros to the destination
Kernel Panic
A Linux or OS X error from which it cannot recover, similar to a blue screen of death in Windows.
net share
A Microsoft Windows command that manages shared resources. net share (name)=(file/folder you want to share) Example: net share shareit=c:\stuff
Light-Emitting Diode (LED)
A diode that will produce light when current flows through it. Used by today's LCDs
Hard Disk Drive (HDD)
A direct access storage device used to store and retrieve data from rapidly rotating disks coated with magnetic material. 3.5 inch and 2.5 inch drives.
Plain Old Telephone Service (POTS)
A POTS connection connects a customer device (such as a telephone) to the public switched telephone network (PSTN). Dial up; landlines Takes system designed to provide analog (voice) and allow it to send digital data; have to have telephone service Dial-up plugs RJ-11 connectors to a phone system; has a DB 25 serial connection; establishes a comport on a system Dial-up is maxed out at 56 kbps Modems convert analog POTS to digital COM port connections Modems connect to other modems using a phone number
Integrated Scripting Environment (ISE)
A PowerShell development environment that helps in creating PowerShell scripts.
Patch Antenna
A directional antenna that has a planar surface and is usually mounted on a wall or column. flat look; half of a big fuzzy ball; can send in one direction
Hardware RAID
A RAID system controlled by hardware located on a disk controller card within the computer. Need to treat hard drives as RAID array, and not as AHCI (which are regular old hard drives) A completed array looks like a single drive to the operating system
Simple Network Management Protocol (SNMP)
A TCP/IP protocol used to monitor network traffic. Able to see how much bandwidth is going through the switch Enables querying of network devices
Netstat
A TCP/IP troubleshooting utility that displays statistics and the state of current TCP/IP connections. It also displays ports, which can signal whether services are using the correct ports. Shows protocol (TCP or UDP), local address (IP Address and port number), foreign address (destination), and state For State: time_wait connection means that it's done, but they're going to wait a certain amount of time; close_wait means it sent out a close and is waiting for the close request to be granted or for it to time out; established means ongoing connections; listening netstat -a -n (see everything, in numerics)
Secure Shell (SSH)
A UNIX-based command interface and protocol for securely accessing a remote computer. Telnet's big brother Offers point to point encryption. Port 22
Diskpart
A Windows command to manage hard drives, partitions, and volumes. command diskpart; puts you into an interactive screen (not in the usual command prompt); "help" gives you a list of commands list disk shows all of your disks (don't select the disk that is your bootable); select disk # selects the disk you want to modify Create partition primary creates a primary partition List partition shows you the partitions on your drive; select partition # selects the partition you want to modify Format FS=NTFS quick will do a quick format in Diskpart Assign letter=x: gives the drive a letter
BitLocker
A Windows feature that encrypts an entire drive; back up recovery key Bitlocker To Go is designed for removable media; don't need a TPM module, so you'll need a password to unlock the drive
Active Directory
A Windows server directory database and service that is used in managing a domain to allow for a single point of administration for all shared resources on a network, including files, peripheral devices, databases, Web sites, users, and services.
Domain Controller
A Windows server that has Active Directory installed and is responsible for allowing client computers access to domain resources. has own set of names and passwords; can log into the domain from other computers, so you don't have to set up names and passwords on all of the computers in the network One name and password is made on the domain (aka Active Directory) macOS: File Sharing and Print Sharing Linux: Samba
System Configuration
A Windows utility (msconfig.exe) that can identify what processes are launched at startup and can temporarily disable a process from loading. Located in Administrative Tools; can set up how computer starts up (normala, diagnostic, selective); can select what OS you want to boot off of; can select which services to start and not start; can select what programs startup
System Configuration (Msconfig.exe)
A Windows utility that can identify what processes are launched at startup and can temporarily disable a process from loading. can select startup type (normal, diagnostic, selective; boot information, can select safe boot (turns off virtual memory, high-end video), can select safe mode with network either on or off; can select services, tools, startup apps
Error Checking
A Windows utility that checks for lost files and fragments as well as physical errors on a hard drive or SSD
Task Scheduler
A Windows utility that enables you to schedule tasks to run automatically at predetermined times with no interaction necessary on your part.
System File Checker (SFC)
A Windows utility that verifies and, if necessary, refreshes a Windows system file, replacing it with one kept in a cache of current system files. For command lines: type sfc /scannow; will overwrite and fix files
Hexadecimal
A base-16 number system that uses sixteen distinct symbols 0-9 and A-F to represent numbers from 0 to 15. All numbers are divisible by 4 A set of 4 numbers (0s and 1s) are replaced with a single character, for a total of 16 combinations 0h-9h; can't do 10 so we use A (Ah); Ah-Fh Example: 11011101 = DDh h stands for hexadecimal and isn't in the address Hexadecimal used as shorthand for long streams of binary values (1s and 0s) Each hex character represents 4 binary numbers (0000-1111)
Windows Recovery Environment (WinRE)
A boot option available on the windows server 2008 installation DVD or by pressing F8 when the system boots; allows restoring Windows after a disk crash or similar catastrophic failure.
Main Distribution Frame (MDF)
A cable rack that connects and manages wiring used for telecommunication between a service provider and intermediate distribution frames (IDFs). The MDF connects private or public lines coming into a facility with the networking devices in the facility. Closet where equipment is Heights on equipment rack ("u") are standardized
CDMA (Code Division Multiple Access)
A cellular standard that uses spread-spectrum technology, in which a signal is spread over a wide bandwidth so that multiple users can occupy the same channel. A cellular device on a CDMA network does not require a SIM card because, on a CDMA network, devices are compared against a white list, which is a database of subscribers that contains information on their subscriptions with the provider. Don't come with a SIM card Have lots of stuff that need to be updated; updated by firmware that's stored on ROM Issue with CDMA phones is the PRL (Preferred Roaming List); sometimes phones are slower to make calls or send/receive texts, and need to update PRL
Trusted Platform Module (TPM)
A chip on the motherboard of the computer that provides cryptographic services. key built-in to chip, which allows you to unlock drive; make sure TPM is turned on (security, securiity device support)
Twisted Nematic (TN)
A class of LCD monitor that has fast response times to keep fast-moving images crisper, but monitors are brighter, consume more power, and have limited viewing angles. Inexpensive and fast
In-Plane Switching (IPS)
A class of LCD monitor that offers truer color images and better viewing angles, but is expensive and has slower response times. Wide range of view
Access Control List (ACL)
A clearly defined list of permissions that specifies what actions an authenticated user may perform on a shared resource.
Rapid Elasticity
A cloud computing service that is capable of scaling up or down as a customer's need level changes. can take copy of popular virtual machine and move an identical copy somewhere else to deal with additional and widespread demand
Platform as a Service (PaaS)
A cloud service in which consumers can install and run their own specialized applications on the cloud computing network. can hand you a public URL to help you test out your code and web page; good for programmers
Thunderbolt
A combination of PCIe and Display Port Also used as mini display port A port that transmits both video and data on the same port and cable. The port is shaped the same as the DisplayPort and is compatible with DisplayPort devices.
Edge/Network Firewall
A combination of hardware and software that filters traffic between private networks or between a private network and a public network, such as the Internet.
Net command
A command that can display all kinds of important networking data and allows you to configure various networking options such as services.
ipconfig /all
A command to display your computer's IP address.
PowerShell
A command-line interactive scripting environment that provides the commands needed for most management tasks in a Windows Server 2012/R2 environment. .ps1 extension
cmdlet
A command-line tool available in Windows PowerShell. Many different options for what you can do with cmdlets.
Deployment Image Servicing and Management (DISM)
A command-line tool that can be used to service Windows 10 images offline or online and perform imaging operations. DISM finds version of Windows you are running and compares your system store to Microsoft's system store online use command: dism /online /cleanup-image /restorehealth
Integrated Services Digital Network (ISDN)
A communication standard for sending voice, video or data over digital telephone lines. uses terminal adapters instead of modems; idea was that it was a completely digital line; faster and digital ran at 64 kbps and 128 kbps
Network Interface Controller (NIC)
A computer card plugged into a slot on the motherboard inside of the computer and allows a network cable to be plugged in so it can interface or communicate with other computers
Switch
A computer networking device that connects network segments Switch collects MAC Addresses; switch can make direct connections from one computer to another; doesn't slow stuff down Switch = Smart Repeater Switches are modern Switches filter traffic based on MAC Address; Switches provide full bandwidth for all nodes
System Protection
A feature in Windows that creates restore points. On Windows Vista and Windows 7, it also captures previous versions of user files. can set up restore point space allocation, setup
Device Manager
A feature in the Windows operating system that lets individuals view and change the properties of all hardware devices attached to the computer.
CIFS (Common Internet File System)
A file access protocol. CIFS runs over TCP/IP and is the cross-platform version of SMB used between Windows, UNIX, and other operating systems.
.exe
A file extension that indicates that the file is a program file.
ISO Image
A file format that has an .iso file extension and holds an image of all the data, including the file system that is stored on an optical disc. ISO stands for International Organization for Standardization. Perfect copy of what was originally optical media; can burn ISO files to optical media or thumb drives Recognized as Disc Image File on Windows
exFAT
A file system type that improves upon FAT32 by having a theoretical maximum file size of 16EB, maximum volume size of 64ZB (but 512TB is current limit), smaller cluster sizes than FAT32, and an increased number of files allowed in a directory. Created for external storage media such as Flash drives and hard drives for saving images/video. hybrid of NTFS and FAT32; supports same sizes at NTFS; less overhead; thumb drives work well for this
NTFS (New Technology File System)
A file system used on Windows-based systems. It is more efficient and provides much more security than do FAT-based file systems. massive volumes up to 16 EiB; individual files can be up to 256 TiB; uses MFT (Master File Table); supports compression; supports encryption; has system and network security for most operating systems; problem is that its so powerful that it has extra data structures that make it really big
Stateless Firewall
A firewall that manages each incoming packet as a stand-alone entity without regard to currently active connections. Stateless firewalls are faster than stateful firewalls, but are not as sophisticated. says I'm blocking this IP Address or Port Number no matter what is happening
Liquid Crystal Display (LCD)
A flat-panel monitor that creates an image when liquid crystals become electronically charged. LCD either lets light pass or blocks light; LCD needs backlighting
Stateful Firewall
A flrewall that monitors communication paths and data flow on the network. Looks at the state of a situation
GNU General Public License (GNU GPL)
A free software license allowing users to run, share, and modify software as long as all software copies include the GNU GPL license terms and the copyright notice If you compile something, you have to provid the original source code either with it or when asked
Administrative Tools
A group of tools accessed through the Control Panel that you can use to manage the local computer or other computers on the network.
Navigating Windows CLI
"cd \"; brings us to the root directory (i.e. C:\); cd means change directory . says where you are; .. says this folder connects to the next one upstream; "cd .." Use dir to see what folders are in your path; use cd "folder name" to go into that folder; can also do cd c:\folder\folder If we want to get to another drive, type in the drive letter; ex. D:; if you go back to the previous drive, it will take you back to the folder/directory you were in before you switched drives
Logical Block Addressing (LBA)
"is a common scheme used for specifying the location of blocks of data stored on computer storage devices, generally secondary storage systems such as hard disks. LBA is a particularly simple linear addressing scheme; blocks are located by an integer index, with the first block being LBA 0, the second LBA 1, and so on in a sequential matter." If operating system needs to save file, it goes to LBA; LBA takes file and allocates blocks necessary to save file. LBA values are binary.
DOCSIS
(Data Over Cable Service Interface Specification) A security technology used for filtering packets and maintaining customer privacy on cable Internet services Used for cable modems
IP Address Classes
(Dated attitude about classes) Class A could start between 1.0.0.0 to 126.0.0.0 Class B could start between 128.x.0.0 to 191.x.0.0 Class C could start between 192.x.x.0 to 223.x.x.0 Class D starts with 224.x.x.x; Multicast Address; used with presentation software Class E starts with 240.x.x.x; reserved; nobody touches it
KVM Switch
(keyboard, video, mouse) allow set of input devices and monitor share between different computers Enable multiple computers to share a single keyboard, monitor, and mouse
Internation Mobile Equipment Identity (IMEI)
*#06# will automatically get you to your IMEI information; identifies the phone; when phone gets activated, IMEI gets connected to IMSI
Horizontal Runs
-network/telephone cabling runs from closets to workstations -always use solid cord (less flexible) runs into to different wall outlets and runs into the patch panel Switch has patch cable to patch panel to wall outlet to computer (one horizontal run) TIA rules that the longest horizontal run you can have is 90 meters
Botnet
A logical computer network of zombies under the control of an attacker.
Serial Attached SCSI (SAS)
A marriage of SCSI and Serial ATA, this uses a serial interface to a SCSI bus.
Brute Force
A method for determining a solution to a problem by sequentially testing all possible solutions.
Software RAID
A method of implementing RAID that uses software to implement and control RAID techniques over virtually any type of hard disk(s). RAID software may be a third-party package or utilities that come with an operating system NOS. Downside with software RAID is that you don't have a dedicated RAID controller; can really slow down smaller CPUs
Windows Preinstallation Environment (Windows PE)
A minimum operating system used to start the Windows installation.
Locator Application
A mobile app used to locate a device through GPS. Devices usually need to be configured to be accessible remotely. For Android devices, the website for locating a device is http://google.com/android/devicemanager. For iOS devices, the website for locating a device is http://icloud.com/#find. For Android devices, devices are linked to one's Gmail account. For iOS devices, devices are linked to one's Apple ID.
Universal Naming Convention (UNC)
A naming system used by Windows computers to locate network file shares and network printers. The format is \\servername\sharename.
Patch Cable
A network cable that is used to connect a PC to a hub, switch, or router.
DHCP (Dynamic Host Configuration Protocol)
A network service that provides automatic assignment of IP addresses and other TCP /IP configuration information. Server that automatically gives you all the information like IP Address, etc.
Wide Area Network (WAN)
A network that connects devices in geographically separated areas.
IP Address
A number that uniquely identifies each computer or device connected to the Internet. Example: 192.168.4.100 Every device inside LAN gets a unique address. First three set of numbers are the same in a LAN. The last set of numbers is different for each device that is connected to the router/switch If computers want to talk to a device that doesn't have the same IP Address, they have to send it out to router (default gateway) to another LAN
Point-to-Point Protocol over Ethernet (PPPoE)
A protocol that was originally designed to encapsulate PPP frames into Ethernet frames. Used by DSL providers to force customers to log into their DSL connections instead of simply connecting automatically. Used to charge internet per person; routers allowed people to get around this
SMB (Server Message Block)
A protocol that works on the Application layer and is used to share files, serial ports, printers, and communications devices, including mail slots and named pipes, between computers.
Post Office Protocol (POP)
A protocol used to retrieve email from a mail server. POP3 is a later iteration of the POP protocol, and can be used with or without SMTP. Uses TCP Port 110 You have set up all of your folders on the client itself
Internet Message Access Protocol (IMAP)
A protocol used to retrieve email messages. IMAP is similar to POP3, but with some advanced features. The main difference between the two is that IMAP generally leaves the email on the mail server. Current version is IMAP4; uses Port 143 Stores alll of your folders and organization and also sends it down to your e-mail client
Encrypting File System (EFS)
A public/private key encryption first used in Windows 2000 on NTFS-formatted disks. The file is encrypted with a symmetric key, and then a public/private key is used to encrypt the symmetric key.
