TESTOUT PC PRO v5.0.2 PART TWO

¡Supera tus tareas y exámenes ahora con Quizwiz!

Cable lengths are limited in distance

Cable lengths can extend a great distance

Cable networking requires the installation of a cable TV line to your location if one does not exist.

o

Microsoft Mobiles formerly Nokia are the leading Windows Phone providers.

Photo-quality inkjet printers mix up to 16 drops of ink to form a single dot of color on the page.

Logical Topology

Physical Topology Description

Pictures

o

Pin 1: Bi+

Print a test page

Print drivers

Print drivers allow you to utilize the following configuration settings:

Print quality

Print quality is often measured in dots per inch (DPI). The higher the DPI, the higher quality the image.

Service manuals

Several DSL standards exist, including ADSL, SDSL, and HDSL (collectively referred to as xDSL).

Share peripheral devices like printers

Share the printer

o

Simple design

Can support between 8 and 9.4 zettabytes depending on the sector size

Dial-up connections are available anywhere a telephone line exists.

o

192.168.0.0 to 192.168.255.255

A cable modem (router) connects the computer to the cable network for sending networking signals.

2.0

3 Mbps 2 10 m

Category

Connector Speed Frequency Description

-n Displays NetBIOS names that have been registered on the local system.

If numbers type instead of letters (such as 1 for J, 2 for K, etc.), make sure that the Num Lock is turned off.

40% longer lifetime than Nickel Cadmium

-R Clears and then reloads the remote cache name table.

-a Looks up the hostname from a given IP address.

-c Displays the NetBIOS cache of remote machine names and their IP addresses.

-l [size] Specifies the packet payload size (in bytes) to use in the test. This can help identify if packets above a certain size are being lost.

-r Displays names resolved by broadcast and via WINS.

-s Displays current NETBIOS sessions by NETBIOS names.

-t Performs a continuous ping test (press Ctrl + C to stop sending the ping tests).

o

/fixboot: Repairs the boot sector

o

/fixmbr: Repairs the master boot record

o

/rebuildbcd: Rebuilds the boot configuration data

1.2

1 Mbps 1 100 m

Simple Network Management Protocol (SNMP)

161,

Cat 6

10 Gbps 250 MHz 10 Gbps speeds are limited to cable lengths less than 55 meters.

Partition size

2 terabytes* 256 terabytes

Volume size

2 terabytes* 256 terabytes

o

2.5G was an evolution that supported speeds up to 144 Kbps.

Hypertext Transfer Protocol over Secure Socket Layer or HTTP over SSL (HTTPS)

443 HTTPS is a secure form of HTTP that uses SSL as a sublayer for security. SSL secures messages being transmitted on the Internet. It uses RSA for authentication and encryption. Web browsers use SSL (Secure Sockets Layer) to ensure safe Web transactions. URLs that begin with https:// trigger your Web browser to use SSL.

Hypertext Transfer Protocol (HTTP)

80 HTTP is used by web browsers and web servers to exchange files (such as web pages) through the World Wide Web and intranets. HTTP can be described as an information requesting and responding protocol. It is typically used to request and send Web documents, but is also used as the protocol for communication between agents using different IP protocols.

802.11a/b/g wireless standards use radio waves and are used to create wireless networks between multiple devices.

A 128-bit proprietary encryption mechanism is used to encrypt signals.

A PKI for issuing certificates. At a minimum, the RADIUS server must have a server certificate. To support mutual authentication, each client must also have a certificate

Virtual assistant

A Virtual Assistant is a program that understands your conversation, replies to you, and carries out many daily tasks for you like sending mail, making a search, opening apps, reporting the news and weather, and more. You can initiate these tasks using your voice. Some examples of a virtual assistant include AIVIC, Skyvi, and iris.

Credit card readers

A credit card reader allows you to accept credit and debit cards payments through your smartphone or tablet.

A cross-linked file occurs when two files claim the same cluster. Check Disk will identify cross-linked files and correct their cluster associations.

A device called a terminator is placed at both ends of the trunk cable.

Dial-up

A dial-up connection uses a modem connected to the phone line to connect to the Internet.

A digitizer pad is used in laptop and PDA systems to receive input. Input is written onto the pad with a stylus pen and then those motions are transferred into data that is processed by the system.

File

A file is a one-dimensional stream of bits treated as a logical unit. They are the most basic component that a file system uses to organize raw bits of data on the storage device itself. The file name is made up of the directory path plus the file name. An extension can also be added to the filename to identify the file type and the program used to create, view, and modify the file.

Gyroscope

A gyroscope measures the vertical and horizontal orientation of the device. This essentially creates a user input mechanism. The tablet can detect changes in vertical and horizontal acceleration and respond programmatically. For example, changes in vertical and horizontal acceleration detected by the gyroscope can be used as input for a gaming app.

Hotspot

A hotspot is a physical location where you can obtain wireless Internet access using a wireless local area network (WLAN) with a router connected to an Internet service provider.

3.

A local spooler sends the file (print job) to the print driver.

A malfunctioning node or cable break can prevent signals from reaching nodes further along on the ring.

Mesh

A mesh topology exists when there are multiple paths between any two nodes on a network. Mesh topologies are created using point-to-point connections. This increases the network's fault tolerance because alternate paths can be used when one path fails. Two variations of mesh topologies exist:

A netbook is a notebook computer with a smaller form factor (10-11 inch screen or smaller) and custom hardware designed to maximize battery life (from 6-11 hours on a single charge). Originally, netbooks used a special operating system that often did not support all of the features of a normal desktop operating system. Increasingly, netbooks can run a regular version of the operating system, although the reduced hardware might still limit their usefulness to email, word processing, and multimedia. Netbooks typically do not have integrated CD/DVD drives.

A patch panel is a device that is commonly used to connect individual stranded wires into female RJ45 connectors. For example, you might connect 4 pairs of wires from a punchdown block to a port on the patch panel. On the patch panel, you then connect drop cables (cables with RJ45 connectors) to the patch panel on one end and a computer on the other end.

o

A set with 3 disks has 33% overhead.

o

A set with 4 disks has 25% overhead.

o

A set with 5 disks has 20% overhead.

Allocate space to an existing storage space.

A single Internet connection is shared among all hosts

A single connector with one end holds both cables

A single connector with two ends keeps the two cables in place

o

A spanned volume uses disk space on a different disk.

Star

A star topology uses a hub or switch to connect all network connections to a single physical location. Today it is the most popular type of topology for a LAN. With a star:

RAID 0 (striping)

A stripe set breaks data into units and stores the units across a series of disks by reading and writing to all disks simultaneously. Striping:

Switch

A switch provides a central connection for multiple media segments on the same subnet. A switch receives a signal on one port and forwards that signal only to the port where the destination device is connected.

A switch should be used instead of a hub in all situations.

A transceiver built into the network adapter formats the binary data for transmission on the network medium.

Printer

A virtual device (logical software entity) inside the print server that can be configured to send output to a printing device. The printer is made up of the print driver, the printing device, and the spooler.

Dynamic disks support up to 128 volumes.

Volume

A volume is a single accessible storage area within a file system. A volume can encompass a single partition or span across multiple partitions depending on how it is configured and what operating system you are using. Volumes are identified by drive letters.

A wireless NIC for sending and receiving signals.

ACPI is also known as Instant Available and Always On. Is often mistakenly referred to as APM (an older standard).

ACPI supports Plug and Play.

Access to data on tape is typically slower than reading or writing to other storage types, making them not well suited for instant, interactive access.

Active sessions, ports, and sockets

Connection Method

Ad hoc An ad hoc network works in peer-to-peer mode. The wireless NICs in each host communicate directly with one another. An ad hoc network is difficult to maintain for a large number of hosts because connections must be created between every other host, and special configurations are required to reach wired networks. You will typically only use an ad hoc network to create a direct, temporary connection between two hosts.

Configure encryption and authentication

Add authentication to allow only authorized devices to connect and use encryption to protect wireless communications from eavesdropping.

Add drivers for network users

Additional paper sizes

Additional wired connections can be provided by connecting additional switches to the router.

7.

After the drivers are loaded, select the partition that represents the RAID array. The installation process will format the partition and install the operating system.

Airplane mode

Airplane mode is a setting available on many smartphones, portable computers, and other electronic devices that suspends the device's radio-frequency signal transmitting functions, which disables telephone, Wi-Fi, and Bluetooth when activated.

All APs and all clients use the same authentication key.

Allow management of the print job by displaying print and printer properties in the operating system

Allows greater cable distances without a repeater • Very expensive

Also called a push in and twist connector

Internet appliance

An Internet appliance is a specialized device that performs a specific network role. The following are some common Internet appliances:

Although some network cards allow you to change the MAC address (or specify one of your own choice), this is rarely done in practice.

Although they are built to withstand portability, protect portable devices in properly-padded cases or include proper packaging materials when shipping.

Accelerometer

An accelerometer is also called a g-sensor. It detects the physical movements of the tablet by measuring its linear acceleration in one dimension. The user interface can be automatically rotated to portrait or landscape mode, depending on the orientation of the unit.

240.0.0.0 to 255.255.255.255

E N/A N/A

Emergency notification

An emergency notification system is a method of facilitating the one-way broadcast of messages to one or many groups of people, alerting them to a pending or existing emergency.

Extreme high or low temperatures shorten the battery life.

o

If mac address filtering is being used, ensure the device has been properly configured on the access point.

4.

If necessary, configure additional drivers to support client computers.

Archive a document and print it later

Bus

Bus Messages are sent to all devices connected to the bus.

Application Server - Provides access to a shared network application (e.g., a database server that contains customer information).

Because power is not supplied through the SATA data cable, eSATA devices require an external power connector or power source.

Apps

Applications must be written to run on mobile devices based on the operating system and system architecture. App distribution is provided online by platform:

As part of the assembly process, it is necessary to polish the exposed fiber tip

Automatic collation or stapling

128.0.0.0 to 191.255.255.255

B 255.255.0.0 /16

Because the devices are built to be carried around, they also must withstand more wear and tear.

Because transmission speeds decrease with distance, you can either achieve the maximum distance or the maximum speed, but not both.

Before servicing a portable device, unplug it and remove any batteries.

Bookmarks

3.

Boot the computer. After the system BIOS/UEFI loads, the RAID BIOS will load. Press the key combination displayed to enter the RAID configuration utility (commonly Ctrl + F).

Bubble jet printers print by heating the ink and squirting it through tiny nozzles in the print head and onto the paper.

o

But not FEC2::78CA::23AB

By using adaptive frequency hopping (AFH), Bluetooth is able to automatically detect other devices in the area and avoid the frequencies used by those devices. It can switch between 79 channels to avoid interference.

Can use dynamic keys or pre-shared keys

Cannot be overcharged

Card readers: Many laptops include a built-in card reader to read flash memory cards.

Cat 5/5e/6/6a cables come with wires that have solid cores or stranded cores. Use solid core cables for longer runs inside walls or the ceiling; use stranded wires for drop cables where flexibility and frequent movement occurs.

Cat 5e (1000BASE-T) and above (Bi indicates the pin is used for both transmitting and receiving):

Change the default administrator username and password. Default usernames and passwords are easily guessed or discovered by checking the device documentation. By changing the password, you protect the system from unauthorized access.

Battery

Characteristics

o

Check the status lights on the back of the NIC to verify the physical status. There should be a link light that is green. An unlit link light or one that is another color (like red or yellow) indicates a physical connectivity problem.

Address Range

Class Default Subnet Mask CIDR

Type

Classification Description

Clean the display with lint-free cloth and isopropyl alcohol. Spray the cleaner on the cloth, not directly on the screen to avoid getting cleaner on other components.

Collate organizes and orders a document into separate sets.

Color printing

Color thermal paper is chemically treated to absorb color from a ribbon where heated.

Common applications for Bluetooth include the following:

Computers (often called nodes or hosts)

Crossover

Computers can connect directly to one another using a crossover cable. The easiest way to create a crossover cable is to arrange the wires in the first connector using the T568A standard and arrange the wires in the second connector using the T568B standard.

Configure a time range during which the printer will be available

Configure content filtering and parental controls. Most SOHO routers provide content filtering and parental controls that prevent hosts from accessing specific websites or using a specific Internet service, such as chat, torrent, or gaming applications.

Device

Considerations

Consolidate (centralize) data storage

o

Contactless payment (e.g., using a smartphone as a payment method)

Contacts

Content filter

o

Create, join, or leave a homegroup.

o

Creates a narrow, focused signal in a particular direction, which increases the signal strength and transmission distance

Current connections

o

Customization options are limited to changing colors and resizing the tiles.

o

Customization possibilities are endless, Android can even be made to look like Windows or iOS.

DNS Server - Uses the domain name service to map IP addresses to domain names.

Data in memory is saved to a file on the hard disk

Data is not striped between disks, but rather just saved to one or more disks (depending on how the operating system decides to save each file). On a new JBOD configuration, data is typically saved to the first disk until it is full, then additional data is saved to the second disk and so on.

Data must be read from tape sequentially. The tape must be cued to the exact location on tape when data must be retrieved.

Data transfer rates include 28.8 Kbps, 33.3 Kbps, and 56 Kbps.

Data transmissions can be secured by using encryption algorithms.

Protocol

Default Port(s) Description

Term

Definition

Deleting installation log files

Deleting offline files

Depending on the type of DSL used, you can use the same line for simultaneous voice and data.

Technology

Details

o

Detect causes of wireless interference.

Issue

Device Type Resolution

Devices are the hard disks or other types of storage from which storage pools are created. You can use a variety of devices such as SATA drives and external drives to create storage pools.

Devices can connect to a cellular Internet connection in a variety of ways:

Devices connected through hubs or switches are on the same subnet. Routers are used to connect multiple subnets.

Dial-up connections use the public switched telephone network (PSTN). Phone lines are sometimes referred to as POTS (plain old telephone service).

Difficult to expand (not scalable)

Difficult to support

Directional antenna

o

Disperses the RF wave in an equal 360-degree pattern

Do not attempt to print on paper with photocopied or laser printed images already on it. The images can come off onto parts of the laser printer and smear your print jobs.

Do not leave portable devices in cars where the temperature can reach extremes or where direct sunlight can be magnified.

Dot matrix printers can be loud because printing takes place by pins physically striking the ink ribbon, paper, and the platen (a metal plate behind the paper).

Double-click the printer to open the print queue.

o

EDGE (also called 2.75G) networks are an intermediary between 2G and 3G networks. EDGE is the first cellular technology to be truly Internet compatible, with speeds between 400 and 1,000 Kbps.

Install the printer drivers

Each network host that wants to use the printer must have the corresponding printer driver installed. When you share a printer in Windows, the current printer driver is automatically delivered to clients that connect to the shared printer. If the client computers run a different version of Windows, you can add the necessary printer drivers to the printer object.

o

Each physical disk can have up to four primary partitions or three primary partitions and one extended partition.

Each power scheme controls power down settings for the monitor, hard drives, and the entire system, and has settings for when running on AC power or on battery power.

o

Each resource is displayed by username and computer name.

Email

Employs a workgroup networking model (i.e., there are no dedicated servers and a domain is not used)

Emptying the Recycle Bin

Enable the Universal Plug and Play (UPnP) networking protocol. UPnP is a networking protocol that allows UPnP enabled devices to easily discover each other on the network and share data and media content.

Encryption to hide the contents of a file

5.

Ensure that the customer or user knows how to use the printer and any additional features.

Ensure that there is paper in the feed tray and that the tray, feed, and rollers are all in their correct positions. Verify that the correct paper tray was selected when sending the print job.

Ethernet devices are identified using the MAC address, which is burned into the network interface card.

Ethernet network adapters that are connected to a switch will operate in full-duplex mode. This allows the adapter to send and receive at the same time.

Distance

Ethernet standards define the maximum distance for cable lengths between two devices:

Ethernet standards support a maximum of 1024 hosts on a single subnet.

Even though different cable categories may look physically similar, they are electrically different. Higher cable categories use different wire gauges and have more wire twists per inch than lower cable categories, which allows for much faster transmission speeds.

o

Excellent print quality

Exchange

o

Existing basic volumes and logical drives in the extended partition are converted to dynamic volumes.

Expensive server operating systems

ExpressCard card slots. You can add ExpressCard/34 and ExpressCard/54 cards by sliding them into the slot to add functionality.

Extensive advanced planning required

Property

FAT32 NTFS

o

Files can be accessed after the storage space is brought back online manually, but you must add more physical disk space to the pool and add it to the storage space in order to use the storage space.

Filters are used to separate the analog voice data from digital data.

Flickering Screen - A flickering screen can be caused by a faulty backlight or inverter. Replacement parts can be purchased from your laptop's manufacturer.

Flip cases and wallets

For laser printers:

Four pairs of copper wires carry the data signals (one wire in the pair carries a positive signal, the other carries a negative signal). Wires are twisted into pairs to reduce the effects of electromagnetic interference and crosstalk.

Full Mesh—Every node has a point-to-point connection with every other node.

Icon

Function

Less susceptible to electromagnetic Interference (EMI)

Fuser wires

Global Positioning System (GPS)

GPS is a space-based navigation system that provides location and time information in all weather conditions, anywhere on or near the Earth where there is an unobstructed line of sight to four or more GPS satellites. Mobile devices use GPS chips in order to calculate the device's location information. This is helpful for things like navigation applications and device location services.

Geotracking

Geotracking is the ability to identify a person's current, physical location by obtaining GPS data from their smartphones or other GPS-enabled devices.

Google/Inbox

Greater charge capacity than Nickel Cadmium

Drive noise

HDD Excessive or unusual drive noise is almost always indicative of a failing hard disk. For example, a clicking noise coming from the drive usually indicates one or more failing heads.

Slow performance

HDD Several things can help increase the performance of a slow HDD:

o

Hard disk drives (HDD)

Hardware

Hardware RAID uses a special controller card that includes a RAID processor. Hardware RAID is the most expensive method but provides much better performance and is more reliable than other methods.

Printer Command Language (PCL)

Hewlett-Packard has created several versions of a printer command language called PCL. Many modern printers understand PCL.

Highly resistant to eavesdropping

o

Homegroup (Read) shares the file or folder with the entire homegroup and assigns read-only privileges.

o

Homegroup (Read/Write) shares the file or folder with the entire homegroup and assigns read-write privileges.

IMEI vs. IMSI

IMEI stands for International Mobile Equipment Identity and is a unique number given to every single mobile phone, typically found behind the battery. IMEI numbers of cellular phones connected to a GSM network are stored in the Equipment Identity Register database containing all valid mobile phone equipment. When a phone is reported stolen or is not type approved, the number is marked invalid.

o

ISDN BRI divides the regular telephone line into three channels:

1.

Identify the network connection as a Home location.

If a DHCP server cannot be contacted, the host uses APIPA to assign itself an IP address.

o

If successful, the problem is with the workstation or the connection to the printer.

If you can ping the device by the IP address but not the host name, then the problem is likely with the DNS configuration.

Video

If your laptop has no display at all,

In general, place access points higher up to avoid interference problems caused by going through building foundations.

In general, placing APs higher up prevents interference problems caused by going through building foundations.

o

In most cases, individual interface IDs are not assigned by ISPs, but are rather generated automatically or managed by site administrators.

In order to communicate, devices must be within 2 inches of each other.

Include a protective MBR. The protective MBR sees the GPT drive as a single partition that extends across the entire drive. So if you try to manage a GPT disk with an old tool that can only read MBRs, it will see the GPT disk as a single partition that extends across the entire drive. The protective MBR makes sure that the old tools don't mistake the GPT drive for a non-partitioned drive and overwrite all your data.

(Infrared)

Infrared uses invisible light waves for communication. Infrared:

Ink is applied using the ribbon in a similar manner to a solid ink printer.

Inkjet printers are an inexpensive way to produce color printouts.

Install a network interface card in the printer.

Atmospheric and EMI conditions

Interference from weather or EMI can degrade the signal and cause service interruptions.

Is 1.2 millimeters thick

It is sometimes necessary or useful for the swap file to be stored on its own partition.

o

Its own IP address. In this case, the router acts as a DNS proxy and forwards all DNS requests to the DNS server at the ISP.

