Computer User Support CompTIA+ Final Exam Study Guide

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

What are the advantages of cloud computing?

- Can access your data from anywhere at any time - Does not use your hard drive - Backs your data up in a remote place

Which types of media can you install Windows from?

.wm, .wmx, .dvr-ms, .wmd, .avi, .mp3, .midi, .aiff, .snd, .wav, .cda, .ivf, .wmz, .mov, .m4a, .mp4, .aac, .flac

How do you correct a corrupt MBR or partition table?

1. Boot into Windows RE (Recovery Environment) using your Windows installation media (either a DVD or bootable USB drive). ... 2. Click Repair your computer. 3. Click Troubleshoot. 4. Click Command Prompt. 5. Type bootrec /fixmbr and press Enter.

What can you do if the operations system is not found?

1. Restart your computer. 2. Disconnect unnecessary flash drives, eject the disc if there's one in the disc drive, and remove any floppy disks. 3. Boot into BIOS and make sure the hard drive the operating system is installed on is listed as the first boot device.

How do you enable Hyper-V in a Windows environment?

1. Right click on the Windows button and select 'Apps and Features'. 2. Select Programs and Features on the right under related settings. 3. Select Turn Windows Features on or off. 4. Select Hyper-V and click OK.

How can you reformat a drive from FAT to NTFS without losing the data?

1. Right-click This PC or My Computer, select "Manage". 2. Enter Device Manager and click "Disk Management" 3. Open Disk Management and right-click the target device, select "Format". 4. Set "NTFS" for the selected device, tick "Quick Format" and click "OK" to confirm.

How do you extend the display of a computer to a second monitor.

1. Select Start > Settings > System > Display. 2. In the Multiple displays section, select an option from the list to determine how your desktop will display across your screens. 3. Once you've selected what you see on your displays, select Keep changes.

How can you customize the look and feel of the Windows desktop environment?

1. Type "Settings" into the bottom right search bar in the Start Menu. 2. Select the Settings app. 3. Click Personalization. 4. Select Themes and look for the Desktop icon settings. 5. Uncheck all the Windows icons you don't want to see on your desktop.

What is the localhost IP address?

127.0.0.1

How many bits is in an IPv6 address?

128 bits

An optical drive speed is identified as 24x10x70. What does each of the numbers indicate?

24 is the record speed, 10 is the rewrite speed, and 70 is the read speed.

How many bits is an IPv4 address?

32 bits

MAC address

48-bit physical address that is a unique identifier for all network adapters.

IPv6 address

A 128-bit address made up of eight 16-bit blocks.

IPv4 address

A 32-bit logical address that consists of four decimal numbers separated by a dot that can range from 0 to 255 (ex. 192.168.1.50)

How much data does a compact disc (CD) typically hold? How much data does a digital versatile disc (DVD) hold? How much data does a Blu-ray disc (BD) hold?

A CD can store up to up 700 megabytes (MB) of data. A single-layer DVD can hold 4.7 gigabytes (GB) of data, and a double-layer disk can hold 8.5 GB. A single-layer Blu-ray disk can store 25 to 33.4 GB of data, and a quad-layer Blu-ray disk can store up to 128 GB of data.

Distributed control system (DCS)

A DCS is a customized all-in-one package that contains the needed PLCs, SCADA controller, and HMI.

A DVD drive and a Blu-ray drive can both read data at 4x speeds. How does the drive's speed compare to the amount of data that can be transferred?

A DVD drive reads data at 1.35 MBps and a Blu-ray drive reads data at 4.5 MBps.

Twisted nematic (TN)

A LCD display technology that provides fast pixel response times and crisper pictures.

B Tree FIle System (btrfs)

A Linux file system with copy-on-write functions. SOmetimes referred to as butter FS or better FS.

Windows Update

A Microsoft service for Windows that automates downloading and installing software updates over a network or the internet.

How do RAID 5 and RAID 10 differ?

A RAID 10 configuration can tolerate the failure of one of its physical disks. If more than one disk fails, data is not recoverable. A RAID 5 configuration can tolerate the failure of one of its physical disks. If more than one disk fails, data is not recoverable.

Small office/Home office network

A SOHO network is a smaller network that does not make use of servers to handle network resources or enterprise level switches to connect devices. Wireless networks used in most homes would be considered SOHO networks?

Mobile Virtual Private Network (Mobile VPN)

A VPN that provides mobile devices with secure access to network resources and software applications on their home network. The connection can be wireless or wired.

Compatibility Mode

A Windows feature that allows you to run an older program using settings from a previous version of Windows.

Storage space

A Windows function that lets you group physical disks into storage pools and create virtual disks from the available capacity.

Hexadecimal Numbering System

A base-16 number system that consists of the decimal 0-9 and also uses letters A-F to represent values 10-15.

32-bit processor

A central processing unit that can process 32 bits of data at a time, to a maximum address memory of 4 gigabytes.

64-bit processor

A central processing unit that can process 64 bits of data at a time, to a maximum address memory of 200 gigabytes for a high-end workstation.

Under which circumstances should you choose a clean Windows installation?

A clean install should only be done if there are serious problems with the OS.

Community cloud

A cloud designed to be shared by several organizations. Acces is granted only to the users within the organizations who are charing the community cloud infrastructure.

Public cloud

A cloud that can be accessed by anyone. Public cloud-based computing resources (such as platforms, applications, and storage) are made available to the general public by a cloud service provider. For example, Google provides many publicly accessible cloud applications, such as Gmail and Google Docs.

Hybrid cloud

A cloud that is a combination of public, private, and community cloud resource from different service providers. The goal behind a hybrid cloud is to expand the functionality of a given cloud service by integrating it with other cloud services.

Private cloud

A cloud that provides resources to a single organization. Private clouds can be hosted internally, but because of the expense and expertise required to do so, they are typically hosted externally by a third party.

Computer Management

A collection of Windows administrative tools, or snap-ins, that you can use to manage a computer.

Group

A collection of user accounts you can use to assign rights and permissions to multiple users.

Cloud computing

A combination of software, data access, computation, and storage services provided to clients through the internet.

Command Prompt

A command line tool used for executing commands and managing files and folders.

Interrupt request (IRQ)

A communication method that allows a device to interrupt the CPU and request processing time.

Near Field Communication (NFC)

A communication method that allows two-way communication between two devices within a few centimeters of each other.

Radio Frequency Identifiaction (RFID)

A communication method that uses radio waves to transmit data from small circuit boards called RFID tags to special scanners.

What is cloud computing?

A concept of computing where processing and storage are performed elsewhere over a network connection rather than locally

Setting

A configuration that defines how an application, operating system, or a piece of hardware performs or appears.

Just a Bunch of Disks (JBOD)

A configuration that places multiple disks in a single logical storage unit.

Bottleneck

A congestion that occurs when a component wis unable to keep up with demand and subsequently slows down other processes or function.

TCP

A connection-oriented protocol. This means that when data is sent between two hosts, the TCP protocol ensures that every packet sent is received before sending the next packet.

UDP

A connectionless protocol. Instead of verifying that each packet sent is received, UDP sends the packets one at a time and the receiver processes them as they come in.

Near Field Communication Connector (NFC)

A connector that emulates cryptographic smart card functionalities for RFID tags or memory cards.

Directory/folder

A container in a volume that holds files or other directories. In Windows, this is also known as a folder.

Where should you store backup media?

A cool, dry storage area

When examining system performance statistics, what is the difference between counters and objects?

A counter is a statistic and an object is a statistic group relating to a hardware device or software process

What is Windows Hello?

A credential technology that provides multi‐factor authentication, including a personal identification number (PIN) or biometrics (face, iris, or fingerprint)

Input/Output (I/O) address

A data address that allows two devices in a computer to send information to each other.

Preferred Roaming List (PRL)

A database residing in a wireless device that contains information used during the system selection and acquisition process.

Hot-swappable device

A device that can be added and removed without shutting down the computer. For example, thumb drives are hot-swappable.

Input/output (I/O) device

A device that can input data to a computer and accept output data from a computer. Examples include CD-ROMs, DVD-ROMS, USB flash drives, network adapters, and Bluetooth adapters.

Digitizer

A device that caputers an analog signal and turns it into digital data. Examples include graphics tables, document scanners, and 3D scanners.

Port replicator

A device that connects several external devices such as a monitor, mouse, and keyboard to a USB port.

Peripheral

A device that connects to a computer, such as a monitor or a printer.

Paper feeder

A device that feeds paper into a printer. Single-cut sheets are fed automatically from a tray in the printer or fed by hand into a paper feeder.

Line conditioner

A device that modifies the power signal to remove noise and create a smooth alternative current (AC) signal.

Inverter

A device that provides power to the LCD screen's backlight.

Input device

A device that sends data to a computer.

Capacitor

A device that stores an electric charge.

Counter

A device that tracks the number of times an event or process occurs. A counter record a specific statistic, such as the amount of free memory or the number of bytes sent on a network card.

Output devices

A device used to send or display data from a computer.

Compact Disc (CD)

A digital optical disc data storage format with a data capacity of 700 MB.

Optical drive

A disc drive that uses laser light or electromagnetic waves within or near the visible light spectrum as part of the process of reading or writing data to or from optical discs.

RAID

A disk sub-system that combines multiple physical disks into a single logical storage unit.

Network FIle System (NFS)

A distributed file system used for file sharing on Unix and Linux.

What is the function of the docking station?

A docking station is an apparatus that fixes a portable device, such as a notebook or tablet, in a single location.

Fully Qualified Domain Name (FQDN)

A domain name that spells out each level of the hierarchy.