5 GHz Band
A range of frequencies that comprises four frequency bands: 5.1 GHz, 5.3 GHz, 5.4 GHz, and 5.8 GHz. It consists of 24 unlicensed bands, each 20 MHz wide. The 5-GHz band is used by WLANs that follow the 802.11a and 802.11n standards. 5.150 - 5.875 GHz Has channels 36-64; no odd channels, then has 100-144, then 149-165 (odd)
RADIUS Server
A server that offers centralized authentication services to a network's access server, VPN server, or wireless access point via the RADIUS protocol.
Restore Point
A representation of the state of your computer's system files at a particular point in time
Man-in-the-Middle
A security attack in which network communication is intercepted in an attempt to obtain key data Main fix is through encryption
Principle of Least Privilege
A security discipline that requires that a particular user, system, or application be given no more privilege than necessary to perform its function or job.
TKIP (Temporal Key Integrity Protocol)
A security protocol created by the IEEE 802.11i task group to replace WEP. Improved upon RC-4
Frame Check Sequence (FCS)
A sequence of bits placed in a frame that is used to check the primary data for errors. Checks to see if the data came in properly
Password Policy
A series of Group Policy settings that determine password security requirements, such as length, complexity, and age. minimum length, type of complexity, how often changed, whose in charge of passwords, how are passwords stored, etc.
Logical Drive
A portion or all of a hard drive partition that is treated by the operating system as though it were a physical drive. Each logical drive is assigned a drive letter, such as drive C, and contains a file system. Also called a volume.
Thermal Printer
A printer that applies heat to special thermal paper, turning select areas black to produce text and basic graphics. Has paper that is thermally sensiitive; when hit with heat, it changes color multi-part forms; special thermal paper
Control Panel
A program accessed from the Windows Start menu that provides specialized features used to change the way Windows looks and behaves. Has a lot of overlap with Settings
Virtual Network Computing (VNC)
A program that allows you to control a computer at a remote location. Used for Linux and Macs for remote desktop connections TightVNC will run on Windows; is a server and a client
Spooler
A program that helps coordinate all print jobs being sent to the printer at the same time.
Transport Layer Security (TLS)
A protocol based on SSL 3.0 that provides authentication and encryption, used by most servers for secure exchanges over the Internet.
Remote Desktop Protocol (RDP)
A protocol that allows for separate channels for carrying presentation data, serial device communication, licensing information, and highly encrypted data (keyboard, mouse activity). Uses Port 3389
Dynamic DNS (DDNS)
A protocol that enables DNS servers to get automatic updates of IP addresses of computers in their forward lookup zones, mainly by talking to the local DHCP server.
Link Layer Discovery Protocol (LLDP)
A protocol that identifies devices connected on the local area network and allows them to automatically exchange information.
NetBT (NetBIOS over TCP/IP)
A protocol that runs in the Session and Transport layers of the OSI model and associates NetBIOS names with workstations. NetBIOS allows old applications designed for out-of-date NetBIOS networks to work on TCP/IP networks. Got rid of NetBEUI and allowed for IP Addresses to connect, but still did same naming convention of NetBIOS
APIPA (Automatic Private IP Addressing)
A service that enables a DHCP client computer to configure itself automatically with an IP address on the 169.254.x.x (Class B Address) network in case no DHCP servers respond to the client's DHCP discover broadcast. APIPA is fall back plan if you can't find DHCP server In ipconfig, if your IP Address (IPv4) is 169.254.x.x, you have a DHCP server problem. Ipconfig /renew will give you the proper IP Address to see if problem is resolved; will connect to DHCP server Ipconfig /release to disconnect from DHCP server
IEEE 802.11
A standard used to ensure compatibility between devices Primary way all of our wireless stuff communicates 2 modes: infrastruccture mode or ad hoc mode Based on the Industrial, Scientific, and Medical (ISM) Radio Bands
Solid State Drive (SSD)
A storage device that uses the same kind of memory that flash drives use but that can reach data in only a tenth of the time a flash drive requires. SSDs are organized into pages; chip on SSD can have thousands of pages; in a page, atom (block); pages can store lots of blocks; each block assigned an LBA number SSD memory cells are called pages 2.5 inch SSD; M.2 SSD Sticks Faster than HDDS First generation SSDs use SATA
Sysinternals
A suite of tools designed to assist with troubleshooting issues with windows. Made by Mark Russinovich
Managed Switch
A switch that can be configured via a command-line interface and sometimes can be configured in groups. Usually, they are assigned their own IP addresses. VLANs can only be implemented through managed switches. have features like VLAN; gets IP Address through DHCP Configure via IP Address and Web Browser (Internet Explorer) Can define VLANs; assign ports to a particular VLAN; port security
Captive Portal
A technical solution that forces wireless clients using web browsers to complete a process before accessing a network. It is often used to ensure users agree to an acceptable use policy or pay for access.
Omni-Directional Antenna
A type of antenna that radiates the signal beam out in all directions and has lower gain but a wider coverage area. Radiation pattern looks like a bug fuzzy ball; the more power, the larger the ball; looks like a car antenna
Inkjet Printer
A type of printer that uses a nonimpact process. Ink is squirted from nozzles as they pass over the media. have ink cartridges and connected to them is the jet; ink brough into the jet, heated up, and jet shoots out the ink with a charge on it Print Head can have CYMK and stores all of the jets; moves back and forth across carriage and shoots ink across the paper Inkjets don't havae high voltages and heats that laser printers do Ink cartridges have colors in separate cartridges, instead of just one cartridge for all colors Multifunction Device (MFD); has scanner functions, fax functions
Host Firewall
A type of software firewall installed on a host and used to protect the host from network-based attacks.
Process ID (PID)
A unique identifier assigned to every process as it begins. every program that's running in memory (RAM) gets its own Process ID
Media Access Control (MAC) Address
A unique identifier assigned to network adapters by the manufacturer. This address is six octets in length and is written in hexadecimal. Every network on local network identified by MAC Address; 48 bit address manifested as 12 hexadecimal characters. Every network card gets unique MAC Address; first 6 characters are OEM ID; other 6 can be changed Physical Address = MAC Address To see MAC Address: Windows: ipconfig / all Linux/Macs: ifconfig / all MAC Address uniquely identifies a host on a LAN
International Mobile Subscriber Identity (IMSI)
A unique number that identifies a cellular subscription for a device or subscriber, along with its home country and mobile network. Some carriers store the number on a SIM card installed in the device. Built into the SIM card; won't ever be on a CDMA phone
WPS (Wi-Fi Protected Setup)
A user-friendly—but not very secure—security setting available on some consumer-grade APs. Part of the security involves requiring a PIN in order to access the AP's settings or to associate a new device with the network. The PIN can be easily cracked through a brute force attack, so this PIN feature should be disabled if possible. Can connect devices by pressing a button on the router and the device you are connecting.
System Restore
A utility in Windows that restores system settings to a specific previous date when everything was working properly.
Nslookup
A utility that is used to test and troubleshoot domain name servers Can show if a DNS Server is functional or not
Windows Server
A version of Windows that has been specifically designed and configured for server use.
Mapping Drives
A way to access a single file, specific folders, or an entire drive between different operating systems over a network map network drive, then give drive letter; can select to reconnect at sign-in; could connect with different credentials
Power over Ethernet (PoE)
A wired networking standard that allows electrical power to be sent along with data over standard Ethernet cables PoE (First Generation) PoE+ (provides more electricity)
Wireless Mesh Network (WMN)
A wireless network in which multiple APs work as peer devices on the same network, thereby providing more fault-tolerant network access to clients. Ad Hoc mode on steroids; easy to set up One base station connected to network; configure SSID; place external stations where you want better coverage Network name, network password, IP Address information Mesh devices use third party types of encryption
AMD Sockets
AM4 (mainstream) TR4 (higher end CPUs)
AMD vs Intel caches
AMD believes in big caches Intel believes in small smart caches
Power Users
Accounts granted greater privileges than normal user accounts when it is necessary for the user to have greater control over the system, but where administrative access is not required one step below Administrator; power users can't take control of other user accounts stuff
Time Domain Reflectometer (TDR)
Advanced cable tester that tests the length of cables and their continuity or discontinuity, and identifies the location of any discontinuity due to a bend, break, unwanted crimp, and so on. Uses speed of light to detect how long a cable is
Authenticator Applications
An authenticator application is a specialized app called an "authenticator." The app is pre-set by you to work with the service and provides a constantly rotating set of codes that you use to utilize two-factor authentication or verification. The codes in authenticator apps sync across your accounts and provide an extra layer of security. For example, implementing two-factor authentication on your Gmail account would require you to use your username, password and one of the generated codes from the authenticator apps to log in to your Gmail account.. It may take a little longer to in, but it provides you with an added layer of security.
Small Computer System Interface (SCSI)
An interface standard developed by the American National Standards Institute (ANSI), it is used for both internal and external hard drives and optical drives as well as devices such as printers, modems, scanners, and many other peripherals. Used parallel interface (multiple wires). Competed with ATA. SCSI is dead today. SCSI language lives on in serial SCSI versions
Command-Line Interface (CLI)
An interface that accepts text commands at a prompt, usually for immediate execution with immediate display of output. Shells are different types of command-line interfaces
Cold Cathode Fluorescent Lamp (CCFL)
An older backlighting technology that uses one or two fluorescent tubes to light a monitor panel. Used by first generation LCDs for backlight
GSM (Global System for Mobile Communications)
An open standard that uses digital communication of data, which is separated by time slots on a channel. GSM is accepted and used worldwide to provide cellular service. Come with a SIM card Usually updated automatically; exception is Android and iOS, where you can choose to update automatically
DVD (digital video disc or digital versatile disc)
An optical disc standard introduced after CDs. A DVD can hold 4.7 GB of data. DVD-ROM is most common Dual-Layer (DL) format, Double-Sided (DS) format DVDs can store 4.37 - 15.9 GB
CD (Compact Disc)
An optical disc technology that uses a red laser beam and can hold up to 700 MB of data. 74 minute, 80 minute sizes for music 650-700 MB
Baseband Update
An update to a mobile phones baseband OS which manages all wireless communication.
Full-Duplex
Any device that can send and receive data simultaneously.
Logical Addressing
As opposed to physical addressing, the process of assigning organized blocks of logically associated network addresses to create smaller manageable networks called subnets. IP addresses are one example of logical addressing. Value typed in to identify LANs Type of Logical Addressing we use is IP Addressing
Crossover Cable
An Ethernet cable that swaps the pair used for transmission on one device to a pair used for receiving on the device on the opposite end of the cable. In 10BASE-T and 100BASE-TX networks, this cable swaps the pair at pins 1,2 to pins 3,6 on the other end of the cable, and the pair at pins 3,6 to pins 1,2 as well. If you make one side TIA 568A and the other side TIA 568B, you have a crossover cable; can plug two computers directly together
Static IP Address
An IP address that is manually assigned to a device and remains constant until it is manually changed. Type in IP Address, Subnet Mask, and Default Gateway
Private IP Address
An IP address that is used on a private TCP/IP network that is isolated from the Internet. Class A: 10.x.x.x; 10 means private Class B: ranges from 172.16.x.x to 172.31.x.x Class C is 192.168.x.x
Broadband Connection
An Internet connection such as DSL or cable modem that offers higher bandwidth, and therefore faster transmission speed, than standard modem connections. always on connection
Access Policy
An SNMP security concept where agent may wish to give different access privileges to different managers You can define port number, time of day, filter by MAC Address, etc.; can combine access policies for your own situation
Loopback IP Address
An address used for testing of the host itself 127.0.0.1 sends ping packet (a single ping) to a particular IP Address; can verify if network card is up and running
Dipole Antenna
An antenna that detects signals from all directions equally (also called omnidirectional antenna). two omni-directional antennas pointing in opposite directions; stomped donut for a flat circular signal; good for one floor of an office
Highly Directional Antenna
An antenna that sends a narrowly focused signal beam long distances. Yagi Antenna signal looks like a stretched football; good for shooting long distances
Open Database Connectivity (ODBC)
An application programming interface that provides a common language for application programs to access and process SQL databases independent of the particular DBMS that is accessed. based on compuer language Structured Query Language (SQL), which allows any application to talk to any database; application uses ODBC to link to that database
Phishing
An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
Distributed Denial of Service (DDoS)
An attack that uses many computers to perform a DoS attack. Malware distributed by mainly by e-mails; affected computers are referred to as zombies; a server is in charge of zombies
Recycling Guide:
Batteries: throw alkaline batteries in the trash; recycle lithium-ion batteries Toner cartridges: can be recycled; refilled and working again CRT Monitors: people will get metal out of them Cell phones and tablets: will be bought by others; delete your accounts and factory reset
AAA
Authorization, Authentication, Accounting
3.5 mm jack
Blue is auxiliary line in Green is for front two stereo speakers Pink is for microphone Silver is for side speakers Black is for rear speakers Orange is for subwoofer or center channel
NAS (Network Attached Storage)
Box that sits on a network; file sharing; Gigabit NIC (high speed network card); RAID array (way to protect data) A dedicated computer system used to provide disk storage on a network. It's often a small device that is easy to plug in and use.
Bluetooth Classes
Class; Power; Range Class 1; 100 mW; 100 m Class 2; 2.5 mW; 10 m Class 3; 1 mW; 1 m
Windows Installation Options:
Clean install: simplest Upgrade install: have previous Windows version; upgrade keeps all of your stuff; some limitations; if you have older home version, can only upgrade to new home version Multiboot: ex. Either boot to Windows Server or Windows 10; Windows 10 in boot information in beginning; choose operating system in menu Unattended Installation: create answer file, which answers as many of the questions as possible when installing; use Windows System Image Manager; create autounattend.xml and move to Windows ISO; when computer boots up with thumb drive, reads xml and starts unattended installation With bunch of new identical computers: windows installed on one computer; image distributed to all the other computers and simultaneously update all computers from that one image; tools like User State Migration Tool (USMT) and Ghost; other benefits include applications, setting up firewalls for all computers
Physical Safety guidelines:
Disconnect power before repairing PC Radio Frequency Interference (RFI) can interfere with wireless signals Equipment grounding Remove jewelry Fire extinguisher; ABC; A) wood, solids; B) grease, liquids; C) electrical Lifting techniques: lift with our legs Weight limitations: 25 pounds or more needs assistance Use a handtruck
RAID 6
Disk striping with parity. RAID-6 uses four or more disks and provides fault tolerance. It can survive the failure of two drives. 1 piece on 1st drive, another piece on 2nd drive; 1 parity each on 3rd and 4th drive Can lose up to 2 drives before losing any data.
net view
Displays shared resources and available network domains/workgroups net view [ex:]mikewin10pc; can see the shares on the computer
DHCP Range
Dynamic Host Configuration Protocol range. A contiguous list of IP addresses in a DHCP pool. Passed out to any computer connecting
.dll
Dynamic Link Library. A compiled set of code that can be called from other programs.