JBOD uses the entire space available on all disks for data storage (no overhead).

o

Keep all air vents clear and unobstructed. Vents are typically located on the back of the unit.

Keep devices away from food and drink. Liquid spills are especially damaging to a portable device. Liquid can easily run beneath the keyboard and onto internal components (e.g., CPU, memory, etc.).

Keep the disc away from direct sunlight and other sources of heat.

Keyed, bayonet-type connector

Lack centralized control

Large existing infrastructure • Expensive

Linux has built-in support for GPT. Apple's Intel Macs no longer use Apple's APT, or Apple Partition Table, scheme but uses GPT instead.

File name length

Long File Names

Lost clusters are a series of used clusters on the hard disk drive that are not associated with a specific file.

Maintain a healthy amount of free disk space on the drive. A mostly empty disk runs faster than a mostly full disk. If a disk is getting full, migrate to a newer, bigger disk.

o

Make sure both the authentication type and passphrase are correct.

Make sure that the printer is not paused.

Connection interface

Make sure that the printer you choose has an interface supported by your computer. The two most common interfaces in modern printers are USB and network interfaces.

Malware scanner

Manage graphics via graphics drivers, converting graphics into the appropriate printer commands

o

Manage print drivers used on the system, including drivers required by network users

Many 802.11n access points can support clients running other wireless standards (802.11a/b/g). When a mix of clients using different standards are connected, the access point must disable some 802.11n features to be compatible with non-802.11n devices, which decreases the effective speed.

o

Many Android manufacturers like Samsung, Sony, HTC, LG, and Motorola.

Match the colors on the screen to the colors that are printed by loading color management profiles

Microwave ovens

Mini-PCI or mini-PCIe slots are used to add devices such as a wireless card.

Monochrome thermal paper is chemically treated to darken where heated (photosensitive). Many cash registers use this type of printer for creating receipts.

More expensive than Nickel Cadmium or Nickel Metal Hydride

Most Blu-ray drives include a second read laser for reading CDs and DVDs. Without this additional laser, Blu-ray drives would not be able to read CDs or DVDs.

Most DVD drives can read and write. Older drives or older DVD players might only support DVD-R.

Most desktop computers have motherboards with built-in network adapters. Practically all mobile devices (i.e., smartphones, tablets, laptops, etc.) have a built-in wireless NIC.

Most hard drives are replaced by removing a cover on the bottom or side of the computer.

Failed login attempts

Most mobile devices are configured by default to only allow a set number of failed login attempts, which is usually ten. If more than ten failed logins are attempted, the mobile device will automatically wipe the entire contents of the device and reset it to the factory defaults.

o

Most newer drives can read both single and dual layer discs. However, older drives might not support dual layer discs.

LCD display

Multiple components make up the LCD display:

Native Command Queuing (NCQ) for increased performance

NetBIOS

NetBIOS is the term used to describe the combination of two protocols: NetBEUI and NetBIOS. NetBIOS was used in early Windows networks. Because NetBIOS is a non-routable protocol, it was often combined with IP to enable internetwork communications.

Network adapters must match the network medium of the network.

Network sharing, such as printers and scanners, is disabled.

Server

Networks contain two types of hosts: hosts that consume a service and hosts that provide a service. Hosts that provide a server are called servers. The following are some of the more common types of servers:

Nickel plated with a ceramic ferrule to ensure proper core alignment and prevent light ray deflection

No centralized storage

No longer used on new laptops

On

No power management being used

Nodes can be added to or removed from the network easily.

Not heat sensitive like Nickel Cadmium

Not truly a battery

Not very flexible (difficult to bend around corners)

Nothing is shut down

o

OneDrive is Microsoft's cloud-based backup service and requires a Microsoft account.

Only data that requires high performance is stored on SSD storage devices.

o

Open an application and try to print directly from the application.

o

Organize parts

Outlook.com

Pattern Unlock. Pattern unlock allows the user to create a line pattern on a nine point grid, used to unlock a mobile device.

Pattern diversity uses two or more co-located antennas with different radiation patterns.

5.

Plug the laptop in and fully charge the battery.

Power schemes work for both laptop and desktop systems.

Processor

Processors built especially for laptop computers have lower power consumption requirements and produce less heat than desktop processors.

Processors do not have the large heat sink and fan combinations to dissipate heat. Rather, heat is controlled by minimizing power consumption and small fans that draw away heat.

Provides redundancy and performance

Push on, pull off connector type that uses a locking tab to maintain connection

Quality lets you modify the print quality of the text and images on the paper.

Radio firmware

Radio firmware controls basic low-level functions like network connectivity, Wi-Fi, and GPS. For several years, "radio" means "baseband", and controls network connectivity aspects only, while Wi-Fi and GPS are governed by OS drivers, like any other devices. Baseband updates may improve or diminish battery performance, network signal strength, and roaming capability.

Receive an excess of power that will fry the system

Receive insufficient power to charge the battery

Receive insufficient power to turn on

Reformatting removes the existing file system and replaces it with the new file system type. Reformatting a drive deletes all existing data.

Remove the keyboard to expose the processor.

6.

Restart the computer and restore your previous Power Scheme settings.

Restores desktop exactly as it was

Restores the computer more quickly than from hibernation

Rollers

Routers maintain a list of known networks and the next router in the path to reach the destination network.

o

Routers use the IP address within a packet to move packets between networks.

SATA1

SATA1 is the original SATA standard. It provided for 1.5 Gbps (150 MBps) data transfer.

162

SNMP is used to monitor and manage network devices. SNMP agents can be installed on network devices such as PCs, switches, and routers. These agents send data to an SNMP manager application running on an administrative workstation, which aggregates the information and displays an overview of the current network status. Thresholds can be configured which trigger alerts if exceeded.

SSH can be used to remotely log onto a server and complete configuration tasks.

Satellite

Satellite networking uses radio signals sent and received from a satellite. Satellite networking:

Send a document or photo to a commercial printer

Shells

Skins

Slightly more expensive than Nickel Cadmium

Enable NAT

Small networks use a single public IP address to connect to the Internet, which is shared by all devices on the private network. Network address translation (NAT) is a protocol that allows multiple computers to share a single public IP address used on the Internet.

Smaller cluster sizes for more efficient storage with less wasted space

Social media data

Special chips called NFC chips are used to send, receive, and store data.

Stepping down the bus speed in the CPU

System docs

T568A Wires are arranged from pins 1 to 8 in each connector in the following order: GW, G, OW, B, BW, O, BrW, Br.

Print to PDF

The Microsoft Print to PDF feature allows you to print your document to PDF format.

o

The Windows store has the least number of applications when compared to the other two major OSes.

o

The first half (first 6 digits) of the MAC address is assigned to each manufacturer.

The folder on the source volume must be empty.

The host is configured to obtain IP information from a DHCP server (this is the default configuration).

The network adapter is responsible for converting binary data into a format to be sent on the network medium.

The network has a small number of hosts.

The network will not change or grow.

o

The original sender then reads the MAC address from the frame and associates the IP address with the MAC address, saving it in cache.

o

The outer layer is semi-transparent, allowing the laser to read data from the inner layer.

Charging

The primary corona prepares the photosensitive drum for writing by causing it to receive a negative electrostatic charge. Depending on the printer, the primary corona will be wires or rollers.

o

The sending device sends out a broadcast frame:

The target partition must not have a drive letter.

The volume with the empty folder must be formatted with NTFS.

There are two versions of ISDN:

o

There aren't cracks in the bezel around your LCD. This can be an indicator that your LCD has been damaged.

o

Try installing a different network adapter, such as an external adapter that connects through a USB port.

They are cheap.

They are great for music and video (they play in audio or video devices that aren't computers).

They are portable and universal.

They are slower than hard disks.

They have a long shelf life and are relatively sturdy.

Though laptop antennae are supposed to be omni-directional, they sometimes need to be re-oriented to get the best reception. This can usually be done by moving the laptop until the reception picks up. If redirecting the antennae doesn't work and wireless reception is consistently poor, the antennae may need to be replaced.

Operating system

Three operating systems are commonly used with mobile devices:

Three-way mirror requires at least five storage devices. The data is written to three storage devices. This option provides redundancy for the data if two storage devices fail at one time.

Turning off any drives that aren't currently being used

Turning off the monitor after a period of inactivity

20 Mbps (full-duplex)

Twisted pair (Cat3, 4, or 5) 100 meters

3.

Unplug the laptop and run it on battery power only.

o

Unshielded twisted pair (UTP) has only an outer plastic sheath. UTP cables are easier to work with and are less expensive than shielded cables.

User forums

o

Using glossy paper could cause the paper to not be pulled into the rollers correctly.

o

Verify an Ethernet connection icon exists.

Vulnerable to eavesdropping

Web Server - Serves web pages and web content via HTTP.

While some RAID configurations provide fault tolerance in the event of a disk failure, configuring RAID is not a substitute for regular backups.

Wi-Fi calling

Wi-Fi calling allows your iPhone to place and receive phone calls and text messages over a Wi-Fi network. If you have a weak cellular signal but a solid Wi-Fi signal, your iPhone will automatically switch over and route calls and texts using Wi-Fi. You can only use this if your cellular carrier supports it.

Wireless game controllers

Xbox360 hard disk interface (called xSATA)

Yahoo

eBooks

eSATA devices use a special SATA data cable with a locking clip to prevent the cable from being accidently disconnected.

iOS: AppStore

iCloud

iOS (closed source/vendor specific)

iOS devices have two different backup tools:

(Windows OS)

ipconfig displays IP configuration information for network adapters. Use the ipconfig command as follows:

nbtstat

nbtstat is used to diagnose issues regarding NetBIOS over TCP/IP. The following options can be used with nbtstat:

netstat

netstat displays the following IP-related statistics:

traceroute

tracert is similar to the ping utility in that it tests connectivity between devices; however, tracert also shows the path between the two devices. Responses from each hop on the route are measured three times to provide an accurate representation of how long the packet takes to reach, and be returned by, the specific host.

Fuel Cell

• A growing technology that is still developing and is recently being implemented into the small electronic device market

Hibernate

• All components are off

Enabled

• Power on

Suspend

• RAM retains contents

Single Mode

• Transfers data through the core using a single light ray (the ray is also called a mode)

A 1x Blu-ray drive reads data at 4.5 MBps.

1.0.0.0 to 126.255.255.255

A 255.0.0.0 /8

A CD-RW drive has a second, high power write laser. When this laser hits the bottom of this photo reactive material on the bottom of the CD-RW disk, it causes crystals to form. This is called phase shifting or a phase shifting media. Wherever a crystal is formed on the bottom of a CD-RW disk is like a LAND on a CD-ROM disk, because it reflects light.

A DVD with a single side of data can hold about 4.7 GB.

A DVD-ROM is read-only memory.

2.

A Device Driver Interface (DDI) is created at this point which allows the document to interface with a printer driver.

Foreign

A Foreign disk is a dynamic disk that was created in one system and moved to another system. When you first add the disk to a different system, the partition information for the disk must be updated to reflect all dynamic disks in the current system. Import the disk to make it available in the new system.

A PDA (Personal Digital Assistant) is a hand-held device, typically with a small touchscreen. A PDA uses special hardware and software that provides basic productivity applications (email, word processing, spreadsheets).

A Tablet PC is a notebook that includes a touchscreen to allow input by tapping on the screen, dragging objects, or through handwriting recognition. A stylus is a special pen designed to be used by these touchscreens for input. Tablet PCs might run special versions of the operating system to enable touchscreen input.

A digitizer pad is used in laptop and PDA systems to receive input. Input is written onto the pad with a stylus pen, then those motions are transferred into data that is processed by the system. If this pad becomes scratched, the laptop or PDA cannot receive input correctly. This is most easily resolved by buying a cleaning product called Screen Clean. This product removes the top layer of plastic from the digitizer pad, thus removing existing scratches and giving the pad a fresh surface. However, you will need to replace the digitizer pad or buy a new system if the scratch is too deep.

o

A dirty primary corona wire can cause a vertical stripe down the print job because that part of the OPC drum is not being charged by the charge corona.

o

A dirty secondary corona wire could cause the same problem because the charge is not being applied to part of the paper.

Docking stations

A docking station allows you to charge an electronic device. Because a wide range of dockable devices have different connectors, power signaling, and uses, docks are not standardized and are designed for a specific make and model of a mobile device.

Docking station

A docking station lets you use the notebook systems as a desktop system. The docking station includes special ports that connect to the back of the notebook and let you use normal-sized external mouse, keyboard, monitor, and speakers.

A duplexing assembly is required to print two-sided output on a laser printer. Many inkjet printers also use duplexing assemblies to print two-sided paper. Duplexing assemblies are typically mounted on the back of a laser or inkjet paper.

Dye sublimation (dye diffusion thermal photo)

A dye sublimation printer is a non-impact printer that uses film-embedded dye.

o

A faulty static eliminator strip might cause paper jams because the paper will stick to the components inside the printer.

-S Displays current NETBIOS sessions with the destination IP addresses.

Cat 6e

10 Gbps 500 MHz Provides additional shielding and tighter cable twists than standard Cat 6.

Cat 7

10 Gbps 600 MHz Has the strictest specifications for crosstalk and noise.

10,000 RPM

o

10.0.0.0 to 10.255.255.255

Cat 5

100 Mbps 100 MHz Supports up to 100 Mbps Ethernet.

Maximum distance

100 ft. 150 ft. 150 ft. 300 ft. 150 ft.

Cat 5e

1000 Mbps 100 MHz Similar to Cat 5 but provides better EMI protection. Supports gigabit Ethernet (gigabit connections require the use of all four twisted pairs)

Gigabit Ethernet

1000BaseT 1,000 Mbps (half-duplex)

Fast Ethernet

100BaseTX 100 Mbps (half-duplex)

Ethernet

10BaseT 10 Mbps (half-duplex)

10 Gigabit Ethernet

10GBaseT 10 Gbps (full-duplex only) Twisted pair (Cat6, or 7) 100 meters

Post Office Protocol 3 (POP3)

110 POP3 is part of the IP protocol suite and used to retrieve email from a remote server to a local client over an IP connection. With POP3, email messages are downloaded to the client.

File Transfer Protocol (FTP)

21 FTP provides a generic method of transferring files. It can include file security through usernames and passwords, and it allows file transfer between dissimilar computer systems. FTP can transfer both binary and text files, including HTML, to another host. FTP URLs are preceded by ftp:// followed by the DNS name of the FTP server. To log into an FTP server, use: ftp://username@servername.

Secure FTP (SFTP)

22 SFTP addresses one of the key weaknesses of FTP; namely, FTP doesn't use encryption. All data, including usernames and passwords, is sent clear text. SFTP provides the same functionality as FTP, but secures the data transmissions using the SSH protocol.

Secure Shell (SSH)

22 SSH allows for secure interactive control of remote systems. SSH is a much more secure alternative to Telnet.

(non-overlapped)

23 (12) 11 (3) 11 (3) 2.4 GHz: 11 (3 or 1)

3.0

24 Mbps 3 1 m

Simple Mail Transfer Protocol (SMTP)

25 SMTP is used to route electronic mail through the internetwork. Email applications provide the interface to communicate with SMTP or mail servers.

Amount of files

268,435,437 4,294,967,295

2G (second generation) networks were the first to offer digital data services. 2G data speeds are slow (14.4 Kbps) and were used mainly for text messaging and not Internet connectivity.

3G (third generation) offers simultaneous voice and data. The minimum speed for stationary users is quoted at 2 Mbps or higher.

Service Location Protocol (SLP)

427 SLP is a protocol that is able to organize and locate various network devices and services, such as printers, shared disk drives, directories, etc.

Frequency

5 GHz (U-NII) 2.4 GHz (ISM) 2.4 GHz (ISM) 2.4 GHz (ISM) or 5 GHz (U-NII) 5 GHz (U-NII)

Domain Name System (DNS)

53 DNS is a system that is distributed throughout the internetwork to provide address/name resolution. For example, the name www.mydomain.com would be identified with a specific IP address.

Maximum speed

54 Mbps 11 Mbps 54 Mbps 600 Mbps 1.3 Gbps

5400 RPM (not desired)

Apple Filing Protocol (AFP)

548 AFP is the protocol used by systems running Mac OS X or newer to support file sharing on the network. AFP replaced AppleTalk and has gone through several revisions.

7200 RPM (minimum)

A laser printer's fuser operates at a high temperature and can burn you.

Network adapter

A network adapter is responsible for creating and receiving transmission signals that are sent along the networking medium.

Network interface card

A network interface card (NIC) creates the signals that are sent along the networking medium.

A network interface card (NIC) uses a cable medium (such as twisted pair or fiber optic cables).

A new generation of inkjet printers produce photo-quality printouts when used with photo-quality paper.

A notebook (or laptop) is a portable version of a desktop system. It often has similar hardware and runs similar software.

A single layer Blu-ray disc holds 25 GB; a double layer disc holds up to 50 GB. Experimental 20 layer discs can hold up to 500 GB.

A single print server services all print queues and print devices.

Smart camera

A smart camera is a self-contained, standalone vision system with built-in image sensor in the housing of an industrial video camera. It contains all necessary communication interfaces, e.g. Ethernet, as well as industry-proof 24V I/O lines for connection to a PLC, actuators, relays or pneumatic valves.

A smart phone is a phone that includes functions of a PDA. As functions are added to smart phones, the line between smart phones and PDAs is disappearing.

Thermal

A thermal printer is a non-impact printer that uses heat to cause a reaction on specially treated paper.

A wireless bridge connects two wireless APs into a single network or connects your wireless AP to a wired network. Most APs today include bridging features.

ARM: Some tablets, such as the iPad, use the ARM architecture. ARM is more power-efficient and less expensive to manufacture than x86. Android runs primarily on ARM.

o

Addresses are assigned to interfaces (network connections), not to the host. Technically, the interface ID is not a host address.

Addresses with consecutive zeros can be expressed more concisely by substituting a two colons for the group of zeros. For example:

o

Adjust processor throttling (if supported) and configure Power Options to reduce power consumption. Lower power consumption not only saves battery life, but it also lowers the heat output.

PDF

Adobe created PDF as a successor to PostScript. PDF allows you to distribute documents on the web and have them displayed consistently in a wide variety of environments. Adobe has also provided Acrobat Reader free for multiple platforms and promoted PDF extensively, so it has become the de facto standard for page description languages.

PostScript

Adobe created a printer language called PostScript that easily handles scaling of certain fonts and images. Printers that understand PostScript are usually more expensive than other printers.

All MAC addresses are denied access, except for those specified in the allow list.

All devices on the subnet share the same network address, but they have unique host addresses.

o

All hosts on the subnet process the broadcast frame and look at the destination IP address of the packet.

All network connections are located in a single place, which makes it easy to troubleshoot and reconfigure.

o

All the high-end Android phones are as responsive as other OSes.

Android (open source)

Assigning log files to be stored on distinct partitions can help minimize the effects of a system crash due to excessively large log files.

o

Be careful when using thick paper or cardstock in a laser printer; they can cause paper jams. The weight of laser printer paper should generally be between 70 and 130 grams per square meter (GSM). On some laser printers, you can change the paper path for thick paper so it is fed through the printer in a straight line (rather than curling the paper up to the top of the printer). Such straight line paper paths can help prevent paper jams with thick paper.

Be sure to reconnect both the antenna and keyboard connectors when reassembling.

Be sure you use the appropriate punch-down tool when connecting UTP cabling to a punch-down block. To use a punch-down tool, position the UTP wire into a slotted post in the punch-down block. Then press down on the top of the wire over the post with the punch-down tool.

Because Windows 7 does not support UEFI on 32-bit platforms, you cannot boot from a GPT partition on Windows 7.

Because an OPC drum is sensitive to light, it can lose its effectiveness if it is over-exposed.

Between 1-10 connected hosts (computers, mobile devices, or printers)

Blu-ray Disc (BD)

Blu-ray Disc (BD) is a newer optical disc format that is capable of greater storage capacity than DVDs.