What is the function of the driver?

A driver, or device driver, is a set of files that tells a piece of hardware how to function by communicating with a computer's operating system.

Quality of Service (QoS)

A feature in some routers and switches that assigns priority to different types of network traffic.

Automatic Private IP Addressing (APIPA)

A feature that allows a device to automatically assign itself an IP address on the 169.254.0.0 network when a DHCP server of manual configuration is unavailable.

Scan-to-folder

A feature that makes it easy to share large-volume files on a network.

Gyroscope

A feature that measures the vertical and horizontal orientation of the device.

Field-Programmable Gate Array (FPGA)

A field-programmable gate array is physically set up like an ASIC or SoC, but the programming is configured by the end user.

Virtual hard disk

A file created within the host operating system that simulates a hard disk for the virtual machine.

Extended File Allocation Table (exFAT)

A file system designed to support large flash drives such as USB flash drives and SD cards.

Swap

A file system used for virtual memory.

Cross-linked file

A file that claims the same cluster as another file.

Lost cluster

A file that has been deleted from the directory listing, but the file allocation table (FAT) still shows the clusters allocated to the file.

Solid-state drive (SSD)

A flash device with a large storage capacity comparable to a hard disk.

SD card

A flash memory device is often used in digital cameras

LCD

A flat panel display that uses liquid crystals.

Optical media

A flat, circular disc used to store large amounts of data.

Microsoft Management Consol (MMC)

A framework that provides a common user interface for performing system administration tasks.

Network

A group of interconnected computers and devices that can share information with each other.

Theme

A group of settings that allows you to customize the way the Windows desktop appears.

Wireless Mesh Network (WMN)

A group of wireless mesh nodes that communicate with one another to share the network connection across a large area. Each device in the WMN uses the others as relays to avoid the need for infrastructure.

What is the difference between full-duplex and half-duplex?

A half-duplex transmission could be considered a one-way street between sender and receiver. Full-duplex, on the other hand, enables two-way traffic at the same time.

What causes thrashing? Which performance statistic can you use to identify thrashing?

A high demand for memory and low physical memory causes Thrashing.

Digital subscriber line (DSL)

A internet connection that provides high-speed digital data transmission over existing telephone lines.

Health Insurance Portability and Accounting Act (HIPAA)

A law defining how healthcare data must be secured.

California Consumer Privacy Act (CCPA)

A law that allows California citizens to have control over the personal information that businesses collect on them.

General Data Protection Regulation (GDPR)

A law that applies to citizens in the European Union and provides many of the same rights as the CCPA.

Family Educational Rights and Privacy Act (FERPA)

A law that provides educational institutes with the procedures to secure student records.

Sarbanes-Oxley Act (SOX)

A law that regulates how publicly traded companies and maintain financial records.

Gramm-Leach-Bliley Act (GLBA)

A law that requires financial institutions to safeguard a customer's information and detail the practices for sharing consumer information.

End User License Agreement

A legal contract detailing the terms of use between a software application author or publisher and the end user of that application.

OLED

A light-emitting diode (LED) technology in which a pixel emits light when electricity is applied to it.

Partition

A logical division of a storage device. Before a drive can be partitioned, it must first be initialized.

Hard disk

A long-term storage device that uses a thick magnetic disk made of several aluminum platters in a protective shell.

File system

A means for naming, organizing, and storing data on a storage device.

Mean time before failure (MTBF)

A measurement of a hardware component's reliability, typically stated in hours or thousands of hours.

Resolution

A measurement of an image's sharpness and clarity. The more pixels that make up an image, the higher its resolution.

File extension association

A mechanism that identifies the program used to create a file.

Non-Volatile Memory Express (NVMe)

A memory storage device designed to allow access to non-volatile storage media through a PCI express (PCIe) bus.

Wireless channel

A method allows the frequency of the wireless network to be fine-tuned. Each channel is approximately 20 MHz wide. 802.11 - IEEE designation for all wireless networking standards.

What is parity?

A method in which the computer ensures the data it processes is accurate.

Indexing

A method of searching and organizing files and content on a PC.

Channel bonding

A method that combines channels into one to increase bandwidth.

Tethering

A method that connects one device to another.

Long-Term Evolution (LTE)

A mobile communications standard used by 5G.

Local Area Network (LAN)

A network in a small geographic area, like an office. A LAN typically uses wires to connect systems together.

What network resources can a server provide access to?

A network server is a computer designed to act as central repository and help in providing various resources like hardware access, disk space, printer access, etc,.

Metropolitan Area Network (MAN)

A network that covers an area as small as a few city blocks to as large as an entire metropolitan city.

Cellular internet

A network that uses a cellular phone infrastructure for internet access.

Satellite internet

A network that uses radio signals sent and received from a satellite.

Internetwork

A network with geographically disperse connections that connect multiple LANs.

Software-defined networking

A networking controller that allows the network administrator to manage network devices remotely.

Router

A networking device that connect two networks together.

Switch

A networking device that connects internal hosts using Ethernet cables. When data comes in, the switch forward it to the intended recipient.

Wireless access point (WAP)

A networking device that provides connection to a wireless network.

Hub

A networking edvice that connects internal hosts using Ethernet cables. When data comes in, the hub forwards it to all connected devices.

Blu-ray disc (BD)

A newer digital optical disc storage format that is capable of greater storage capacity than DVDs.

Port

A part of a computing device that can connect to peripherals or cables. A computer port is like a door into the system. There are 65,536 possible network ports. The port number tells the host device the type of traffic sent and where to send it to.

Network in which hosts can both share and access data.

A peer-to-peer network is one in which two or more PCs share files and access to devices such as printers without requiring a separate server computer or server software.

Hotspot

A physical location where you can obtain a wireless network using a wireless local area network (WLAN) with a router connected to an internet service provider (ISP).

What is the difference between a storage pool and a storage space?

A pool is simply a logical grouping of physical disks, whereas a storage space is a virtualized disk that can be used like a physical disk.

M.2

A popular solid-state drive often used in portable computing devices

Infrared port (IR)

A port on a mobile device that enables devices to exchange data without using cables.

Subnet

A portion of a network with a common network address.

Bad sector

A portion of the hard disk that cannot be used.

Wireless printer

A printer that communicates with wireless clients through radio frequency technologies such as Wi-Fi or Bluetooth. Wireless technologies help users to share print resources around an office or building without running cables.

Shared printer

A printer that connects directly to a computer and is configured as shared on the network.

Network printer

A printer that has a network interface card that directly connects it to the network hub or switch.

Local printer

A printer that requires a direct connection to a specific computer. A local printer can be connected by wire, wirelessly, or using an Ethernet cable.

Ethernet printer

A printer that uses a network interface card in the computer to attach to an Ethernet router or hub on the network. You can use an Ethernet network for one or more computers and support many printers and systems simultaneously.

Port flapping

A problem in which a port on the network switch continuously turns off and on three or more times per second for at least 10 seconds.

File encryption

A process that encrypts the contents of an individual file.

Disk encryption

A process that encrypts the entire contents of a hard drive.

Defragmentation

A process that reduces file fragments by grouping together file pieces on a hard drive.

Data transmission encryption

A process that uses encryption to protect data sent through a network.

Calibration

A process to improve print quality. Modern printers commonly have calibration programs to electronically perform adjustments, but changes to the settings may be done manually.

Driver

A program that enables the operating system to interact with hardware devices.

Service

A program that processes requests from other applications or users.

Lightning

A proprietary computer bus and power connector created by Apple Ince. to replace its previous proprietary 30-pin dock connector.

Microsoft Terminal Services Client

A remote Management service that allows users to take control or remote computers over a network connection.

How does a remote access virtual private network (VPN) differ from a host-to-host VPN?

A remote access VPN connects remote users from any location to a corporate network.

What is a repair installation?

A repair install installs Windows over the existing installation of Windows 10 on your hard disk, using your installation DVD or Installation media file.

Cartridge

A reservoir that carries ink or toner and is the main consumable component in a printer.

Which device connects multiple networks together?

A router is a device that connects two or more packet-switched networks or subnetworks.

Which networking devices connects two networks together?

A router is a device that connects two or more packet-switched networks or subnetworks.

Screened subnet

A screened subnet, slow known as a demilitarized zone (DMZ), is used to place a device on the network that should be open to external users while still protecting the internal network.

Windows Firewall

A security application created by Microsoft and built into Windows.

Lock screen

A security measure that displays an image with the date and time when the computer is locked. You can add preferred apps (such as the calendar) to the lock screen.

Light-emitting diode (LED)

A semiconductor device that emits light when an electric current passes through it.

Platform as a Serive (PaaS)

A service that delivers everything a developer needs to build an application. The deployment comes without the cost and complexity of buying and managing the underlying hardware and software layers.

Infrastructure as a Service (IaaS)

A service that delivers infrastructure to the client, such as processing, storage, networks, and virtual environments. The client deploys and runs software without purchasing servers, data center space, or network equipment.

Software as a Service (SaaS)

A service that delivers software applications to the client either over the internet or on a local area network.

Near-field communication (NFC)

A set of communication protocols that allow devices to communicate when they are within 1.6 inches of one another. NFC devices are commonly used in retail stores and restaurants with Tap Pay phone apps.

Shared folder

A set of files that are made available to other users over a network.

Policy

A set of rules and guidelines that establish the way that business is conducted within an organization.

Software development kit (SDK)

A set of software development tools that allows the creation of applications for a certain software package, software framework, hardware platform, computer system, video game console, operating system, or similar development platform.

What is the material safety data sheet?