Dynamic Host Configuration Protocol (DHCP)
Dynamically (automatically) assigns IP address information (for example, IP address, subnet mask, DNS server's IP address, and default gateway's IP address) to network devices. Routers can act as a DHCP server. In Settings, when you select obtain IP Address automatically, it means you want to use DHCP.
ipconfig/all
Enables the MAC address information to be displayed from the command prompt Can show you your IP Address, Subnet Mask, Default Gateway, MAC Address (physical address)
Port Triggering
Enables you to specify outgoing ports that your computer uses for special applications; their corresponding inbound ports open automatically when the sessions are established. Can select FTP Active and set triggering port to 21, which allows router to accept anything back if something is sent out on Port 21
Environment Variables
Environment variables are like variables in programming languages—they hold data to be referred to by the variable name. Environment variables differ from programs' internal variables in that they're part of the environment of a program, and other programs, such as the shell, can modify this environment. Ex: homepath=\Users\michaelm; usually that line won't work for other users; using environment variable, it will adjust depending on the user logged in Back in bat file; c:%homepath%\Desktop\Logs
Error Correction commands in Windows CLI
Error correction uses command chkdsk; checks drive chkdsk only checks, but does not fix to fix, use chkdsk /f (f means fix)
European voltage vs. United States voltage
European voltage: 230 V United States voltage: 110 V
Example of CPU name: i7-5820k
Ex: i7 - (gen# 2-9) SKU (sale inventory code) (letter defining feature)
FAT32
File allocation table that uses 32 bits to address and index clusters. Commonly used with USB flash-media drives and versions of Windows prior to XP. has 8 hexadecimal characters on each side; right side value is made by saying which block that files continues into; 0000FFFF means end of file
RAID 5 (Striping with Parity)
File blocks are striped along with a parity block. This requires at least three disks. Efficient use of disk space as files aren't duplicated, but space is still used for parity. High redundancy Data is available after drive failure but parity calculation may affect performance. Need minimum of 3 drives. First piece of file on 1st drive; Second piece on 2nd drive; multiply together creates parity value on third value. If any drives die, you can reverse math to recreate type of data. If you lose more than one drive, you lose the data. You get speed and redundancy of data.
CDFS (Compact Disc File System)
File structure, rules, and conventions used when organizing and storing files and data on a CD. designed to allow optical discs to organize file system that we can read with our operating systems; files up to 4 GiB
Fox and Hound
Fox = tone generator Hound = tone probe Fox makes noise, hound finds noise Finds homeless cable
DLP projector (digital light projection)
High-end projector with extremely high light (up to 15,000 lumens) and scan output. Most commonly used for very large screen and room applications.
Firewall example:
Http out on destination port 80, source port is 14421; router allows outgoing port 80; firewall blocks incoming port 80; goes to server which is listening on port 80; source port is 80, destination is port 14421; since destination is now 14421, firewall does not block it If firewall on server blocks incoming port 80, it won't receive it, so we can't block incoming port 80 on a server
Inventory Management
IT uses asset tags and barcodes to keep track of inventories
Expansion Cards Troubleshooting
If any problems: First assume device driver. Can be compatibility issues. Can show blue screen of death. Make sure it's plugged in right; make sure it's power connection is connected.
Troubleshooting Wireless Connections:
If no connectivity: SSID might not exist or may have changed; pas word may have changed; Low RF (radio frequency) signal, may need to get closer, look at antennas; SSID broadcasting might be off If limited connectivity: some of the same situations for no connectivity; slow transfer speeds may be caused by some devices; low RF signal If intermittent connectivity (as in, runs great, then suddenly not working well): sometimes interference causes this; too many people on wireless network, may need more WAPs; may need to establish QoS
Network Troubleshooting: Wired Troubleshooting
If no connectivity: are wires all plugged in?; look at IP addressing with static IP Addresses, may have IP conflicts; ping by IP Address to see your system If limited connectivity: DHCP problem; look for APIPA addresses; Rogue DHCP Server is possible If intermittent connectivity: problem with the cable itself; interference with cable If unavailable resources: might be problem with the server or the shared resources itself If slow transfer speeds: go through your processes that are eating up your network bandwidth
Trouble Shooting Applications
If system is running slow: Malware could be causing an issue In task manager, see what is using high CPU and Disk; look at Performance charts; start killing tasks; storage can be an issue; defragmentation, chkdsk, event viewer Applications blowing up: Can try to repair an application; case by case basis; can delete application and try again; can apply updates Problems with Services: Services that fail to start; restart the service; something else might be keeping it from starting
Administrator Account
In Windows 2000/XP/Vista, an account that grants to the administrator(s) rights and permissions to all hardware and software resources, such as the right to add, delete, and change accounts and to change hardware configurations. God of the computer; can manage, add, delete other accounts
Storage Spaces
In Windows 8 and later, a software RAID solution that enables users to group multiple drives into a single storage pool Storage Pool is preassigned group of drives that work together
Workgroup
In Windows, a logical group of computers and users in which administration, resources, and security are distributed throughout the network, without centralized management or security. Most basic type of networking organization; used as organizational tool; no security, no central administration; good for small networks
Windows Basics for CLI
In Windows, running as administrator will allow you to use any command; some commands are very powerful "Dir"; shows date, time, size, name of file or folder; dir signals a folder (directory); dir /p shows dir one page at a time Anything put on the end of a command line is called a switch (ex. "Dir /p") /? Is a switch that will teach you about what command you use (ex. "Dir /?" will tell you more about the dir command); or you can type "help dir" Cls clears the screen C:\Windows\system32>; as we look in different folders, it will change
default gateway
In a TCP/IP network, the nearest router to a particular host. This router's IP address is part of the necessary TCP/IP configuration for communicating with multiple networks using IP.
DHCP Reservation
In addition to having DHCP supply a random address from the scope, you can configure it to supply a specific address to a client. Such an arrangement is known as a reservation. Reservations are a means by which you can still use DHCP for a system but at the same time guarantee that it always has the same IP address. DHCP can also be configured for exclusions. In this scenario, certain IP addresses are not given out to client systems. Reserves one of the IP Addresses in the IP Pool for a specific device
Process Explorer
In addition to listing the running programs, Process Explorer can list the files and directories each process has open, as well as open handles and loaded DLLs. can see the dependency tree in this program
MIMO (multiple input-multiple output)
In the context of 802.11n wireless networking, the ability for access points to issue multiple signals to stations, thereby multiplying the signal's strength and increasing their range and data-carrying capacity. Because the signals follow multipath propagation, they must be phase-adjusted when they reach their destination. Allows a single WAP to use multiple antennas to change its radiation signal so it zeroes in on a device; just need 802.11n WAP and NIC to use this feature
Windows Logs
Keeps logs for application, security, system, and setup Application; anything happening within an application that might be of interest Security; information about logons Setup; information about setup of windows, updates System; anything that has to do with the Windows core system
Real-Time Clock (RTC)
Keeps system time without external power using a CMOS battery All computers in a network need to be synchronized to the same time in order to boot up; runs with a CMOS battery that is built-in to the motherboard (CR 2032 battery) If you don't have a battery, you lose time or it slows down If the battery dies, all of the system information that you have saved gets erased
What are the different Cache Levels?
L1 Cache: runs at multiplied speed of CPU (KB) L2 Cache: feeds L1 cache; bigger (KB), but runs at half multiplied speed L3 Cache: biggest (MB); runs at base motherboard speed, but faster than RAM itself
LBA 0
LBA of the protective MBR (first position) LBA 0 is where MBR tells computer to find operating system
Link Lights
LEDs located next to the Ethernet port on the NIC that indicate activity on the link. 1. Connected (steady and always on) 2. Speed Light (different color, no standard) 3. Activity (always flickering)
Intel Sockets
LGA 1151 (mainstream) LGA 2066 (in higher end CPUs)
Three ways to connect printers:
Local Printer (plug in to local system) Network Printer (RJ-45 cable or wireless) Cloud Printing
Printer Protocols
MAC - SLP Windows - LLDP gets own IP Address via DHCP
Inkjet Printers Maintenance
Maintenance Area's job is to plug the ink jets so it won't drip ink and clog Maintenance: 1. Clean Heads 2. Calibration 3. Replace Cartridges 4. Clear jams, paper jams
Image-Level Backup
Makes a copy of the virtual disk and configuration associated with a particular VM. Backup is saved as a singled entity called as a VM Image. Also supports file-level recovery. Doesn't require the hypervisor resources
Types of Threats
Man-In-The-Middle Spoofing Denial of Service (DoS) Distributed Denial of Service (DDoS) Zero Day
Corporate-Owned Personally Enabled (COPE)
Means the organization issues a mobile device, but unlike COBO, employees are allowed to install a specific number of preapproved (white-listed) apps for their personal use.
Magnetic Disk Drives
Memory storage device that uses the magnetic state of ferrous coating to record data; arm picks up 1s and 0s
Troubleshooting Printers: Printer Errors
No image on printer display: turned on?; sleep mode?; key stroke that administratively locks you out of printer? Paper not feeding, paper jam: problem with pickup rollers or separate pads; replace them; humidity can kill paper Low memory errors: laser printers; reduce resolution or buy more RAM, use regular RAM Error Code: research error code
Three Shells of Physical Security
Perimeter Security: keeps people off the property Rooms: locks, badges, etc. Individual Devices: cable lock, server lock, privacy screen, etc.
ping -t
Ping continuously until stopped with Ctrl+C
Quality of Service (QoS)
Policies that control how much bandwidth a protocol, PC, user, VLAN, or IP address may use. toolset that allows you to meter how much bandwidth things get (certain IP Addresses, MAC Addresses, Ports) Can give things higher or lower priority
Symptoms of Malware:
Pop-Ups; manifests as separate window Browser Redirection: type in a website, then sends you to a different website Security Alerts: desktop notifies you of problem; notices pop-ups, browser redirection, system files being changed Application Crashes OS Update Failure: OS doesn't let you update; malware prevents patch from being applied Spam or Hijacked E-mail: usually from someone you know's e-mail or your e-mail sends out spam Automated Replies: sign of hijacking e-mail Invalid Certificates (Trusted Root CA): website says certificate is invalid; check so see what problem is
TCPView
Port Monitoring. A Windows program that displays all active TCP and UDP endpoints on your system, indicating which process is associated with each local and remote IP address and relaying continuous, detailed real-time data on system's TCP/IP activity.
What is built into the BIOS?
Power-On Self-Test (POST) System Setup (CMOS) reads data
Cloud Printing
Printing to a printer anywhere on the Internet from a personal computer or mobile device connected to the Internet. Google Cloud Print; print to a printer installed to a Google Account; has to be a wireless capable printer and has to have Google Print Services support built into it; can print to that printer no matter where you go as long as that printer stays on the same wireless network
robocopy
Powerful command-line utility for copying files and directories, even over a network. Can handle more verification and speed than xcopy. Ex: robocopy c:\backup x: /s /xa:h /xa:h (no hidden files) xcopy and robocopy are network aware: Ex: robocopy D:\VMs "\\ Server\vmbackup"; allow you to make copies across a network as if it were another drive
Parity/ECC (Error Correction Code) RAM
RAM that has an extra (9th) chip called a parity chip
RG Ratings
RG-58, RG-59, RG-6
RWXRWXRWX
RWX(user) RWX(group) RWX(other) Read Write eXecute
Common Problems with Malware:
Ransomware Botnet Keylogger Spyware
3D Printing
Rapid prototyping process that builds a part by ejecting adhesive bonding material onto successive layers of powders. Note that this term is often used to describe all rapid prototyping processes. Heating element moves back and forth; uses heated thermal plastic and makes a shape based on 3D images; can use 3D program to make image, then use tool to prepare it for printing, and then go through printing process Filament is unmelted raw material; makes 3D objects; can melt them and they harden very quickly; usually thermal plastic Can select number of layers pasted, can select how hollow it is Slicing process makes a slice file, which then goes to printer Printing process requires preheating the various print elemens, such as the filament, extruder, and bed
CAT Ratings
Ratings for twisted pair cabling CAT 5 - 100 mbps CAT 5e - 1 Gbps CAT 6 - 1 gbps up to 100 m, 10 gbps up to 55 m) CAT 6a (10 gbps at 100 m segments)
Windows 10 Task Manager
Right-click on Windows key will give you the option of Task Manager In Processes, will see total CPU%, Memory%, Disk%, Network% Background Processes are Services; can right-click and open file locations, properties; there still is a Services Tab Performance Tab; shows how much memory is available; shows disk utilization, how hard network is running Still has a Resource Monitor; shows each core running
RC-4
Rivest Cipher 4; encryption used on WEP
Delete Commands for Linux CLI
Rm "file" deletes a file Rm M* deletes all files starting with M Rm * deletes all files within the directory/folder
Universal Plug and Play (UPnP)
Technology designed to allow wirelessaware devices to connect to a wireless network automatically declare themselves to other devices and discover other devices. Allows devices to connect more easily; helps find a router that you have connected
TACACS+
Terminal Access Controller Access Control System Plus
Dynamic Disks
Special feature of Windows that enables users to span a single volume across two or more drives. Dynamic disks do not have partitions; they have volumes. Dynamic disks can be striped, mirrored, and striped or mirrored with parity. Drives must be converted from basic to dynamic in Disk Management; dynamic disks enable shrinking, extending, and spanning volumes without losing the data on the disk For GPT; keep the boot drive basic (not dynamic); set boot drive to GPT; easy to create dynamic disks; will lose all data if you change dynamic drive to basic drive
Parallel ATA (PATA)
The older and slower ATA standard. Hard drive spoke this language.
Visual Basic
The Microsoft graphical user interface (GUI) programming language used for developing Windows applications. A modified version of the BASIC programming language. .vbs extension
Domain Account
The accounts used to access Active Directory or network-based resources, such as shared folders or printers. Resides in the Active Directory on a Windows Domain Controller.
Port Number
The address on a host where an application makes itself available to incoming data. IP Address gets us to the computer; Port Number gets us to the right application on that computer Port Numbers range from 0-65535 Web server listens to a port; computer sends data to ports of a particular IP Address Server; data can be sent between ports on a server Resource Monitor shows the connections on a system
Disaster Recovery
The administrative function of protecting people and resources while restoring a failed network or systems as quickly as possible.
Tower Case
The largest type of personal computer case. Tower cases stand vertically and can be as high as two feet tall. They have more drive bays and are a good choice for computer users who anticipate making significant upgrades.
Protocol Data Unit (PDU)
The name given to data at different layers of the OSI model. Specifically, the PDU for Layer 4 is segment. The Layer 3 PDU is packet, the Layer 2 PDU is frame, and the Layer 1 PDU is bit. Looks at ethernet frame and determines what part you are interested in We organize packets by PDUs
Serial ATA (SATA)
The newer and faster ATA technology. Hard drives speak this language; used today
VGA Connector
This is a connector for analog video. It has 3 rows and 15 pins. It is also sometimes referred to as the DE-15 or HD-15 connector.
Network ID
The portion of an IP address common to all nodes on the same network or subnet 0 gets put at the end to show that we're talking about a Network ID (not a computer) Subnet Mask example: 255.255.255.0
Memory Controller Chip (MCC)
The portion of the chipset that controls communications between the CPU and system RAM
Port Forwarding
The process of redirecting traffic from its normally assigned port to a different port, either on the client or server. In the case of using SSH, port forwarding can send data exchanges that are normally insecure through encrypted tunnels. Preventing the passage of any IP packets through any ports other than the ones prescribed by the system administrator.
Encrypting
The process of transforming data into a non-readable form for security purposes.