Blu-ray discs can be read-only (BD-ROM), recordable (BD-R), or rewritable (BD-RE).

Blu-ray discs can store a large amount of data (25 GB or more, depending upon the format).

Blu-ray has become the accepted HD video standard as the last movie studio stopped distributing HD DVD movies.

Blu-ray is intended to eventually replace DVD.

Blu-ray uses a blue laser instead of the red laser used with CDs and DVDs. The blue laser light has a shorter wavelength, which allows data to be packed more tightly on the disc.

Blu-ray was originally developed for high definition video (and expanded content on movie discs), but can also be used for data storage.

Bluetooth devices

Bluetooth is a wireless technology for creating simple connections between two devices. Unlike infrared, line-of-sight connections are not required.

Bluetooth

Bluetooth uses radio waves in the 2.4 GHz frequency range for communication.

Built-in network support

Built-in scanners, copiers, or faxing capabilities

Bumpers

By default, Windows is allowed to control power to all devices that support the feature. You can edit the device properties in Device Manager to prevent Windows from controlling the device.

By default, a Windows workstation will use the hosts file to resolve hostnames into IP addresses first. If a match can't be found for the hostname to be resolved in the hosts file, the workstation will contact the DNS server it has been configured to use.

By default, all Windows computers try to use DHCP for TCP/IP configuration information.

o

By default, devices are not allowed to wake the computer, although they might support this feature.

By default, the Print Spooling service is configured to start automatically each time the system starts.

By default, users can manage their own jobs in the print queue (pause/unpause or delete).

Enable MAC address filtering

By specifying which MAC addresses are allowed to connect to your network, you can prevent unauthorized devices from connecting to the access point. MAC address filtering can be implemented in one of two ways:

192.0.0.0 to 223.255.255.255

C 255.255.255.0 /24

RG-59

CCTV video systems; short cable lengths (less than 3 meters) are sometimes used for cable TV 75 ohms

CD-RW can be written, read many times, erased, and rewritten.

CD-RW drive speed rating includes three parameters for a write speed, a rewrite speed, and a CD-RW read speed. All of these are multiples of the original 150 KB/s 1x speed defined by the first CD-ROM drives. For example, if you have an 8x4x32 CD-RW drive, this means that it can write at 1,200 KB/s, it can rewrite to a CD-RW disk at 600 KB/s, and it can read at 4,800 KB/s.

CD-RW drives can burn or write to CD-RW discs, erase CD-RW discs, and read a CD-ROM disc.

CD-RW has a capacity of about 650 megabytes.

CD-RW is a removable hard drive, because you can insert the disc into the disc drive on one PC, add and delete data, eject it, and insert it into another disc drive on another system and have all your data immediately accessible.

Compact Disc (CD)

CDs were first developed to store digital music. Later, the CD technology was adapted to store digital computer data. A CD:

RG-6

Cable TV, satellite TV, and broadband cable Internet 75 ohms

Cabling problems usually affect only one node.

Can be a portable solution for cars or trucks with an attached satellite dish

Can hold 74 to 80 minutes of audio

Can provide Internet to remote areas by installing a single antenna

Can typically be implemented in WEP-capable devices through a software/firmware update

o

Card Emulation mode emulates the functionality of a smart card in order to perform contactless payment or ticketing (this mode is typically used by smartphones).

Cat 5 Ethernet (100BASE-T) and below (Tx is a pin used for transmitting and Rx is a pin used for receiving):

Cellular

Cellular networking uses the cellular phone infrastructure for Internet access.

Optical Media

Characteristics

Power State

Characteristics

1.

Charge the battery to 100%. Because you might not be able to trust the power meter that shows in Windows, be sure to allow sufficient charging time.

Check Disk

Check Disk is a utility that verifies the file system integrity of a hard disk. Errors that can be checked and fixed by Check Disk include:

Check ribbon, ink, and toner levels.

Check the carriage assembly and belt. The carriage is the assembly that holds the ink cartridges and slides back and forth using a belt drive to transfer ink onto the paper.

Check the disk rotational speed. A disk that spins faster will perform better.

Check the ink and toner levels.

Check the pickup rollers if paper is not being fed through the printer properly.

Check the print queue. Sometimes a large document might be first in the queue and is stalling or otherwise preventing other documents from printing. Move the document down in the queue, or delete the document from the queue if necessary.

Check the printer console or workstation for any error messages or error codes. Use the printer documentation or the manufacturer website to look up specific codes displayed on the printer.

Check the speed of the SATA connection. Older SATA versions have slower transfer speeds than newer SATA versions. If performance is too slow, consider upgrading components to the latest SATA version.

Check the speed of the disk interface. If your system uses an older disk interface, upgrade to a faster interface (if possible).

Check to make sure that the printer is turned on and is online.

Communicates at 9600 bps up to 4 Mbps and uses the resources of a COM port.

Components with a high degree of standardization include the processor, memory, and internal hard drives.

Configure custom settings for the specific print device

o

Configure printing notifications

o

Configure the drive to operate in SATA1 mode. This is typically done by setting a jumper.

Configure the firewall on the device. Enabling the basic firewall on the router provides an additional level of security for the private network. If necessary, configure exceptions on the firewall to allow specific traffic through the firewall.

Connect the boot drive to the lowest SATA channel number of the installed devices. The boot sequence will normally follow the channel order unless a boot priority is specified in the BIOS/UEFI.

o

Connect the cable to a different hub or switch port and check the status lights on the port.

Connect the cable to a different switch port and check the status lights on the port.

1.

Connect the print device to an available port.

1.

Connect the print device to the computer.

Connect the printer to a special print server that has a network connection.

Connected devices are able to join the network homegroup.

2.

Create a printer object. For plug and play printers connected to a USB port, the printer might be configured automatically.

224.0.0.0 to 239.255.255.255

D N/A N/A

DHCP Server - Automatically configures network hosts with an IP address, subnet mask, DNS server, and default gateway.

DVD-RW is a rewritable DVD format.

o

Decimal (e.g., 131.107.2.200). In decimal notation, each octet must be between 0 and 255.

Parameter

Description

Dial-up connections cannot be used for both voice (phone calls) and data at the same time.

Directory Server - Handles user authentication. Also stores user credentials, permissions, and settings.

Advantages

Disadvantages

Disk Cleanup

Disk Cleanup helps manage disks by locating and disposing of files that can be safely removed from the disk by:

Distinct operating systems can be assigned to run on assigned partitions to allow a dual boot system setup.

Documents

Dot matrix printers operate in either a font (letters, numbers and symbols) or dot-addressable (graphs and charts) mode.

Drive speeds are measured as multiples of this original speed. To calculate an estimate of your CD-ROM drives transfer rate, multiply its speed by 150 kilobyte (1x = 150 KB/s, 2x drive = 300 KB/s, 4x drive = 600 KB/s, 72x = 10,800 KB/s).

o

Dual-layer DVDs are recorded using Opposite Track Path (OTP).

o

Dual-layer discs can hold up to 8.5 GB of data.

Each host on the entire network must have a unique IP address.

Each wire has a separate connector

Easy to expand (scalable)

Easy to install and manage

Easy to support

o

Edit the device properties in Device Manager to allow a device to wake the computer.

Networking media

Ethernet supports the following cable types:

Fastest available transmission rates

Fiber optic cables use light pulses.

Fiber optic cables, which are used in high-speed applications (e.g., servers or streaming media).

File and Print Server - Provides file sharing and print sharing services.

File and folder permissions to control access to files

8.

Following installation, edit the CMOS settings to modify the boot order to boot from the RAID array.

For wireless networks, you can use wireless network locator software to do the following:

Failure to boot (OS not found)

HDD/ SSD A failure to boot with an error message that reads something to the effect of "OS Not Found" could be trivial or serious. Common causes include the following:

Has a shorter lifespan than Nickel Metal Hydride

Has an L-shaped connector

o

ISDN PRI requires different cables to be installed rather than the regular phone lines. The cable is divided into 24 channels:

Integrated Services Digital Network (ISDN)

ISDN is a digital service, running over a switched network.

If the disk no longer exists, then delete the disk from Disk Management.

If the drive tray won't open for some reason, you can insert a straightened paper clip in the small hole beneath the drive door to push the drive tray out of the drive.

Verify the IP configuration

If the network adapter has a physical connection, verify the IP configuration for the connection.

If the network interface card is detected and configured, you should see an Ethernet or Wi-Fi icon in the Network Connections window. Make sure that the connection is enabled.

If the page only prints part way through (and the rest of the page is blank), you might need to upgrade the memory on the printer or check the print server settings.

If the ping test fails only to that device, then the device might not be properly configured.

If the ping test succeeds, the destination device is working. If you are still having problems, check issues with logon, resource sharing, permissions, or services.

If the text appears garbled, make sure the proper printer driver is used. If necessary, upgrade to the latest version or reinstall the driver.

o

If the video display doesn't work, connect an external monitor.

If there is no icon, check Device Manager to make sure that the device is detected, has the appropriate drivers, and is enabled. If there is no network device, then the hardware could not be detected.

o

If this does not work, access the printer properties in Devices and Printers and then click Print Test Page. This option bypasses the application. If it works, troubleshoot the printing configuration in the application.

o

If toner is not sticking to the paper, check the transfer (fuser) rollers.

o

If unsuccessful, the problem is with the printer itself.

2.

If using an onboard RAID controller with SATA drives, edit the CMOS settings and identify the drive type as RAID. This tells the system to load the onboard BIOS/UEFI for accessing the connected drives.

If you don't get a display on either monitor, you can assume that there is a problem with the video card. Repairing the video card typically means replacing the motherboard.

If you have a computer (e.g., a laptop) that connects to two networks (i.e., one with a DHCP server and another without a DHCP server).

Verify physical connectivity

If you have a network connection in Windows, verify that the adapter can establish a physical connection to the network.

If you install a new hard drive, the drive letter for your optical drive might change. Software programs or shortcuts that rely on the old drive letter will likely not run properly until they have been told the correct drive letter for the drive.

In order to establish an SSH session, the server must have the SSH process running and configured to allow remote connections.

Obstructions

In situations where there is no clear line-of-sight between transmitter and receiver due to obstructions (e.g., concrete or metal studs), the wireless signal is reflected along multiple paths before finally being received. This can cause phase shifts, time delays, and attenuation. To address this, antenna diversity implemented, which uses two or more radio antennas to increase the quality and reliability of a wireless link. There are two common antenna diversity implementations:

1.

Install the RAID controller card and connect the drives to the controller.

Installation requires careful planning to create a continuous ring.

Internet access is limited to areas with cell phone coverage. Coverage will be dictated by the service provider's network.

Is affected by mild atmospheric and weather conditions (fog, rain, or snow can disrupt service)

It can be difficult to isolate cabling problems.

o

It has a home screen and a button to enter the App Drawer.

636

LDAP is a protocol used to access information about network resources stored by a directory service, such as Active Directory or eDirectory. LDAP uses port 389 for clear text transmissions and port 636 for secure transmissions.

Latency

Latency on wireless networks can be affected by several factors.

Launcher

Launcher is the name given to the part of the GUI that lets users customize the home screen (e.g. the phone's desktop), launch mobile apps, make phone calls, and perform other tasks on Android devices.

Leading zeros can be omitted in each section. For example, the quartet 0284 could also be represented by 284.

Leather Case

Less toxic than Nickel Cadmium

Lightning

Lightning is a proprietary computer bus and power connector created by Apple Inc. to replace its previous proprietary 30-pin dock connector. It is used to connect Apple mobile devices like iPhones, iPads and iPods to host computers, external monitors, cameras, USB battery chargers and other peripherals.

Line of site

Line of site Internet access (also called fixed wireless broadband) is similar to satellite Internet; however, instead of antennas being directed to a satellite in orbit, they are pointed at a large antenna on land. The antennas use radio signals--typically microwaves--to transmit and receive data. Line of site Internet:

o

Logical drives are defined within an extended partition. You can have up to 24 logical partitions on an extended partition. The extended partition can be divided into multiple logical drives.

Multiple-input, multiple-output (MIMO)

MIMO increases bandwidth by using multiple antennas for both the transmitter and receiver.

MS: Windows Store

Make sure the file system being used is optimized for an SSD. Because SSDs store data differently than HDDs, they require special techniques to extend the life of the drive, such as wear leveling support.

o

Make sure the wireless NIC is installed properly and, if applicable, has any necessary antennae installed.

Making Cat 6 compliant cables is difficult; if you do not add the connectors exactly right, the cable will only be capable of 100 Mbps speeds. In most cases, it would be easier to buy cables of the correct length than to try and make your own.

o

Manage shared libraries.

Many access points have an automatic channel feature that detects other access points and automatically selects the channel with the least amount of traffic.

Networking capabilities

Mobile devices implement 802.11b/g/n networking to provide networking connectivity. Bluetooth is also commonly implemented for connecting peripherals in place of wired USB connections.

o

Most notebooks include a utility for calibrating the touchpad. Run the utility and follow the instructions to recalibrate.

(Near Field Communication)

NFC enables communication between two devices that are in very close proximity with each other.

NFC operates in the 13.56 MHz frequency and has a maximum transmission speed of 424 Kbps.

NTFS is not recommended for disks smaller than 10 MB.

Network discovery is enabled; however, the computer is unable to create or join a homegroup.

Network interfaces—devices that send and receive electrical signals

Keyboard

Notebook keyboards are smaller than standard keyboards. Keys are often a bit smaller and closer together. Keys such as the number pad and some function keys might be left off, but are accessible by pressing a special Fn key to provide alternate functions for regular keys.

Offers speeds of up to 1520 Mbps

Defragmentation

On an SSD storage device, fragmentation is much less of an issue than it is for standard hard disk drives. File systems such as NTFS still fragment files when writing them to the drive in order to optimize storage space. However, an SSD storage device doesn't have read-write heads and no repositioning must occur to read heavily fragmented files. As a result, fragmented files can be read as quickly as contiguous files.

On most systems, you can configure the processor to use a lower bus speed when running from battery power, thereby conserving battery life.

Host Role

Peer-to-Peer In a peer-to-peer network, each host can provide network resources to other hosts or access resources located on other hosts. Each host is in charge of controlling access to those resources. Advantages of peer-to-peer networks include the following:

o

Pin 7: Bi+

Port multiplier support, allowing multiple devices to be connected to a single SATA port

Print to XPS

Print to the XPS allows you to create .xps files using any program that you can print from in Windows. Use the Print to the XPS Document Writer when you want to view, save, share, digitally sign, and protect your document's content.

o

Provides access to many clients in a radius

Provides an increase in performance

Provides an increase in performance for read operations. Write operations are slower with RAID 5 than with other RAID configurations because of the time required to compute and write the parity information.

Provides built-in support for disk protection methods

Provides fault tolerance for a single disk failure

Provides fault tolerance for a single disk failure.

Phone cable

RJ-11 10 Mbps N/A Used to connect a modem to a phone jack in a wall outlet to establish a dial-up Internet connection

Cat 3

RJ-45 10 Mbps 16 MHz Designed for use with 10 megabit Ethernet or 16 megabit token ring.

Rather than being recharged (taking hours), when its charge becomes low, the fuel is merely replaced (taking seconds)

Element

Recommended Maintenance

o

Refer to manufacturer resources

Regardless of the method, Internet connections are made from the subscriber location to an Internet Service Provider (ISP). The ISP might be the cable TV company, the phone company, or another company offering Internet access.

Remote Access Server - Provides remote access to network resources.

Remote backup applications

Remote backup applications allow you to recover important business data and personal files (e.g., pictures and texts) from a lost, stolen, or broken phone. Most cellular providers offer some type of cloud backup service. In addition, each mobile OS offers their own proprietary backup service:

Resistant to physical damage

Ring

Ring Messages are sent from device to device in a predetermined order until they reach the destination device.

Routers use the IP address within a packet to move packets between networks.

Run a manufacturer-specific SSD software utility. Most SSD manufacturers have specialized utilities that can check for errors and optimize an SSD's performance.

Screws at the bottom of the notebook case or underneath a power button panel on the top hold the keyboard in place.

3.

Select which types of libraries to share.

Send a document to someone who has the same printer, but doesn't have the program you used to create the document

Send empty toner and inkjet printer cartridges to be recycled.

3.

Share the printer. On Windows 7, click Start > Devices and Printers. Right-click on the printer you want to share and select Printer Properties. Click the Sharing tab. On Windows 8.1 and 10, click Start > Settings > Devices. Scroll to the bottom and select Devices and Printers. Right-click on the printer you want to share and select Properties. Click the Sharing tab.

Wireless on/off switch

Some portable devices have a physical wireless switch on the outside of the device. The wireless switch turns the device's integrated wireless network adapter on and off. When in the off position, no wireless networks are displayed as available.

Version

Speed Class Distance

Storage spaces define logical units of space created from a pool. One or more storage spaces can be created from the pool. To the Windows system and the user, storage spaces appear as disks with typical drive letters (e.g., E: drive, F: drive).

o

Switches operate in full-duplex mode, meaning devices can send and receive data at the same time because transmission paths are dedicated to only the communicating devices.

o

Switches use the MAC address to send frames to the destination device.

Switches use the MAC address to send frames to the destination device.

T568B Wires are arranged from pins 1 to 8 in each connector in the following order: OW, O, GW, B, BW, G, BrW, Br.

Takes up more physical space than Lithium Ion batteries

Tape drive

Tape drives (also called digital linear tape or DLT drives) store data on magnetic tapes. Tape drives are most commonly used for data backups, such as taking a backup of all hard drives in a system.

The BIOS must have ACPI support enabled before you can enable hibernation in Windows. If the Hibernate tab is missing, check the BIOS. If the BIOS does not have a setting for ACPI, you might need to upgrade the BIOS.

The DHCP server assigns IP address and mask values to the host (called an address lease).

The LED light on your power adapter is lit. If it isn't lit, this means that your point of failure is between the outlet and the adapter.

o

The MAC address is a 12-digit (48-bit) hexadecimal number. Each number ranges between 0-9 or A-F.

The backlight illuminates the LCD by evenly dispersing light over the entire screen. These backlights are usually cold cathode fluorescent lamps (CCFL) or LEDs.

The bezel is the case in which the LCD is set.

The bottom surface of a CD-RW drive is coated with a photo reactive crystalline coating. A red laser causes a crystal to form which creates the reflective and non-reflective areas on the bottom of the DVD-RW disc.

The core diameter is around 50 to 100 microns

o

The desktop application iTunes can be used to backup and restore iOS devices. iTunes requires mobile devices to be connected to the desktop computer via a USB cable.

The most common problem for the touchpad is that the mouse cursor is not controlled properly based on where you press. In this case, recalibrate the touchpad.

The physical topology describes the way the network is wired.

The system can monitor the battery and other device states and dynamically change power consumption on one or more devices.

Thin provisioning is based on the premise that not all users will use all of space in their allocated storage space.

To access the inverter, backlight, or other display components, remove the screws in the bezel. These screws are typically underneath rubber pads that keep the lid from hitting the palm rests.

To share individual files and folders within the homegroup, right-click the file or folder, click Share, and click one of the following:

To shrink a partition, you must be a member of Backup Operators or Administrators (or equivalent) to complete this process.

To view a list of available network connections, do one of the following:

Transmission Control Protocol (TCP) - TCP is a connection-oriented protocol. To ensure reliable delivery of data, TCP requires the recipient of a network transmission to send an acknowledgement of each and every IP packet it receives to the sender. Packets that don't make it are retransmitted. This ensures that the data is delivered reliably.

Transmission speeds and max distance depends on the version and device class:

Component

Troubleshooting Tips

Two-way mirror requires at least two storage devices. The data is written to two devices. Two-way mirror requires twice as much device space as the amount of storage allocated to the storage space. This option protects you from a single storage device failure.

USB and FireWire ports. You can plug external devices, such as external storage devices, into USB or FireWire ports.

o

USB cellular adapters can be connected to most mobile devices to provide cellular access.

(255 characters, spaces)

Unicode

Unshielded twisted-pair cables (UTP) with RJ45 connectors. This is the most common transmission medium used for Ethernet.

o

Update the BIOS/UEFI to recognize the new drive.

