Core 1 videos
IMEI
International Mobile Equipment Identity
IMEI
International Mobile Equipment Identity. Is uniquely assigned to the device itself.
IMSI
International Mobile Subscriber Identity. is uniquely assigned to the user.
D-subminiature Serial Connectors
Introduced in 1952. D-shaped electrical connector. Typically used for RS-232 serial communications. Contains two or more rows of pins or sockets
How is USB 3.0 different from USB 2.0 and 1.1
5 gigabits per sec and is 3 meters in length
Cellular networks support what in GSM networks?
3G, 4G, and 5G
Batch files are used to simplify and automate tasks. Which of the following extension is used to create a batch file? .vbs .js .bat .ps1 .py
.bat
Low Speed USB 1.1 can handle what
1.5 megabits per sec and is 3 meter in length
How is USB 3.2 different from other USBs
10 Gbps or 20 Gbps and uses USB-C
High speed USB 1.1 can handle what
12 megabites per set and is 5 meters in length
DD-50 Connector
17-16-17 pin layout. Fast-SCSI equipment
how are UBS-C connectors different from others
24 pins, double-sided, uses host and device, can't be plugged in upside down, Does not necessarily indicates USB 3.1 or 3.2
Lightning connector adapters attributes
30-pin. USB. HDMI. VGA. SD cards
DA-15 connector
8-7 pin layout and the key users for this type of connector are for gaming controllers
Which of the following can be enabled when the user signs in? It helps administrators with automating tasks, connecting shares and other useful processes. A. Logon Script B. Task Scheduler C. Task Manager D. BIOS
A
Which part of the Active Directory structure houses all the users, computers, and other objects in the active directory controlled by the administrator? A. Domain B. Forest C. Organizational Unit D. Tree
A
Which of the following methods are used by organizations to allow the use of mobile phones? A. Corporate-Owned, Personally Enabled B. Choose Your Own Device C. Corporate-Owned, Personal Use D. -Owned, Business Only E. Bring Your Own Device
A, B, D, and E
What is the reason for encrypting a mobile device's hard drive? [Choose all that apply] A. Prevent unauthorized access to the data on the device B. Prevent the device's hard drive from being accessed when lost or stolen C. the device from being unlocked with a password or PIN D. Prevent the access to the location of the device when lost or stolen
A and B
What is a SIM card
A chip inserted inside a mobile devices. Used to connect mobile devices to GSM networks. Identifies devices on a network
How is USB 2.0 better than USB 1.1
Improved performance and can do 480 megabits per sec. is 5 meters in length
Decide which of these statements about SATA and SAS data storage interfaces are true. (Choose all that are true.) A. The SAS interface is more than three times faster than the SATA interface. B. SAS interfaces are expected to replace SATA interfaces for home use. C. The SATA interface is better suited than the SAS interface for use in servers where many users will be using the data at the same time. : D. Because SATA drives are less expensive, higher-volume drives are more common in small offices.
A, D The SAS interface is too expensive to expect that they would replace SATA interfaces for typical home use. The SAS interface is best suited for use in servers because it is able to handle the load of many users accessing data at the same time.
How to enable Bluetooth
Access setting on a mobile device Apple devices Android devices Enabling Bluetooth on a laptop. Allow Bluetooth devices to find computer.
As an IT technician, you arrive at a customer's home office to troubleshoot problems they are experiencing with their printer. While questioning the customer to get an understanding of their network, you find they have a new Wi-Fi router that connects wirelessly to a new desktop and two new laptops, in addition to multiple smartphones, tablets, and the network printer. They also have several smart home devices, including security cameras, light switches, door locks, and a thermostat supported by an IoT controller hub. To work on the printer, which type of network will you be interacting with? A. WAN B. LAN C.WMN D. PAN
B A LAN can have a variety of several devices, but it is always limited to a single router that creates the boundary for the network. A single router indicates a LAN.
Which statements are false about the GPT partitioning system? (Choose all that apply.) A. It supports up to 128 partitions. B. It can only be installed on drives that are larger than 2 TB. C. It keeps a backup copy of the GPT table. D. contains the legacy MBR system for backward compatibility.