2.4 GHz Band
The range of radio frequencies from 2.412 to 2.4884 GHz. The 2.4 GHz band, which allows for 11 unlicensed channels, is used by WLANs that follow the popular 802.11b and 802.11g standards. However, it is also used for cordless telephone and other transmissions, making the 2.4 GHz band more susceptible to interference than the 5-GHz band. different WAPs can use different ranges so they don't stomp on each other; premade channels so you don't have to specify band 14 channels in Japan; 13 channels in Europe; 11 channels in USA
Basic Input/Output Services (BIOS)
This program is dedicated to enabling your CPU; every motherboard has programming that's designed to communicate with assumed hardware of computer (called BIOS)
110-Punchdown Tool
This tool is used to permanently connect wires to patch panels and RJ-45 wall jacks
Format comands for Windows CLI
To format example: format e: /FS:NTFS To quick format example: format e: /FS:NTFS /Q
Internet Tier 1
USA; about 10 companies that provide Internet to very large customers; none provide complete coverage of entire USA; have to work together to cover all of USA; created peering agreement to cover all of USA, agree to let each other's traffic go through; need a place to interconnect, so they use Network Operation Centers (NOCs) that are owned by third-parties
Troubleshooting Printers: Computer Errors
Unable to install printer: don't have rights to istalll printer, set at administrative level No connectivity: physically connected?; getting good DHCP?; are other able to connect to it?; usualy a network problem, not a printer problem Mental Reinstall: install printer, shows up in device manager, printer queue shows up in device manager, sent print test page; if problems, go through uninstall process; rollback device driver if something isn't working after an update Access denied: administrative issue
Troubleshooting Power Supplies: Signs of slow death
Unexpected shutdowns, boot up and have no power Capacitor breaks down Undervolted
Formatting in Windows:
Windows uses Disk Management Can choose exFAT or NTFS can select alloccation unit size (determine how big the blocks are) can choose quick format, but it will only build data structures, but not test them can choose to enable file and folder compression (can always do that later)
Super User Account Names
Windows: Administrator Linux & macOS: Root
Bluetooth
Wireless PAN technology that transmits signals over short distances between cell phones, computers, and other devices looks like 802.11; big difference is bluetooth is designed to connect only two devices at a time in a Personal Area Network (PAN)
802.11ac
Wireless networking standard that operates in the 5-GHz band and uses multiple in/multiple out (MIMO) and multi-user MIMO (MU-MIMO) to achieve a theoretical maximum throughput of 1 Gbps. 5 GHz; 1300 mbps Improves MIMO by creating Multi-User MIMO; can zoom in on multiple clients at a time depending on number of radios put it in it 802.11ac WAP also has 2.4 GHz radio in there for backwards compatibility AKA Wi-Fi 5
WEP (Wired Equivalent Privacy)
Wireless security protocol that uses a standard 40-bit encryption to scramble data packets. Does not provide complete end-to-end encryption and is vulnerable to attack.
WPA (Wi-Fi Protected Access)
Wireless security protocol that uses encryption key integrity-checking/TKIP and EAP and is designed to improve on WEP's weaknesses. Supplanted by WPA 2. TKIP is WPA. AES is WPA2.
Blue Screen of Death (BSOD)
a Windows error that occurs in kernel mode, is displayed against a blue screen, and causes the system to halt. The error might be caused by problems with devices, device drivers, or a corrupted Windows installation. also called a stop error.
SAMBA
a Windows folder and printer sharing emulation tool; built-in to Linux and Mac
ASCII code
a code that defines how keyboard characters are encoded into digital strings of ones and zeros
RAID 10 (Striping Mirrors)
a combination of RaID 1 and RaID 0 that requires at least four disks to work as an array of drives and provides the best redundancy and performance. Need minimum of 4 drives; 2 pairs; 1st and 2nd pairs are mirrored (RAID 1); data on first pair, another piece mirrored on second drive in pair; stripe across to mirrored pairs. Can lose one drive on each pair and still be fine; if you lose a whole pair, you lose half of the stripe.
Virtual Reality (VR)
a complete virtualized environment; includes a headset that detects head movements (tracking) HTC Vive Pro; controllers, headset, sound, tracking, infrared transmitters
The Cloud
a computer full of different Virtual Machines on a big server that people have remote access to
Materials Safety Data Sheet (MSDS)
a document that summarizes key information about a chemical, its composition, which exposures may be dangerous, what to do if an exposure should occur, and how to clean up spills
Cache
a little bit of what you have put closer to you; a computer memory with very short access time used for storage of frequently or recently used instructions or data
Virtual Local Area Network (VLAN)
a logical network that can separate physical devices without regard to the physical location of the device Takes one physical switch and electronically turns it into two or more switches Separates a LAN into two or more LANs
Zero Day
a new type of threat that nobody has seen before
Magic Packet
a packet that triggers a computer to wake up from a low power state
Firewalls
a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
Firewall
a part of a computer system or network that is designed to block unauthorized access while permitting outward communication. can block certain IP Addresses, port numbers; can block based on time of day, keywords of websites, etc.
Performance Baseline
a performance baseline identifies the network's or system's normal hardware utilization statistics gives idea of how well computer runs before adding applilcations
Spear Phishing
a phishing expedition in which the emails are carefully designed to target a particular person or organization
Trojan Horse
a program designed to breach the security of a computer system while ostensibly performing some innocuous function; zombifies your computer for a later use
Band
a range of radio frequencies
Demilitarized Zone (DMZ)
a separate network located outside the organization's internal information system that permits controlled access from the internet anything that comes from the internet can be set to be sent to one particular system
Shoulder Surfing
Watching an authorized user enter a security code on a keypad.
Types of Port Numbers
Well-Known Ports are 0-1023; applications like web, secure web; nobody else can ever use these port numbers Registered Ports are 1024-49151; came after well-known ports, but wanted their own ports Dynamic/Ephemeral Ports are 49152-65535; always need two port numbers; 2nd port number is ephemeral port number, spun up by system every time it makes connection to give return port number for whatever server you're connecting to
How does a computer save data?
When saving, CPU instructs data written on RAM, then copies it over to mass storage
File Transfer Protocol (FTP)
a simple network protocol that allows the transfer of files between two computers on the internet Usees port 21; need FTP Client Every browser is an FTP client; can upload to and download from FTP Servers Passive Mode is when everything is done on Port 21 Can use Active Mode: Client sends data on Port 21, but server sends data back on Port 20, but most routers may block Port 20; active mode is 5x faster than passive mode
Extended SSID (ESSID)
a single SSID name, but it's the same SSID on all the different WAPs in an enterprise; allows handoffs between WAPs depending on your location
Mobile Device
a single, sealed unit; runs specific mobile OS on an embedded system; wireless connectivity Smart phones run iOS or Android; features like GPS, accelerometers, battery chargers, battery packets Wearable technology: smart watches, heart rate monitor
Spyware
a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
Graphics Processing Unit (GPU)
a specialized logic chip that is dedicated to quickly displaying and calculating visual data such as shadows, textures, and luminosity GPU has own memory (RAM); memory stores what's on the monitor Video Card CPU with integrated GPU is called APU
Secure Sockets Layer (SSL)
a standard security technology for establishing an encrypted link between a web server and a browser, ensuring that all data passed between them remain private
Current User
a subset of Users; infor for whoever is logged in
Ethernet
a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems. Defines cabling, hubs, speeds, and that you can only make your data in discrete chunks of 1500 bytes so you don't hog the network; 1500 byte chunks called a frame
Intrusion Detection System (IDS)
a system that creates logs of all network traffic that was permitted to pass the firewall and then analyzes those logs for signs of attempted or successful intrusions either a box or piece of software running on a system Just alerts you of an issue, doesn't resolve the issue
Spoofing
a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network certificates are used by web pages for verification in to prevent spoofing
Asymmetric DSL (ADSL)
a type of DSL service that provides higher downstream bandwidth to the user and less upload bandwidth upload speed slower than download speed
DB-9 Connector
a type of connector with 9 pins that's used in serial communication and conforms to the RS-232 standard; technically RJ-45
Open-Source License
a type of license for computer software and other products that allows the source code, blueprint or design to be used, modified and/or shared under defined terms and conditions.
Ransomware
a type of malicious software designed to block access to a computer system until a sum of money is paid.
Homegroup
a type of peer-to-peer network where each computer shares files, folders, libraries, and printers with other computers in the homegroup. access to the homegroup is secured using a homegroup password. hybrid of workgroup and domain; convenience of workgroup, security features of domain; all files would be automatically shared in a homegroup; not around much today
Traceroute
a utility application that monitors the network path of packet data sent to a remote computer tracert in Windows
Extensions
abbreviation of a type of file, usually 3 letters, on the end of the file name can allow for file association; certain file types will be opened by a certain program
Windows Professional/Workstation Editions
all basic tools; ability to join Windows domain; can have more than 20 people connect to ou; can take advantage of CPU power
PWM connectors (4 pin)
allow CPU to communicate with fans (speed up/slow down)
PCIe Expansion Slot
allows for more things to be connected to the motherboard; sends/receive data on one wire; uses serial connections
ATX12V power supply
an aTX Version 2.1 power supply that provides a 12 V power cord with a 4-pin connector to be used by the auxiliary 4-pin power connector on motherboards used to provide extra power for processors.
Uninterruptible Power Supply (UPS)
an alternative power supply device that protects against the loss of power and fluctuations in the power level by using battery power to enable the system to operate long enough to back up critical data and safely shut down
Rainbow Tables
an attack on a password that uses a large pregenerated data set of hashes from nearly every possible password
JavaScript
an object-oriented computer programming language commonly used to create interactive effects within web browsers. Used for client-side applications, where applications are sent from the web server and run on the client side
Linux
an open-source version of the UNIX operating system Linux refers to the kernel of the operating system GNU's Not Unix Popular Linux distros (distributions): Ubuntu; Fedora Linux (KDE desktop environment; alternative to KDE is GNOME); Linux Mint distro (has Cinnamon environment, which is similar to Windows) Ubuntu Features: to bar has network, wifi, power on/orr; dash on the side that is similarish to a taskbar; activities can bring up multiple desktops; bottom left shows all applications installed on system Uses Terminal command prompt
Vi
ancient text editor vi "name" will make a file
Strings
any combination of letters, numbers, etc... that are enclosed by "quotations"; can put anything you want in a string
Per-Processor License for Windows
any workstation version of Windows (Home, Pro) can be used on any computer with up to two physical CPUs on it; challenges happened when you have CPUs with multiple cores; server motherboards also could have multiple CPUs with multiple cores; Microsoft changed rules for server system; today Microsoft uses per-core licensing system
Solid Core
Type of UTP goes into the wall; each of the 8 wires is a solid piece of copper
Stranded Cable
Type of UTP more flexible and won't break Use for patch cables
64-bit operating system
Type of operating system that processes 64 bits at a time. built into every CPU is the ability to addres memory; dedicate # of wires to be able to alke to the memory; 64 bits today
Chipset
defines all of the features that the motherboard can do (# of USB slots, etc.)
Local Machine
defines all settings for this computer
Set Association
defines how different types of cache are how efficient and handing code to CPU
Current Config
defines what software and aspects of the system are being used right now; subset of Local Machine
Infrastructure as a Service (IaaS)
delivers hardware networking capabilities, including the use of servers, networking, and storage, over the cloud using a pay-per-use revenue model We can logon to a site and create our own virtual machines instead of setting up our own web servers; very inexpensive compared to what it used to be
Windows Home Edition
designed for homes and small offices; can't join Windows domain; come with media tools; can onlly have 20 people connect to you; can't take advantage of CPU power
2.5 inch Labtop
designed many for laptops and mobile devices; popular today because you can fit many; a bunch can be used in servers
SO-DIMM
designed where long sticks of RAM won't work; usually in laptops DDR4 260 Pin DDR3 204 Pin
iOS
developed by Apple, is a proprietary mobile operating system specifically made for Apple's mobile devices Uses the App Store; requires iCloud account Swipe down for notifications and Spotlight Search; swipe up for Control Center
Surge Suppressor/Protector
device that absorbs extra voltage from a surge catch big spikes of voltage and eat them in themselves With trip alert: let's you know when spike/surge happens Can protect ethernet cabling, landline, USB Cheap suppressors only work once, and then turn into a regular power strip
Shells
different types of command-line interfaces; command prompt, powershell are both different types of shells
Virtualization with Host-Only Adapter
directly connected to particular host network card
Signed Drivers
are drivers that include a digital signature; say their device isn't spreading Malware
Crimps
attached at end of cable (look like ethernet) Crimps have a CAT rating
Denial of Service (DoS)
attack floods a network or server with service requests to prevent legitimate users' access to the system; malformed http requests
Clock
bell in CPU; clock's job is to tell CPU to do something
Internet Tier 3
big internet service providers (i.e. Comcast, AT&T); not totally interconnected; sell internet services to individuals and corporatios; no peering agreements, paying for internet from Tiers 1 and 2
Graphic/CAD/CAM Design Workstation
big powerful multi-core processor and high-end video Mother board support multicore processor; high-end video, maximum RAM
ATX Form Factor
biggest common form factor we have 12 inches X 9.6 inches
Rogue AP Detection
blocks access points that aren't listed in the network
CPU (Central Processing Unit)
brain of the computer, or really powerful calculator; runs programs
USB Controller
built into motherboard; controls USB devices USB allows you to connect up to 127 devices by using USB hubs Sometimes have multiple controllers (ex: 1.1 and 3.1 controller) and plugged into own separate root hub USB Hubs are devices you connect to root hub to allow for more USB ports (may need AC power to support devices)
Virtualization with Internal Network
bunch of computers attached to internal network, but no router out to internet through own computer
DVD+R
burn once DVD+RW, DVD-RW were competing standards; used to need different players
Riser Rating
cable that runs in between floors More fire resistance than non-plenum, but not as much fire resistance as plenum
Windows Version 8
came out in 2012; Microsoft wanted something that would work on other devices, like tablets and smartphones; metro desktop; taskbar, but no start button introduced Microsoft Store; Charms Bar introduced Settings (took many settings from control panel, but there was still a control panel) introduced OneDrive (cloud storage) Windows Version 8.1 came out a year after 8; had a start button Not many people were fans of 8 and 8.1
Virtualization with NAT Network
can create two completely separate networks; set Virtual Machine to attach to your created network; Virtual Machines will populate the created networks
Hot Spare / Swappable Drive
can have a drive sitting there ready to go in case one of your drives dies; will rebuild array automatically Hot swappable means you don't have to turn off system to take out hard drive and put in a new one
Rate Limit
can limit upstream and downstream rates on a network
Virtual Printers
can print to pdf, print to onenote, etc. doesn't actually print, just sent to to files or make it a file
CD-R (CD-Recordable)
can't erase from also were CD-RW (CD-Rewritable)
Windows Enterprise Edition
can't purchase from store; for large organizations; special features to be able to take control of 10s or 100s of thousands of computers
Endpoint Management
central system in network watches for intrusions and makes sure anti-malwares and patches are up to date
chown
change ownership; Linux ex: sudo chown timmy fred; gives ownership of timmy file to fred user
chmod
change permission modifiers; Linux RWX(user) RWX(group) RWX(other) 4+2+1=7 4+2+1=7 4+2+1=7 chmod 777 fred; all given rwx permissions; fred is file name 4+2=6 4+2=6 4=4 chmod 664 fred; changes permissions to: RW, RW, R
Simple Main Transfer Protocol (SMTP)
e-mail protocol; uses TCP Port 25 sends mail up to SMTP server; then can use POP3 or IMAP, which brings e-mail down to your email client
Wireless Access Point (WAP)
enables devices to connect to a wireless network to communicate with each other Bridge between an ethernet network and a wireless 802.11 network
Internet Tier 2
entities that aren't as big as Tier 1, but have decent-sized coverage area; don't have a peering agreement with the Tier 1 providers, but have some peering agreements with others
Resolution
example 1280 X 1024
End Process Tree
example is winword.exe doesn't know how to scroll or change window sizes, so other processes are taken care of by dynamic link libraries (.dll or .exe) that store that information some programs lean on other programs; get dependency hierarchy; end process tree will end a lot of programs that depend on that program
Lightning Connection
exclusive to Apple products; used for charging, data transfer Runs at 5 Gbps
HFS+ (Hierarchical File System Plus)
exclusive to macOS; 8 EiB volumes and files
Organic LED (OLED)
doesn't use a backlight, as the pixels make their own light; can make really thin monitors with it
3.5 inch mass storage
dominant for for mass storage for many decades
Screen Lock
features: putting a lock on a screen after the device times out Use fingerprints, pin codes, passwords, or facial recognition
Linux Files Systems on exam
ext3: supports 32 TiB volumes and 2 Gi files ext4: supports 2 EiB volmes and 16 TiB files
Restore Point
file that contains info about your systems configuration at a particular time, helps backup the computer
S/MIME (Secure/Multipurpose Internet Mail Extensions)
for e-mail attachments, you use MIME; turns every 8 bits of filie into an ASCII code; for a while, we couldn't encrypt the mail, so we enrypted the files, creating S/MIME
Satellite
for people out in the country or the ocean Speeds are 3mbps/25mbps or better (upload/download) Latency is an issue
Impact Printer
forms characters and graphics on a piece of paper by striking a mechanism against an inked ribbon that physically contacts the paper Platents are what the pins push up against Paper used was Tractor Feed Paper Impact Paper can be used, so there are copies of the documents you've printed; multi-part form Maintenance includes replacing the ribbon and keeping it clean
Routing Table
generated automatically by software, is used to determine the best possible route for a packet tells router where to send stuff Routing Tables have a Default Gateway
DDR (double data rate) SDRAM
gives two bits of information for every click of the clock DDR speed rating is double the clock speed (Clock Speed X 2 = DDR Speed) DDR speed (Bits) X 8 = PC Speed rating (bytes)
80 Plus Rating System
guarantees you get an 80% efficiency
Comport
how Windows recognizes different serial ports
Wattage Rating
how efficient a power supply is; wattage rating only measures at room temperature
IP Address
identifies which LAN you are a part of and gives you a unique Host ID No computers can have the same IP Address 4 numbers; each set of numbers is an octet; can range from 0-255; about 4 billion possible address combinations
Infrastructure Mode (\)
if you have a WAP(s); most common way we do 802.11
Hybrid Cloud
includes two or more private, public, or community clouds, but each cloud remains separate and is only linked by technology that enables data and application portability Part of the cloud is private, part of the cloud is public
File-Level Backup
individually selecting which files you want to backup; usually consists of personal files
NTFS vs. Share Permissions
• NTFS permissions apply from local and network connections • Share permissions only apply to connections over the network • The most restrictive setting wins - Deny beats allow • NTFS permissions are inherited from the parent object • Unless you move to a different folder on the same volume
command to make a folder/directory in Windows
md
Orientation Notch
means CPU fits into socket in only one way
ACPI Level 0
means a laptop is on; enabled but unused
micro SD Card
mini SD is adapter for micro SD
command to make a folder/directory in Linux
mkdir
Thick Client
most basic type of desktop office computer Meets recommended requirements for selected OS; install desktop applications
m.2 format mass storage
mostly replaced 1.8 inch mass storage
Gaming PC
multicore procesor; high-end power supply; high-end motherboard; high-end cooling; high-end video/specialized GPU; high-definition sound card; large storage
NetBIOS/NetBT
naming convention used for Windows
Domain
needs a Windows Server System; domain used today is called an Active Directory Domain provides lots of security, central administration; very powerful and very expensive
Metropolitan Area Network (MAN)
network that spans a metropolitan area, usually a city and its major suburbs. Its geographic scope falls between a WAN and a LAN We connect LANs using routers, creating a WAN. If WAN gets spread out through an entire town, we have a MAN.