A sheet the states the safety ratings and precautions to be taken for use and handling of chemicals.

Video Graphics Array (VGA) mode

A simplified startup mode that can help you troubleshoot video card issues that interru[t Windows OS functions.

Volume

A single accessible storage area within a file system.

Thrashing

A situation that occurs when a computer's virtual memory resources become saturated, leading to a constant state of paging.

Personal Area Network (PAN)

A small network for communication between personal devices such as wireless earbuds and a cell phone.

Virtual machine

A software implementation of a computer that functions like a physical computer, including application execution.

What is a software package?

A software product offered commercially by a third party.

UEFI

A software program specification that connects firmware to the operating system. UEFI is eventually expected to replace BIOS.

Application

A software program that preforms a specific task or function on a computer or device.

Print queue

A space for print jobs that are waiting to be processed by the print device. Each printer has its own print queue.

Global Positioning System (GPS)

A space-based navigation system that provides location and time information in all weather conditions anywhere on or near the Earth where there is an unobstructed line of sight to four or more GPS satellites.

Trusted Platform Module (TPM)

A special hardware chip that generates and stores cryptographic keys.

Patch panel

A special panel where Ethernet cables are terminated.

Storage Attached Network (SAN)

A special type of network that provides high-speed access to storage across the network. Specialized hardware is used to store and provide access to needed data.

Program Files

A standard folder in the Microsoft Windows operating system in which applications are typically installed.

Codec

A standard for compressing and decompressing audio and/or video.

Optical disc

A storage device that records binary information through pits in a reflectively-coated disc. Optical discs use lasers for reading and writing information.

Keyboard, video, mouse (KVM) switch

A switch that allows multiple computers to use a single keyboard, mouse, and monitor.

File Encryption Key (FEK)

A symmetric encryption key used to both encrypt and decrypt a file.

Hibernate

A system power state where the system appears to be shut down and an image of the system RAM has been saved to disk. Standby - A system power state where power is cut to all peripherals, storage device(s), and screen. Power to system RAM remains on, allowing for the system to resume quickly.

Sleep

A system power state where the system appears to be shut down, but violated memory is refreshed and some components remain powered so the computer can wake up quickly if it receives input from a keyboard, LAN, or USB device.

System-on-chip (SoC)

A system-on-chip incorporated all components on the board.

Primary Rate Interface (PRI)

A telecommunications interface standard used on an Integrated Services Digital Network (ISDN) to carry multiple Digitial Signal 0 (DS0) - voice and data transmissions between the network and a user.

Hypervisor

A thin layer of software that resides between the virtual operating system and the hardware. A hypervisor allows virtual machines to interact with hardware without going through the host operating system.

Accelerometer

A tool to detect the physical movements of a tablet by measuring its linear acceleration in one dimension.

Wi-Fi analyzer

A troubleshooting tool for Wi-Fi connectivity issues that: identifies the number of broadcasting access points (APs); displays the signal strength and channel of each wireless network; and obtains wireless network information such as the network type; data activity, and service provider.

Cell tower analyzer

A troubleshooting tool for cellular network connectivity issues that: reports signal strength; interference; the number of cell towers in the area; the location of each cell tower; and mobile network information such as the network type, data activity, and service provider.

App scanner

A troubleshooting tool that identifies issues in installed apps.

Parity resiliency

A type of resiliency that writes parity information across the physical disks using bitwise arithmetic. It requires that you have at least three storage devices and provides fault tolerance against only one failure at a time.

Three-way mirror resiliency

A type of resiliency that writes to three storage devices and requires at least five storage devices. This option provides redundancy for the data if two storage devices fail at one time.

Two-way mirror resiliency

A type of resiliency that writes to two storage devices and requires at least two storage devices. This option protects you from a single storage devices failure.

Anycast address

A unicast address that is assigned to more than one interface, typically belonging to different hosts.

International mobile subscriber identity (IMIS)

A unique identifier that defines a subscriber in the wireless world, including the country and mobile network to which the subscriber belongs. The IMIS is one of the pieces of information stored on a SIM card.

International Mobile Equipment Identity (IMEI)

A unique number given to each mobile phone. The number is typically found behind the battery.

Disk cluster

A unit of disk space allocation for files and directories.

Lumen

A unit of measurement that indicates an amount of light.

Man utility_name

A utility used at the shell prompt to view the syntax along with the options that can be used.

Body Area Network (BAN)

A very small network that consists of wearable or implanted devices such as a smart watch, fitness trackers, or medical implants.

Virtual LAN (VLAN)

A virtual network that is configured on a network switch.

What is the difference between a partition and a volume?

A volume is a single accessible storage area with a single file system. A partition is a logical division of a hard disk.

BitLocker partition

A volume that contains the boot files.

Spanned volume

A volume with unallocated disk space on a different disk.

Extended volume

A volume with unallocated disk space on the same disk.

What is an organizational unit (OU)

A way of classifying objects located in directories.

How is a workgroup different from a domain?

A workgroup uses a LAN to communicate

What is the difference between Authentication Header (AH) and Encapsulating Security Payload (ESP) when used with IPsec?

AH provides data integrity by using an authentication algorithm. It does not encrypt the packet. ESP typically protects the packet with an encryption algorithm and provides data integrity with an authentication algorithm.

What are the most common IoT communication protocols?

AMQP (Advanced Message Queuing Protocol) CoAP (Constrained Application Protocol) Data Distribution Service (DDS) MQTT (Message Queue Telemetry Transport) HTTP (HyperText Transfer Protocol) TCP (Transmission Control Protocol) WebSocket

How can you cause the output of a command to list one screen at a time when using Command Prompt in Windows?

Adding | more after a command

What enhancements does SATA2 provide that the original SATA specifications do not?

Allowing up to 3 Gps, hot pluggable support, improved connectors that extends life when external devices being used, port multiplier support which allows multiple devices to be connected to a single SATA port.

Vertical Alignment (VA)

An LCD display technology in which the liquid crystals align vertically to the glass substrates.

In-plane switching (IPS)

An LCD display technology that uses liquid crystals between two glass panels.

What is the difference between an online UPS and an offline UPS?

An Online UPS supplies the AC power through a rectifier and inverter circuit even when the AC mains power is available. On the contrary, the offline ups directly supply the AC mains power to the load circuit when the power supply is available.

TRIM

An SSD function that configures the operating system to communicate with an SSD device and tell it the blocks on the device that are no longer required and can be deleted.

User account

An account that identifies a specific user. You can assign rights and permission to a user's account.

Unicast address

An address assigned to a single interface for the purpose of allowing one host to send and receive data. Packets sent to a unicast address are delivered to the interface identified by that address.

Multicast address

An address that represents a dynamic group host. Packets sent to a multicast address are sent to all interfaces identified by that address.

Which tools can you use to troubleshoot mobile devices?

An app scanner/manager.

How does virtual memory work?

An application that is no longer in use is swapped out of RAM into virtual memory in the hard drive. Space for a new application to load is made. Old application can be swapped back if needed

Backup

An archived copy of data that you can use to restore corrupt or lost data in the event of a hardware or system failure.

Carriage

An assembly that carries the printhead(s) back and forth with precise, controlled movement while printing.

Liquid crystal display (LCD)

An electronic display system switches pixels on and off using liquid crystals that rotate polarized light.

Integrated Drive Electronics (IDE)

An electronic interface that allows communication between a motherboard's data paths or bus and a computer's hard disks.

Embedded System

An embedded system is a complete computer system that is designed to perform a specific dedicated task.

Mount point

An empty Folder on an existing volume that points to another partition. Data saved to the folder is physically saved on the reference partition.

Multiple-input multiple output (MIMO)

An enhancement that allows multiple antennas to use the same radio frequency.

Multi-user multiple-input multiple-output (MU-MIMO)

An enhancement to MIMO that allows the antennae on the access point to divide streams between multiple devices.

What are some common causes for scripting?

An error has occurred behind the scenes, either on the web server for errors in a web browser or on the programming end of a software program.

Blue screen of death (BSOD)

An error screen in Windows that displays when an error is so severe that Windows can no longer continue to function. Starting with Windows 11, the background for this error message is now black.

Use case

An example of how a technology can be used in a real-life example.

Print spooler

An executable file that runs as a service on Windows to manage the printing process. If you turn off this service, you won't be able to print or see printers.

External SATA (eSATA)

An extension to the SATA standard that enables SATA drives to attach externally.

What is the difference between an input device and an output device?

An input device is connected to a computer that sends out data into the computer, while an output device is connected to a computer that receives incoming data.

Clean installation

An installation preformed on an existing or new system that installs a fresh instance of an operating system with default settings and overwrites any existing data on the storage device. It is also known as a custom install.

Upgrade installation

An installation preformed on an existing system that is running an earlier version of Windows. The installation upgrades Windows to a newer version while preserving the existing data, settings, and applications currently installed.

Repair Installation

An installation that installs a new build over the current installation. This process repairs registry entries and working files without losing applications or user information.

Process

An instance of a computer program that is being executed.

Proxy server

An internet appliance typically configured to monitor all incoming and outgoing network traffic and determines if the traffic is allied or not.

Cable internet

An internet connection that uses the existing cable TV infrastructure to provide access to the internet.

Scripting language

An interpreted programming language used in a text file, usually human-readable.

Standby power supply

An offline device that goes online to provide power when an Undervoltage event occurs.

Uninterruptible power supply

An online device that is constantly providing battery power to the computer and being recharged by the wall outlet.

Linux

An open source and freely distribute operating system based on UNIX that was created by Linus Torvalds of Finland.