B and D GPT can support up to 128 partitions and keeps a backup copy of the GPT table. Although it is equipped to handle the situation when BIOS is expecting an MBR system, GPT does not actually support MBR. GPT can be installed on any size hard drive, but it is more expensive than the MBR system.
Which statements are true about TCP and UDP? (Choose all that apply.) A. TCP is generally faster than UPD. B. establishes a session between source and destination before it sends data, and UDP sends data without first establishing a session. C. TCP guarantees delivery and UDP does not. D. UDP is used on the local network but not on the Internet; TCP works on both the local network and the Internet.
B, C TCP is the protocol to use when guaranteed delivery is important—but speed is sacrificed to guarantee that delivery. Data delivery is guaranteed with TCP because a session between source and destination is first established so the source can verify the data was received and resend if necessary. Both UDP and TCP can work on local networks and the Internet.
BIOS is the
Basic input/ output system and is essential for starting the computer once it's powered on.
Which group is necessary to impose permissions and rights onto users? A. Power Users B. Cryptographic Group C. Security Group D. Distribution Group
C.
Preferred Roaming Lists (PRL) Updates
Changes to provider network configuration. Connecting to the right tower. Updating over-the-air
CDMA
Code division Multiple Accuse
DB-25 Connector
Communication ports, Printers, Audio Connections, Broadcast and Video
DE9 (DB-9) Connector
Communications Ports. Token Ring network connectivity. Legacy Computer mouse connector
Mobile Hotspot (Tethering)
Connecting to mobile device. Enables a network connection. Process Connect the laptop using a USB/charging cable Enable hotspot on the mobile device Laptop recognizes phone as a modem
What are some features of lightning cables
Contains 8 pins per side. Cant be inserted upside down
Which mobile security feature ensures that the device will not be vulnerable to attacks? A.Encryption B. Location C. Lock Screen D. Security Update
D
Which one of the following Screen lock options is not secure? A. Pattern B. PIN C. Password D. Swipe
D
Near-Field Communication (NFC)
Data sharing, Short distance. Radio-frequency identification
cipher /w:E:\ What does this command do on a Windows computer?
Deletes data on a NTFS drive
DIMM
Dual in-line memory module
You have just upgraded memory on a computer from 4 GB to 8 GB by adding one DIMM. When you first turn on the PC, the memory count shows only 4 GB. Which of the following is most likely the source of the problem? What can you do to fix it? A. The new DIMM you installed is faulty. B. Windows is displaying an error because it likely became corrupted while the computer was disassembled. C. The new DIMM is not properly seated. D. The DIMM is installed in the wrong slot. E. The new DIMM is not properly seated.
E Turn off the PC and reseat the DIMM. Check that the DIMM is standing in the slot at the same height of the other installed DIMM.
You need to install a customized console on 10 Windows 10 computers. What is the best way to do that? A. When installing the console on the first computer, write down each step to make it easier to do the same chore on the other nine. B. Make sure all computers are using Windows 10 Pro because Windows Home does not support MMC. Then create a console on each Windows 10 Pro computer. D. Create the console on one computer, and copy the .mmc file to the other nine. E. Create the console on one computer, and copy the .msc file to the other nine.
E You don't want to redo your work at each computer, and a console can easily be copied to another computer. A console has a .msc file extension. Windows 10 Pro and Windows 10 Home both support MMC.
What do GSM Networks allow cellular phones to do
Enable voice calls and transfer data
GPT
GUID Partition Table
GSM Communication is a network of what
Gateways, Repeaters, Relays and all mobile devices comment to cell towers.
GPS
Global Positioning System
GSM
Global system for mobile communication
What is a lightning cables advantages over Micro-USB
Higher power, Better durability, and simpler to connect
.js
Java Script
LAN
Local area network
What does MFi certification stand for?
Made for iPhone/iPod/iPad
MBR
Master boot record
Lightning cables device authentication
Microchip for device authentication. Compatible with approved devices only. Non-apple lightning cables
What does NFC stand for?
Near-Field Communication
Key Features of NFC
No deceive discovery. No pairing. Instant communication if near each other. Secure Data Transfer. Can be used to make tap transactions with cards. Encryption support.
Bring Your Own Device (BYOD)
Organizations might allow you to bring your own device for official use. However, organizations need to ensure that any corporate data on the mobile phone is secure. To safeguard the data, mobile phones must be encrypted.