Molex connector
older power connector; provides 5 V and 12 V
PCI
older type of expansion; 32-bit wide bus; ran 32 wires wide
Hyper-Threading
one super smart pipeline that can handle two incoming pieces of codes at the same time
ATX Power Connector
originally had 20 pins, now have 24 pins
Response Time
panel needs to reset self for persistence of vision; how long it takes for pixel to go from all black to all white and back to all black response times are about 1 ms - 4 ms
Change Board
people who meet and look at requests for changes and either approve or disapprove them Look at: Documented Business Practices Purpose of the Change Scope of the Change Risk Analysis Plan for the Change End-User Acceptance if it doesn't workout, need a Backout Plan Document all changes and events that take place; lessons learned
Recovery Disk
personal copy of Windows installation media; can installl onto 16 GB thumb drive
Virtualization
running multiple systems simultaneously on one physical computer Virtualization takes physical hardware and allocates it to a separate internal system, but it can't do anything you don't already have
Python
runs on every operating system; easy to read and to make variables .py extension
whoami command
says what user is logged in
Ethernet Standard
says you can't connect more than 1,024 computers to a switch because system will become overloaded; in reality, 30-40 computers is standard size for a network
Flatbed Scanner
scans paper documents; downside is it can only take one document at a time
CPU Sockets
physical types of packages of the CPU; the mount where a CPU connects to the motherboard
Hash
plaintext that has been transformed into short code; used for storing passwords one-way-value; fixed length
Bring Your Own Device (BYOD)
policy allows employees to use their personal mobile devices and computers to access enterprise data and applications
1.8 inch mass storage
popular with SSDs
Troubleshooting Power Supplies: Signs of fast death
power supply will burn, create smoke
Synchronization
predates the cloud chunk of data in one place, and you want the same chunk of data elsewhere; update each other on the fly to update two or more data stores to their information is identical Android syncs with Google Drive; iOS syncs with iCloud
FAT32
predates windows; allowed us to make files with long names; could support 8 TiB volumes; each single file could be as large as 4 GIB; FAT32 works on small drives and thumb drives today
System Crystal (Quartz Oscillator)
presses the clock button; acts like a metronome
Virtualization with Generic Driver
pretends to be different type of network card; used for old operating systems; actually is emulation
Motherboard
primary device that we connect innards of system unit together (RAM, CPU, internal hard drives)
Duplex Printing
prints on both sides
Decimal vs IEC counting
problem is when can use both in out industry People who sell hard drive measure 4 tb in decimal value; computer uses LBA values (binary), so it shows different capacity that decimal values advertised Just different ways of counting
Virtual Memory
process of optimizing RAM storage by borrowing hard drive space Use to avoid "Out of Memory" errors Swap File = Virtual Memory when using virtual memory, computer slows way down; hard drive light starts going crazy; to fix this problem, add more RAM
Rootkit
program that hides in a computer and allows someone from a remote location to take full control of the computer seats itself within boot sector of drives, and tries to hidde itself from the operating system
Services
programs that manages services on computer; shows installed services; can see which services are running and not running; can turn services on/off; can choose start to be automatic, automatic (delayed start), manual, disabled If you can't find Service in Details in Task Manager, it is a service host
Antistatic Wristbands
protects chips and electronics from electrostatic discharges; use in professional environment
Digital Rights Management (DRM)
protects different type of copyright with audio and video; licensing done by the hardware when using HDMI
Spike
provided more voltage than what you're expecting; also called surges dangerous because they can destroy your computer
Modular Power Supply
provides connectors at the power supply end, allowing unused cables to be detached from the power supply, producing less clutter, a neater appearance and less interference with airflow.
Windows Server System
provides developers with dynamic development tools that allow businesses and customers to connect via the internet domain needs this
Digital Subscriber Line (DSL)
provides high-speed digital data transmission over standard telephone lines using broadband modem technology, allowing both Internet and telephone services to work over the same phone lines early version of broadband; used telephone lines Asymmetric DSL and Symmetric DSL
Active Directory Domain
provides lots of security, central administration; very powerful and very expensive
Overclock
push system beyond its rated speeds
Parallel vs. Serial
sending data over 1 wire vs. 32 wires; sending data over 1 wire is better than sending it over 32 wires; single lane Sometimes need more than one lane for things like 16 lane graphic cards or video cards that need big bandwidth
Community Cloud
serves a specific community with common business models, security requirements, and compliance considerations Smaller organizations use a community cloud; they chip in to afford the cloud, because it is expensive; private use
Private Cloud
serves only one customer or organization and can be located on the customer's premises or off the customer's premises Private Virtual Machines; within organization
Thin Client
rarely counts on own internal storage; network connectivity is big Want motherboard with great network connectivity; meets recommended requirements for selected OS; basic applications
command to delete a folder/directory in Windows
rd to remove a folder rd /s to remove a folder and its contents
Active Directory repair
reestablish connection to active directory server
Telnet
remote command line tool; allows you to get to a command line on some other operating system one of the earliest application protocols used on the Internet Lacks encryption and offers no security Port 23
Mobile Device Management (MDM)
remotely controls smartphones and tablets, ensuring data security
Windows Version 10
removed Charms bar; start menu is resdesigned, has metro functions, many other features including a settings button; if you right click on start button, has a bunch of functionality features listed; no media center
Symptoms of Security Threats
renamed system files being denied from doing things you could do before disappearing filles file permission changes unauthorized people coming into the network
Attributes
settings you can apply to a file or folder; can make read-nly or hidden; in advanced, file ready for archiving, indexing, compress, or encrypt
Keystone projector
shape from projector
Pincushion projector
shape from projector
Skew projector
shape from projector (more uncommon) looks kind of like a tilted keystone
System Information (MSINFO32.EXE)
shows details about your computer's hardware configuration, components, and software, including drivers System Summary used when you need a quick snapshot
Task Manager
shows you the programs, processes, and services that are currently running on your computer (Ctrl + Alt + Del)
Shutdown command on Windows CLI
shutdown /s means to just shut down shutdown /r means to restart after shutting down
command to delete a folder/directory in Linux
rmdir for an empty folder rm -r to delete a folder and its contents
shutdown command on Linux CLI
shutdown will shut down computer after 1 minute shutdown -c will cancel the shutdown shutdown -r will reboot the computer after shutdown shutdown now will shutdown the computer immmediately
ACPI Level 3
sleep mode; CPU stops working, but RAM keeps running
Channels
slots where you can insert sticks of RAM
Mini-ITX Form Factor
smallest common form factor; designed for small systems
USB Lock
software designed to watch over USB ports; prevent people from using it, can also record when someone tries to use it
Commercial License
software license that gives permission to install a program on one computer can't reverse engineer it or change it; can only use it within the specifications of the EULA Types of Commercial Licenses: Personal License, Enterprise License
File-Based Encryption
softwware feature in OS where you can pick particular file/folder and say encrypt this
Modular vs. Solder
some say solder are more efficient; solder has wires coming from power supply; modular has wires that you can connect to power supply as you please
Audio & Video Editing Workstations
specialized audio and video card; large, fast hard drive; dual monitors
Optimization
way we can organize our hard disk drives so that they run more efficiently Optimization is also known as disk defragment or defrag Pages are the atom of the SSD; each page stores 2-8 kb; each block stores 32-256 pages; we can't erase pages, can only erase entire blocks; trim writes into individual, now unused pages, Available For Use (AFU)
Process
when a program starts to run a program that is running and taking up memory
Pipeline Stall
when pieces of codes aren't in cache when CPU needs it; entire pipeline shuts down and many clicks of clock to get line of code off RAM
Cname
when there's more than one name for a particular IP Address
Exception
when you allow something to get through a firewall
Overclocking
when you increase the multiplier; can make systems unstable
Emulation
when you pretend to have hardware that you don't have
kill command (Linux)
will kill any proccesses Ex: kill PID#
Data Over Cable Service Interface Specification (DOCSIS)
works well to watch TV and connect to the Internet; used by Cable Cable speeds were 1.5/10 mbps; today they are 50/100 mbps or better (Upload/Download)
IP Address Classes
x (you can choose your own number) Class C: 210.11.12.x; 254 hosts; first three numbers are locked Class B: 172.16.x.x; 65534 hosts; first two numbers are locked Class A: 6.x.x.x; millions of hosts; first number is locked Idea was that you wouldn't be more than 4 routers away from the top of the internet; they were wrong IP Addresses never end with a 0 or 255
ADF (Automatic Document Feeder)
take multiple documents at a time
On-Demand
take one virtual machine and clone it a bunch of times during busy times, and then shrink it back down once the demand dies down
Clock Multiplying
takes beat from system crystal and multiplies; clock multipliers are built into the CPU
Disk-Based Encryption
tool built-in to OS; say you want entire drive encrypted
TCP/IP (Transmission Control Protocol/Internet Protocol)
two different protocols working together to get the data between your systems TCP is a connection-oriented protocol; client talks to server, then waits until server responds (which is a handshake)
Yagi Antenna
unidirectional antenna; works well transmitting and receiving signals in some directions but not in others Yagi Antenna signal looks like a stretched football; good for shooting long distances
Flashing
updating firmware electronically; with BIOS, keep a copy of a flash update (called BIOS Flash Image)
Brightness
use Nit (nt) measure of light panels generally run 200-500 nts
Thermal Paste
used as a way to pull heat from the CPU into the cooling system
PS/2 Connector
used for keyboards and mice; keyboards are purple, mice are green Downside is after you connect, you have to reboot for it to register
5.25-inch mass storage
used for optical media; early
Magnetic Reader
used for swiping cards
PCIe Connector
used for video cards
POST cards
used if nothing works at all; show hexadecimal values, and the motherboard book shows you all of the codes and what they mean (POST error codes); only valid as the computer is booting up
SATA Cables
used to connect hard drives to the motherboard; also connect into SATA HDD connectors
Pipeline (aka core)
used to optimize the processing commands; 4 guys in conveyor belt, first guy decides who to give command to; first guy is prefetch
Digital Light Processing (DLP)
uses a grid of tiny mirrors; light source goes through a color wheel and hitting grid and reflecting out; popular with projectors
Radio Frequency Identification (RFID)
uses electronic tags and labels to identify objects wirelessly over short distances sticker that is a radio and stores some information; readers use radio frequency to power up stickers, then stickers have enough enery to transmit back whatever information they have
Non-Volatile Memory Express (NVMe) Drives
usually are m.2 drives; faster than SATA NVMe drives have one notch; SATA drives have 2 notches
USB Type-B
usually connects to scanners
USB micro-B
usually for Android phones; many other devices use this as well
USB mini-B
usually for cameras
Variables
values that change based on how we manipulate them integers, strings
PuTTY
a Telnet client; PuTTY can access a Telnet server
Ethernet Frame
Destination Address - Source Address - Data - FCS (Frame Check Sequence)
Boot Order
a BIOS setting for bootable partitions and devices
Half-Duplex
Communication between two devices whereby transmission takes place in only one direction at a time.
Virtual Private Network (VPN)
Companies can establish direct private network links among themselves or create private, secure Internet access, in effect a "private tunnel" within the Internet VPN Client software will make a direct connection between Laptop and WAN side of router at the office; tell VPN client IP address of WAN side of router at office; router lets computer into the network, DHCP server gives computer IP Address, which is same address as if it were a DHCP client on network, and this proccess is called a VPN Tunnel A saved VPN Connection manifests as a new network card; acts like a network card If you open up a web browser while on a VPN connection, you get split tunneling
Frame with IP Addresses
Destination MAC - Source MAC - Destination IP - Source IP - Data - FCS
Ethernet Frame with Port Numbers
Destination MAC - Source MAC - Destination IP - Source IP - Destination Port - Source Port - Data - FCS
Public Cloud
Provides cloud services to just about anyone Public Virtual Machines; open to anyone
Data Execution Prevention (DEP)
Windows feature that uses a combination of software and hardware to prevent the execution of code in unintended areas of memory to protect against buffer overflow attacks. helps prevent programs for stepping over other programs
Local Security Policy
Windows tool used to set local security policies on an individual system (i.e. password requirements, log-in requirements, etc.)