Digital versatile disc (DVD)

An optical media standard that can be used to store large amounts of different types of data, such as computer data, video, and audio. Most DVD drives can read and write. Depending on the type of DVD, storage is typically somewhere between 4.7 and 9.39 GB.

Duplexing assembly

An optimal printer attachment that automatically turns over paper and reroutes it back through the printer for two-sided printing.

Simple data provisioning

An option that adds space from the storage pool to the storage space. When you select the Simple option, all data in the storage space is lost if one of the drives fails.

Thin provisioning

An option that lets you allocate storage spaces larger than the disk space available in the pool.

Third Extended Filesystem (ext3)

An updated version of ext2 that supports journaling.

Data at rest

Any data that is not currently being accessed.

What can cause a mobile device to perform poorly?

Apps are overusing resources, certain apps may be incompatible with the current device, storage space is low.

Which apt-get or apt command uninstalls a package from the system?

Apt-Get Remove

Why should you not defragment a solid-state drive (SSD)?

At best it won't do anything, at worst it does nothing for your performance and you will use up write cycles.

What is biometric authentication?

Authentication is a way to verify, beyond a doubt, that a person is who they say they are.

Captive portal

Authentication method that forces a user to agree to terms or pay a fee before accessing the wireless network.

Permission

Authorization granted to a user or group to access and preform other tasks on a network resource.

Dynamic Host Configuration Protocol (DHCP)

Automatically assign the IP configuration when a device connects to the network.

What is the difference between BD-R and BD-RE discs?

BD-R discs can be written to once, whereas Blu-ray Disc Recordable Erasable (BD-RE) can be erased and re-recorded multiple times.

How are Blu-ray drives made compatible with CD, DVD, and Blu-ray discs?

Because CD and DVD discs are read using a red laser and Blu-ray discs are read using a blue laser, Blu-ray drives have both red and blue laser heads.

How can groups simplify security administration?

Because it is only one change to make instead of customizing each and every user.

Why don't processors for laptop computers require the large heat sink and fan combinations that desktop PCs use to dissipate heat?

Because powder consumption is minimized and the small fans draw away the heat.

Which Windows default accounts should be disabled?

Because the Administrator account is known to exist on many versions of the Windows operating system, it's a best practice to disable the Administrator account when possible to make it more difficult for malicious users to gain access to the server or client computer.

What is the proper way to lift heavy objects?

Bend your hips and knees to squat down to your load, keep it close to your body, and straighten your legs to lift.

What is the advantage of a dual-boot system?

Better Performance Than a Virtual Machine

Binary Numbering System

Binary is the number system that computers and most electronic systems use. Because these systems work on electricity, there are only two states, on and off. This is represented using the numbers 1 and 0.

What Windows feature should be used to encrypt a volume?

BitLocker

What is the difference between Bluetooth and Wi-Fi?

Bluetooth allows for short-range data transfer between devices.

What is the difference between brownout and blackout?

Brownouts happen when there is too much demand on the electrical grid and there isn't enough power for everyone. A blackout is a complete loss of power.

How does online software activation work?

By validating that the software's activation ID has not been used on more PCs than allowed by the software's end user license agreement.

Which scripting languages are used on different operating systems?

C is the most common language for writing operating systems.

What is the first configuration change you should perform on a new wireless router?

Change the SSID.

Which utility could you use to detect and mark bad clusters?

Check Disk

What can you do if a service fails to start when Windows loads?

Check event viewer to see why, if its not necessary, set it to Manual, otherwise verify installation and user's privileges.

What should you do if the processor utilization in a system is consistently over 90%?

Check the running processes to see the CPU use of each process

A hard disk is preforming slowly. What can you do to speed up its performance?

Clear up a greater amount of space on the hard disk drive, Keep the disc defragmented, Check the rotational speed of a disc, when spinning faster it will preform better, Upgrade the disc interface.

How can older applications be configured to run on newer versions of Windows?

Click the Compatibility tab. Check the Run this program in compatibility mode option, and select the version of Windows you remember worked for the application.

What advantages does NTFS provide over FAT32?

Compared to FAT32, the NTFS file system has higher disk utilization and can manage disk space more effectively.

Direct memory access

Conduits used by high-speed devices to bypass the CPU and communicate directly with RAM.

How does a Redundant Array of Independent Disks (RAID) 0 configuration improve disk read and write performance?

Configuring the striped disks as a single partition increases performance since multiple disks do reading and writing operations simultaneously.

What are the three methods of incident detection?

Consisting of SIEM, Endpoint Detection and Response (EDR) and Network Detection and Response (NDR, formerly called Network Traffic Analysis), this visibility triad allows one to eliminate weak points and lift up cybersecurity via cooperation.

Which types of volumes support mount points?

Contiguous unallocated space, non-contiguous unallocated space, extended volume, spanned volume, and NTFS.

If the GPO is applied to an organizational unit, how does it affect objects in the OU?

Continue outwards from there.

Network interfaces

Convert the digital network data into a signal that can be transmitted along the transmission medium.

Reverse lookup zone

DNS record that matched an IP address to its hostname.

Forward lookup zone

DNS record that matches a hostname to its IP address.

Which system recovery methods can you use when you are unable to boot the computer?

DVD bootable and startup settings

User data

Data that includes all the data files saved and modified by users or applications that users run.

System state

Data that includes all the files required to boot and run the computer.

Application data

Data that includes files installed by an application and application configuration files.

A computer system has a solid-state drive (SSD) installed. What should you do to optimize the useable lifespace of this device?

Defragment the disk

What is the difference between a traditional desktop application and an application from the Microsoft Store?

Desktop apps are designed for the desktop and Microsoft Store apps are designed for the Microsoft Store.

Passive detection

Detection of a security incident discovered when not actively looking for it.

Active detection

Detection of a security incident when actively looking for security incidents.

Proactive detection

Detection of a security incident when the organization is actively looking for security flaws in its systems.

What type of network is created when you pair wireless earbuds to a cell phone?

Devices connected in a Bluetooth network communicate with each other using ultra-high frequency (UHF) radio waves.

Which peripheral devices require special software or drives to function?

Devices like printers, webcams, scanners etc will all require their own drivers or software to function properly or so you can take advantage of all the features.

Which hardware devices can you use to make storage pools?

Devices such as hard disks, SATA drives, and external drives are used to create storage spaces.

Nodes or hosts

Devices that reside on the network. Hosts can range from a computer, tablet, mobile phone, gaming console, IoT device, or server.

What are the common causes of touchscreen issues?

Dirty Screen. A dirty screen can cause touchscreen lag, though it usually only occurs with capacitive touchscreen devices Damaged Resistive Layers. If one or more layers of a resistive touchscreen device are damaged, it may cause lag Too Many Apps Running.

What can you do if there are low memory warnings?

Disable Background Apps

What tasks does the Disk Cleanup app preform?

Disk Cleanup searches your disk and then shows you temporary files, Internet cache files, and unnecessary program files that you can safely delete.

Which function does the cd .. command provide?

Displays the name of the current directory or changes the current directory.

What is a distribution group used for?

Distributing e-mail messages to groups of users.

What special purpose do matrix printers serve now?

Dot matrix printers can print multiple sheets at once, printing directly onto the white front sheet, then following on to the colored carbon copies behind.

How is Windows updated after installation?

During the updating process, the Windows Update Orchestrator operates in the background to scan, download, and install updates.

What advantages do dynamic disks provide when extending volumes?

Dynamic disks provide volume migration.

Which encryption method encrypts individual files so that only the owner and authorized users can decrypt file and read it?

EFS (Encryption File Service)

How does file encryption differ from disk encryption?

Each file in a disk/drive can be encrypted with a different key.

What are the advantages of a workgroup?

Easy sharing of files, printers and other network resources.

Flash memory

Electronic non-volatile memory that is easy to erase and reprogram.

What is electrostatic discharge (ESD) and how can it be a hazard to electron computer components?

Electrostatic discharge (ESD) occurs when a non-conducting surface is rubbed against another and the contacted surfaces are then parted. ESD can damage or destroy sensitive electronic components, erase or alter magnetic media, or set off explosions or fires in flammable environments.

Wi-Fi Protected Access

Encryption protocol used on most wireless networks today. Versions 2 and 3 are the latest version in use.

What is the role of a TPM when implementing whole disk encryption?

Enhances computer security and privacy.

What should you do if you hear a series of beeps when the system powers on and nothing displays on the monitor?

Ensure that internal hardware added to your computer recently, such as additional memory or a video card, is installed correctly.

Which type of data is backed up with a system image backup?

Everything on the system to a . vhd file, including the operating system, installed programs, drivers, and user data files.

What are common Digital Rights Management (DRM) technologies?

Examples of these DRM strategies include software licenses and keys, user authentication and IP authentication protocols, proxy servers, virtual private networks (VPNs), regional restriction or geoblocking, and designing products to only work on specialized hardware or software.

Proprietary

Exclusive ownership or holding exclusive rights to something.

What is the difference between an extended volume and a spanned volume?

Extended volume uses the free space on more than one physical hard disk, spanned volume does not write across all volumes in the small blocks.

Which Linux distributions use the yum command to manage software? Which distribution use apt-get or apt?

Fedora Linux uses yum and Debian distribution like Ubuntu Linux uses the apt-get command.

Orphaned files

Files that exist on the hard drive but are not associated with a directory in the index.

Unified Extensible Firmware Interface (UEFI)

Firmware designed to replace BIOS firmware and used to initialize the boot process.

BIOS

Firmware that initializes hardware at startup and provides runtime services to the operating system.