Update the SSD's firmware. Newer firmware versions are released to fix bugs and optimize how the SSD stores data.

Update the firmware on the router to fix bugs or security vulnerabilities. Firmware updates are typically downloaded from the manufacturer's website. Some SOHO routers can automatically download and install firmware updates.

o

Use a wireless analyzer, which can be installed on a smartphone or tablet, to do the following:

Used for Ethernet networks

Uses Temporal Key Integrity Protocol (TKIP) for encryption

Verify consumables status on a regular basis, including the toner cartridges and the imaging drum.

Verify that all configuration values are correct.

o

Verify that the SSID settings are correct. If the SSID is hidden, make sure the manually entered SSID has been entered correctly.

Videos

Virtually all operating systems today provide native (built-in) support for TCP/IP.

o

VoIP is provided by many ISPs to replace existing analog telephone lines (even using the same phone number).

Volume mount points that allow you to map disk space on another partition into an existing volume

Volumes must be unformatted or formatted with NTFS to be extended.

Wi-Fi Protected Access 2 (WPA2) or 802.11i

WPA2 is the implementation name for wireless security that adheres to the 802.11i specifications. It was deployed in 2005. It is built upon the idea of Robust Secure Networks (RSN). Like WPA, it resolves the weaknesses inherent in WEP; it is intended to eventually replace both WEP and WPA. WPA2:

Web proxy

When disassembling at notebook, make sure you:

When you change the network card, the host will have a new physical device address.

When you configure a static IP address, you disable DHCP and APIPA.

Windows (closed source/vendor specific)

Windows Mobile devices have two backup tools:

o

Windows Phone is light weight with a lag free OS.

With omnidirectional antennas, radio waves are broadcast in each direction, so the AP should be located in the middle of the area that needs network access.

XGA screens have the normal 4:3 aspect ratio. WXGA screens use a widescreen aspect ratio.

o

You can also install an adapter card in an available bus slot to increase the number of SATA ports.

You can modify the existing schemes or create new ones to meet your needs through the Power Options utility in the Control Panel. In Windows 10, you can edit power schemes by right-clicking on the desktop, selecting Display Settings > Power & Sleep.

You can use open authentication to allow any wireless client to connect to the AP. Open authentication is typically used on public networks.

You can use the host name with the ping command. If you can ping the device by the IP address but not the host name, then the problem is likely with the DNS configuration.

You cannot install the operating system on a dynamic disk. You can, however, upgrade a basic disk containing the operating system to a dynamic disk after installation.

You will need to remove the keyboard and likely the palm rests to remove the video card or the display components.

You will typically need to remove the keyboard to replace other internal components (such as the processor, wireless card, or video card).

You'll probably want to use GPT when setting up a drive; however, if you need compatibility with old systems, like the ability to boot Windows off a drive on a computer with a traditional BIOS, you'll need to use MBR.

eSATA has a rectangular connector.

eSATA is typically faster than USB or FireWire.

eSATAp combines the functionality of an eSATA and a USB port with a source of power in a single connector.

o

iOS devices or iPhones are solely designed and developed by Apple.

o

iOS is light weight and has lag performance free. Since iOS software and hardware are built by Apple alone, it is well balanced.

(Linux/Mac OS)

ifconfig is used on Linux and Mac OS systems and displays the installed network interfaces and the current configuration settings for each interface, including the MAC address, IP address, broadcast address, and subnet address. Use the ifconfig command as follows:

nslookup

nslookup resolves (looks up) the IP address of the specified hostname. It also displays additional name resolution information, such as the DNS server used for the lookup request.

Standby

• CPU is off

Nickel Metal Hydride (NiMH)

• Does not develop a memory

Internet Message Access Protocol (IMAP)

143 IMAP is an email retrieval protocol designed to enable users to access their email from various locations without the need to transfer messages or files back and forth between computers. Messages remain on the remote mail server and are not automatically downloaded to a client system.

o

172.16.0.0 to 172.31.255.255

Remote Terminal Emulation (Telnet)

23 Telnet allows an attached computer to act as a dumb terminal, with data processing taking place on the IP host computer. It is still widely used to provide connectivity between dissimilar systems. Telnet can also be used to test a service by the use of HTTP commands. You should avoid using Telnet as it transmits all data (e.g., usernames and passwords) clear text.

Remote Desktop Protocol (RDP)

3389 RDP allows you to view and use the graphical desktop of a remote computer system as if you were sitting in front of it.

Lightweight Directory Access Protocol (LDAP)

389,

File size

4 gigabytes 16 terabytes

Server Message Block (SMB)

445 SMB enables the sharing of folders and printers on the network. Using SMB, remote users can access files in a shared folder on a server or workstation. Likewise, a remote user can send print jobs to a shared printer. SMB is also known as Common Internet File System (CIFS).

4G (fourth generation) offers minimum speeds of around 38 Mbps, with up to 100 Mbps possible.

Dynamic Host Configuration Protocol (DHCP)

67,

802.1x

802.1x authentication uses usernames and passwords, certificates, or devices such as smart cards to authenticate wireless clients. Originally designed for Ethernet networks, the 802.1x standards have been adapted for use in wireless networks to provide secure authentication. 802.1x authentication requires the following components:

A JBOD configuration creates a single volume using space from two or more disks.

Network attached storage (NAS)

A NAS is a device that is optimized to provide a single service: file sharing. NAS devices range in price from several hundred to several thousand dollars. A NAS can be connected to a network and configured very easily. This makes them a great choice for most networks needing a file sharing service.

A NAT router associates a port number with each private IP address. Communications with the private hosts from the Internet are sent to the public IP address and the associated port number. Port assignments are made automatically by the NAT router.

A RADIUS server to centralize user account and authentication information. A centralized database for user authentication is required to allow wireless clients to roam between cells but authenticate using the same account information

RAID 10 (stripe of mirrors)

A RAID 10 volume stripes data across mirrored pairs and across multiple disks with parity for data redundancy. If a single disk fails, its data can be recovered using the parity information stored on the remaining disks. If two disks in the same mirrored pair fail, all data will be lost, because there is no parity in the striped sets. RAID 10:

RAID 5 (striping with distributed parity)

A RAID 5 volume combines disk striping across multiple disks with parity for data redundancy. Parity information is stored on each disk. If a single disk fails, its data can be recovered using the parity information stored on the remaining disks. RAID 5:

Devices

A STA (station) is any device that is able to use the 802.11 protocol to communicate on a wireless network. Devices on a wireless network include:

o

A USB Optical Drive allows you to connect an external optical drive to your notebook.

o

A USB to Bluetooth dongle plugs into a USB port allowing a computer to communicate with Bluetooth devices such as mobile phones, mice, keyboards, remotes, and headsets.

o

A USB to Wi-Fi dongle plugs into a USB port allowing you to connect to a wireless network.

A bad keyboard can be tested by plugging in an external keyboard to your laptop and seeing if it works. If it does, you can assume that your laptop keyboard is malfunctioning and needs to be replaced.

A bad sector is a portion of the hard disk that cannot be used. Bad sectors are marked so that they are no longer used. Any used bad sectors are redirected to another sector.

A basic disk only supports volumes made up of contiguous disk space.

A bridge connects two segments within the same subnet that use different media types. For example, use a bridge to connect wireless clients to wired clients on the same network.

Bridge

A bridge connects two segments within the same subnet. Bridges learn which side a host resides on by copying the MAC address of the source device and placing it into the MAC address table. The port number which the frame entered is also recorded in the table and associated with the source MAC address.

Bus

A bus topology consists of a trunk cable with nodes either inserted directly into the trunk or tapped into the trunk using offshoot cables called drop cables. With a bus:

Directory

A directory (also called a folder) is a container in a volume that holds files or other directories. It is used to logically sort and organize data to keep related files grouped together. Most operating systems use a hierarchal filing structure.

o

A dirty drum or roller can create lines or splotches at regular intervals on the print job.

Dot matrix

A dot matrix printer is an impact printer that transfers characters by striking a pattern (from a matrix) through an inked ribbon and onto paper.

A dual band access point can use one radio to transmit at one frequency, and a different radio to transmit at a different frequency. For example, you can configure many 802.11n devices to use one radio to communicate at 5 GHz with 802.11a devices, and the remaining radios to use 2.4 GHz to communicate with 802.11n devices. Dual band 802.11a and 802.11g devices are also available.

Hub

A hub provides a central connecting point for multiple media segments on the same subnet. When a hub receives a signal, it is sent out to all the ports on the hub. Hubs operate in half-duplex mode because the path between devices is shared, meaning that devices can only send when no other devices are sending data.

A hub provides a central connection for multiple media segments on the same subnet. When a hub receives a signal, it is repeated out to all other ports. Hubs operate in half-duplex mode, meaning devices can either send or receive data at any given time.

A laptop keyboard is generally connected to the system board using a flat, ribbon-like cable.

Exposing

A laser beam changes the charge on the surface of the drum in a pattern of the page's image.

miniUSB/microUSB

A mini-USB connector is a small USB cable connector that is often used by handheld electronic devices like mobile phones, MP3 players, and digital cameras. On mobile phones it is often used for both USB data connectivity and charging. The new connector, called micro-USB, is smaller than the mini-USB connector and allows for even thinner device designs.

RAID 1 (mirroring)

A mirrored volume stores data to two duplicate disks simultaneously. If one disk fails, data is present on the other disk, and the system switches immediately from the failed disk to the functioning disk. Mirroring:

o

A mobile hotspot is a cellular device that provides Internet access by creating a small Wi-Fi network to which multiple devices can connect. Most smartphones have built-in mobile hotspot functionality.

VPN

A mobile virtual private network (mobile VPN) provides mobile devices with access to network resources and software applications on their home network when they connect using other wireless or wired networks.

o

A modem converts binary data to analog waves (modulation) on the sending end, and then converts the analog waves back to binary data (demodulation) on the receiving end.

A modem or router connects the location to the Internet. This connection provides a single IP address for connecting to the Internet.

Configure a mount point

A mount point is an empty folder on the existing volume that points to another partition. Data saved to the folder is physically saved on the referenced partition.

Partition

A partition is a logical division of a storage device associated with a hard disk drive. Multiple partitions can be assigned to a single device in which case a drive letter is assigned to represent each partition. Multiple letters do not always mean that there are multiple devices, just multiple partitions. Some reasons why you may consider partitioning your hard drive are:

Print queue

A print queue is a location on the hard disk that holds print jobs that are waiting to be processed. Each printer object has its own print queue.

A print server is responsible for managing the flow of documents from the queue to the printer. When the printer is ready, the print server takes the next document out of the queue and sends it to be printed.

Toner

A printer's reported toner level isn't based on how much toner is actually left in the cartridge, but on how many pages have been printed since the toner cartridge was installed. For this reason, it is important to check the actual toner level periodically. If the cartridge still has sufficient toner, but you are receiving prompts that say that toner level is low, you can reset the toner page counter by following the instructions in your owner's manual.

A rechargeable battery with twice the capacity of a nickel-cadmium battery with significantly increased stability and safety

Ring

A ring topology connects neighboring nodes until they form a ring. Signals travel in one direction around the ring; each device on the network acts as a repeater to send the signal to the next device. With a ring:

A router connects the private network to the Internet connection. This router is typically a multifunction device, which includes a four port switch, wireless access point, and firewall functionality.

Router

A router connects two network segments that have a different subnet address.

A router connects two network segments that have different subnet addresses.

o

A router has multiple network connections, with each connection being on a different subnet.

A router has multiple network connections, with each connection being on a different subnet.

SDK/APK

A software development kit (SDK) is a set of software development tools that allows the creation of applications for a certain software package, software framework, hardware platform, computer system, video game console, operating system, or similar development platform. To create applications, you have to download a specific software development kit. For example, the development of an Android app requires an SDK with Java, for iOS apps an iOS SDK with Swift, and for MS Windows the .NET Framework SDK with .NET. There are also SDKs that are installed in apps to provide analytics and data about activity. Prominent examples include Google and Facebook.

A static pre-shared key (PSK) is configured on the AP and the client and cannot be dynamically changed or exchanged without administration. As a result, every host on large networks usually uses the same key.

A switch provides a central connection for multiple media segments on the same subnet. When a switch receives a signal, it forwards that signal only to the port where the destination device is connected.

Touchscreen interface

A touchscreen is an input device normally layered on the top of an electronic visual display of an information processing system. A user can give input or control the information processing system through simple or multi-touch gestures by touching the screen with a special stylus and/or one or more fingers. The touchscreen enables the user to interact directly with what is displayed, rather than using a mouse, touchpad, or any other intermediate device like a stylus.

o

A transceiver is responsible for converting digital data into digital signals to be sent on the medium. The type of signal the transceiver sends depends on the type of network. A fiber optic NIC sends light signals, an Ethernet NIC sends electronic signals on a wire, and a wireless NIC sends radio signals. To receive signals, the transceiver converts digital signals from the network to digital data for the PC.

A transfer belt is used on some high-end color laser printers. Colors are applied to the transfer belt and then to the paper. This step is repeated for different colors.

A wireless access point (AP) is the equivalent of an Ethernet switch. The wireless NICs connect to the AP, and the AP manages network communication.

A wireless network adapter transmits radio waves.

Access time is a general measure of drive performance. Like hard drives, average access time includes average seek time and average latency time. However, it also includes average spin up/down time. This is the time required for a drive to spin up or down to the proper speed to read the data from that particular location of the disc.

o

Add ports and modify the port for any printer

Add the free space on that device to a storage pool.

All MAC addresses are allowed to connect to the network, except for those specified in the deny list.

All new motherboards include support for multiple SATA devices.

All other components are off

Secure the SOHO network

Although the router should now be configured to connect hosts to the private network and provide Internet access, the following steps should be taken to properly secure the network from external threats:

Always use WPA2 when possible. If WPA2 isn't available, use WPA.

An Ethernet over Power device allows for network communications to be transmitted over existing AC power lines. An Ethernet over Power device is plugged in to one AC power outlet, and a second Ethernet over Power device is connected to the same AC circuit. These devices multiplex the AC copper power lines to transmit digital network signals at a frequency higher than the AC electrical power already on the circuit.

NFC

An NFC connector is used to emulate cryptographic smart card functionalities for RFID tags or memory cards.

An alternative to replacing failed components (because of cost) is to add external components. For example, you can use your notebook as a desktop computer by connecting an external monitor.

o

An extended volume uses disk space on the same disk.

IR

An infrared port is a port on a mobile device that enables devices to exchange data without using cables.

An internal print server is inside the printer itself. You use special management software to connect to the print server and manage print jobs.

An outer plastic sheath bundles the wires together and protects them.

1.

An output file is created that contains commands that the printer understands and is sent to a virtual printer where the print job may be configured.

o

An unmounted storage space must be brought back online manually.

An unstable wireless network signal can increase the processing that is performed on the signal by both the hardware and software.

Android devices use the Google sync service to sync and backup mail, contacts, calendar, and files across all android devices. Google sync is a cloud-based service and requires a Google account.

o

Android has the most number of applications in its Google Play Store.

Device encryption

Another line of defense that can be implemented, and is used by default on most new devices, is encryption. Encryption prevents someone from accessing the stored information in any capacity. This means even if someone got a hold of a device and were somehow able to copy the contents of the device, they wouldn't be able to view any of the information. It would be encrypted. There are two types of encryption methods used by mobile devices:

Another problem that digitizer pads face is called pointer drift or ghost cursor. Drift occurs when a pad's pressure sensors need to be realigned. If this is the case, your digitizer pad needs to be recalibrated. It is always best to address this issue before it progresses to the point that you can't access the recalibration utility.

Another way to differentiate the network and host addresses is by using CIDR block notation. With CIDR, the network address is specified by appending a slash (/) followed by the number of bits that are part of the network address. For example, the subnet mask 255.255.0.0 is written as /16 in CIDR notation (the network address consists of the first two octets, or the first 16 bits).

o

Apple devices can also use the iCloud service to backup and synchronize files and settings across all Apple devices (i.e., mobile and desktop devices). iCloud is a cloud-based backup service and requires the user to have an Apple ID, which needs to be logged in and configured on each Apple device. Apple devices can then synchronize and backup files over the Internet.

o

Apps on the home screen are tiles. Swiping the tile to the left gives a list of apps installed on the device.

As part of the assembly process, it is necessary to polish the exposed fiber tip to ensure that light is passed on from one cable to the next with no dispersion

As with satellite networking, line of site is affected by weather conditions

Assign permissions to control what users can do

Assigning the boot system to a different partition than application and data files can help many computers run more smoothly and minimize damage in a system crash.

Bad Backlight - A bad backlight may cause a display to become dim. It is important to note that dimming the backlight is a power saving method used by laptop computers to conserve power, so you should always verify that this isn't the cause for a dimmed screen before choosing to replace the backlight.

Basic and dynamic disks use the same hardware, but different partitioning methods.

Basic disks are supported by all operating systems.

Basic

Basic disks have the following characteristics:

Basic disks store partition information in a portion of the master boot record (MBR) known as the partition table.

Basic disks use primary and extended partitions.

Video

Be aware of the following facts about screens and video cards:

o

Because addresses are allocated based on physical location, the prefix generally identifies the location of the host. The 64-bit prefix is often referred to as the global routing prefix.

Because dot matrix printers strike the image onto paper, it is a good printer to use when carbon-copy documents are being printed.

Because key values are short and don't change, the key can be captured and easily broken.

Because many Internet service providers also provide other services (such as cable TV or telephone), you can often combine services to get Internet access with other services.

Because of the limited space in a notebook case, the processor uses a heat pipe to pull heat towards the side of the case where a small fan can vent the heat from the case.

Mean Time Before Failure (MTBF)

Because of the way they are constructed, an SSD storage device has a lifespan (identified as the Mean Time Before Failure) that is usually much shorter than standard hard disk drives. Each time a write/erase operation occurs, it consumes some of the finite lifetime of the flash memory chips within the SSD device.

Configure the router

Before setting up the network, some basic settings on the router need to be configured.

Before two devices can communicate, they must know the MAC address of the receiving device. They do this by using the Address Resolution Protocol (ARP):

Configure the Internet connection

Begin by connecting the router to the Internet connection using the device's WAN port.

o

Binary (e.g., 10000011.01101011.00000010.11001000). In binary notation, each octet is an 8-digit number.

Biometric authentication

Biometric authentication is a type of authentication that relies on the unique physical characteristics of individuals to verify their identity for secure access. Some mobile devices support biometric authentication on lock screens. The two most common ones are fingerprint and facial recognition.

Biometric locks. The two most common biometric locks are fingerprint and facial recognition. With fingerprint recognition, the finger of the user is scanned and used to unlock the device. With facial recognition, the device's camera is used to scan the user's face and unlock the device.

Bluetooth

Bluetooth is a wireless technology standard for exchanging data over short distances from fixed and mobile devices and for building personal area networks (PANs). It can connect several devices, overcoming problems of synchronization.

Bluetooth uses ad hoc connections between devices to create personal area networks called piconets. A piconet can have up to 7 devices, and each device can participate in multiple piconets at the same time.

Both SATA data and device power are integrated in a single cable.

Built-in hard drives or memory for storing and recalling printed documents

Buttons below the keyboard replace mouse buttons for clicks, double-clicks, and right-clicks.

By default, Telnet does not encrypt transmissions (they are sent as clear text).

Cable

Cable networking uses a cable TV connection to create a wide area connection to the Internet.

Cables are easily damaged

Calendar

Calibrate the printer after replacing the ink cartridge. Most inkjet printers include a calibration utility that you can use to align the new print head in the new cartridge.

Calibrate the printer. Some dot matrix printers include a calibration utility that you can use to print out a calibration page. Follow the manufacturer's instructions for completing the calibration.

Can be basic or dynamic

Can be represented in one of two ways:

Extra batteries/chargers

Cell phone chargers have gone through a diverse evolution that included cradles, plug-in cords and obscure connectors. However, more recent devices generally use micro-USB. (Apple devices still use proprietary cables.)

Cellular networking is a truly mobile solution. You can often be moving and still have Internet access without manually having to reconnect.