Parabolic Antenna
focus the signal to a signal point uses a dish a highly directional antenna
Incident Response Guidelines:
1. Know your responsibility 2. Identify the problem - Report through proper channels - Data/Device preservation - Use of documentation - Document changes 3. Keep chain of custody (keep track of evidence when legality is in question) - Tracking evidence - Document process
Issues with Connecting to an SSID:
1. NIC is configurd as DHCP client; may get APIPA address, meaning you have a bad password; may still connect, but get APIPA address 2. Passwords can change 3. Set wireless NIC to a static IP Address
Secure DNS
1. Non-ISP DNS servers; Google 8.8.8.8; doesn't log or questionable redirections 2. Encrypt DNS requests; good to use on phones; install fully encrypted DNS Server; create VPN connection to DNS Server
Data You Need to Know:
1. Personally Identifiable Information (PII) 2. Protected Health Information (PHI) 3. EU General Data Protection Regulation (GDPR) - says that a person has the right to control information that people gather from you 4. Payment Card Industry Data Security Standard (PCI DSS) - all the banks that issue credit cards
Laser Printer 7 Steps:
1. Processing; print joobs comes in and stored on local memory 2. Charging; primary corona puts really strong negative charge on it 3. Exposing; laser writes onto photosensitive drum, reduces charge wherever laser hits it 4. Developing; toner comes out of toner hopper and goes onto photosensitive drum 5. Transferring; transfer corona charges paper with a positive charge, then as paper comes close to drum, and toner goes onto paper 6. Fusing; fusing assembly using heat and pressure pushes toner into the paper 7. Cleaning; rubber scraper scrapes residual toner
USB 1.1
1.5 mbps or 12 mbps (megabits per second); has white tab
Thunderbolt 1
10 Gbit/s (x2 channels) Used as mini display ports
802.11n
100 mbps; 2.4 GHz and 5 GHz Backwards compatible with all extensions because it has 2.4 GHz and 5 GHz bands Introduced MIMO (multiple in / multiple out) AKA Wi-Fi 4
Versions of Ethernet
10BaseT (10 mbps Baseband Twisted Pair); 1000BaseT; 1 GB BaseT
802.11b
11 mbps; 2.4 GHz
Colors for power supply voltages
12 V: yellow connector 5 V: red connector 3.3 V: orange connector
Loop Back Address
127.0.0.1
VGA (Video Graphics Array)
15 pins on the three rows; blue connector common; problem is that it is an analog signal (monitor may have to convert into digital) Standard for the video graphics adapter that was built into IBM's PS/2 computer. It supports 16 colors in a 640 × 480 pixel video display.
Binary / IEC Values
2^10 = 1024 = kibi 2^20 = mebi 2^30 = gibi 2^40 = tebi 2^50 = pebi 2^60 = exbi These are all IEC Values. Kibi similar to kilo, mebi similar to mega, etc.
Microsoft's Proprietary RAID
3-way mirror; needs five blank drives; helps protect from two simultaneous drive failures traditional drives need drives of about same size in order to not have space wasted; Microsoft's Propriietary RAID does not need drives of same size
x86
32-bit CPU Program Files (x86) holds 32-bit programs
Thunderbolt 3
40 Gbps Shaped like USB C; not USB C; still a lot of compatibility between them
USB 2.0
480 mbps; brought in USB thumbdrives; black tab
Swap Partition
A disk partition configured to be used as an extension to a computer's RAM. This enables a system to run more programs or to process larger data sets than would otherwise be possible. Similar to Virtual Memory.
Certificate of Destruction
A document that shows what data and records were destroyed, who destroyed those data and records, and the method used for that destruction.
FileVault
A feature in Mac Os X that, in earlier versions of the OS x, encrypted the home folder. In recent versions it encrypts the entire startup disk.
Extended Partitions
A partition on a basic disk that is created from unpartitioned free disk space, and is not formatted with a file system. The space is allocated to logical drives. limited to 4 partitions; 4 partitions called Primary Partitions, can create extended partition with extra space in 4th partition, called Logical Drives; logical drive made into 5th partition
Recovery Partition
A partition on a hard drive that contains a recovery utility and installation files. Used to bring OS back online In Windows, partitions manifest as drive letters; in Linux/macOS, partitions manifest as folders
Dictionary Attack
A password attack that creates encrypted versions of common dictionary words and compares them against those in a stolen password file.
Virus
A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data old term; first generation of malware would have virus on a floppy disk, passed from system to system; virus two jobs were to replicate and activate
Heat Sink
A piece of metal, with cooling fins, that can be attached to or mounted on an integrated chip (such as the CPU) to dissipate heat; copper block draws heat from CPU, heat transfers through copper tubes and goes to cooling fins
I/O Shield
A plate installed on the rear of a computer case that provides holes for I/O ports coming off the motherboard Size is extremely fixed; all form factors can fit any I/O Shield because of standardization Customized to fit the motherboard I/O Area
Acceptable Use Policy (AUP)
A policy that defines the actions users may perform while accessing systems and networking equipment. defines what you can and can't do with company equipment
Windows Update
A service that keeps a Windows system patched and updated is vitally important to maintaining proper security. Windows 7 has Windows Update; lists important updates and optional updates; can look up Knowledge Base (KB) numbers online to see what each update does; critical updates are also listed; can choose how often to update and check for updates; Windows Update won't update Device Drivers (windows 8 and 8.1 would); can update the System BIOS Firmware Windows 10 has Windows Update; can choose active hours so Windows knows not to update during those active hours; can view update history; no option to choose which updates you want to install
Form Factors
A set of specifications on the size, shape, and configuration of a computer hardware component such as a case, power supply, or motherboard; industry standards
Near Field Communication (NFC)
A set of standards primarily for smartphones and smart cards that can be used to establish communication between devices in close proximity. NFC is RFID Examples: Laser printer has tap to print; Tap-To-Pay
Network Discovery
A setting that when turned on allows a computer to see other computers on a network and to be seen by those other computers.
Flash Memory Reader
A slot or compartment into which the flash memory card is inserted. Reads different flash memory and memory cards.
SOHO (Small Office / Home Office) Router
A small business office with between 1 and 10 users. 4 port switch, WAP
Keylogger
A small hardware device or a program that monitors seach keystroke a user types on the computer's keyboard.
Intrusion Prevention System (IPS)
A technology that monitors activity like an IDS but will automatically take proactive preventative action if it detects unacceptable activity. could be a box or software on machines known as agents; if they see something they don't like, they will communicate with firewalls, which will turn off ports or URLs to kill the virus; need central administration or endpoint management
Batch File
A text file containing a series of OS commands. .bat extension
RG-58 Cable
A thin, flexible coaxial cable used in 10Base2 network. Also called thinnet. Used BNC Connector
Yost Cable
A twisted-pair patch cable in which all of the wires are reversed on one end of the cable as compared with the other end without regard to how they are paired. A rollover cable is used to connect a computer to the console port of a router. Also called Yost cable or Cisco console cable.
compiled code
All the code is turned into machine code at once; An .exe file is compiled code
Single Sign-On (SSO)
Allows a user to authenticate once to gain access to multiple systems, without requiring the user to independently authenticate with each system.
Component Object Model (COM+)
Allows you to build apps that can be distributed over a network; allows us to share more than databases; use Component Services
System Repair Disk
Also known as system recovery disk, this is a CD or DVD that you can use to boot your computer into the Windows recovery Environment after a serious error has occurred that shuts normal Windows operation down. a bootable media that helps with recovery
Organizational Units
An Active Directory logical container used to organize objects within a single domain. Objects such as users, groups, computers, and other OUs can be stored within a OU container.
HTTPS (Hypertext Transfer Protocol Secure)
An encrypted version of HTTP. It uses port 443.
AES (Advanced Encryption Standard)
An encryption standard used by WPA2 and is currently the strongest encryption standard used by Wi-Fi.
Network Interface Card (NIC)
An expansion card that enables a computer to connect other computers or to a cable modem to facilitate a high-speed Internet connection.
File Allocation Table (FAT)
An index of all sector numbers that the hard drive stores in a table to keep track of which sectors hold which files. Keeps track of where all your stuff is on an LBA by LBA basis on a particular partition
Troubleshooting Boot Problems
Black Screen: is computer turned on?; is there a problem with your boot order?; device driver issues, possibly with graphics card?; for device driver issues: boot to safe mode and rollback/update/disable device driver in device manager, and make note of driver versions; find out what event might have impacted a driver in Event Viewer; undo what you just did after problem starts If no OS found: check boot order; reset/update boot order WinRE can repair Windows; repair installation or reimage/reload OS
Ways to crack hash values or passwords:
Brute Force Dictionary Attack Rainbow Tables
SPD (Serial Presence Detect) Chip
Built into every stick of RAM; allows system to query the RAM chip (how fast, who made it, other info)
CD-ROM (Compact Disc/Read-Only Memory)
CD File System (CDFS), aka ISO-9660; CDFS allows us to put disc into a drive and see the files on a computer
How does a computer start a program?
CPU retrieves stuff from hard drive; takes copy off of mass storage and puts it on RAM; program that is running is on RAM
Fiber Optic Cable
Cable that uses light guided through thin glass tubes, instead of electrical signals, to transmit data. It is very fast but also expensive. Popular with 10 Gigabit ethernet situations and faster Two ways to propagate a light signal: Multimode (uses LED) Singlemode (uses lasers) Fiber Optic connectors come in pairs; one for send, one for receive
twisted-pair cable
Cables made of copper wires that are twisted around each other and are surrounded by a plastic jacket (such as traditional home phone wire). Unshielded Twisted Pair (UTP) - twists allow it to give off a better signal; run at about 100 meters Shielded Twisted Pair (STP); still RJ-45; can work better with some devices that usually cause interference
Users and Groups
Can add permissions directly to each user for each folder; if you lose a user, it's tough to recreate for a different user; Can put users into a group so that they get the same permissions for that group, so you don't have to adjust each individual user An individual user account can be a member of multiple groups; can have groups within groups
Augmented Reality (AR)
Computer data or graphics are overlaid onto the physical environment Augmented Reality places virtual objects in the real world Examples include snapchat filters
Windows 7 Task Manager
Can get to task manager by using ctrl+alt+delete, ctrl+shift+esc Applications Tab Processes Tab; shows what processes are running Services Tab; shows what services are running and stopped; can start/stop services Performance Tab; overview of how system is running; can show how much memory is available and free Networking Tab; shows how hard network is working Users Tab; shows who is currently logged in Resource Monitor is more powerful; click performance tab and go to resource monitor to access it Resource Monitor has CPU, Memory, Disk, Network; only place on Windows 7 where you can get your Process ID (PID) Memory is allocated in Pages; if a program needs a page, but it's not there, and has to go to a hard drive, called a Hard Fault; too many hard faults mean you don't have enough RAM
Causes of BSODs
Causes of BSoDs: caused by hardware, might not be compatible with Windows; can fix by updating hardware; safe mode, go to event viewer; might need to rollback or update a device driver
Resource Pooling
Cloud computing services to multiple customers that are hosted on shared physical resources and dynamically allocated to meet customer demand. Can have virtual machines share storage, electrical needs, etc.; allows fo incredible efficiencies; dominant way of the cloud
RG-6 Cable
Coaxial Cable used for connecting homes to cable networks. Larger conductor and higher frequencies than RG-59. Uses F-type connectors
xcopy
Command in the command-line interface used to copy multiple directories at once, which the copy command could not do. Can verify data as it's being copied. Xcopy "location of files" "destination" ex: xcopy c:\backup x: can add switches to the end, including /s (copy all sub-directories), /v (verify each copy as its being copied), /h (no hidden files)
recovery console
Command-line interface boot mode for Windows that is used to repair a Windows XP system suffering from massive OS corruption or other problems.
Wake-On-LAN
Configuring a computer so that it will respond to network activity when the computer is in a sleep state. Turns on upon receiving a Magic Packet.
Local Area Network (LAN)
Connects a group of computers in close proximity, such as in an office building, school, or home Runs wires to a central box (hub) so everyone is connected; for wireless, uses WAP (Wireless Access Point)
LogicalDisk
Counters in the LogicalDisk category monitor individual partitions and logical drives on a disk. to track stuff over time, use data collector sets; uses cyclic logs; can find your data sets under reports
Copy/Move Commands for Linux CLI
Cp command copies files; mv command moves files To copy all files: cp M* destination; Ex: cp M* Gather
How to Crimp Cables
Cut away blue jacket 4 pairs are orange, blue, green, brown Untwist each pair and slide into crimp into specific order Each pair has a white in each one
DVDs and Sizes: SS or DS = Single or Double Sided SL or DL = Single or Double Layer
DVD-5 (SS/SL): 4.37 GB DVD-9 (SS/DL): 7.95 GB DVD-10 (DS/SL): 8.74 GB DVD-18 (DS/DL): 15.90 GB
Ad Hoc Mode
Decentralized wireless network mode, otherwise known as peer-to-peer mode, where each wireless node is in meshed contact with every other node. No wireless access point; bunch of NICs and one person can be the host and set up a wireless ad hoc network; all other computers treat host as a WAP; handy if you want to connect to nearby devices
Delete commands for Windows CLI
Del "name" deletes a file Del *.txt would delete all files that have the extension .txt Del *.* deletes all files in that folder/directory
Laser Printer
Electrostatic printer that focuses a laser beam to form images that are transferred to paper electrostatically toner cartridge; photosensitive drum is cornerstone of all laseer printers; use laser to hit photosensitiv drum, which holds static charge, but the more light it sees, the less of a charge that that particular spot can hold Processing, print jobs are stored in memory on the laser printer Have CMYK (Cyan, Magenta, Yellow, Black)
FAT16
File allocation table that uses 16 bits to address and index clusters. Used as the primary hard drive format on DOS and early Windows 95 machines; currently used with smaller-capacity (2 GB or less) flash media devices. Has 4 hexadecimal characters on each side; on left side is LBA values for every block on that drive (0000-FFFF); on right side, defines content of that LBA value
Domain Levels
First Level: .com, .edu, .gov Second Level: examples are google.com, totalsem.com Inside second level domain, will have www then IP Address
DVI (Digital Visual Interface)
First digital connect; also can provide an analog signal with an adapter (DVI to VGA) Special video connector designed for digitalto- digital connections; most commonly seen on PC video cards and LCD monitors. Some versions also support analog signals with a special adapter. DVI-I (Digital and Analog) DVI-D (Digital only) Single-link DVI; Dual-link DVI Problem with DVI was that you needed to go through configuration to get it to work
Troubleshooting Printers: Paper Output Errors
Garbled characters on paper: bad/corrupted drivers; corruption in print job; dump print job out of spooler, reset printer, try again; may need to roll back driver Vertical lines on page: usually laser printers; foreign matter on optically sensitive roller; replace the toner cartridge Color prints in the wrong print color: driver issues; lost one color and it can't make a certain color Printing blank pages: thermal printer when heating element doesn't work; laser printer and primary corona is dead Streaks: inkjet issue; inkjets are clogging; maintenance mode Faded prints: laser printers probably low on toner; impact printer, ribbon is running out; injet, probably clogged jets Ghost images: on laser printers; replace toner Toner not fused to printer: something wrong with fuser assembly; replace it Creased paper: a pickup roller is in bad shape; put maintenance kit on it
USB 3.1
Gen 1: 5 Gbps; blue tab Gen 2: 10 Gbps; teal tab
Copy/Move commands for Windows CLI
Go to directory where files are; copy "name" "path where you want to copy to"; Ex: copy fred.txt k: Move command deletes original files after they're copied over To copy all of a certain file type: copy *.jpg k: To copy everything: copy *.* k:
16:10 aspect ratio
Golden Ratio WSXGA was 1440x900 WUXGA was 1920x1200
gpupdate/gpresult
Group Policy: could be a policy of a domain; could require complex passwords; need way to quickly update policies on all machines; group policies overwrite local policies gpupdate queries our domain controller to see if anything has been changed, while gpresult tells us what has been changed Gpudate command; then use gpresult gpresult /R is the smallest output you can generate only use these commands when told to by someone up high; not usually ran manually, and are run by scripts
HDMI (High-Definition Multimedia Interface)
HDMI transfers uncompressed digital data. Typically, it is used for connecting high definition video and audio devices. can do stuff with DRM; can do plug and play Mini-HDMI
Straight-Through Cable
In Ethernet, a cable that connects the wire on pin 1 on one end of the cable to pin 1 on the other end of the cable, pin 2 on one end to pin 2 on the other end, and so on. Pretty standard cable; wired same on both sides; same standard on each end (both sides TIA 568A or TIA 568B)
Subnet Mask
In IPv4 addressing, a 32-bit number that, when combined with a device's IP address, indicates what kind of subnet the device belongs to. Subnet Mask example: 255.255.255.0 255 says to take number from IP Address, 0 means it has to find host
Linux CLI Basics
In Linux, can't open bash shell as administrator; use the command "sudo" and then whatever command you want; Linux equivalent of "dir" is "ls"; marks folders in blue and files in white to clear screen, type "clear" switch example: ls -l (shows more information, like file and folder permissions, owner and group, size, date, time, name) type man and then the command you are interested in to learn more about that command (ex. "man ls")
NTFS Permissions
In Microsoft Windows, NTFS permissions are used to specify and control which users and groups can access certain files and folders and what each user or group can do with them. Permissions for folder: full control, modify, read and execute, list folder contents, read, writes Permissions for file: full control, modify, read and execute, read, write Inheritance: file/folder inside a folder will take on the same permissions as the folder that is put in Allow vs. Deny: can stop inheritance; can deny someone from having the same permissions they had before
Mobile Device Troubleshooting
Inaccurate/non-responsive touchscreen: system overloaded, so restart system; might have too many apps installed; might need to recalibrate screen Dim Display: might need to turn up the brightness; if still dim, might need to replace backlight; most likely need to replace device Cannot display to external monitor: are you on same network?; make sure you are talking to the correct external monitor No sound from speakers: check volume; unpair any bluetooth devices Intermittent/no wireless connectivity: interference; check password on your SSID No Bluetooth connectivity: make sure device is in discoverable mode; make sure someone else isn't already paired Apps not loading/app log errors: need to clear cache; could do force stop or shut down entire phone Slow performance: you're running too many apps Extremely short battery life: you're burning too much battery; GPS can use up a lot of battery life; use power saving tools Overheating: if you place device in area with no ventilation Frozen system: problem with app, can lead to black screen of death System lockout: typed in password wrong too many times; need to factory reset and reinstall
iSCSI (Internet Small Computer System Interface)
Internet Small Computer System Interface. A lower-cost alternative to traditional SANs. It supports sending traditional SCSI commands over an IP network. Used now in server situations.