Basic Input/Output System (BIOS)

Firmware that initializes the boot process at startup and provides runtime services.

How does a flash device differ from a hard disk?

Flash storage drives consume up to 50% less power than similar capacity HDDs, and are capable of much faster read/write speeds.

Once you get a system started after reducing it to a minimal state, how do you identify a component that has a problem?

Go into device manage and see what device is causing the problem.

Wide Area Network (WAN)

Group of LANs that are geographically isolated but are connected to form a large internetwork.

What port does Hypertext Transfer Protocol Secure (HTTPS) use?

HTTPS uses port no. 443 for data communication

What configuration tasks can you preform using Control Panel?

Hardware and software setup and configuration, security, system maintenance, and user account management.

What is the difference between hardware and software?

Hardware is the physical component. It cannot do much. It needs instructions from the software. Software is stored electronically on a hard drive or a special chip. Hardware can do a lot, but it needs to be told by the software.

Which law regulates how healthcare information is secured?

Health Insurance Portability and Accountability Act of 1996 (HIPAA)

Which statistic should you examine to diagnose a network adapter bottleneck?

High network utilization.

Extended File System (XFS)

High performing and flexible file system.

How are open source development projects funded?

How are open source development projects funded?

What is the main difference between a hub and switch?

Hub works at the physical layer and transmits the signal to the port. Switch route the information and send it over the network.

Which Institute of Electrical and Electronics Engineers (IEEE) standard defines how wireless network operate?

IEEE 802

Which protocols are commonly used to establish a VPN? Which protocol is typically used for web transactions?

IPsec protocols

IPv4 address class

Identifies the range of IP addresses and the default subnet mask used for the range.

What are causes of a dim LCD screen?

If a system is being used on battery power, and the LCD is too dim, then the brightness may be adjusted with the Fn Key keystrokes for your system.

What does it mean if permissions are cumulative?

If a user is a member of more than one security group, the rights of each group is OR'ed together to determine the user's access rights.

With a RAID 0 configuration, what happens to the data if a drive in the set fails?

If one or more drives fail, all of the information contained on the volume becomes totally inaccessable.

When it is necessary to manually configure a device?

If the device does not work properly with the default/plug and play configuration, or additional features or functionality is desired out of the device.

If you cannot boot the system into Safe Mode, which steps should you take to boot the system?

If you cannot boot into Safe Mode, boot the system from the installation disc and use System Restore to revert the system to a recent restore point.

When should a system image backup be restored in the recovery process?

If you cant use restore point, automatic repair, or Command prompt then you can restore system from a system image backup.

When would you choose a Windows upgrade rather than a clean installation?

If you want to keep your files, apps, and settings, perform an in-place upgrade.

What could be the cause of a streak down a printed document?

If your print-outs are streaky, faded, have lines on them that should not be there, or are otherwise poor in quality, this may be due to a problem with the printer or a low ink or toner supply.

What are common causes of the black/blue screen of death?

Improperly installed, damaged, or aging hardware, or by buggy or incompatible software.

What is the role of host devices in a peer-to-peer network?

In a peer-to-peer network, each host can provide network resources to other hosts or access resources located on other hosts.

How do you use the System File Checker (SFC) to check for corrupted files?

In the command prompt window, type SFC /scannow and press Enter.

Which values does the hexadecimal numbering system use?

In this system there are 16 symbols or possible digit values from 0 to 9, followed by six alphabetic characters -- A, B, C, D, E and F.

Which symptoms may indicate a corrupt or missing boot sector?

Incomplete or corrupt games

Industrial Control Systems (ICS)

Industrial control systems (ICSs) handle the workflow and automation process for all sorts of machinery.

Spam gateway

Internet appliance that monitors incoming and outgoing emails to reduce the amount of spam affecting the network.

Load balancer

Internet appliance that monitors servers and distributes network traffic so one server does not get overwhelmed.

Symmetric

Internet connection that have the same upload and download speeds.

Asymmetric

Internet connections that have different upload and download speeds.

What is IoT?

Internet of Things (IoT) is the collection of devices that can communicate over the Internet with each other or with a control console in order to affect and monitor the real world. IoT devices might be labeled as smart devices or smart home equipment.

Fiber internet

Internet that uses fiber optic cables to provide access to the internet.

Internet of Everything (IoE)

IoE is another name for IoT.

Internet of Things (IoT)

IoT is a system of connected computing devices and other things that use unique identifiers and the ability to send data over a network without requiring human interaction.

What advantage does eSATAp have over eSATA?

It delivers power to the device in the cable so you don't need another cable for power.

What are some of the most common uses of UDP?

It is specifically chosen for time-sensitive applications like gaming, playing videos, or Domain Name System (DNS) lookups.

How does indexing optimize the process for finding files on Windows?

It makes the search process faster.

Why should you test restore methods?

It's crucial to test disaster recovery and individual file recovery abilities.

Which peripheral devices require little to no configuration?

Keyboard and mice

What types of displays are available?

LCD (Liquid Crystal Display) IPS-LCD (In-Plane Switching Liquid Crystal Display) OLED (Organic Light-Emitting Diode) AMOLED (Active-Matrix Organic Light-Emitting Diode)

How is a lost cluster different from a cross-linked file?

LOST CLUSTERS are a series of used clusters on the hard disk drive that are not associated with a specific file.

What are the security concerns associated with remote access?

Lack of information Password sharing Software Personal devices Patching Vulnerable backups Device hygiene Phishing attacks

Internet

Large, world-wide, public network.

Which internet connection uses light to transmit data?

LiFi

How are updates applied on Linux and macOS operating system?

Linux uses Software Updater and macOS uses the system preferences panel and application software updates are through the App store.

What is the difference between local authentication and domain authentication?

Local is on that machine while domain uses online servers for authentication.

What is a physical address? Logical address?

Logical addresses are generated by CPU during execution whereas physical address refers to location in a physical memory unit (the one that is loaded into memory).

Which storage device types are magnetic media? Which are optical? Which are solid state?

Magnetic storage devices are like hard drives and tapes. Optical storage devices are like CDs, DVDs, and Blu-ray discs. Solid state storage devices are like SSDs and USB memory sticks.

Hot-wash meeting

Meeting to review a security incident and the remediation steps.

File attribute

Metadata that gives certain qualities to a file after the attribute has been assigned.

What CPUs can be used in an embedded system?

Microcontroller ARM architecture family Intel Core Reduced instruction set computer PowerPC Intel Atom 32-bit computing Intel 8051 Xeon

New Technology File System (NTFS)

Microsoft's default file system.

Modbus

Modbus is a special network protocol that controller systems use to communicate with each other.

What does an End User License Agreement (EULA) contain?

Most EULAs include some basic provisions such as a description of the software application, clarification of ownership (including any content created by the end-user), a disclaimer of warranty and limitations on liability, the method by which any updates to the application will be delivered, support and maintenance.

What are some of the internal components of a computer?

Motherboard CPU RAM Hard drive Solid-state drive (SSD) Optical drive Heat sink Graphics processing unit

Which of the following utilities typically shows the same information included in the other two utilities: Msconfig, Msinfo32, or Dxdiag?

Msinfo32 and Dxdiag

What is multifactor authentication?

Multi-factor Authentication (MFA) is an authentication method that requires the user to provide two or more verification factors to gain access to a account.

Network Address Translation (NAT)

NAT is a protocol that allows multiple computers to share a single public IP address on the internet.

Which permissions (share or NTFS) apply to both local and network accessed file?

NTFS permissions

How does inheritance work regarding NTFS permissions?

NTFS permissions offer the possibility to let files and subfolders inherit NTFS permissions from their parent folders.

Logical address

Network addresses assigned by software.

Client-server

Network in which hosts have specific roles.

What benefits does implementing a network provide to an organization?

Networks facilitate efficient collaboration between employees, better use of resources, centralized administration and centralized backups.

Wireless internet service provider (WISP)

Networks that use antennae pointed at a large antenna on land to provide access to the internet.

What are reasons that a printer won't print?

No Power. A printer might not be working because it is not getting any power No Computer Connection Printing to the Wrong Printer Print Job Stuck in the Print Queue "Use Printer Offline" Option Enabled (Windows Only) Paper Problems Ink Issues Corrupted Printer Driver

What are the parts of an ink cartridge?

Nozzle plate: the part where ink goes through from ink cartridge to paper Cover plate: covers the nozzles when they are not in use Common ink chamber: where ink is transferred from the body before printing (In piezoelectric printers) piezoelectric substrate: houses the piezoelectric crystal

Extruder

On a 3-D printer, a simple extruder assembly includes a stepper motor, nozzle, and heater.

If you lose a mobile device, how can you find it?

On a browser, go to android.com/find Sign in to your Google Account The lost device gets a notification On the map, you'll get info about where the device is If you get a prompt, tap Enable lock & erase Select what you want to do

What technology allows multiple computers to share a single public IP address on the internet?

One is the capability to perform network address translation (NAT).

Second Extended Filesystem (ext2)

One of the oldest Linux file system.

How does open source software differ from software protected by a proprietary license agreement?

Open source refers to software that is available for anyone to access or change the code.

How do you connect a mobile device to a network?

Open your device's Settings app

What are important system requirements to check before installing a new application?

Operating system. Minimum CPU or processor speed. Minimum GPU or video memory. Minimum system memory (RAM) Minimum free storage space. Audio hardware (sound card, speakers, etc)

What does an optical character recognition (OCR) scanner do?

Optical Character Recognition (OCR) is the process that converts an image of text into a machine-readable text format.