Centralized services

o

Change or retrieve the homegroup password.

o

Change the drive and directory used for all print queues (spooler location) on the system

Change the driver used by the printer object

Change the port used by the printer

Channel bonding

Channel bonding combines two, non-overlapping 20 MHz channels into a single 40 MHz channel, resulting in slightly more than double the bandwidth.

Channel bonding

Channel bonding is used to combine even more channels in the 5 GHz band, allowing for up to 160 MHz wide channels.

Check the status lights on the back of the Ethernet NIC to verify the physical status. There should be a link light that is green. An unlit link light or one that is another color (like red or amber) indicates a physical connectivity problem.

Clean the drive roller using an alcohol wipe.

Clean the heating element.

Clean the print head every time the ribbon is changed. Clean the head with isopropyl alcohol and a lint-free rag.

Cleaning the keyboard might correct stuck keys or keys that will not display a character when typed.

2.

Click Join Now from the homegroup prompt in the Taskbar, or click Join Now within the homegroup utility from the Control Panel.

Coaxial cable with F-type connectors for cable Internet services. Coaxial cable is also used for older Ethernet implementations (often called thinnet or thicknet networks).

Color thermal printers are very expensive, high quality, and operate quietly.

Impact

Complete the following to maintain impact printers:

Inkjet

Complete the following to maintain inkjet printers:

Thermal

Complete the following to maintain thermal printers:

Completely immune to EMI

Composed of a plastic connector with a locking tab

Composed of a plastic connector with a locking tab, similar to an RJ45 connector

Compressing old files

Compression to reduce the amount of space used by files

Patch

Computers connect to the network through a hub or switch with a patch cable. Patch cables use the same wire configuration on each connector end. The following are the two most commonly used wiring configurations:

Configure quality of service (QoS) settings. Most SOHO routers provide basic QoS functionality. When enabled, QoS prioritizes certain network communications over others. For example, VoIP network traffic would be given higher priority and more bandwidth than HTTP (web browser) traffic.

2.

Configure the printer object where the print device is connected.

Configure the shared secret (passphrase) value used with WPA2 or WPA. Each client needs to be configured with same secret value.

Configuring a default gateway and DNS server addresses that the router will use in order to access the Internet

Configuring logon information (username and password) to access the Internet

Configuring the Internet connection with a static IP address assigned by the ISP or configuring the device to use DHCP for addressing

Configuring the protocol used for the connection. This will often be PPPoE for an always-on Internet connection

Connect the printer to a workstation or server that is connected to the network. The printer is shared to make it available to other computers.

o

Connecting peripheral devices (e.g., keyboard and mouse)

Cooling is a major concern for portable devices. Follow these recommendations:

Copper cables use electrical signals.

Cordless telephones that operate in the 2.4 GHz range (900 MHz cordless phones do not cause interference)

68

DHCP is used to dynamically assign IP addressing information to network hosts when they come online. The client system, when it connects to the network, broadcasts a DHCPDISCOVER message on the network, looking for a DHCP server. The DHCP server responds with a DHCPOFFER message containing proposed IP addressing configuration information. The client then responds with a DHCPREQUEST message to the DHCP server indicating it wants to use the proposed configuration. The DHCP server makes the assignment with a DHCPACK message.

DSL divides the telephone line into multiple channels. One channel is used for analog voice, while the remaining channels are used for digital data.

DSL is not available in all areas; the service location must be within a fixed distance of telephone switching equipment.

Digital Subscriber Line (DSL)

DSL provides broadband digital data transmission over existing telephone lines.

Digital Versatile Disc (DVD)

DVD (Digital Versatile Disc) is an optical media standard that can be used to store large amounts of different types of data (computer data, video, audio).

DVD speeds use a multiple of 1.35 MB/s (1x = 1.35 MB/s, 2x = 2.7 MB/s, etc.).

DVD-RW uses a crystal encoding on the bottom of the DVD disc.

Dead Spots - Dead spots are areas on your screen (sometimes entire rows or columns of pixels) that no longer work. This means that your LCD assembly is no longer functioning and you will need to replace it. Be aware that it is often cheaper to purchase a new laptop computer than to replace the display.

Deleting temporary files such as those used by a web browser or for application installation

Depending on how you use them, most batteries will last between 1-3 years. Under normal conditions, the battery will gradually lose capacity over time. If after calibrating the battery the battery life is still low, the only solution will be to replace the battery.

Depending on the configuration, the DHCP server will use one of the following for DNS server addresses for hosts on the private network:

Additional configuration steps

Depending on the implementation, it may be necessary to take the following steps in order to configure the SOHO router for a particular network environment:

5 GHz: 23 (12 or 6)

Depends on configuration

Accessory

Description

Action

Description

Benefit

Description

Cable

Description

Characteristic

Description

Component

Description

Connection Type

Description

Connection Types

Description

Connector

Description

Consideration

Description

Device

Description

Disk Type

Description

Feature

Description

Issue

Description

Language

Description

Location

Description

Method

Description

Printer

Description

Protocol

Description

RAID Level

Description

Security Method

Description

Standard

Description

Status

Description

Step

Description

Topology

Description

Type

Description

Utility

Description

Virtual Printing Option

Description

o

Desktop computers can be used to make VoIP calls by using VoIP software and the computer's microphone and speakers. The most common example of this is the VoIP application Skype.

o

Detect rogue access points.

Devices often get better reception from APs that are above or below.

Devices often get better reception from access points that are above or below.

Devices use the MAC address to send frames to other devices on the same subnet.

Devices using NFC operate in one of three modes:

Devices you can connect using SATA include:

Difficult to work with

Disable DHCP for wireless clients

Disabling DHCP on the wireless access points allows only users with a valid, static IP address in the range to connect. An attacker would have to be able to discover or detect the IP address range, subnet mask, and default gateway information to connect to the access point.

Disk Defragmenter

Disk Defragmenter optimizes the performance of your hard drive by joining fragments of files that are in different locations on your hard drive into a single location.

Disk quotas to restrict the amount of disk space that files saved by a user can use

Disks used within the spanned volume can be of different sizes.

Do not place the access point next to sources of interference, such as other wireless transmitting devices (cordless phones or microwaves) or other sources of interference (motors or generators).

Do not put any materials in a laser printer that melt below 180 degrees Fahrenheit. When they pass through the fuser, they can melt and permanently damage the laser printer.

Do not use the first or the last host address on a subnet address range.

o

Document and label cable and screw locations

Document or sheet feeders

Does not increase performance

Does not provide fault tolerance. A failure of one disk in the set means all data is lost.

Dot matrix printers can use either a friction feed or a tractor feed system to move paper through the printing assembly.

Double-sided (duplex) printing

o

Dual-layer recordable discs cost more than single layer discs.

Duplex allows you to print on both sides of a sheet of paper.

6.

During the first part of the installation, Windows loads the necessary files it needs to start the installation. You will need to manually load the controller driver so that Windows can see the RAID array. You will need to have the drivers on a flash drive.

Dye sublimation printing prints in transitioning colors rather than pixels.

Dynamic

Dynamic disks have the following characteristics:

Dynamic disks store partitioning information in a hidden database on all dynamic disks in the system.

Dynamic disks support volumes that use discontiguous disk space.

E-readers

E-readers are similar in size to tablets, but they lack the functionality of a tablet. Their primary purpose is for reading digital books, newspapers, magazines, and other periodicals. Most e-readers use E ink to display digital content. E ink is a special technology that creates a high-contrast, black and white display. Even though they can only display grayscale, E ink screens are great for e-readers because they consume much less power than LCD screens and they don't suffer from visibility problems when used in bright sunlight.

Each SATA drive has its own channel, with a single drive connected to each cable and port.

Each laser printer has a DC power supply to operate most of the electronic components inside the printer.

Each laser printer has a controller, which is a circuit board that acts like a motherboard in the printer. This controller board makes it possible for the printer to have and add its own memory.

Each laser printer has a high-voltage power supply to charge the drum. This power supply converts AC current into higher voltages required for the printing process.

Each quartet is represented as a hexadecimal number between 0 and FFFF. Each quartet represents 16-bits of data (FFFF = 1111 1111 1111 1111).

o

Each resource is controlled on a per-user basis, allowing different users to share different resources to the homegroup.

Each subnet in a larger network has a unique subnet address.

Each type of UTP cable can be substituted for any category below it, but never for a category above. For example, Cat 6 can be substituted for a task requiring Cat 5e; however, neither Cat 5 nor Cat 3 should be used for this particular task.

Easy implementation

o

Easy set up and maintenance

Easy to back up

Edit the power scheme to control what the device does when you press the power button, shut down the system, or close the laptop lid.

Edit the print server properties and use the Sharing tab

Edit the print server properties to:

3.

Edit the printer object to configure device-specific settings such as color profiles, paper trays, or features such as stapling or double-sided printing.

Edit the printer properties and use the Advanced tab

Printer properties

Edit the properties of the printer object in order to:

Enable and configure a DMZ (demilitarized zone) host. Configuring DMZ on a SOHO router causes all incoming port traffic to be forwarded to the specified DMZ host. Because this can open up the network to a variety of external threats, only configure DMZ if you understand all the implications associated with it.

Standards

Ethernet standards identify the transmission speed and the cable type. Data transfer rates are between 10 Mbps (very old Ethernet networks) to up to 10 Gbps. Between 100 and 1000 Mbps are the most common speeds for most networks.

Connectivity devices

Ethernet uses the following connectivity devices.

o

FEC0:0:0:0:78CD:1283:F398:23AB

o

FEC0::78CD:1283:F398:23AB (concise form)

o

FEC2:0:0:0:78CA::23AB

o

FEC2::78CA:0:0:23AB or

o

Find locations with poor wireless coverage.

Maintenance Kits

Following the manufacturer's recommendations for the installation of maintenance kits can greatly extend a printer's life. Most maintenance kits include replacements for the most commonly used components of a printer such as:

For Ethernet NICs, the network icon in the notification area can be used to identify the connection status. If the cable is unplugged, or if the NIC cannot find a connected device, the network icon will reflect this.

For a DSL or ISDN router, connect the device directly to the DSL/ISDN line.

For a SOHO network without a domain, use pre-shared key (PSK) authentication with either AES (more secure) or TKIP (less secure) encryption.

For a cable, fiber optic, or satellite connection, connect the router to the Ethernet port on the modem or connection device.

For all RAID configurations, the amount of disk space used on each disk must be of equal size. If disks in the array are of different sizes, the resulting volume will be limited to the smallest disk. Remaining space on other drives can be used in other RAID sets or as traditional storage.

For basic volumes, you can only extend the volume onto the same drive using contiguous unallocated space. Many third-party partitioning tools can extend partitions regardless of the operating system.

o

For dot matrix printers, printer images become faint when the ribbon needs to be replaced. Also, ensure that there is not too much gap between the printer head and the paper.

For individual keys that stick, you might be able to remove the key and clean underneath it. However, if that does not work, you will need to replace the keyboard.

o

For inkjet printers, if letters have missing lines, use the printer's automatic cleaning feature. If this doesn't work, replace the printer cartridge. For missing or incorrect colors, verify ink levels.

o

For laser printers with missing lines, try shaking the toner cartridge to distribute the toner evenly. If lines are still missing, or if extra characters appear, you might need to have the printer cleaned or some internal components replaced.

For modems, try to establish the connection. Verify that you get a dial tone and that the destination computer answers the call.

For network printers, make sure that the printer is configured with correct TCP/IP settings for the network.

For newer laser and inkjet printers, calibrate the printer (perform a self-test). Often the printer uses the self-test to check the printed image and make minor adjustments automatically. Calibration fixes blurry text, misalignment (jagged lines), or incorrect colors.

For optimal performance, consider upgrading to SATA3. This will upgrade your speed to 600 Mbps.

Antenna orientation

For radio frequency wireless devices, the antenna orientation might have a small effect on signal strength. There are two types of antennas that are commonly used in wireless networks.

For security reasons, APs should not be placed near outside walls. The signal will emanate beyond the walls. Placing the AP in the center of the building decreases the range of the signals available outside of the building.

For security reasons, do not place access points near outside walls. The signal will extend outside beyond the walls. Placing the access point in the center of the building decreases the range of the signals available outside of the building.

For wired connections:

For wireless connections:

Full device encryption. This method encrypts every single sector of the device's storage, regardless of whether it has data or not. This protects the entirety of the device, including deleted files. If a mobile device doesn't encrypt contents by default, it's important to make sure that full device encryption is enabled and configured.

Game pads

Gamepads allow you to turn your mobile device into a virtual multi-touch gamepad for PC games through a Wi-Fi connection.

Google: Play Store

Drive not recognized by the BIOS/UEFI

HDD/SSD A modern BIOS/UEFI automatically detects your drives and their geometry during POST. In older systems, you had to manually enter the disk geometry, and it was very common for a wrong value to be entered. In modern systems, this rarely happens. If the BIOS can't detect your drive, it's usually caused by one of three things.

Half the size of other fiber optic connectors

Has a 50% overhead. Data is written twice, meaning that half of the disk space is used to store the second copy of the data. Overhead is 1 / n where n is the price of the second disk.

Has an overhead of one disk in the set for parity information: (1 / n - 1)

Has no overhead because all disk space is available for storing data

Have lands and pits and use reflective light to interpret the data on the disc

Heavily used information is stored on a standard hard disk drive. For example, the Windows operating system and its applications may be installed on a less expensive (but more durable) standard hard disk drive.

Hold about 737 MB of data with error correction or 847 MB total

Holsters

Hot pluggable support, allowing drives to be added and removed while the system is running

ISDN is more common in Europe than in the United States.

ISDN is not available in all areas; subscribers are required to be within a certain proximity of telephone company equipment.

o

Identification (e.g., passports that contain an NFC chip)

If a Home network connection is selected during the installation of Windows 7, the HomeGroup configuration utility will start automatically.

Automatic Private IP Addressing (APIPA)

If a Windows client is configured to receive an IP address from a DHCP server, but cannot contact a DHCP server, it will automatically assign itself an IP address within the following range:

If a ping test fails to any network device, check routers and other devices.

If a problem cannot be found, try restarting the printer and the computer.

If a storage space runs out of disk space, it will immediately unmount, leaving any I/O processes vulnerable to data corruption.

If an address has more than one consecutive location where one or more quartets are all zeros, only one location can be abbreviated. For example, FEC2:0:0:0:78CA:0:0:23AB could be abbreviated as:

o

If faint images from previous printouts appear on subsequent pages, the fluorescent lamp and rubber scraper might not be removing remaining toner from the drum prior to starting a new print job.

o

If it is a device with specifications from Google, which is the case with the Nexus series and the Android One series, then it is completely lag free and fairly responsive.

If no Ethernet adapter is found, open Device Manager to make sure the device is detected, the appropriate driver is installed, and the device is enabled.

If one drive fails, you might be able to use disk recovery tools to recover data from the remaining disks.

If the IP address begins with 169.254.x.x and has a mask of 255.255.0.0, the computer was not able to contact the DHCP server and used APIPA to configure the address automatically. In this case, verify that the DHCP server is connected to the network and properly configured.

o

If the SSID is hidden, make sure the manually entered SSID has been entered correctly.

If the built-in monitor isn't working, connect an external monitor to the laptop. Use the Fn keys to direct output to the external monitor.

Verify network connectivity

If the computer has a valid network connection and IP configuration values are correctly set, use the ping utility to test connectivity with other network hosts. Ping sends out a request that is answered by the destination device.

Verify network communication

If the computer has a valid network connection and IP configuration values are correctly set, you can use the ping command to test connectivity with other network hosts. Ping sends out a request that is answered by the destination device.

If the computer is using DHCP and if you see an IP address beginning with 169.254.x.x and a mask of 255.255.0.0, the computer was not able to contact the DHCP server and used the APIPA feature to configure the address automatically. In this case, verify that the DHCP server is connected to the network and properly configured.

If the computer runs for only a short time even while plugged in, it could be that the power adapter is bad. If the adapter is not working, the computer will run off of the battery until the battery is drained. Try using a different adapter, or verify the power coming from the adapter.

o

If the destination IP address matches its own address, the host responds with a frame that includes its own MAC address as the sending MAC address.

If the disk is turned off, turn it back on, then reactivate the disk.

If the display renders on the external monitor but still won't render on your laptop, then you can assume that there is a problem with your LCD display. If this is the case, you should verify that:

o

If the keyboard doesn't work, plug a keyboard into the USB or PS/2 slot.

If the keyboard doesn't work, you can connect an external keyboard to continue using the system until the keyboard is replaced.

If you need to replace the touchpad, it is typically connected to the palm rest which is part of the inside case. You will need to remove the keyboard and the palm rest to replace the touchpad.

If you use a DHCP server for IP address configuration, you can still manually configure DNS server addresses.

Print to File

If you use the Print to file option, Windows saves the formatting and layout information of your file so a printer can create the document without the program or computer that created it. This allows you to:

If you want to provide values to properly configure the computer in case the DHCP server is unavailable.

If you will not use the battery for longer than 2 weeks, for example if you are not using the laptop or are running it only on AC power, remove the battery and store it separately.

Configure the wireless protocol

If your access point supports multiple wireless protocols, select the protocols to support, such as 802.11n only or mixed mode (both 802.11n and 802.11g). Be aware that when using mixed mode, most access points will throttle all clients to the slowest connected protocol speeds (i.e. if a 802.11g client connects to the network, 802.11n clients will operate at 802.11g speeds).

If your battery seems to be losing the ability to hold a charge, or if the power drops shortly after starting to use it, you might need to recalibrate the battery.

If your computer has used APIPA because the DHCP server is unavailable, it will have an IP address in the 169.254.x.x range. The workstation will be able to communicate with other hosts that have addresses in this range, but will not be able to communicate with hosts on other networks.

If your system or disk supports multiple operating systems, be sure to select a file system supported by all necessary operating systems.

Important data on the SSD is automatically backed up on the standard hard disk drive.

Improved connectors to reduce ESD, improve usability, and extend life when used with external devices

o

In Windows 8 and Windows 10, right-click the Start button, and then click Network Connections.

2.

In Windows, change the Power Scheme settings so that the system is not shut down automatically when the battery level reaches a low level.

In Windows, hibernation must be enabled before you can select Hibernate as an option for shutting down the system or in a power scheme.

In Windows, sleep corresponds to the suspend ACPI state. With hybrid sleep, data in memory is retained as well as written to the hard disk. If the computer is turned off while in hybrid sleep, it can be resumed using the data stored on disk.

6.

In Windows, the RAID array appears as a single disk with a partition already defined. Use Disk Management to format the partition and assign it a drive letter.

o

In the notification area, right-click the Network icon, and then click Open Network and Sharing Center. In the Network and Sharing Center window, on the left pane, click Change adapter settings.

Includes both the network address and the host address.

Incoming and outgoing connections

Incorrectly configured network printing often leads to end users installing the wrong driver on their machine. Make sure to configure your network so that end users don't have to install the driver on their machine, especially without supervision.

Increase internal and external communications

Increase productivity and collaboration

Individuals and organizations can make services (such as a website) available to other users on the Internet.

Inexpensive

Inexpensive compared to other media types

Inkjet

Inkjet printers are quiet non-impact printers with ink stored in a reservoir. Bubble jet printers are the most popular form of inkjet printers.

Inkjet printers feed single cut sheets of paper, from a feed tray, by clamping them between rollers and advancing them one print line at a time, from top to bottom, and then placing the newly printed paper into a tray, other than the feed tray.

Install a new storage device to the system.

Pointing devices

Instead of a mouse, notebooks use one (or more) of the following devices:

Airplane Mode

Instead of a physical switch, some portable devices have a software-controlled switch called Airplane Mode. When in Airplane Mode, all wireless functionality is disabled.

o

Interface IDs must be unique within a subnet, but can be the same if the interface is on different subnets.

Internal hard disks

Internal hard disks are typically 2.5" and very thin compared to desktop hard disks. SATA, solid state drives, and Flash drives are used in portable devices.

Hard drive

Internal hard drives are usually 2.5" in size.