Domain Name System (DNS)
Internet service that translates domain names into IP addresses. Computer gets the right IP Address from the DNS to connect to a server; data sent from computer to server, and then data sent from server to computer
Dumpster Diving
Involves digging through trash receptacles to find computer manuals, printouts, or password lists that have been thrown away
Mass Storage Troubleshooting: RAID not found or not working
Is RAID controller working? Right drivers? Can you get to system setup? Make sure hard drives are connected properly and have power. Look at RAID arrays like a hard drive.
Regulatory and Compliance Policy
Laws, industry standards, best practices, traditions, common sense
NetBIOS/NetBEUI
Legacy Microsoft protocol; a predecessor to DNS. When a computer booted up, it broadcast its name (Figure 10-2) along with its MAC address. Every other NetBIOS/ NetBEUI system heard the message and stored the information in a cache. Any time a system was missing a NetBIOS name, the broadcasting started all over again. NetBIOS was naming system for Microsoft; only 15 characters NetBEUI did communication and created connections between systems; only lived on MAC Addresses, so only useful on LANs
Wireless Network Card
Like a standard NIC, but without the use of wires, it has a transmitter/receiver for sending signals via radio waves Always going to have WAP and a Network Interface Controller (NIC)
apt-get (linux)
Linux command for installing or updating a program using the advanced packaging tool. Sudo apt-get update; onboard repository is being updated so that it knows the latest version of thousands of applications If you try to get an application called joe, type joe; will give you the options sudo apt install joe and sudo apt install joe-jupp; we use just apt usually To install program: sudo apt-get install joe To upgrade software: sudo apt-get upgrade; will upgrade every piece of software on system; for individual upgrade, use sudo apt-get upgrade joe To delete a program: sudo apt-get remove joe
Navigating Linux CLI
Linux doesn't use drive letters; root directory is just a slash /; we mount all of the volumes as folders; we still use the cd command; linux cares about capitalization; we use a forward slash (/) in the Linux environment; tab will autofill for you when typing a file or folder name Ex. cd Desktop/; cd ~ will always put you back in your home directory Cd / puts you in the root directory "Pwd" shows you what directory you are in
LCD Projector
Liquid crystal display projectors are devices that project light through panels made of silicone colored red, green, and blue. The light passing through these panels displays an image on a surface such as a screen or wall.
What do chipsets define?
Motherboard capabilities: how much RAM, how many video cards, how fast RAM, how many USB ports and speed, how many hard drives
Volt Meter readings
Multimeter V with squiggle = AC Multimeter V with line and three dots = DC
Master File Table (MFT)
NTFS uses this database to store and link to files. It contains information about access rights, date and time stamps, system attributes, and other information about files.
Thermal Printer Maintenance
Need to replace paper a lot; need to clean the heating element because it picks up dandruff over time; need to remove debris, because paper dander can build up
The two early chipsets and their functions:
Northbridge: acted as interface to CPU, doing the fast stuff Southbridge: handles slower stuff, like individual ports Today, CPUs take over all of Northbridge tasks; most chipsets are now single-chip Southbridge
Competitors for GPU
Nvidia, ATI/AMD, Intel
S/PDIF (Sony-Philips Digital Interface) sound port
Optical connector that plugs computer into a receiver system A sound port that connects to an external home theater audio system, providing digital output and the best signal quality.
Blu-Ray Disc (BD)
Optical disc format that stores 25 or 50 GB of data, designed to be the replacement media for DVD. Competed with HD DVD. BD-RE: (Blu-Ray Disc Recordable Erasable)
Android
OS used on some mobile devices Applications bought on Google Play Store; not a big screening process for apps Need Google account for Android phone Backs up everything to Google Drive
Ping command
One of the most commonly used command-line commands. It can check IP connectivity between two network devices. Multiple platforms (for example, routers, switches, and hosts) support the ping command.
Microsoft Management Console (MMC)
One of the primary administrative tools used to manage Windows and many of the network services provided by Windows. customize utilities; list of tools
GUID Partition Table (GPT)
One of two methods used to organize partitions on a hard drive. A GPT partitioning system installed on a hard drive can support 128 partitions and is recommended for drives larger than 2 TB. Compare with Master Boot Record (MBR). designed to take advantage of power of UEFI BIOS GUID = Global Unique Identifier; 128-bit unique value that defines your partitioning system Advantages of GPT: 128 partitions per drive; each partition can be 18.8 million terabytes per partition; backward compatible with MBR GPT uses a protective MBR (LBA 0) but the GPT starts at the Primary GPT Header (LBA 1) and includes a Secondary GPT Header (on a later LBA)
Laser Printer long explanation
One spot charged on the photosensitive drum by the primary corona, which puts uniform negative charge on the photosensitive drum (-400, -600 volt charge); as drum rotates, laser writes image onto the photosensitive drum; developing, toner is at -300V charge, and is repulsed from the other negative charges, repulsed from the areas that isn't exposed; exposed areas at -150V charge; toner yanked out and sticks where we have exposed image; toner now on the photosensitive drum; imaging, paper comes in, separation pads make sure only one paper is taken at a time; transfer corona has static charge of 150V onto paper; toner goes onto the paper and the image is now on the paper; toner gets sealed onto the paper by heat and pressure, which is done by the fuser assembly; antistatic device wipes static charge off the paper
Mini Connector
One type of power connector from a PC power supply unit. Supplies 5 and 12 volts to peripherals. Also known as a floppy connector.
Troubleshooting Core Components
Only plug in basic essentials when doing initial setup. Need some kind of graphics in order to boot up (built-in or not) Errors in System Setup can cause a dead PC; try clearing the CMOS jumper by shorting the two post for about 30 seconds. If loud noise coming from case, a cable might be caught in the fan. If loud noise coming from power supply, capacitor might explode. System Setup can show you if your RAM is there; if RAM is bad, use memory checking program; Windows Recovery Program Start over if you can't figure out what problem you are having and how to fix it. Use fire extinguisher if smoke comes out of the system. Look at what the indicator lights on your motherboard mean when you are having errors.
LAN IP Address
Only three private address schemes available; common one is 192.168.1.x Be careful when setting this up because you may get disconnected from router if you have a static IP Address set up
Performance Monitor
Operating system program that assesses and reports information about various computer resources and devices. uses counters to monitor system; gives idea of what happens to computer over time
Troubleshooting Monitors
Overheat Shutdown: video card overheats; possibly bad fans on video card or video card not getting enough ventilation Dead Pixels: happens on LCD monitors; go back to manufacturer and get new one Artifacts: pieces of stuff show up on screen but don't belong there anymore; look at video RAM to see if it went bad; run another video card to see if the same problem happens Incorrect color patterns: check cable; check video RAM DIM image: something making light isn't making enough light; replace part CCFL Flickering Image: check cable Distorted Image: make sure running at native resolution of monitor; for projectors, adjust geometry Burn In: on old-school plasma monitors, fixed image on screen burns in to the screen; LCDs can get burn-in (but called image persistence) and to fix, put different images on screen Over/undersized images & icons: on Windows; adjust text size
Linux and macOS Permissions:
Owner, group, everyone; each have own set of permissions Both have R W X (Read Write Execute) as options for permissions
Socket Names
PGA (Pin Grid Array) LGA (LAN Grid Array)
Encrypted Email Ports
POP3 encrypted port: 995 IMAP encrypted port: 993 SMTP encrypted port: 465 or 587 Gives Point-to-point encryption (P2PE) of your e-mail
Power-ON Self-Test (POST)
POST tells motherboard to check itself out; goes into internal diagnostics, then boots if everything is okay; a beep lets you know that the POST test has run well; if something is wrong, computer reports to human that there is a problem; POST checks CPU, RAM, video, etc.
VPN Clients:
PPTP, L2TP, IPsec VPN Client in Windows is limited
Booting over a Network
PXE Booting, Apple's NetBoot; allow you to boot from a network server; popular for diskless workstations
Address Bus
Pathway from memory to processing unit that carries the address in memory to and from which data is transferred. Direct connection between CPU and MCC that allows CPU to tell MCC which byte of data it needs
External Data Bus
Provides a channel for the flow of data and commands between the CPU and RAM
Change Management
Process of making sure changes are made smoothly and efficiently and do not negatively affect systems reliability, security, confidentiality, integrity, and availability. (see Change Board for steps in Change Management)
Component Services
Programming tools in Windows for the sharing of data objects between programs.
IPv6 (Internet Protocol version 6)
Protocol in which addresses consist of eight sets of four hexadecimal numbers, each number being a value between 0000 and FFFF, using a colon to separate the numbers. Here's an example: FEDC:BA98:7654:3210:0800:200C:00CF:1234. Uses 128-bit addressing scheme; use a hexadecimal notation IPv6 Example: 2001:0db8:85a3:0000:0000:8a2e:0370:7334 IPv6: Example: 2001:0000:0000:0001:0000:0000:0000:8a2e; shorthand version is 2001:0:0:1:0:0:0:8a2e; makes things easier by dumbing the leading zeroes; in place where we have 3 sets of zeroes in a row, can change to 2001:0:0:1::8a2e Today we have two separate IP Addresses: Link-Local Address starts with fe80:0000:0000:0000:[last half auto generated] Internet Address (global unicast address); brought from router; router determines first half, computer determines second half Link-local addresses are used for local connections. Global unicast addresses are used to connect to the Internet Computers can have temporary IPv6 addresses as a security feature IPv6 has prefix length fixed at /64; prefix used to talk to upstream routers to get our data to the places we need it the quickest
Mass Storage Troubleshooting: Single Drives
Read/Write Failure: all hard drives have a certain life span. S.M.A.R.T. can query a drive a check health of a drive; if bad drive, replace it. Slow Performance: not enough RAM to make system run as fast as it should; red write/read drive going mad Loud Clicking: click of death is terminal; replace drive Failure to Boot: is boot order correct? Drives not recognized: drive might have formatting problem; reformat drive; always need to initialize disk before Windows will recognize it. OS Not Found: usually messed up boot process; boot order might be messed up Attempts to boot incorrect device: boot order is messed up Continuous Reboots: corruption of OS
Troubleshooting at the GUI
Rebooting can fix many troubleshooting issues Safe Mode and Event Viewer; Look at logs in Windows, System, and look for errors; search error on Google to hopefully find an answer/fix applications and low RAM can cause Windows to be slow; can turn off applications that are automatically set to start up and run Corrupted Profile; can get to login screen, but not to a desktop; fix depends on your version of Windows; Windows 10 is automatic; Windows 7 in safe mode, control panel, administrative tools, computer management, local users and groups, then create new user, use robocopy to copy old profile into new profile, with the hopes that the corrupted part won't copy over
MX record
Records within DNS servers that are used by SMTP servers to determine where to send mail. Used by mail servers
Network Topology Diagrams
Refers to the geometric arrangement of the actual physical organization of the computers and other network devices) in a network Logical Diagrams: organizes network IDs, computers and IP addresses, routers, etc. Physical Diagrams: how everything looks; manifests as a floor plan; cable runs, distribution frame; real-world idea of how it is all organized
eSATA (External SATA)
Serial ATA-based connector for external hard drives and optical drives. Not used as much.
Best Practices for Passwords:
Set strong passwords: use upper and lowercase, numbers, extra characters (!, #, etc.); long passwords Password Expiration: make passwords that expire after 30 or 60 days Screensaver: forces people to reenter password Lockscreen Required Password BIOS/UEFI passwords Require passwords everywhere Multifactor authentication
Sag
Short Term Voltage Dip; same as brownout
Bash shell
The default shell used by the terminal for many distributions of Linux.
Device Driver
Software that facilitates the communication between a device and the operating system. While usually automatic, sometimes you need to manually download the correct driver for a USB device.
Software as a Service (SaaS)
Software that is owned, delivered, and managed remotely and delivered over the Internet to contracted customers on a pay-for-use basis or as a subscription based on use metrics. Examples: google docs, google maps
Hypervisor
Software that runs on a physical computer and manages one or more virtual machine operating systems. Host that runs virtual machines
Type 2 Hypervisor
Software to manage virtual machines that is installed as an application in an operating system. hardware has OS already installed; then install hypervisor, then run virtual machines on hypervisor Example: Oracle VM Virtualbox
Type 1 Hypervisor
Software to manage virtual machines that is installed before any operating system is installed. hypervisor installed on hardware; then virtual machines run on top of hypervisor; runs as an OS Type 1 Hypervisors: VMware ESXi, Microsoft Hyper-V, KVM
Universal Serial Bus (USB)
Standard for computer ports that support data transfer rates of up to 12 million bits per second.