A monitor suddenly shuts off during use. What could cause this?

Over heated monitor

Programmable logic controller (PLC)

PLC is a specialized controller that can be programmed to perform specific tasks. Multiple PLCs can be combined and configured to work together to carry out complex tasks.

What are the general stages of the Windows startup process?

POST, Bootloader, OS Load, Driver load, User Login.

What authentication protocol is typically used by DSL providers?

PPPoE is implemented extensively by providers offering digital subscriber line (DSL) services.

What is the difference between Platform as a Service (PaaS) and as a Service (SaaS)?

PaaS, or platform as a service, is on-demand access to a complete, ready-to-use, cloud-hosted platform for developing, running, maintaining and managing applications. SaaS, or software as a service, is on-demand access to ready-to-use, cloud-hosted application software.

Artifact

Part of an image that stays on-screen after the screen is cleared of the image.

Which type of device encryption does not encrypt deleted files?

Partial device encryption.

Share permissions

Permissions used to control the level of access users have when accessing files over the network.

NTFS permissions

Permissions used to manage and secure files and folders within an NTFS file system.

What is the difference between a personal software license and an enterprise (or volume) software license?

Personal licenses are intended for small businesses or home use and they only allow a certain amount of installs. Enterprise licenses are used for larger businesses and they usually have no limit to the amount of installs but because of this they are much more expensive.

Which network utility would you use to test the connection between two devices?

Ping

What are common causes of jitter?

Poor hardware performance. Using an outdated network with older equipment, such as an outdated switch, cable or router, can cause network jitter. Not enough bandwidth. ... Wireless network jitter. ... Not implementing packet prioritization.

What kinds of components are typically built into a notebook computer?

Power supply. The laptop's internal power supply recharges the computer's rechargeable battery Central processing unit (CPU) Graphics processing unit (GPU) RAM Storage I/O ports Display Keyboard and touchpad

How do you repeat a command by causing the most recent command to appear in Command Prompt?

Pressing the Up arrow key at the command prompt.

What is User Account Control (UAC)?

Prevents unauthorized access and avoids user error in the form of accidental changes. A security component in Windows that keeps every user in standard user mode instead of acting like an administrative user.

Print preferences

Printing preferences are settings such as orientation, page order, and paper source. You can also set preferences for options supported by a printer such as collating or stapling.

Extranet

Private network that uses internet technologies but its resources are made available to trusted external users.

Which system components are commonly monitors to troubleshoot system performance?

Processors (CPU), Hard disks (HDD's), RAM (Memory), Network.

How is a print server used?

Put simply, print servers connect printers to client devices like laptops over a network.

What advantages does RAID 5 have over RAID 1?

RAID 5 improves performance over RAID 1.

RAID stops working, but has the appropriate drive loaded. What could cause this issue?

RAID could not be compatible with your device.

What is the best way to dispose of printer cartridges?

Recycle them at the retailer.

Why should you back up all data before formatting a drive?

Reformatting a computer will delete all the data on your hard drive.

What is the difference between Remote Desktop and Remote Assistance?

Remote desktop is for unattended access. Remote assistance is for remote collaboration.

What safety precautions should you take when handling computer components?

Remove your watch and jewelry and secure loose clothing. Turn off the power and unplug equipment before performing service. Cover sharp edges inside the computer case with tape. Never open a power supply or a CRT monitor. Do not touch areas in printers that are hot or that use high voltage. Know where the fire extinguisher is located and how to use it. Keep food and drinks out of your workspace. Keep your workspace clean and free of clutter. Bend your knees when lifting heavy objects to avoid injuring your back.

Why is it important to not move files encrypted with EFS to a non-NTFS partition?

Removes the encryption.

A hard disk is making noise. What should you do?

Replace the disk, because the noise indicates a failing hard disk

The operating system (OS) cannot find the Redundant Array of Independent Disks (RAID) array. What could cause this issue?

Replace the hardware controller.

How can you continue to use a notebook when a component fails?

Replace the motherboard.

How can you verify that a device is compatible with a particular computer?

Research the device or read the manual so you can verify your computer's specifications suit the device or if it is compatible or not.

What are some of the specifications used by display devices?

Resolution, aspect ratio, response time, viewing angle, refresh rate, brightness, contrast ratio, and color depth.

Which tool lets you view running tasks and current memory use?

Resource Monitor

Default gateway

Responsible for forwarding data packets to destinations outside of the network.

What is a simple fix for most USB controller resource warnings?

Restart your computer, so Windows will automatically reinstall the USB drivers.

Roll back

Revert a system that has received an update or other change to its previous state.

Which methods can you use to recover lost data files?

Right-click the file or folder, and then select Restore previous versions.

Protocols

Rules or standards that describe how hosts communicate and exchange data.

Self-Monitoring, Analysis, and Reporting Technology (S.M.A.R.T.)

S.M.A.R.T. is a monitoring system that detects drive errors. IF S.M.A.R.T. detects the number of errors that indicate a complete hard disk failure is imminent, a warning is displayed during system boot.

Which type of connector attaches an optical drive to the motherboard?

SATA

How does SATA2 differ from SATA3?

SATA II is a second generation SATA interface, and it runs at 3.0 Gb/s, although the actual bandwidth throughput is up to 300MB/s, due to 8b/10b encoding. SATA III is a third generation SATA interface, and it runs at 6.0Gb/s, although the actual bandwidth throughput is up to 600MB/s, due to 8b/10b encoding.

Supervisory control and data acquisition (SCADA)

SCADA controllers are used to monitor and control PLC systems. They gather data and adjust the system based on the data acquired from sensors.

What are the advantages of SSDs over all other forms of storage media?

SSDs are incredibly faster, lighter, more durable, and they use less energy.

Wireless Local Area Network (WLAN)

Same as LAN but uses wireless connection.

What are the three ways you can send a Remote Assistance invitation?

Save this invitation as a file Use email to send an invitation Use Easy Connect

How can BitLocker be implemented on Windows systems that don't have a TPM chip on the motherboard?

Saving a startup key on a removable drive, such as a USB flash drive, becomes mandatory when enabling BitLocker.

What is scripting?

Scripting is coding in a scripting language

802.1x authentication

Secure authentication method for wired and wireless networks.

How do you add devices to a notebook computer?

Select Start > Settings > Devices > Bluetooth & other devices. Select Add Bluetooth or other device and follow the instructions.

Where is the print queue?

Select Start > Settings > Devices > Printers & scanners

What is the minimum number of characters a password should have?

Set minimum password length to at least a value of 8.

How are share permissions different from NTFS permissions?

Share permissions allow you to restrict the number of concurrent connections to a shared folder.

What is the importance of driver signing? What should you be aware of when using a driver that is not signed?

Signed drivers are drivers that include a digital signature, and this is important because it proves that it comes from the reported publisher, has not been altered or modified, and is compatible with the operating system version.

Wireless Wide Area Network (WWAN)

Similar to WLAN but uses different technology to connect to the internet. Also known as 4G, 5G, or LTE networks.

What are the steps to configure a printer?

Simply plug the USB cable from your printer into an available USB port on your PC, and turn the printer on. On the taskbar, select the Search icon, type Printers in the search bar, and then select Printers & scanners from the search results to open the Printers & scanners system setting.

Virtual memory

Simulated memory that is implemented as a paging file on a hard drive.

What is the difference between a laptop computer and a mobile device?

Smartphones and tablets have less storage capacity than a computer.

Digital Rights Management

Software and hardware security limitations meant to protect digital content and prevent privacy.

Open source

Software or operating system source code that is distributed under the GNU General Public License free to anyone. The software or operating system source code can be modified and redistributed under the GLP without fees.

vSwitch

Software that facilitates the communication between virtual machines by checking data packets before moving them to a destination. A vSwitch may be software installed on the virtual machines, or it may be part of the server firmware.

vRouter

Software that preforms the tasks of a physical router. Because virtual routing frees the IP routing function from specific hardware, you can move routing functions around a network.

Campus Area Network (CAN)

Sometimes referred to as a corporate area network, this network type is established when multiple LANs are connected together within a limited area, such as a college campus or between multiple buildings that are owned by the same organization.

What are throubleshooting options for boot problems in Windows?

Startup repair tool

What are the steps of the 3-way handshake?

Step 1: A connection between server and client is established. Step 2: The server receives the SYN packet from the client node. Step 3: Client node receives the SYN/ACK from the server and responds with an ACK packet.

How would you convert a drive from NTFS to FAT32?

Step 1: Open the Disk Management Tool and right-click the drive that you want to format. Step 2: Select "Format" and click "Yes". Step 3: Now, name the drive and use the drop-down menu to change the file system to "FAT32". Step 4: Press "Ok" and the drive will be formatted to FAT32.

What are the benefits of using storage pools?

Storage Pools give you a higher spindle count than you can get out of a traditional RAID group.

How do striping and mirroring differ?

Striping breaks data into units and stores the units across a series of disks by reading and writing to all disks simultaneously, mirroring stores data to two duplicate disks simultaneously.

What is the benefit of using virtual memory?

System libraries can be shared.

Payment Card Industry Data Security Standards (PCI DSS)

Technical and operational requirements for any organization that handles cardholder information for debit cars, credit cards, prepaid cards, prepaid cards, and any other type of payment card.

Power over Ethernet

Technology that can provide power to devices over an Ethernet cable.

Script

Text files with commands and structures specific to a scripting language.

What is the difference between a 32-bit and a 64-bit operating system?

The 32 bit OS can store and handle lesser data than the 64 bit OS.

What are the components of a FQDN?