Internal storage

Internal storage is a hardware component located inside the device and used for storing data. Some tablets use solid state drives (SSD), others may use on-board flash memory (such as the iPad). Some also have external USB ports for removable storage.

Participation

Internet The Internet is a large, world-wide, public network. The network is public because virtually anyone can connect to it, and users or organizations make services freely available on the Internet.

Internet requests are sent to the ISP, who then forwards the request to the Internet.

Is 120 millimeters in diameter

Is a 32-bit binary number represented as four octets (four 8-bit numbers). Each octet is separated by a period.

Is a line-of-sight medium. Objects cannot be in the path of communications.

Is created when a network interface is identified as a Home location and if another homegroup is not already present on the local area network (LAN).

Is displayed as a separate node in the Libraries container in Windows Explorer:

Is the best option for I/O-intensive applications like database, email, web servers, or any other system requiring high disk performance

Isolating problems can require going to several physical locations along the ring.

Keep the disk defragmented. A heavily fragmented disk can run quite slowly. You'll need ample free space to fully defragment the drive.

Environment

Keeping printers in a clean, safe area helps prevent premature failure. An optimal printing environment includes:

Keeping the printer in an area with minimal amounts of dust or other air debris will help the printer to run smoothly and will extend the life of its mechanical components.

Knowledge bases

Memory

Laptop memory uses SODIMM and UniDIMM packages with SDRAM and DDR/DDR2/DDR3/DDR4 memory. These modules are sometimes called MicroDIMMs.

Laser printers are classified as page printers, because they print text and graphics simultaneously one complete page at a time.

Laser printers move paper through the printer via motorized rollers.

Laser printers use a laser and electrical charges to transfer images to paper.

Laser printers use a laser to charge a metal drum. The drum picks up plastic toner, and the toner is then fused onto the paper (using rollers and heat).

o

Locate wireless networks.

Location data

Look for a paper jam. If a jam is found, clear it and then check any feed and roller mechanisms nearby and confirm that they are clean and operating correctly.

(MU-MIMO)

MU-MIMO is an enhancement to MIMO that allows multiple users to use the same channel.

Many laptops include a switch that turns the wireless network card on and off. When troubleshooting wireless network connectivity, make sure the switch is turned on.

Change the default SSID

Many manufacturers use a default SSID that contains identifying information (such as device manufacturer and model number), so it is important to change the device's SSID from the default. In addition to changing the default SSID, it is also possible to disable the SSID broadcast. This is known as SSID suppression or cloaking. With broadcasting disabled, the SSID needs to be manually entered into devices for them to connect to the network (the SSID will not show up in the list of available networks).

Many mobile processors are capable of automatic throttling to turn off extra cores or reduce the speed to conserve energy.

Many motherboards include built-in (onboard) support for RAID. RAID implemented in this way is typically software/driver RAID.

Wireless

Many printers allow you to connect using a wireless connection. This is especially useful when working with laptop computers.

Device locator

Many smartphones and tablets have a device location feature to locate a lost or stolen device. This feature is usually a proprietary service specific to the device manufacturer; however, there are also third-party apps that offer location services.

o

Many smartphones use a technique known as tethering to provide cellular Internet to another device. Tethering typically requires the smartphone to be connected via a USB cable.

Many switches allow you to configure Quality of Service (QoS) settings, which prioritize certain types of network traffic over others. For example, if your network includes Voice over IP (VoIP) telephones, you could increase the priority of VoIP traffic on the switch to increase call quality.

Maximum signal distance depends on several factors, including obstructions, antenna strength, and interference. For example, for communications in a typical environment (with one or two walls), the actual distance would be roughly half of the maximum.

May have a long delay time (latency) between requests and downloads

Mesh

Mesh Messages are sent from one device to the next around the ring until they reach the destination device.

Headsets

Mobile headsets allow you to listen to music and answer phone calls. Mobile headsets come in both corded and cordless varieties using Bluetooth technology.

Mobile payment service

Mobile payment services operated under financial regulation and are performed using a mobile device. Instead of paying with cash, check, or credit cards, a consumer can use a mobile phone to pay for a wide range of services and digital or hard goods.

Mobile phones with digital data plans use cellular signals to connect to the Internet.

Most network adapters support Wake-on-LAN (WOL) functionality, which allows you to power on a computer system over the network through the network adapter.

Most notebook manufacturers provide service manuals on their websites that you can use to learn specific disassembly/reassembly procedures for a particular notebook make and model.

Most notebook systems have features that cause keyboard keys to perform alternate functions, such as emulating 10-key functionality by turning on the NumLock. Before troubleshooting other problems, make sure that no special features are enabled that may cause keys to perform alternate tasks.

Most notebooks have an external video port that you can use to display the screen on a projector or a monitor. To show the display on the external monitor, change the display settings in the operating system or use the Fn keyboard combination.

Networking

Most notebooks include built-in networking devices such as an Ethernet port, a modem port, wireless, Bluetooth, and/or infrared.

Memory

Most notebooks use a small panel on the bottom to access the additional memory slots.

Most older versions of some operating systems used a different protocol as the default protocol suite. For example, older NetWare servers used IPX/SPX, while older Mac OS systems used AppleTalk.

USB

Most printers use a USB connection, allowing for configurations that also include scanners, external drives, or additional printers. The USB connection increases speed considerably over a standard serial or parallel port. A smaller number of printers that use a FireWire interface are also available.

Most wireless networks are local area networks that are connected to the Internet using a wired method (such as DSL or another broadband solution).

Mouse malfunction on a laptop is usually caused by the installation of an incorrect driver. Good indicators that the incorrect driver has been installed are if the laptop mouse's sensitivity isn't consistent or if the mouse doesn't recognize a double tap.

Multifactor authentication

Multifactor authentication is a type of authentication that requires multiple authentication credentials to verify the user's identity for a login or other transaction. For example, you might require a user to enter a username, password, pin, and fingerprint before authenticating to a computer system.

Multiple standards define how to send digital data over the analog phone lines at various speeds and compression ratios.

Music

Backwards compatibility

N/A None 802.11b 802.11a/b/g, depending on implementation 802.11b/g/n

NFC has seen widespread use in the following areas:

Management

Network The term network often describes a computer system controlled by a single organization. This could be a local area network at a single location or a wide area network used by a single business or organization. If two companies connected their internal networks to share data, you could call it one network. In reality, however, it is two networks, because each network is managed by a different company.

Network discovery is disabled. This means other computers on the network cannot see you and you cannot see them.

Network discovery is enabled. This means other computers and devices on the network are able to see and connect to each other.

Notebook parts are not as standardized as other PC components. In many cases, you will need to order from the manufacturer to get the correct part.

Power

Notebooks can run from either AC power through the transformer or from battery power. When troubleshooting power, verify that:

Notebooks vary considerably in design and composition. Consult the documentation to find the location of screws and to identify installation sequences for accessing system components.

OFDM, QPSK, BPSK at higher data rates

OFDM (and others, depending on implementation) OFDM

Modulation technique

OFDM DSSS, CCK, DQPSK, DBPSK DSSS (and others) at lower data rates;

Of all the types of printers discussed in this course, laser printers have the highest print quality.

Offers instant power and uses replaceable cartridges

Offers no security for transmissions.

Older operating systems without native TCP/IP support enabled IP communications by either installing the protocol stack or through a process known as encapsulation or tunneling. With this process, non-IP packets are re-packaged as IP packets at the sending device. The receiving device strips off the IP headers to reveal the original packets.

Omnidirectional antenna

o

On Ethernet networks, the interface ID can be automatically derived from the MAC address. Using the automatic host ID simplifies administration.

On Linux and Mac OS systems, use the traceroute command.

o

On Windows 10, Right-click Start, and then click Network Connections.

o

On Windows 7, Right-click the network icon in the notification area and click Properties.

On a Windows system, use the tracert command.

5.

On a client computer, create a network printer object using the share name of the shared printer. To manually identify the shared printer, use the format: \\computername\sharename.

Dynamic Host Configuration Protocol (DHCP)

On a network configured with DHCP, IP hosts contact a DHCP server for IP addressing and other configuration information. This ensures error-free host configuration. With DHCP:

On occasion, driver files may become corrupted. If this is the case, you should reinstall the latest version of the driver from the manufacturer's website.

o

On some controller cards, you can create a RAID 1 set using an existing disk (with data) and a new disk. During the setup, data from the first disk is copied to the second disk.

On the workstation, verify that the Print Spooler service is started.

Once the sender knows the MAC address of the receiver, it sends data in frames addressed to the destination device.

TRIM

One method for extending the life of an SSD device is to enable TRIM functionality. TRIM configures the operating system to communicate with an SSD device and to tell it which blocks of data on the device are no longer required and can be wiped clean. This prevents the SSD device from storing unnecessary data and being overused.

Open

Open authentication requires that clients provide a MAC address in order to connect to the wireless network.

Operating system

Operating system RAID uses RAID features within the operating system. Like software RAID, the system CPU is used for RAID operations, but performance is typically better than software RAID because of integration with the operating system.

Optical disc

Optical discs such as CDs, DVDs, and Blu-ray discs are a storage medium that uses lasers for both reading and writing information. Optical discs store information through pits in their reflective coating. As the disc spins, the optical drive sends laser optics to the disk, and receives the stored information through the deflected output.

o

Optical drives (CD/DVD/Blu-ray)

Orientation allows you to change the orientation of the paper so you can print in both portrait and landscape.

Orphaned files are files that exist on the hard drive but which are not associated with a directory in the index. Normally Check Disk can re-associate the file with the correct directory.

Other APs in the area (for example, each of your neighbors might have a wireless network, with each configured to use a similar channel)

PIN. A PIN allows user to enter the correct four or six numbers in order to unlock the mobile device.

PVC plastic insulation surrounds each copper wire.

Parity requires that you have at least three storage devices. This option uses parity information to reconstruct data if one of the storage devices fails. Parity uses less space for redundancy than the mirror options, but performance is not as good as the mirror options if a device failure occurs. Parity requires only 50 percent more redundancy space than storage space.

Partial Mesh—Some redundant paths exist.

Partial device encryption. With this method, only the sections of the device's storage that contain files are encrypted. This type of encryption is fast, but it doesn't encrypt deleted files, which can be recovered using special software.

Passcode. Passcode authentication uses a user-defined password to unlock the device. The password can be a mix of letters, numbers, and symbols

o

Peer-to-Peer communications (e.g., sharing data between a smartphone, notebook, and tablet)

o

Peer-to-Peer mode enabled two devices to communicate and exchange information.

Perform a test print from the printer console.

Perform a test print from the workstation.

Peripherals are all off

Geography

Personal Area Network (PAN) A personal area network is a very small network used for communicating between personal devices. For example, a PAN may include a notebook computer, a wireless headset, a wireless printer, and a smartphone. A PAN is limited in range to only a few feet. A PAN is typically created using Bluetooth wireless technologies.

Phablets

Phablets are a hybrid between a smartphone and a tablet. They aren't as small as a smartphone and aren't as powerful as a tablet. They are somewhere in between. Phablets usually have a screen size between 5.2 and 7 inches. In fact, any smartphone with a screen bigger than 5.2 inches is technically a phablet, not a smartphone. Most phablets are able to use special stylus pens to interact with the device. This allows for more accurate screen tapping for things like writing notes, drawing diagrams, or navigating apps.

Physically secure the router. Anyone with physical access to the router can make configuration changes and gain access to the network. To prevent this, limit physical access to the router. For example, place the router and other networking equipment in a locked closet.

o

Pin 1: Tx+

o

Pin 2: Bi-

o

Pin 2: Tx-

o

Pin 3: Bi+

o

Pin 3: Rx+

o

Pin 4: Bi+

o

Pin 4: Unused

o

Pin 5: Bi-

o

Pin 5: Unused

o

Pin 6: Bi-

o

Pin 6: Rx-

o

Pin 7: Unused

o

Pin 8: Bi-

o

Pin 8: Unused

Place access points in central locations. Radio waves are broadcast in each direction, so the access point should be located in the middle of the area that needs network access.

Plastic case components are sometimes screwed into place and sometimes snapped into place. For pieces of the case that snap into place, use a plastic tool to carefully pry the piece off.

Pointing sticks are small knobs in the center of the keyboard. Pushing on this knob moves the cursor.

Pools of storage are created from the available disk space. A pool is a logical concept composed of the free space available on the specified storage devices.

Portable devices are built to be lighter and easier to carry. The smaller form causes components to be placed in closer proximity, which has historically caused technical development to lag behind that of desktops.

Portable devices often run on battery power. Individual components are engineered to minimize the power consumption in order to maximize battery life.

Additional devices

Portable devices typically do not have free internal bus slots that you can use to add components and expand the system. Instead, components are typically added in the following ways:

Pouches and sleeves

Power cables run from your laptop to the LCD through the hinges that attach the LCD to the laptop. If these cables become bent or frayed, they can cause your LCD to lose power or display.

Power management must be supported by the BIOS, devices, and the operating system.

Power over Ethernet

Power over Ethernet (PoE) technology can be used to distribute electrical power along with network data on twisted-pair Ethernet cabling (CAT 5 or higher). Power is usually supplied by a PoE-enabled Ethernet switch. PoE is commonly used to power network devices that are located where physical access to a power outlet may not be available. For example, a PoE-enabled surveillance camera mounted on a tall pole can be powered via its Ethernet cabling.

Press the Fn (Function) and the appropriate display key to switch the display output to the laptop monitor.

Print speed

Print speed is expressed as the number of pages that can be printed in a minute (PPM or pages per minute). Printers often rate both the black and white and color print speeds.

Print to Image

Print to Image allows you to print any document into an image file that is independent of the application you use to view them. For example, you can convert a Word document into a .jpg file. The resulting images are print-ready and optimized for websites, smartphones, and tablets. You can also print them on a physical printer for excellent printouts.

Memory

Printers can improve performance by having significant built-in memory. Additional memory improves performance and reduces the processing load on computers. In some cases, you can add or upgrade the memory in a printer.

Additional features

Printers can include additional features such as:

Produces photographic quality images.

Programs

Proper ventilation will help a printer to not overheat. Excessive heat causes electrical components to degrade rapidly. Avoid keeping printers in closets or rooms that aren't properly ventilated.

Protective covers

Protective covers or cases are designed to attach to, support, and hold a mobile device. Protective covers are meant to protect a mobile device from accidental drops, shock, and water.

Protocols—rules or standards that describe how hosts communicate and exchange data

4.

Provide the homegroup password.

Provides Internet access without needing to run cables or lines to each subscriber's premise

o

Provides a stronger point-to-point connection; is better equipped to handle obstacles

Provides for easy configuration--just connect the device to the SATA port

Provides nearly 100% global coverage

Putting the computer to sleep or turning it off automatically

RAID 1 is the most expensive fault tolerant system.

RAM retains contents

o

Read/writer mode is used to read information stored on an NFC chip.

5.

Reboot the computer from the operating system installation disc.

5.

Reboot the computer into the operating system and install the drivers for the RAID controller.

Printer

Recommended Maintenance

Remote wipe

Remote wipe is used to remotely format a mobile device. It's a feature that's built into a lot of mobile devices--especially smartphones--but it's also possible to use third-party software, such as Windows Intune, to achieve this functionality. Remote wipe requires some sort of connection to the device. This means that in order to send a remote wipe command, the device needs to be powered on and have cellular or Wi-Fi connection.

Removable drive bays. Laptop vendors produce removable devices (such as CD/DVD, hard disks, or batteries) that fit into special slots. These slots are typically custom made for the laptop vendor and model.

Removable storage devices are typically connected through eSATA, USB, or FireWire ports. A hard drive enclosure allows you to connect a SATA hard drive to the USB or FireWire port of your computer, making the hard drives a form of portable storage.

Remove accumulated debris with compressed air.

Remove accumulated debris. Pay special attention to the paper rollers as debris can cause them to jam.

Remove accumulated debris. Pay special attention to the tractor feeds as debris can cause them to jam.

Replace the ink cartridge as needed. Avoid refilling and reusing the ink cartridge as it could decrease your print quality. In addition, many ink cartridge manufacturers include a small fuse or switch that is tripped when the cartridge runs out of ink. The switch has to be reset or the fuse replaced before the cartridge could be refilled and reused.

Replace the print head if necessary. Heavily used printers may require replacement of the print head as it wears out. Follow the manufacturer's instructions for replacing the print head.

Replace the ribbon as needed. Avoid rewinding and reusing the print ribbon as it will dramatically decrease your print quality.

Requires a direct line of site between two fixed antennas. A single, large antenna provides connections for all subscribers in an area

Requires a minimum of four disks

Requires a minimum of three disks.

Requires a minimum of two disks

Requires line-of-sight to the satellite (dish placement is crucial)

Requires two disks

SATA devices use a special 15-pin power connector that supplies 3.3, 5, and 12 volts. You can use an adapter cable to convert a 4-pin Molex connector to a SATA power connector, but if you do, the resulting cable will not have 3.3 volts (3.3 volts are typically not used in most SATA devices).

Screen protection and body films

Shared key authentication is relatively insecure, as hashing methods used to protect the key can be easily broken.

o

Shielded twisted pair (STP) has a grounded outer copper shield around the entire wire bundle or around each wire pair. STP provides additional EMI protection, but costs considerably more than UTP.

Signals travel from one node to all other nodes.

SSH

Similar to Telnet, the SSH utility is used for remote server management; however, SSH encrypts all communications and is much more secure.

o

Simple volumes contain disk space from a single hard disk (either contiguous or discontiguous space).

Simple, which does not provide redundancy. This option simply adds space from the storage pool to the storage space. When you select the Simple option, all of the data in the storage space is lost if one of the drives fails.

Smartphones

Smartphones combine the functionality of a cellular phone with the features of a desktop computer. Smartphones can access the Internet either through a Wi-Fi connection or by using a 3G, 4G, and LTE cellular connection. They can also be used as a GPS navigation unit, a portable gaming device, and a mobile music player. Smartphones typically have a screen size between 2.5 inches and 5 inches.

Software

Software RAID uses a driver and the system CPU for controlling RAID operations. This is the slowest form of RAID.

Solid ink

Solid ink printers melt ink onto the print head (which is as wide as the paper). The head jets the melted ink onto the paper as the paper passes by on the print drum (similar to the laser printing process).

Solid ink printers offer the following advantages:

o

Solid state drives (SSD)

o

Some 802.11n devices are capable of transmitting at either 2.4 GHz or 5 GHz. However, a single radio cannot transmit at both frequencies at the same time.

Some DVDs can store data in two different layers on the same side.

Some RAID controller cards support RAID configuration, but without the onboard RAID processor. These solutions are classified as software RAID (sometimes called fake RAID) even though you install a controller card to provide RAID capabilities.

Some RAID controllers support combined levels of RAID. For example, RAID 0+1 is a striped array that is mirrored. Other combined configurations that might be supported include RAID 1+0 (also called RAID 10), RAID 5+0, and RAID 5+1.

Some cables use plenum plastic as an insulator. Plenum wires are fire resistant and non-toxic when burned. These types of cables are rated to be run in the plenum (the space above a ceiling or below a floor) or a building.

Some card slots might be accessible through a panel on the bottom, or underneath the memory or the hard drive. Otherwise, you will typically need to remove the keyboard and the palm rest or the rest of the case to get at the expansion slots.

o

Some controller cards cannot create mirrored drives using existing data on a drive. If you use drives with existing data, that data will be lost.

o

Some controller cards let you mirror an existing drive, but only from a utility that runs within the operating system.

Some disk drives are placed inside a caddy with a special connector. You will need this caddy when replacing the drive.

Some files, such as certain system files, cannot be moved.

Some manufacturers recommend calibrating the battery when you first use it, and every 3 months thereafter.

Some metropolitan areas provide free, city-wide wireless or wired Internet connectivity. This type of network is known as a metropolitan area network (MAN).

o

Some mobile devices (e.g., notebook computers and tablets) have integrated cellular antennas.

o

Some motherboards include eSATA connectors, or you can use a port connector device to add external ports using the internal SATA connections.

Some newer 802.11a and 802.11g devices provide up to 108 Mbps using 802.11n pre-draft technologies (MIMO and channel bonding).