Structured Cabling
Standards defined by the Telecommunications Industry Association/Electronic Industries Alliance (TIA/EIA) that define methods of organizing the cables in a network for ease of repair and replacement.
Advanced Configuration and Power Interface (ACPI)
Standards used by system BIOS and other components that define power states for the system and processor used to conserve power when the system is not in full use.
Troubleshooting Theory
Step 1: Identify the Problem Step 2: Establish a theory of probable cause Step 3: Test the theory to determine cause Step 4: Establish a plan of action to resolve the problem and implement the solution Step 5: Verify full system functionality and, if applicable, implement preventative measures Step 6: Document findings, actions, and outcomes
Interpreted Language
Takes the most recently entered instruction, translates it into machine language, and executes it; Visual Basic, Python, JavaScript
Symmetric DSL (SDSL)
Supports same data rates for upstream and downstream transfers upload and download speeds were the same
MBR Partitioning
Supports up to 4 primary partitions; partitions can be no bigger than 2.2TB; can have primary or extended partitions but only primary are bootable (can boot an OS); can have 4 primary with a different OS each; active partition loads by default MBR = Master Boot Record Oldest type of partitioning MBR tells computer where to find operating system MBR broken up into 5 pieces: boot loader, partition tables (up to 4 different partitions, with idea being ou can load up to 4 different operating systems); boot loader has to be preassigned active partition in ordder to determine which operating system to boot MBR consisted of a boot loader and up to four partitions with one set as an active partition If you need more than four partitions on a single drive, you create an extended partition and and add logical drives to that partition
Bash Shell
The Bourne Again Shell; it is the default command-line interface in Linux.
IP Packet
The IP portion of a TCP/IP frame that acts as an envelope for data, holding information necessary for routers to transfer data between subnets.
Internet Protocol Version 4 (IPv4)
The Internet Protocol standard released in the 1980s and still commonly used on modern networks. It specifies 32-bit addresses composed of four octets.
Internet Tiers
The Internet is millions and millions of computers all joined together to form the largest network earth. To keep everything organized, the Internet is broken down into groups called tiers. The main tier, called Tier 1, consists of a small number of companies called Tier 1 providers. The Tier 1 providers own long-distance, high-speed fiber-optic networks called backbones. These backbones span the major cities of the earth (not all Tier backbones go to all cities) and interconnect at special locations called network access points (NAPs). Anyone wishing to connect to any of the Tier 1 providers must pay money. The Tier 1 providers do not charge each other to connect. Tier 2 providers own smaller, regional networks and must pay the Tier 1 providers. Most of the famous companies that provide Internet access to the general public are Tier 2 providers. Tier 3 providers are even more regional and connect to Tier 2 providers. The piece of equipment that makes this tiered Internet concept work is called a backbone router. Backbone routers connect to more than one other backbone router, creating a big, interwoven framework for communication.
Spinning Pinwheel of Death (SPoD)
The Mac equivalent of a BSoD. Disconnect any external hardware, restart the system, and see if the behavior repeats itself. If it does, perform all system updates available and run an antimalware scan.
Virtual Machine
The apparent machine that the operating system presents to the user, achieved by hiding the complexities of the hardware behind layers of operating system software. a self-contained computer running within a host operating system
System Image
The backup of the entire Windows 7 volume and can also include backups of other volumes. The backup is made using the Windows 7 Backup and Restore utility. A snapshot of the current state of the computer that contains all settings and data. image-level backup; a copy of the drives required for Windows to run
Lumens
The brightness of projector devices is rated in these units
ps command (Linux)
The command used to obtain information about processes currently running on the system. Ps aux lets you see all of the processes and gives a lot of details and info Ps aux | (weird line called a pipe); funnels output to whatever you type in after the pipe; example: ps aux | grep "libre" (libre spot is whatever string you're looking for; looks for all text in the quotation marks); essentially, grep will look for any processes that have libre in it
Fully Qualified Domain Name (FQDN)
The complete domain name of an Internet computer, such as www.CIWcertified.com. Must be unique; limited to 256 characters
Kernel
The core of an operating system that manages memory and devices, maintains the internal clock, runs programs, and assigns the resources, such as devices, programs, apps, data, and information. core part of operating system that handles primary memroy management
Advanced Technology Attachment (ATA)
The former name of the Parallel AT Attachment (PATA) interface standard. Hard drive spoke this language
Internet of Things (IoT)
The idea that objects are becoming connected to the Internet so they can interact with other devices, applications, or services. Gives internet capability to many things like thermostats, lightbulbs, door locks, etc. 3 Types of Technologies Used: 802.11 Zigbee (runs on 2.4 GHz band) Z-Wave (runs in 900 MHz band) Need a hub for Internet of Things (IoT)
File Explorer
The main tool for finding, viewing, and managing the contents of your computer by showing the location and contents of every drive, folder, and file; called Windows Explorer prior to Windows 8. Navigation Pane; on left side, shows folders and drives Preview pane: clicking on something, gives a preview of it Details pane: gives quick info about a particular file Quick Access: desktop, downloads, documents, some others; can add and remove folders from quick access This PC: can right click to see system information; shows desktop, documents, drives Cloud Services: OneDrive, others Network: see shared folders General Options: can customize file explorer; single vs double click, privacy View Options: can show hidden folders, files drives; can hide extensions, hide protected operating system files, many others
Audit Policy
The settings that define which operating system events are audited; accessed through Local Security Policy can help add things to monitor in Event Viewer; change certain thing to be audited
Console Port
The type of port on a router used to communicate with the router itself, such as when making programming changes to the device. A serial port using RS-232 language to act as a connection; terminal program can allow us to talk to the router
Right-Click
The use of the right mouse button to access special features of an application view context menu; can select properties
Service Set Identifier (SSID)
The user-supplied network name of a WLAN; it can generally be alphanumeric from 2 to 32 characters. name of the wireless network
Network Address Translation (NAT)
Translates the private IP address to a public address for routing over the Internet NAT takes all of the addresses from inside your network or LAN and gives them a private IP Address; gateway router removes private IP Address and inserts own WAN Address, which is a public IP Address When receiving data back, uses the private IP Address again; don't have to give away public IP Addresses for end users; everything inside the LAN is invisible to the internet Networks that use NAT are invisible to the public Internet
TCP/IP
Transmission Control Protocol/Internet Protocol. Protocol that connects computers to the Internet. Tells computers how to exchange information over the Internet. Adopted as protocol for ARPANET/the Internet
Broadband Speeds
Upload Speeds: 768 kbps to 3 mbps Download Speeds: 1.5 mbps to 7+ mbps
mac OS features:
Upper left corner, apple menu; changes depending on active application Dock on bottom: shows programs that are used the most; is customizable Some apps won't close even if you X out of them; black dot will still be under program if it is still running; use command Q to quit out of program Finder; shows folder contents; applications, documents, desktop, recent, etc System Preferences is similar to Settings or Control Panel instead of command prompt, we have Terminal in macOS
Troubleshooting Power Supplies: How to test power supply
Use power supply tester; test individual connections Use paperclip to see if power supply does supply power Use motherboard to test voltage; plug in; use volt meter
Security Policies
Use the application Local Security Policy Account Policies: password policy (max password age, minimum password length, password complexity requirements, enforce password history, store passwords using reversible encryption), account lockout policy (account lockout threshold, account lockout duration, reset account lockout counter after) Local Policies: User Rights Assignment (allow log on locally); Security Options (rename administrator account) For a computer that is a member of a domain, you can't change these settings; domain policies; domain administrator policies override local policies
Tailgating
When an unauthorized individual enters a restricted-access building by following an authorized user.
net use
a TCP/IP command that connects or disconnects a computer from a shared resource or can display information about connections. ex: net use v: \\mikewin10pc\mike net use (drive letter) (UNC address) use what you want to share
net user
a TCP/IP command used to manage user accounts. Net user (name) (password) /add; adds a user Net user (name) /delete; deletes a user
Printer Broadcasting Applications
Zeroconf (Zero Configuration) - Windows Bonjour - MAC Bonjour goes on wired network and does broadcasting for printer On wireless, AirPrint on Mac handles wireless printing
SATA Power Connector
a 15-pin flat power connector that provides power to SaTa drives; primarily for hard drives and optical media
MAC Clone
for cable modem; if you use a modem nor from the cable company, you can clone the MAC Address from the company cable modem and use it on your own modem
Liquid Cooling System
chunk of metal has coolant running through veins; two hoses; one hose pulls way hot fluid into a fan to cool it; other hose returns cool fluid and brings it back into meal; radiator behind fans; hot fluid goes to veins of radiator and fans are cooling it off; uses a pump, a radiator, and a cooling block with liquid to remove heat; quiet and and can yank out a lot of heat, more than any fan can
Functions
chunks of code that are run over and over again
Microarchitecture
circuit diagram on inside of CPU; single microarchitecture can create a broad cross section of different models
Laser Printer Maintenance
cleaning, can use anti-static vacuum Maintenance Kits have pickup rollers, transfer roller Can have laser printers do Maintenance Mode and print out statistics Laser printers may need to be calibrated; they have built in calibration features
icacls
command that can be used to take full access of a file
Duplex
communication system that allows simultaneous two-way communications by using two frequencies for each channel.
Unified Threat Management (UTM)
comprehensive security management tool that combines multiple security tools, including firewalls, virtual private networks, intrusion detection systems, and web content filtering and anti-spam software puts everything into one box/service/system; combines firewall for network, intrusion protection, anti-malware; can get cloud-based UTM
Dongles
connectors with cables that plug into the motherboard
TCP Segment or UDP Datagram
consists of Destination Port - Source Port - Data
A Record
contains the IPv4 address for a target host A Record is www or IP Address
Human Interface Devices (HID)
core device drivers that ensure mice and keyboards work
Virtualization with NAT
creating a virtual router; creates own network ID (10.0.0.x) and treats host computer as internet service provider; only allows one computer to connect to virtualized network ID
Social Engineering
hackers use their social skills to trick people into revealing access credentials or other valuable information Social Engineering attacks include telephone scams, tailgating, shoulder surfing, and dumpster diving Phishing and spear phishing attacks seek personal or financial information with targeted scams
USB Type-C
handles high speeds; can plug in both ways
Double-Sided RAM
has chips on both sides; not all motherboards support this
Single-Sided RAM
has chips on only one side
Windows Defender Firewall
has options for three different types of Firewalls: Domain networks, Private networks, and Guest or Public Networks Firewall features change depending on what type of network you are connected to; can customize these settings
Bash Script
have extension .sh
Wireless Printers
have network cards and are subject to same 802.11 rules Can set up for direct printing; can set up for ad hoc; bluetooth capable printers; WPS (pressing button on printer and pressing button on router)
Dual-Channel Memory
have to put two RAM sticks of same size and speed into these slots
ACPI Level 4
hibernation mode; everything on RAM is copied to file on hard drive, and then RAM is shut off
Barcode/QR Code Scanners
little printed black and white symbols that store numeric or alphanumeric information
Coaxial Cable
insulated copper wire; used to carry high-speed data traffic and television signals Uses RG Ratings
Brownout
intentional or unitentional drop in voltage; same as sag
Plenum Rating
is save for installation between a dropped ceiling and structural ceiling where air circulation takes place -made from a special; plastic which retards fire and produces less smoke than other cables Ability to resist fire; Plenum is resistant to fire PVC (non-plenum) is most burnable
Personal/Pre-Shared Key (PSK)
key needed by access points and wireless hosts for authentication
Certificate
keys that allow us to encrypt a connection that are signed by a third party have a key, date they were issued, serial number, name of website they're connecting to Possible Problems: expired; revoked certificate; self-signed
ITX Form Factor
larger version of mini-ITX; not common
Windows Version 7
last version of Windows that had Media Center; classic taskbar; dominant form of Windows until 2018-2019 when Windows 10 came along; had Control Panel
Beep Codes
let you know what is having a problem; primitive; depending on the types of beeps determine what the problem is
Users
lists all of the different users on the computer
Mark Russinovich
made the website Sysinternals
Sectors
magnetic disk storage device units
System Setup
makes changes to the changeable parts of our BIOS; access by holding down a key at startup Enables changes to CPU frequencies, RAM timings, BIOS passwords, boot options, and more
Isolation (for routers)
makes it co that computers can only tallk to the WAP; can't share with other computers on the network
For Statement
statement that directs program flow through a group of statements a fixed number of times a conditional loop;; as long as variable is doing something, then keep doing this
Power Supply
step-down transformer that converts AC power to DC power
RAID 0+1
striped sets in a mirrored set ( minimum four disks; even number of disks) provides fault tolerance and improved performance but increases complexity. The key difference from RAID 1+0 is that RAID 0+1 creates a second striped set to mirror a primary striped set. The array continues to operate with one or more drives failed in the same mirror set, but if drives fail on both sides of the mirror the data on the RAID system is lost. Mirroring some stripes; minimum of two pairs; 2 striped pairs Striped across first pair, mirrored over to second pair; can lose one complete pair and be okay; if we lose one on each side, we wouldn't be able to rebuild the mirror
Unified Extensible Firmware Interface (UEFI)
supplanted original BIOS, but is still called BIOS, UEFI BIOS is a common term
SDRAM
synchronized to the crystal; 168 pins, two notches; runs at motherboard speed
tasklist/taskkill
tasklist lists all of the processes running on your system taskkill allows us to shutdown any of these processes taskkill /"PID or name" Ex: taskkill /PID ####
Digital Rights Management (DRM)
technologies that let copyright owners control the level of access or use allowed for a copyrighted work, such as limiting the number of times a song can be copied
4:3 Aspect Ratio
the aspect ratio of a television that is 4 units wide by 3 units high VGA was 640x480 SVGA was 800x600 SXGA was 1280x1024 UXGA was 1600x1200
Partitioning
the building blocks for a hard drive A partition is a logical electronic device readable by an operating system Partitions define the location of operating systems, swap files, and recovery partitions
Fragmentation
the condition of a file that is broken up and stored in many different locations on a magnetic disk downside is it has to go all over the hard drive to retrieve broken up file when deleting file, still stays on drive, but first letter of file changed to lowercase sigma symbol (o'); symbolizes that those blocks can be written over; when making new file, overwrites the blocks, but file gets split apart over bllocks (as in a different file can exist in between the blocks of another file)
Swap File
the disk space that is set aside for virtual memory
Throw
the further out you have the projector, the larger the screen; the closer the projector; the smaller the screen Minimum and Maximum throw
HTTP (Hypertext Transfer Protocol)
the protocol used for transmitting web pages over the Internet Port 80 HTTP is insecure
Pixel (Picture Element)
the smallest component of a two-dimensional digital image 3 individual pieces that emit red, green, and blue light (RGB)
Multifactor Authentication
the use of two or more types of authentication credentials in conjunction to achieve a greater level of security
Standout
things that we place the motherboard on; form factors allow the motherboards to fit any of these standouts
Format
this process queries each LBA block if it can read/write data; will identify bad blacks, replaces 0000s on the right with a hexadecimal value signalling bad block (video used 0000FFF7)
Collate
to arrange into the proper order, especially documents has a bunch of trays and it prints out in order multiple times
RAID 1 (Mirroring)
• File blocks are duplicated between physical drives • High disk space utilization • High redundancy • Minimum of 2 drives (can use 4 drives) 1 copy on first drive, then second; then another piece of file on first, then second. Provides redundancy and can secure data better, but it is slower
RAID 0 (Striping)
• File blocks are split between physical drives • High performance • No redundancy • Minimum of 2 drives Gives us speed. Downside is if any drives die, you lose the data