The FQDN consists of two parts: the hostname and the domain name.

Human-machine interface (HMI)

The HMI can be either a touch-screen control panel or software running on a typical computer system. The HMI allows the operator to make configuration changes in the ICS.

Localhost

The IP address 127.0.0.1 (also known as the loopback address) is used to verify that the local TCP-IP protocol is installed and working properly.

Which law regulates how payment card information is secured?

The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards designed to ensure that ALL companies that accept, process, store or transmit credit card information maintain a secure environment.

What is the print spooler and why is it important?

The Spooler is a special process that manages access to printers by multiple users.

Page file

The Windows swap file that holds the virtual memory used to supplement the physical memory installed in a computer.

What setting can affect the size of images and icons?

The adjust icon size setting

Latency

The amount of time it takes to send a network request and receive a response back.

Application-specific integrated circuit (ASIC)

The application-specific integrated circuit chip is created to perform a single function.

Taskbar

The area located at the bottom of the Windows desktop that displays icons for open and pinned apps. You can right-click the icon for additional actions.

A system fails to boot, displaying an Operating System Not Found error message. What could cause this issue?

The basic input/output system (BIOS) does not detect the hard disk.

Where are the best places to obtain the most up-to-date version of a driver for each of the following: a Windows system, a macOS system, and a Linux system?

The best place to obtain the most up-to-date version for Windows is Windows update or the off of Microsoft's Website, for Mac it is off of Apple's website, and for Linux you install them off of the manufacturers website for whatever hardware you are using.

Which numbering system is most used in computers and electronic systems?

The binary system is the primary language of computing systems.

Why is the chain of custody so important?

The chain of custody proves the integrity of a piece of evidence.

Which protocols does email use?

The common protocols for email delivery are Post Office Protocol (POP), Internet Message Access Protocol (IMAP), and Simple Mail Transfer Protocol (SMTP).

Printhead

The component in the printer that transfers ink to paper. Different printers may use different types of printheads. The printhead is usually mounted on the carriage assembly that moves back and forth.

Disk thrashing

The condition where the physical memory is so insufficient that data must be continuously moved from physical RAM to disk and back again.

Printer port

The connection point for the print device to connect to a computer. Modern printers use USB connectivity and are configured as plug-and-play devices.

Paper rollers

The cylindrical devices that tightly pinch the paper and move it through the printing process. A stepper motor advances the rollers.

Decimal Numbering System

The decimal numbering system is the most used number system across the world. Decimal is a base-10 number system that consists of the digits 0, 1, 2, 3, 4, 5, 6, 7, 8, and 9.

Chain of custody

The documentation and procedures used to detail the handling of any evidence.

How do you identify the location of components and replacement procedures for the notebook system?

The documentation.

A hard disk connected to the motherboard is not recognized by the Basic Input/Output System (BIOS)/Unified Extensible Firmware Interface (UEFI) firmware. What is the cause of this issue?

The drive is either malfunctioning, loss of power connector, or the SATA cable is disconnected.

What is eSATA? When would you use it?

The eSATA (external SATA) standards are a subset of other standards specifically for externally connected devices. Use when need to transfer lots of data faster. Larger capacity than flash drives. Need its own power supply.

How do you determine which portion of a IPv4 address is the network ID and the host ID?

The first part of an IP address is used as a network address, the last part as a host address.

What should you do first when troubleshooting any network issue?

The first step in troubleshooting network errors is to check cables, devices, switches, and routers for proper functioning.

Electrostatic discharge

The flow of electricity from one electrically charged object to another.

Fourth Extended Filesystem (ext4)

The fourth-generation file system in the ext file system family.

Serial Advanced TEchnology Attachment (SATA)

The latest generation of standards for hard disk and other storage devices.

Backlight

The light that illuminates an LCD screen so that images on the screen are visible.

Printer

The logical entity that is made up of the print device, the print driver, and the print spooler.

What is the main difference between Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)?

The main difference between TCP (transmission control protocol) and UDP (user datagram protocol) is that TCP is a connection-based protocol and UDP is connectionless.

Input/output operations per second (IOPS)

The measurement of the number of input.output operations that can be preformed per second.

Transmission media

The medium that is used to carry electrical or radio signals between connected network hosts

Which internet connection is provided over coaxial cable?

The modem's Ethernet connection to your computer is what transmits that data, giving you high-speed internet access.

Color depth

The number of bits used for each color component of a single pixels.

What is the refresh rate?

The number of times a second the screen is illuminated

What is the benefit of using a separate hard disk for the paging file?

The operating system will process multiple input/output requests more quickly.

Android Package (APK)

The package file format used by the Andriod operating system for the distribution and installation of mobile apps and middleware.

First responder

The person or team that should be immediately notified when a security incident is discovered.

Print device

The physical, peripheral device connected to a computer that prints the output.

Print Device

The physical, peripheral device connected to a computer. The print device is where the printed page output happens.

Bezel

The plastic casing around an electronic device's screen.

Platen roller

The platen roller moves material through the printer. It is made of rubber to grab and push the paper.

Principle of least privilege

The practice of giving users only the resource needed to perform their job.

What is the concept of giving users only the resources needed to do their job called?

The principle of least privilege (POLP) is a concept in computer security that limits users' access rights to only what are strictly required to do their jobs.

Encryption

The process of converting cleartext, or unencrypted, data into an unreadable format by using a special key and mathematical algorithm.

Paging

The process of moving data from RAM to hard disk and back again. This process is also called swapping.

Authentication

The process of proving a user's identity.

3-way handshake

The process two devices go through to establish a TCP connection.

What is the purpose of each power state?

The purpose of each power state is to offer options to the laptop in various situations to conserve power.

What are the advantages of using a recovery disc/partition to recover a system?

The recovery partition carries advantages over disc-based recovery solutions, including a faster recovery process (as the data is directly on the hard drive and no need a disc swapping), and less costly to the OEM (original equipment manufacturer) because they do not need to ship a recovery media with the computer.

Which Linux command deletes data?

The rm command is used to delete files.

What is Server Message Block (SMB) and why is it important?

The server message block or SMB protocol provides shared access to printers, files, etc., running on a connected network.

Print driver

The software that the computer uses to communicate with the print device. A print driver is specific to the printer's make and model. Be sure the print driver is up to date.

Open Database Connectivity (ODBS)

The standard application programming interface for accessing database management systems (DBMS).

Print bed

The surface of a 3-D printer where the filament is deposited for building an object.

Unified Threat Management (UTM)

The unified threat management (UTM) internet appliance combines multiple functions into one single device.

Virtual Memory Manager (VMM)

The utility that manages swapping data between physical memory and the hard disk.

Jitter

The variation in the latency of VoIP packets.

What are the requirements for creating a mount point?

The volume must be formatted with NTFS, it can be basic or dynamic, the folder on the source volume must be empty, and the target partition must not have a drive letter.

What are the prerequisites for extending a volume when extending volumes?

The volume must be formatted with the NTFS file system.

Orientation

The way the document is positioned on the paper. In portrait orientation, the long edge of the paper is vertical. In landscape orientation, the long edge of the paper is horizontal.

How is filament used in 3-D printing?

These materials are supplied on a 3D printer spool and are directed through a heated nozzle by means of an extruder. The extruded plastic is then used to build up a 3D printed part, layer by layer.

Why should you be cautious when handling old CRT monitors?

They can hold a charge for a long time.

What is the role of the first responder?

They provide services essential to the response and the community.

How does thin provisioning allow you to allocate more storage space to users than is available in the pool?

Thin provisioning allocates disk space to users on demand based on how much space they need at any given time.

When can you use an upgrade installation?

This is where you have an older operating system on the computer such as Windows Me and you want to install a newer operating system.

What is the minimum number of disks required for a RAID 5 configuration?

Three

You are comparing the hardware required for two-way mirroring and three-way mirroring. What is the minimum number of disks required for each data resiliency type?

Three-way mirroring requires a minimum of 5 disk to allow. Two-way mirroring requires a minimum of 2 disk.

How do you safely remove a hot- component?

Tin the hot tweezer tip. Apply a small amount of liquid flux to both ends of the component. Place the tweezer tips in contact with both ends of the component. When the solder melts, lift the component off the circuit board. ( See Figure 1) Clean the area.

What is the purpose of swapping?

To access the data present in the hard disk and bring it to RAM so that the application programs can use it.

How should you typically modify settings in the registry?

To edit the value, right-click the name and select Modify. Change the Value Data to whatever is appropriate and press OK.

What is the Remote Desktop Connection tool used for?

To troubleshoot live fixes on a client's computer.

Which network utility shows each hop a packet makes?

Traceroute

Domain Name System

Translates hostnames to IP addresses.

An LCD monitor has dead and stuck pixels. How can you fix this issue?

Turn off your monitor. Get yourself a damp cloth so that you won't scratch the screen. Apply pressure to the area where the stuck pixel is. ... While applying pressure, turn on your computer and screen. Remove pressure, and the stuck pixel should be gone.

What should you do if a mobile device's battery is swollen?

Turn your device off if you have any indication of swelling and take it to a service centrer.

Which Power over Ethernet (PoE) standard can provide up to 100 watts of power?

Type 4

Where can you adjust the speed of the cursor in Windows?

Type and search [Mouse settings] in the Windows search bar, and then click [Open]. In the Cursor speed section, drag the slider to the right or left, to adjust the mouse cursor speed as desired.

What does Point-to-Point Tunneling Protocol (PPTP) use for encryption? What does Layer Two Tunneling Protocl (L2TP) use?

UDP datagrams

Which connector is used by most peripheral devices?