Some notebook components are built into the motherboard and cannot be replaced without replacing the entire motherboard. In those cases, add a similar component using an external bus type (e.g., PC Card/PCMCIA, ExpressCard, or USB).

Some notebooks allow you to detach or remove the screen from the keyboard. This turns the notebook into a tablet.

Some notebooks have one memory slot located underneath the keyboard, and a second slot accessible through a door on the bottom of the case, or both slots accessible from the bottom.

Some notebooks have processors soldered onto the motherboard. On these systems, you will not be able to upgrade or replace the processor.

Some notebooks have special touchscreens that can rotate 180 degrees, allowing the notebook to close and the screen to still be visible.

Some notebooks include a base amount of memory built onto the motherboard or a memory module soldered into the first memory slot. You will not be able to remove or upgrade this memory.

o

Some notebooks recalibrate the touchpad at every system boot. Reboot the computer, making sure not to press the touchpad during startup.

Some operating systems can't run on a large partition. Creating a separate partition for your operating system can help it run properly.

Network

Some printers also have their own network interface card, which allows them to connect directly to a network. Network printers can also be connected to a computer that is connected to the network. Another way to connect a non-network-ready printer to a network is with a network interface device. Network printers are useful for allowing multiple people to share the same printer. This is a common way to connect printers used in a business environment.

Some recordable discs use a foil placed on the top of the disc instead of imbedding the foil inside the plastic. Be very careful when working with these types of discs. A scratch or even some types of markers can damage this layer.

Some screens promise brighter display for crisper viewing or better viewing outdoors.

Memory/MicroSD

Some smartphones feature SD card slots, usually the smaller MicroSD variant. These, in combination with a compatible SD card, can be used to transfer files from one device to another, or simply to increase the storage capacity of the phone.

Some video cards are integrated on the motherboard and cannot be replaced. If the video card can be replaced, you will need to disconnect the display wires first.

Space is added to a user's storage space as the user consumes space.

o

Spanned volumes contain disk space from multiple hard disks, grouped together into a single logical volume.

Spanning is another term for JBOD because the volume spans multiple physical disks.

Spatial diversity uses multiple antennas that are physically separated from one another.

Speakers

Speakers allowing you to listen to your mobile device without headphones. Portable speakers can be connected to your mobile device using Bluetooth or through the earphone jack.

Special training required to attach connectors to cables

Specification

Standard

Category

Standard Bandwidth Cable Type Maximum Segment Length

Star

Star Messages are sent directly to (and only to) the destination device.

Data resiliency

Storage spaces can include data resiliency. Choosing an option that provides resiliency requires you to allocate space for redundant information. The options for storage spaces data resiliency include:

Ease of adding space

Storage spaces eliminate the need for such tasks as repartitioning drives, resizing volumes, and backing up data in order to repartition. When you need more disk space for your storage spaces, follow these steps:

Stores cyclic redundancy check (CRC) values to check that its data is intact. If the data is corrupted, GPT notices the problem and attempts to recover the damaged data from another location on the disk. MBR has no way of knowing if the data is corrupted. You would only see that there was a problem when the boot process failed or the partitions vanished.

Stores multiple copies of the partition table across the disk, so it's much more robust and can recover if the data is corrupted

Storing a battery longer than 3 months without use might affect its ability to hold a charge.

Supports a large amount of data

Supports both pre-shared key (WPA-PSK or WPA Personal) and 802.1x (WPA Enterprise) authentication

Supports both pre-shared key (WPA2-PSK or WPA2 Personal) and 802.1x (WPA2 Enterprise) authentication

Supports external devices through the external SATA (also called eSATA) standard. eSATA is faster than USB and FireWire

Supports up to 128 partitions depending on space allocated for the partition table. There is no need for extended and logical partitions.

Supports up to 2 pairs of wires

Supports up to 4 pairs of wires

Swipe lock. Most mobile devices are configured to use a swipe lock screen. This means that anyone can unlock the device with a simple swipe of the screen; there's no authentication at all. For obvious reasons, this is not very secure.

Switches can operate in full-duplex mode, where a device uses a different channel for sending and receiving and where the transmission paths are dedicated to only the communicating devices.

TCP/IP

TCP/IP is the protocol suite used on the Internet and on most networks. Nearly all computers today use TCP/IP for communication. The Internet Protocol (IP) is a key component of the TCP/IP protocol suite. The IP protocol is responsible for determining how to deliver data from the sending host to the destination host. However, it does not provide a mechanism for segmenting and sequencing packets in a communication. To accomplish this, IP is used in conjunction with another transport protocol:

Tablets

Tablet devices use a touchscreen interface instead of the touchpad and keyboard used by notebook PCs. The touchscreen interface is usually capacitive, meaning that it requires conductive material, such as your finger tip, for input. Capacitive touchscreens provide multi-touch capabilities, which allow the tablet to recognize multiple finger touches at the same time.

Takes up less physical space and weighs less than Nickel Cadmium or Nickel Metal Hydride batteries for comparable power output

Tapes are relatively inexpensive and small enough for long-term storage.

Tapes can be changed, allowing you to save data from different sources on the same drive.

Tapes can typically store large amounts of data. DLT tapes range in capacity from 10 GB to 800 GB per tape.

Telnet is mostly used by specialized industrial and scientific devices.

Terminators absorb signals and prevent them from reflecting repeatedly back and forth on the cable.

Tethering

Tethering is connecting one device to another. In the context of mobile phones and tablet computers, tethering allows sharing the Internet connection of the phone or tablet with other devices like laptops. Connection of the phone or tablet with other devices can be done over wireless LAN (Wi-Fi), over Bluetooth, or by physical connection using a cable like USB.

The 128-bit address contains two parts:

Channel interference

The 2.4 GHz frequency range is divided into 11 channels, with each channel having some overlap with the channels next to it. You might experience problems with your wireless network when other devices are trying to use the same or adjacent channels. There are also numerous devices that operate in the 2.4 GHz and 5 GHz ranges, which can create background noise and additional interference.

The 2.4 GHz range has a total of 11 channels, with 3 non-overlapping. This allows for a maximum of 1 non-overlapping channel. For this reason, channel bonding is typically not practical for the 2.4 GHz range.

The 5 GHz range has a total of 23 channels, with 12 non-overlapping. This allows for a maximum of 6 non-overlapping bonded (combined) channels.

o

The 64-bit prefix can be divided into various parts, with each part having a specific meaning. Parts in the prefix can identify the geographic region, the ISP, the network, and the subnet.

The DHCP server delivers its own IP address as the default gateway address.

The DHCP server ensures that no two hosts are assigned the same IP address.

The DHCP server will automatically assign IP addresses within the range you specify.

DNS server

The DNS server address identifies the DNS server that is used to resolve host names to IP addresses.

o

The DNS server addresses configured at the ISP. With this configuration, clients attempt to connect directly to the DNS servers at the ISP for name resolution requests.

Failed

The Failed status shows for a volume that cannot be started, such as when the disk is damaged or the file system is corrupt. Make sure the disk is on, then try reactivating the volume. If that doesn't work, then you likely have data loss.

Formatting

The Formatting status is shown for volumes during the formatting process. After formatting, the status for the volume changes to Healthy.

Healthy or Online

The Healthy or Online status indicates that the disk is turned on and can be accessed. The volume on the disk is valid and has no errors.

Home network

The Home network location is designed for use on networks where you know and trust each device on the network. With the Home network location:

IP address

The IP address identifies both the logical host and the logical network addresses.

Initializing

The Initializing process shows while a disk is being converted from a basic disk to a dynamic disk. After the conversion, the status for the volume changes to Healthy.

The Internet is classified as a public network. All devices on the public network must have a registered IP address. This address is assigned by the ISP.

The Internet uses a set of communication protocols (TCP/IP) for providing services.

The MAC address is a 48-bit, 12-digit hexadecimal number (each number ranges from 0-9 or A-F).

The MAC address is a unique hexadecimal identifier burned into the ROM (physically assigned address) of every network interface.

The MAC address is a unique hexadecimal identifier burned into the ROM of every NIC.

The MAC address is guaranteed unique through design.

o

The MAC address is guaranteed unique through design. The first half (first six digits) of the MAC address is assigned to each manufacturer. The manufacturer determines the rest of the address, assigning a unique value which identifies the host address. A manufacturer that uses all the addresses in the original assignment can apply for a new MAC address assignment.

Offline

The Missing or Offline statuses show when a dynamic disk has failed, been removed, or turned off.

No Media

The No Media status shows for an optical or removable media drive that does not contain a valid disc. This disk status only applies to CD-ROM, DVD-ROM, or removable disks.

Unknown

The Not Initialized or Unknown status indicates a disk without a valid master boot record or partition table (either missing or corrupt). To correct the problem, initialize the disk. If the partition table is invalid, use third party tools to try to recover the partition table.

Online (Errors)

The Online (Errors) status indicates that I/O errors have been detected on a dynamic disk. To correct the problem, try reactivating the disk.

PRL updates

The Preferred Roaming List (PRL) is a database residing in a wireless device that contains information used during the system selection and acquisition process. Without a PRL, the device may not be able to roam. In some cases, having a missing or corrupt PRL can lead to a customer not having service at all. On many networks, regularly updating the PRL is advised if the subscriber uses the device outside the home area frequently, particularly if they do so in multiple different areas. This allows the phone to choose the best roaming carriers, particularly "roaming partners" with whom the home carrier has a cost-saving roaming agreement, rather than using non-affiliated carriers. PRL files can also be used to identify home networks along with roaming partners, thus making the PRL an actual list that determines the total coverage of the subscriber, both home and roaming coverage.

PRI updates

The Primary Rate Interface (PRI) is a telecommunications interface standard used on an Integrated Services Digital Network (ISDN) for carrying multiple DS0 voice and data transmissions between the network and a user. The PRI is a level of service assigned by the ISDN, sometimes referred to as an ISDN PRI. The PRI provides businesses with digital access to the PSTN. While ISDN PRI is usually associated with only voice transmission, it is capable of transmitting data, video, and faxes as well.

Public network

The Public network location is designed for use on unknown or public networks (e.g., a coffee shop or other public Wi-Fi network). With the Public network location:

The SATA cable is unplugged.

The SOHO network is classified as a private network. All devices on the private network use private IP addresses internally, but share the public IP address when accessing the Internet.

Service Set Identifier (SSID)

The SSID, also called the network name, groups wireless devices together into the same logical network. All devices on the same network must use the same SSID.

The Telnet protocol must be running and configured on the remote server in order for a Telnet session to be established.

Unallocated

The Unallocated status shows for portions of a disk that have not been assigned to a partition or a volume.

Unavailable

The Unavailable status indicates that errors have occurred on physical or dynamic disks.

Unreadable

The Unreadable status indicates a hardware failure, I/O errors, or other corruption but might also be caused by a delay in reading the disk in Disk Management. Try rescanning the disk to see if the status changes; if not, troubleshoot the hardware or disk problem.

Configure Wi-Fi Protected Setup (WPS)

The WPS security protocol makes it easier for WPS enabled devices (e.g., a wireless printer) to connect to the wireless network. WPS can use several methods for connecting devices, including the PIN method and the push button method. The method used to connect devices must be supported by both the access point and the wireless device.

The Wake on LAN (WoL) feature allows a device that receives a special network signal to wake the computer from a sleeping or hibernated state. WoL is often used by desktop administrators to remotely start up computers for management purposes.

The Windows firewall configuration is changed to allow certain types of network communication through.

The Windows firewall configuration is changed to allow certain types of network communication.

The Windows firewall configuration is changed to block almost all inbound and most outbound communications. For applications to be able to communicate, they need to be manually allowed through the firewall.

Work network

The Work network location is designed to be used in a SOHO environment or other small business network. With the Work network location:

The ability of newer devices to communicate with older devices depends on the capabilities of the transmit radios in the access point.

The ability to format larger partition sizes in Windows

The active partition identifies the partition that contains the operating system (or the program that loads the operating system) used to start the computer.

The address is made up of 32 hexadecimal numbers, organized into 8 quartets (e.g., 35BC:FA77:4898:DAFC:200C:FBBC:A007:8973).

The address is often written as 00-B0-D0-06-BC-AC or 00B0.D006.BCAC (although dashes, periods, and colons can also be used to divide the MAC address segments).

The amount of base memory installed will affect the total amount of system memory you can have.

The antenna for wireless network cards is typically housed in the display bezel.

o

The app drawer can be found using a button on the home screen.

The braided mesh conductor is a second physical channel and also functions as a ground. It is made of aluminum or copper-coated tin.

The cable length can be up to one meter (up to 2 meters for eSATA).

The central core carries the signal. It is made of plastic or glass.

Configure the channel

The channel identifies the portion of the wireless frequency used by the access point and connected devices.

The cladding maintains the signal in the center of the core as the cable bends.

Cleaning

The cleaning phase prepares the drum by removing the previous image printed. It uses a rubber-cleaning blade to remove any excess toner on the drum and then it scrapes off the debris into a debris cavity. Next, a heat roller is lubricated to ensure that enough heat will be evenly applied to transfer the next image printed. Then an electrostatic erase lamp neutralizes the electrical charges that remain on the drum from the previous printed image.

The client application generates the print job on the local system. This process is known as spooling.

The color system used by thermal printers is CMYK (cyan, magenta, yellow, and black).

The components used in notebook systems are much smaller than those used in desktop system. You should carefully organize and label each part as you remove it from the system to ensure that it doesn't get lost and that it gets reinstalled in the correct location.

The cord from the AC outlet to the power adapter is correctly plugged into both the wall and the adapter unit. Move it around to see if a more secure connection can be made.

The core diameter is around 10 microns

The crispness of an inkjet printer's image is usually rated as dots per inch or dpi. Ink jets range from 150 to over 1400 dpi.

Default gateway

The default gateway identifies the router to which communications for remote networks are sent. The default gateway address is the IP address of the router interface on the same subnet as the local host. Without a default gateway set, most clients will be unable to communicate with hosts outside of the local subnet.

Developing

The developing roller applies toner to the drum. The toner sticks to the charged areas on the drum.

The drive is malfunctioning.

eSATA

The eSATA (external SATA) standards are a subset of other standards specifically for externally connected devices.

eSATAp

The eSATAp (Power over eSATA or Power eSATA) standards are meant to replace eSATA.

The eSATAp connector and port are neither an L-shaped or rectangular.

o

The extended partition or a logical drive on the extended partition cannot be set to active.

The feed assembly takes the thermal paper off the roll and it sends it through the printer to the outside of the printer.

Prefix

The first 64 bits are known as the prefix.

Fusing

The fusing assembly attaches the toner to the paper using rollers that press and melt the toner to the paper. As the paper leaves the printer, a static eliminator strip removes the static charge from the paper.

The head takes as long as 15 minutes to heat prior to printing.

The host only configures the IP address and mask. It does not assign itself the default gateway and DNS server addresses. For this reason, APIPA can only be used on a single subnet.

The host uses broadcast messages to locate a DHCP server when it boots.

The hostname command displays the hostname of the system.

Hostname

The hostname identifies the logical name of the local system.

The ink reservoir is in a disposable cartridge that includes the printing mechanism.

The inner conductor carries data signals and is made of solid copper or tin.

The insulator surrounds the inner conductor and keeps the signal separated from the mesh conductor. It is made of PVC plastic.

The inverter is a power supply for the LCD screen that converts the DC power used by the computer to AC power needed for the backlight.

Interface ID

The last 64 bits are the interface ID. This is the unique address assigned to an interface.

The length for fiber optic cables varies depending on the cable type and specification, but typically ranges from 100 meters all the way up to 40 kilometers.

The local routing table

AP placement

The location of the AP can affect signal strength and network access. Keep in mind the following:

Access point placement

The location of the access point can affect signal strength and network access. Keep in mind the following recommendations:

The logical host address identifies a specific host on the network. Each device must have a unique logical host address.

The logical network address identifies a network segment (called a subnet). All devices on the same network segment share the same logical network address.

The logical topology describes the way in which messages are sent.

o

The manufacturer determines the rest of the address, assigning a unique value which identifies the host address.

The maximum cable length for UTP Ethernet "T" implementations is 100 meters for all standards.

Printer port

The means by which a print device connects to a print server (the printer's NIC). Many printers can be configured in the same way that most plug and play devices are.

The more information that is on the drive, the more time it will take to defragment the drive.

The most common (and most supported) network medium • Very susceptible to EMI

The most common number of pins on a dot matrix printer is 9, 18, or 24, with more pins providing a higher resolution. 24-pins create a near-letter quality print and anything with less than 24-pins provides a draft quality print. The overall print quality of a dot matrix printer is quite poor when compared to that of other types of printers.

Notebook Components

The most common portable components used with laptop systems are keyboards, mice, digitizer pads, and antennae. The following list suggests troubleshooting methods to use when working with these components:

Incorrect configuration

The most common source of problems with wireless networking is incorrect configuration. Before considering other problems, verify that the correct SSID and WEP/WPA keys have been configured. Remember that WEP/WPA keys are not case sensitive, but passphrases are case sensitive. In the case of a standalone (or thick) configuration, make sure each individual AP is properly configured. With a controller-based (or thin) configuration, make sure each AP can communicate with the wireless controller.

Media

The networking medium provides the path for signals to pass between devices.

o

The notification area includes a Network icon that indicates the physical status of the connection. If the cable is unplugged or the NIC cannot find a connected device, the Network icon will have an X on it.

o

The notification area includes a Wireless Network icon that indicates the connection status. If the computer is not connected to any wireless network, the icon will have an X on it.

o

The numbers in a MAC address can be divided by dashes (00-B0-D0-06-BC-AC), periods (00B0.D006.BCAC), or colons (00:B0:D0:06:BC:AC).

The operating system, BIOS, and devices interact to manage power.

The paper must make one pass for each application of a different color.

o

The partition table has room for up to four partition entries (hence the limitation on the number of primary partitions).

Print device

The physical device connected to the print server where print output occurs

The plastic sheath encases everything and protects the cable.

Print queue

The portion of the hard drive where print jobs are stored before going to the print device.

o

The power bundles that go from your laptop to the LCD are not damaged or cracked. You must remove the bezel around the LCD to inspect the power bundles.

The power connector is unplugged.

The preconfigured power schemes available depend on the operating system version and the computer type (laptop or desktop). Some manufacturers also include preconfigured power schemes. Default power schemes are often included to maximize performance or power savings.

o

The prefix length identifies the number of bits in the relevant portion of the prefix. To indicate the prefix length, add a slash (/) followed by the prefix length number. Full quartets with trailing 0's in the prefix address can be omitted (for example 2001:0DB8:4898:DAFC::/64).

The print head can become dangerously hot due to pin friction.

The print head heats and passes over the film, causing the dye to vaporize and soak into the film paper.

5.

The print job is concurrently stored on a disk file.

The print job is sent to a print queue. The queue is a location for storing waiting print jobs.

7.

The print job is then sent to the printer and is physically printed.

Print server

The print server is a software process that takes print jobs from the queue and sends them to the print device.

Use a print server

The print server manages the flow of documents sent to the printer. Using a print server lets you customize when and how documents print. The print server can be any one of the following devices:

6.

The printer driver creates the correct print document format.

Connect the printer to the network

The printer must have a connection to the network (either wired or wireless). This can be done in one the following ways:

Processing

The printer receives a document to be printed from the connected computer and converts it into a bitmap raster image, which is divided into horizontal raster lines.

The private network can use addresses in the following ranges that have been reserved for private use (i.e., they will not be used by hosts on the Internet):

Processor

The processor is typically located underneath the keyboard.

The protective layer provides a stiff structure to prevent the cladding and central core from breaking.

The quartets are separated by colons.

The remainder of the LCD screen comes as a unit.

The route command displays the default gateway configuration settings.

The same cable line is used to carry networking and cable TV signals, although in some cases a separate line is installed for Internet access.

SATA2

The second generation of SATA devices support up to 3 Gbps (300 MBps). SATA2 includes the following enhancements:

The sheath is made of PVC plastic and encases the cable, protecting it from external elements.