You do not have a Corporate
Owned, Personal Use method.
PAN
Personal area network
.ps1
Powershell
PRL
Preferred Roaming List Updates
D-subminiature Naming Convention
Prefixed by the letter D. Shell size denoted by letters A, B, C, D, or e. Number of pins or sockets. Suffixed with P for pins or S for sockets
Lightning cable
Proprietary to apple products. Introduced in 2012. Used for power and data
.py
Python
SATA
Serial advanced technology attachment
Bluetooth Pairing
Set to discoverable mode List discoverable devices Nearby devices Select desired device Enter pin code Pair to synchronize devices
Airplane Mode
Standard feature on mobile devices. Turns off wireless antenna including the following services. GSM Wi-Fi Global Positioning System (GPS)
SAS
Statistical Analysis System
MFi certification
Stringent manufacturers' certification. Made for iPhone/iPad/iPod. Guarentes safety standards towards device
SIM
Subscriber Identity Module
SIM
Subscriber identity module
How is USB 3.1 different from other USBs
Superspeed +, 10 Gbps, Type A or USB-C
Corporate-Owned, Personally Enabled (COPE)
The organization provides the mobile device to the user. However, as a user, you are only allowed to install pre-approved apps.
Corporate-Owned, Business Only (COBO)
The organization provides, controls, and manages the devices. The applications and the data belong to the organization.
TCP
Transmission control protocol
What is CDMA Cellular Connectivity
Used to provide multiple devices simultaneous access. This is a form of multiplexing. Each device is assigned a code. Allows numerous signals on a single transmission channel
UDP
User Datagram Protocol
Global Positioning System (GPS)
Uses Radio navigation system. Geolocation satellites. Incoming data. Location and time
.vbs
Visual Basic
Micro-B plug
What is this
Mini-8 Plug
What is this
Standard-A plug
What is this
Standard-B Plug
What is this
USB 3.0 micro-B plug
What is this
USB 3.0 standard-B plug
What is this
WAN
Wide area network
WMN
Wireless Mesh Network Technology
Bluetooth
Wireless data transmission standard. Used for short distances. Wireless Personal Area Network (PAN). Connects different devices. Automatic connection and disconnection
Task Manager is a
tool that allows users to stop processes, get system information, and adjust logon applications and services.
A Domain is
a collection of users, computers, and other items that are controlled by the Active Directory administrators. They are grouped together regardless of their physical position.
Cryptographic Group members
are authorized to perform cryptographic operations.
Power Users
are included for backward compatibility and possess limited administrative powers.
Distribution Groups
are only meant for communication purposes. These are email lists that allow for communication with the users in the active directory. Distribution Groups can't affect policy.
Security groups
are the types of groups that allow administrators to apply rights and permissions, control access to shares, and apply overall controls to the system.
You work for a company that provides the same smartphone model for dozens of its employees. While troubleshooting one smartphone that won't connect to the cellular network, you call the provider's tech support number for some assistance. The technician asks for the device's IMEI. What is she trying to determine? A. The IP address of the phone on the cellular provider's data network B. The OS version on the phone C. The specific device you're calling about D. The SIM card installed in the device
c The IMEI identifies a device. It does not identify the OS version, the SIM card, or the IP address of the phone.
A Tree is a
collection of Domains that have formed a trust relationship with each other.
Organizational Units are a
necessary component of Active Directory's operation. Users, groups, and other group policy objects are stored in Organizational Units.
Task Scheduler is a program
that allows you to create and manage tasks that your computer will perform automatically at the times you specify. Predefined tasks are saved in Task Scheduler Library folders. Alternatively, users can create custom tasks as well.
A key component to using the GSM on your device is
the SIMs card
The Forest is at
the top level in the active directory structure. Forests are separate from one another. They each have their own boundaries for security and have a single database and global address for each.
Logon scripts can be
used for several purposes, such as including the mapping of network drives to users and computers, installing applications, setting up printers, creating log files, and many other tasks. Once the script is written, it will need to be saved in a batch file. The batch file is used to automate a process. When the user signs in, any logon scripts will be executed.
DC-37 Connector
used in aerospace industrial, defense, and healthcare
.bat extension is
used to create a Windows batch file.