USB

How do you synchronize data between a mobile device and a desktop PC or laptop computer?

USB cable, use a bluetooth connection or wifi network.

Which editions of Windows provide BitLocker support?

Ultimate and Enterprise editions of Windows Vista and Windows 7. Pro and Enterprise editions of Windows 8 and 8.1. Pro, Enterprise, and Education editions of Windows 10. Pro, Enterprise, and Education editions of Windows 11. Windows Server 2008 and later.

How do you verify that a device is compatible with the version of Windows you are running before you purchase it?

Under Device specifications > System type, see if you're running a 32-bit or 64-bit version of Windows.

Which tasks can be completed using Windows Update?

Unspecified/Default Microsoft Update Store OS Flighting WSUS or Configuration Manager Offline scan service

What are two ways to configure a SATA2 drive with a system that supports only SATA1?

Update the Bios/UEFI to support the Sata 2 drive or configure the drive to operate in Sata 1 mode using a jumper.

What are the first items you should check when you have installed a new device and it is not working properly?

Update the device drivers.

How does keeping a system up to date increase security?

Updates enhance existing features, patch security flaws, add new security features, fix bug issues and improve performance for devices.

What are two reasons updates are released for an operating system?

Updating your operating system helps ensure that you have the latest security patch against new malware or viruses.

How do you determine if a print driver is up to date?

Use Windows Update

Post Office Protocol version 3 (POP3)

Used for incoming emails and operates on port 110. Emails are downloaded to the local computer and then removed from the email server.

Internet Message Access Protocol (IMAP)

Used for incoming emails and operates on port 143. Emails are kept on the email server allowing users to access their email from multiple devices.

Simple Mail Transfer Protocol (SMTP)

Used for outgoing emails and operates on port 25.

Which types of media can Backup and Restore write to?

User data files, user preferences, and user data settings.

Pathping

Utility used to see the path a packet takes along with additional information such as latency and packet loss.

tracert/traceroute

Utility used to see the path a packet takes.

Ping

Utility used to test the connection between two devices.

Netstat

Utility used to view network statistics.

Dig

Utility used to view or modify current DNS configuration in Linux.

Nslookup

Utility used to view or modify current DNS configuration in Windows.

Ip

Utility used to view or modify current IP configuration in Linux.

ipconfig

Utility used to view or modify current IP configuration in Windows.

Hostname

Utility used to view or modify the device name.

How can virtualization help you provide legacy software to users?

VirtualBox can readily be used to virtualize the OS and application, allowing the legacy environment to be used on modern hardware.

Which protocols are commonly used to encrypt and secure wireless communications?

WEP, WPA, and WPA2

What does the Universal Plug and Play (UPnP) feature do?

Web protocol s to enable devices such as PCs, peripherals, intelligent appliances, and wireless devices to be plugged into a network and automatically know about each other.

Burn-in

When an image displays on a screen for too long and becomes permanently stuck. It is also known as image retention (IR).

What condition causes disk thrashing? How can you reduce its effects?

When the amount of physical memory is so low that data must constantly be moved from physical RAM, to disk, and then back again.

What causes fragmentation? How does defragmenting improve how a system preforms?

When the computer saves files, it fragments the files into pieces and saves the pieces in various locations on the hard drive.

What is the difference between Backup and Restore and File History?

While File History allows you to restore individual files, Backup and Restore does not.

Which wireless method allows a device to connect to the wireless network by pressing a button?

Wi-Fi Protected Setup (WPS) is a feature supplied with many routers.

What is the difference between a cell tower analyzer and a wireless network (Wi-Fi) analyzer?

Wi-Fi analyzer specifically scan for its signal strength, network information and so on, whereas cell tower analyzers scan for the number of cell towers in the area, the nearest cell tower, and signal strength from it.

Which operating systems can use NTFS?

Windows server, XP, 7, 8X, 10 and some Linux and Unix distros

Net

Windows utility used in conjunction with other commands to manage network resources and connections.

Chkdsk

Windows utility used to check the health of a hard drive.

Wi-Fi Protected Setup

Wireless authentication method that allows for automatic connection between a device and the wireless access point.

Pre-shared key (PSK)

Wireless authentication method that uses a passphrase to authenticate users.

Bluetooth

Wireless communication technology that allows two device to connect to each other over a short distance.

Open network

Wireless network that requires no authentication.

What are the names of the Windows power states?

Working state: S0 Sleep state: Modern Standby Sleep state: S1-S3 Hibernate state: S4 Soft off state: S5 Mechanical off state: G3 Wake-on-LAN behavior

What should you do if the amount of memory being utilized in a system is close to the amount installed. What should you do if the page file utilization in a system is near 100%?

You can quit programs you are not using at the time or install more RAM.

Which actions can you complete within a folder if you have the Modify permission to that folder?

You can read, execute, write, and add or delete files.

Which system rights are required to install devices?

You must have Administrative rights.

Which components do you use to create storage spaces?

You need at least two extra drives (in addition to the drive where Windows is installed).

How does Msconfig differ from Msinfo32? When are you more likely to use Msconfig instead of Msinfor32?

You're more likely to use msconfig over msinfo32 when you want to configure how your computer starts up, which programs it boots up.

Which option can you use with the ps command to view all processes running on the system?

a option outputs all running processes of all users in the system. u option provides additional information like memory and CPU usage percentage, the process state code, and the owner of the processes. x option lists all processes not executed from the terminal.

What components allow you to see liquid crystal displays (LCD)?

a polarizing filter, a glass plate that has a transparent electrode pattern, the liquid crystal material, a clear common electrode on glass, a polarizer whose axis is crossed compared to the first polarizer, and a reflective surface

What is a hypervisor?

a program that manages VMs

Object

a statistical group, often corresponding to a specific type of hardware device or software process (such as the processor or memory)

What features are commonly included in mobile devices?

applications like a clock, alarm, calendar, contacts, and calculator and a few games.

Which Linux command can you use to view the contents of files?

cat command

Which Linux command navigates between directories?

cd command

Which Linux command can you use to edit a text file?Which Linux command manage file and folder ownership and permissions?

chmod (change mode)

Which Linux command copy and move data?

cp command

Which dir command can you use to display files that are not read-only?

dir /a-r

What are the two methods of thermal printing?

direct thermal and thermal transfer.

How can you get help with a Linux command?

enter 'help' at the terminal prompt

Which type of hardware device uses direct memory access (DMA) channels to communicate directly with random-access memory(RAM)?

hard drives, sound cards, and FireWire cards use DMA channels to increase the speed of data transfers.

Which operating systems run on mobile devices?

iPhone's OS, Apple iOS, and Google's open source OS, Google Android.

Which network utility shows the current IP configuration in Linux?

ifconfig

What are the steps in the laser imaging process?

image processing, charging, exposure, development, transfer, fusing, and cleaning.

What are the three types of peripheral devices?

input devices, output devices, and storage devices

What can cause no output on a video monitor?

loose cable

Which Linux command displays a listing of all files and subdirectories in the current directory?

ls command

The output on a video monitor displays in VGA mode. What could cause this?

missing, buggy, or incompatible video board driver.

What are the benefits of a high-resolution?

more pixel information and creating a high-quality, crisp image

Which Linux command displays the current working directory?

pwd (print working directory)

How do you verify that a device is recognized and enabled in Device Manager?

right-click the device you want to enable, and select Properties. From the Driver tab, select Enable Device or Enable, followed by OK.

Which command removes subdirectories and files in the current directory?

rm command with the recursive option, -r.

Which devices are configured as the VPN tunnel endpoints with a site-to-site VPN?

routers

Which setting can you change to stop an LCD from flickering?

start your PC in safe mode, uninstall your current display adapter, and then check for driver updates.

Which apt-get or apt command updates all the installed packages on a system?

sudo apt-get upgrade

What are the main differences between the copy command and the xcopy command?

the "copy" command is used for copying files or data, and "Xcopy" is used to copy multiple files or complete directory trees from one directory to another, etc.

What encryption algorithm does WPA2 use?

the AES algorithm

Processor utilization

the amount (percentage of time the processor spends doing non-odle tasks.

What can cause the output of an LCD to look pixilated and chunky?

the current resolution that is set not being native to the monitor

Network utilization

the percentage of traffic sent and received over a network connection.

What is the benefit of using organic light-emitting diode (OLED) displays?

they are more efficient.

How many non-overlapping channels are in the 2.4 GHz range? 5 GHz range?

three non-overlapping channels

What should you do if the system crashes during startup before you can log on?

try booting using the Last Known Good configuration.

How can you remove image retention on a plasma display?

turning on white static for 12 to 24 hours.

What is the set number of failed login attempts allowed on a mobile device?

usually ten

Which components compromise the video system in a PC?

video cable, video adapter, display device.

How can an IPv6 address be shortened

you might abbreviate the IPv6 address in Figure 3-2 by replacing the two contiguous fields of zeros in the interface ID with two colons.

Which yum command searches online repositories for a particular package, downloads it, and installs it?

yum install

Which yum command downloads and installs the latest updates for packages installed on the system?

yum update


Kaugnay na mga set ng pag-aaral

Ch 25: Assessment of Cardiovascular Function (1)

View Set

1-36 Elements + Sr, Ba, Sn, Pb, I, Xe, Rn

View Set

chapter 29.3 and 32 thermoregulation

View Set

Google Cloud Certified Professional Cloud Architect - quiz#1

View Set

RETIREMENT PLANS: VARIABLE ANNUITIES (UITS)

View Set

Chapter 2 Financial statements, Taxes, and Cash flow

View Set