Print driver

The software that allows the printer to communicate with the print device. Printer drivers provide the following support functions:

The speed of an Ethernet network adapter is determined by the NIC, the network medium, and the connectivity device. The speed can only go as fast as the slowest component. For example, if the NIC runs at 1000 Mbps, but the Ethernet cable only runs at 100 Mbps, the speed to the network will be 100 Mbps.

The speed of dot matrix printers is measured in characters per second (CPS). Common speeds for a dot matrix printer are 32 to 72 CPS.

4.

The spooler tracks the printer ports and printer configuration and assigns print queue priority to the print job.

The standard includes new connectors for solid state devices and thin optical drives.

o

The stock version of Android contains a home screen where you can put app shortcuts and widgets.

Subnet mask

The subnet mask identifies which portion of the IP address is the network address and which portion is the host address. Two devices on the same subnet must be configured with the same subnet mask.

The system volume can only be extended using contiguous free space on the same disk. This is the same for both basic and dynamic disks.

Telnet

The telnet utility is used for remote server management.

SATA3

The third generation of SATA devices support up to 6 Gbps (600 MBps).

The touchpad is located below the keyboard. Moving your finger across the pad moves the mouse. You can also tap the touchpad to click the mouse.

Touchpad

The touchpad takes the place of a mouse.

Transferring

The transfer roller charges the paper to attract the toner.

The video controller is either integrated onto the motherboard or it might be a separate board that can be replaced.

There are different connectors rated for solid or stranded core wires; be sure to use the correct connector type.

There are no performance or fault tolerance benefits with JBOD.

There are some compatibility issues between disc formats and readers.

They have a small capacity (650 MB for CDs, 4.7 GB for DVDs).

Thin provisioning

Thin provisioning or overbooking allows you to allocate larger storage spaces than the disk space available in the pool.

This standard mainly addresses solid state drives with SATA (hard disk drives are not capable of sending data at this rate).

To clean up toner spills, scoop up large quantities of toner or use a damp cloth to wipe up lesser quantities. Use toner vacuums that are specially designed to clean up toner spills. Never use a household vacuum to clean up a toner spill. Because toner is very fine, it is likely to pass through a household vacuum's filter and be blown into the air. Also, it can be attracted to magnets in the motor and ruin the vacuum or cause a fire.

o

To convert from a dynamic disk to a basic disk, you must delete all existing volumes.

To edit the print server properties, in the Printers folder, choose the File menu then Server Properties....

To extend the volume onto the same drive using non-contiguous unallocated space, or to extend the volume onto another disk, convert the disk to a dynamic disk, then extend the volume.

o

To help in heat dissipation, do not place a laptop on a surface where air cannot be circulated evenly beneath it. The best way to keep a laptop properly ventilated is to purchase special laptop cooling bases that provide fans for the bottom of the unit. If a laptop cooling base is not available, set it on top of hard, solid surfaces, such as a desk or counter top. Soft surfaces, such as a couch or your lap, should be avoided because they will more than likely obstruct even airflow.

To help prevent scratching, keep the disc in its case when not being used.

To identify the source of problems on a notebook, plug in a known good external component. For example:

To improve defragmentation, disable programs that run in the background like screensavers and virus software. Any disk access while Disk Defragmenter is running (whether to read from or write to the disk) will slow down the defragmentation process.

To join to a homegroup from a computer running any edition of Windows 7:

To minimize the effect of scratches that might be generated while wiping a disc, wipe the disc in straight lines from the center to the edge (like the spokes of a wheel).

To provide more working time when running on battery power, turn down the display brightness, avoid watching DVDs or playing CDs, turn off wireless networking when not in use, use Power Scheme settings to power off unused devices, and adjust processor power settings (if available).

To reduce crosstalk, keep the pairs twisted as much as possible right up to the connector.

To remove the display assembly, remove the screws holding the lid that are typically located beneath the keyboard or a plastic cover above the keyboard. Unplug the video cables and the wireless antenna or other device cables.

Screen locks

To secure access to a mobile device, such as a tablet or smartphone, configure the device's lock screen to use some sort of authentication. Several different types of lock screen authentication methods include:

To view a list of available network connections:

Toner drum

Transferred data at a rate of 150 KB/s

Translate data into a recognizable form for the given printer

Transmission media—a path for electrical signals between devices

Transmission speeds are affected by distance, obstructions (such as walls), and interference.

Try installing a different network adapter, such as an external adapter that connects through a USB port.

2,000 Mbps (full-duplex)

Twisted pair (Cat5 or higher) 100 meters

200 Mbps (full-duplex)

Twisted pair (Cat5 or higher) Uses 2 pairs of wires 100 meters

Architecture

Two computer architectures are used by mobile devices:

Two devices on the same subnet must have IP addresses with the same network portion of the address.

Two devices on the same subnet must have unique host portions of the IP address.

Upgrade the hard disk

Upgrade to the fastest hard disk possible. Hard disk drives come in a variety of different rotation speeds such as:

Upgrade the disk interface

Upgrading your disk interface will greatly improve the throughput of data to and from your hard disk drive.

Use AirPrint to enable wireless printing capability on Apple iOS devices.

Use Bonjour networking technology service to allow you to share a printer on your local area network.

Use Chkdsk with the /f switch to automatically fix errors without scanning for bad sectors.

Use Disk Management or DiskPart to create, format, and manage partitions and volumes. You access Disk Management on Windows systems through Computer Management. You access DiskPart from the command prompt by entering cmd.

Use Google Cloud Print to wirelessly send jobs from Internet-connected devices to a remote printer.

Use Ipconfig /all to view additional information including the DNS server addresses.

Use Ipconfig to view the IP address, subnet mask, and default gateway configured for the system.

Use a channel that does not overlap or conflict with other access points in the area. A simple rule to minimize conflicts is to remember that the frequencies used by channels 2-5 compete with the frequencies used by channels 1 and 6, while the frequencies used by channels 7-10 compete with the frequencies used by channels 6 and 11.

Use a crimping tool designed for RJ45 connectors to attach connectors to UTP cable. Most crimping tools include an integrated wire stripper that you can use to remove the outer sheath from the cable so you can access the individual wires.

Use a different network cable that you know works. You can use a cable tester or cable certifier to test the network cabling behind the wall (the cable between the wall jack and the punch-down panel). You can also use a tone generator (sometimes called a toner) and probe to trace the location of cables through the wall and ceiling.

o

Use a different network cable that you know works. You can use a cable tester or cable certifier to test the network cabling behind the wall between the wall jack and the punch-down panel. You can also use a tone generator (sometimes called a toner) and probe to trace the location of cables through the wall and ceiling.

Use ifconfig [interface_name] down to disable the specified network interface.

Use ifconfig [interface_name] up to enable the specified network interface.

Use ipconfig /all to view additional information (e.g., the DHCP and DNS server addresses).

Use ipconfig /all to view detailed configuration information including the MAC address and the DHCP server used for configuration.

Use ipconfig /displaydns and ipconfig /flushdns to view and manage the local DNS cache. The first command displays the contents of the local DNS cache that Windows maintains and updates every 24 hours. The second option flushes (or removes) all the entries in the current DNS cache. If the IP address of a network server is changed, your local cache will contain the old IP address until the cache is updated or the flushdns option is used.

Use ipconfig /release to release the IP configuration information obtained from the DHCP server.

Use ipconfig /renew to request new IP configuration information from the DHCP server.

Use ipconfig to view IP address, subnet mask, and default gateway configuration.

Use only approved toner or ink cartridges. Refilling cartridges might cause ink or toner spills, result in unsatisfactory output, void the printer warranty, or cause damage to printer components.

Use shared key authentication on small, private networks.

Use the /r switch to scan and fix bad sectors and other errors.

Use the HomeGroup utility in the Control Panel to:

Use the Services snap-in to manage the Print Spooling service.

o

Use the appropriate hand tools

Use the correct paper type for the printer. Most paper will be labeled as appropriate for a specific type of printer. For example:

Use the following syntax to establishing an SSH connection:

Use the ipconfig utility to view the IP address, subnet mask, and default gateway configured for the system.

Used in legacy 10Base2 Ethernet networks

Used in specialized industries

Used primarily for telephone wiring

Used to connect a cable modem to a broadband cable connection

Used to connect composite video displays on commercial video devices.

Escape Codes

Used to control dot matrix printers. Escape codes are primitive compared to today's standards.

Used to create cable and satellite TV connections

User Datagram Protocol (UDP) - UDP is a connectionless protocol. Unlike TCP, UDP does not require acknowledgements. One of the key drawbacks of using TCP is the fact that its reliability introduces latency. For small data transmissions, such as sending an email, moderate latency is not a problem. However, for large data transmissions, such as video or audio streaming, the latency associated with TCP is unacceptable. By using UDP instead, the latency of the transmission is significantly reduced, with the assumption that an occasional lost packet won't be detrimental.

Users and organizations connect to the Internet through an Internet service provider (ISP).

Users can configure settings that identify events and power consumption characteristics. For example, you can configure the display to turn off after 5 minutes of inactivity.

Users who have the Manage documents permission can manage all documents in the queue (pause, resume, delete, or rearrange the order). Users can only pause individual documents (or all documents) in the queue; they cannot pause the printer.

Uses 50% of the total raw capacity of the drives is due to mirroring

Uses Advanced Encryption Standard (AES) as the encryption method

Uses Ethernet or 802.11 wireless networking (or both) as the network medium

Type

Uses Resistance Rating

Uses a ceramic ferrule to ensure proper core alignment and prevent light ray deflection

Uses a locking tab to keep a connector secure in an outlet

Uses a locking tab to keep aconnector secure in an outlet

Uses a single subnet

Uses a subnet mask to differentiate the network and host addresses.

Uses a transmitter with an antenna (dish) directed skywards to a satellite

Uses metal guide pins to ensure it is properly aligned

Uses serial communication (meaning each device is on its own channel)

o

Using glossy paper in inkjet printers could lead to smeared ink because the ink is not being absorbed into the paper.

Using splitters degrades signal quality

Using surge protectors will help protect a printer from the effects of power surges and spikes.

Verify that the cable is connected on both ends and that it is the correct cable for that printer.

Verify that the latest version of the driver for the specific make and model of the printer has been installed. If the incorrect driver is installed, this can lead to post-script text, garbled text, and other irregular activity.

4.

Verify that the printer works by sending a test print.

Verify the network adapter

Verify that your computer has detected and properly configured the network adapter card.

Verify the interface type, speed, capacity, and RPM speed supported by the notebook before purchasing a replacement drive.

o

Verify the wireless network configuration.

Very common (media and tools are easy to obtain)

Very heat sensitive

o

Video gaming

Video memory typically shares a portion of the system memory, although some notebooks have dedicated video memory.

VoIP

VoIP devices provide voice communication over a packet-switched network (an IP network). The most common VoIP device is an IP phone. Instead of using the standard public switched telephone network, IP phones connect to an Ethernet network using an RJ45 connection. Basic VoIP services include Skype or Google Voice.

Voice over IP (VoIP) sends voice phone calls using the TCP/IP protocol over digital data lines.

Volumes on dynamic disks are like partitions and logical drives on basic disks.

Wired Equivalent Privacy (WEP)

WEP is an optional component of the 802.11 specifications that was deployed in 1997. WEP has the following weaknesses:

Wi-Fi Protected Access (WPA)

WPA is the implementation name for wireless security based on initial 802.11i drafts that was deployed in 2003. It was intended to be an intermediate measure to take the place of WEP while a fully secured system (802.11i) was prepared. WPA:

Wearable devices

Wearable devices are a type of mobile device meant to be worn somewhere on the body. These devices range from being as simple as a fitness tracker wrist band to as complex as glasses or a virtual reality headset. Most wearable devices are designed to interface with another device. For example, a smartwatch by itself has a limited set of functionality; however, smartwatches are designed to connect to smartphones using Bluetooth. Doing this unlocks additional functionality, such as reading texts or answering phones calls through the smartwatch.

o

When an extended partition is used, one of the four entries points to an extended boot record (EBR). The EBR is located within the extended partition and contains information about the logical drives within the extended partition.

When creating a homegroup, a default password is provided. Use this password to connect other computers to the homegroup.

o

When creating new RAID 0 and RAID 5 drives, all existing data on all disks will be lost.

Keyboard

When experiencing problems with the keyboard:

When installed, both PCMCIA and ExpressCard cards extend past the outer edge of the laptop (with ExpressCards extending less than PCMCIA cards). You should remove the cards from the slots before putting them in a case to prevent them from catching on objects and breaking.

When installing a newer SATA2 drive into a system that only supports SATA1, you might need to:

When moving from outside to inside, allow the computer to warm up before using it. One of the main reasons is to prevent water vapor condensation that can occur when the system is powered on and warms up quickly.

o

When possible, use switches instead of hubs.

When replacing the video card or LCD components, be sure to reconnect the wireless network antenna when reassembling.

When the SSD is too full, performance will decrease significantly. If this happens, try enabling features such as TRIM support in the OS.

4.

When the battery level drops below 3%, turn the laptop off.

When using NTFS on removable devices, you must use Safely Remove Hardware before removing the flash device to prevent file corruption.

When you configure an access point, some configuration utilities use the term mixed mode to designate a network with both 802.11n and non-802.11n clients. In this configuration, one radio transmitter is used for legacy clients, and the remaining radio transmitters are used for 802.11n clients.

Extend the volume

When you extend a volume, you add unallocated disk space to the volume.

When you format a disk, you identify the file system type and identify the cluster size used to store data.

o

When you make a phone call, the call is converted into digital data and sent through the Internet.

When you move a device to another network, the physical address remains the same (as long as the network card has not been changed).

When you place a disc in the drive, it can take several seconds for the drive to recognize the new disc and spin up to speed. If you receive a message saying that the drive is not accessible after trying to access a recently inserted new disc, wait a few seconds and try again.

When you shrink a partition, unmovable files (e.g., the paging file or the shadow copy storage area) are not automatically relocated and you cannot decrease the allocated space beyond the point where the unmovable files are located. If you need to shrink the partition further, check the Application Log for Event 259, which identifies the unmovable file. Next, move the paging file to another disk, delete the stored shadow copies, shrink the volume, and then move the paging file back to the disk.

Configure DHCP

While you can manually assign IP addresses to hosts on the private network, most SOHO routers have a built-in DHCP server. On the router, enable the DHCP server and identify the subnet address and mask that will be used on the private network. Be sure to use a subnet address within the private IP address ranges.

Windows can only boot from GPT on UEFI-based computers running 64-bit versions of Windows 7, 8.x, 10, and the corresponding server versions. All versions of Windows 7 and later can read GPT drives and use them for data, but they cannot boot from them without UEFI.

Print Spooling service

Windows printing is dependent upon the Print Spooling service. The Print Spooling service is a software process that captures print jobs from applications, places them in the print queue, and then sends each print job to the print device.

Wireless cards require an antenna. Connectors on the card connect to the antenna, which is usually a wire routed into the lid and around the display.

Wireless communication operates in half-duplex (shared, two-way communication). Devices can both send and receive, but not at the same time. Therefore, devices must take turns using the transmission channel. Typically, once a device begins receiving a signal, it must wait for the transmitter to stop transmitting before replying.

o

Wireless headphones and smartphone headsets

Wireless network card

Wireless network cards might be integrated onto the motherboard, or added through add-on cards.

Wireless networking capabilities are often provided by a small card that plugs into an internal mini-PCI slot (located under the keyboard or accessible through the back). The wireless antennae might be a wire that extends around the screen.

Wireless networks use radio waves or infrared waves.

Range

Wireless standards have a limited range. Moving a notebook outside the effective range will weaken the signal and likely cause intermittent reception. Moving outside of the stated range can cause the connection to drop entirely.

o

With VoIP, phone calls are made through your Internet connection, not through a phone line.

Alternate IP configuration

With an alternate IP configuration, the system attempts to use DHCP for TCP/IP configuration information. If a DHCP server cannot be contacted, the static configuration values are used. When you configure an alternate IP address, APIPA is no longer used. Use an alternate configuration:

Shared key

With shared key authentication, clients and APs are configured with a shared key (called a secret or a passphrase). Only devices with the correct shared key can connect to the wireless network.

Static

With static addressing, you manually assign all configuration values. Static addressing is prone to error and should only be used under the following conditions:

4.

Within the configuration utility, define an array, add disks to the array, and identify the array type (RAID 0, 1, 5, or 10, etc.).

o

WoL is not recommended for laptop computers, as the computer will periodically come out of standby to check its network state which runs down the battery.

Works best for devices within 1 meter, but can operate up to 30 meters in areas without ambient light interference.

You can also use the PS/2 connector or a USB connector to connect an external mouse.

You can buy discs that are recordable.

You can configure a computer (either a server or a workstation) to perform print server functions. The computer can fill other roles on the network in addition to being the print server. Most operating systems include print server software.

You can configure the DHCP server to deliver default gateway, DNS server, and other configuration information to hosts.

You can convert a basic disk to a dynamic disk without losing data in existing partitions.

You can create mount points on basic or dynamic volumes.

o

You can have only one active partition at a time.

You can implement MAC address filtering to restrict access to the AP to only known (or allowed) MAC addresses.

You can purchase an external print server. This device is only used as a print server, although many print servers can manage multiple printers.

You can replace the pointer stick pad by simply pulling off the old one and replacing it.

You can shrink primary partitions and logical drives on raw partitions (those without a file system) or partitions using the NTFS file system.

You can use USB or ExpressCards to add missing or malfunctioning networking features.

You have some hosts that must have the same address each time.

You must create a logical drive in an extended partition before you can format and store data (the logical drive, not the partition is the storage unit).

o

You must reboot the system to complete the conversion if the disk contains the boot or system volume, or if the volume includes the pagefile.

You're booting from the wrong disk that doesn't have an operating system installed. This is a very common issue. It frequently occurs when a CD or DVD is in your optical drive at system boot and the BIOS/UEFI is configured to boot from the optical drive first. The error message is displayed when an operating system can't be found on the optical disc. To fix this issue, simply remove the optical disc from the drive and reboot. This error could also be caused in situations where you have multiple hard disks in the system, but only one has an operating system installed. If the boot device setting gets inadvertently changed in the BIOS/UEFI, it will try to boot the system from the wrong hard disk.

o

Your LCD cutoff switch is working. Sometimes the switch can get stuck in the off position, thus preventing the display from being sent to the LCD.

Your battery is sufficiently charged. If the battery reads it is fully charged in Windows, disconnect your laptop from its power source. If the battery lasts only a short amount of time, you can assume that your battery needs to be replaced.

Your master boot record (MBR) has been overwritten or is corrupt. The MBR is the first sector of your hard drive that tells the BIOS where to look for the operating system on the disk. If the MBR is damaged or corrupt, then the operating system will fail to load. On Windows, you have to boot from the installation disc to enter the recovery environment and select the Automatic repair option. Alternatively, you can select the Command prompt option and run the bootrec command to rebuild the boot configuration data. You can also run the bootrec command with the following switches:

o

iOS is very similar in looks to Android.

ping

ping sends an ICMP echo request/reply packet to a remote host. A response from the remote host indicates that both hosts are correctly configured and a connection exists between them.

x86: The x86 architecture is compatible with standard x86 PC hardware and software, which allows the device to run operating systems such as Windows. Some newer versions of Android can also run on the x86 architecture.

Nickel Cadmium (NiCad)

• Develops a memory and begins to store less power as it is repeatedly recharged. To avoid battery memory problems, completely drain the battery before recharging it

Lithium Ion (Li-Ion)

• Does not develop a memory

Multi-mode

• Transfers data through the core using multiple light rays


Conjuntos de estudio relacionados

IDCPBI CISSP- Physical and Environmental Security

View Set

Resistance Training and Conditioning - Exam 1 (Prev. Quiz & Essentials Q's)

View Set

Identify the structure and function of bacterial flagella

View Set

psych 1101 CHAPTER 9 DEVELOPMENT

View Set

NUR 238: Chapter 20 Practice Questions

View Set

Essentials of Business Law (Chapter 2)

View Set

Lecture 3 Endo Module - Thyroid Gland

View Set