Mike Meyers A+ Certification Flash Cards

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

How Linux names partitions:

/dev/sda is a drive; /dev/sdb; optical media is /dev/sr0

Hexadecimal Values

0000 - 0h 0001 - 1h 0010 - 2h 0011 - 3h 0100 - 4h 0101 - 5h 0110 - 6h 0111 - 7h 1000 - 8h 1001 - 9h 1010 - Ah 1011 - Bh 1100 - Ch 1101 - Dh 1110 - Eh 1111 - Fh Example: 11011101 = DDh h isn't in the address, so it would actually show up as DD

Parity RAM

1 of the 8 chips can be bad and it will still work

Capacity Stuff

1,000 = kilo 1,000,000 = mega 1,000,000,000 = giga 12 zeros = tera 15 zeros = peta 18 zeros = exa Can't use this to count in binary

Which is fastest: CPU, RAM, Hard Drive

1. CPU 2. RAM 3. Hard Drive

How to Setup Classic Email Account on mobile device:

1. FQDN of SMTP server 2. Username & password for SMTP server 3. Port number for SMTP (usually port 25) 4. FQDN for IMAP server 5. Username and password 6. Port number for IMAP (usually port 143)

To get computer on the internet...

1. Give it an IP Address 2. Give it a subnet mask 3. Give it a default gateway

CompTIA's 7-Step Malware Management Process:

1. Identify and research malware symptoms 2. Quarantine the infected systems 3. Disable System Restore (in Windows); if left on, you'll create restore points that are already infected 4. Remediate the infected systems - Update the anti-malware software - Scan and use removal techniques (safe mode, pre-installation environment) 5. Schedule scans and run updates 6. Enable System Restore; also and create a restore point (in Windows) 7. Educate the end user

Intel Microarchitectures Generation Names

1st Gen: Nehalem 2nd Gen: Sandy Bridge 3rd Gen: Ivy Bridge 4th Gen: Haswell 5th Gen: Broadwell 6th Gen: Skylake 7th Gen: Kaby Lake 8th Gen: Coffee Lake

ECC Ram

2 of the other 8 chips can go bad and it will still work

Thunderbolt 2

20 Gbps Used as mini display port

Common Port Numbers

21 - FTP 22 - SSH 23 - TELNET 25 - SMTP 53 - DNS 80 - HTTP 110 - POP3 161/162 - SNMP 143 - IMAP 443 - HTTPS 3389 - RDP 137-139 - NETBIOS/NETBT 445 - SMB/CIFS 427 - SLP 548 - AFP 67/68 - DHCP 389 - LDAP

DDR2

240 pins DDR2 speed rating is 4x fast as clock speed or double the DDR speed rating DDR2 speed X 8 = PC Speed Rating

DDR3

240 pins Double DDR2 speed rating DDR3 speed X 8 = PC Speed Rating

DDR4

288 pin stick; fastest and most common Bandwidth (MT/s = megatransfers per second) Clock Speed X 8 = bandwidth = DDR4 speed rating DDR4 Speed X 8 = PC Speed Rating

Structured Query Language (SQL)

A language used to create and manipulate databases.

End User License Agreement (EULA)

A legal contract between the author of software and the end user that defines how the software can be used Defines who the owner actually is and defines how you can use the software

Enterprise License

A license to use software that allows an organization to install multiple instances of the software.

Personal License

A license to use software that gives the right to install one instance of the software. Licensed on a per person basis

If Statement

A line that determines whether or not you run a certain chunk of code if this, then that

Blacklist/Whitelist

A list of addresses, ports, or applications that should be denied (blacklist) or allowed (whitelist) by a firewall, spam filter, or other software.

Proxy Server

A computer system (or an application program) that intercepts internal user requests and then processes that request on behalf of the user. A proxy server acts as a go-between (a proxy) between a client and a server; proxy servers are application-specific (e.g., a Web proxy for HTTP and HTTPS) proxy server provide firewalling, check for malware, ban bad URLs; applications must know the adddress of the proxy server Whenever anything is sent out to the Web instead of directly to a router, it will go to the proxy server and then out the router Anything done on any web browser will go through proxy server when configured Proxy servers can do caching, so you can get to websites more quickly

USB 3.0

5 Gbps; lots of compatibility issues; Blue tab; later updated to USB 3.1

802.11g

54 mbps; 2.4 GHz

802.11a

54 mbps; 5 GHz One of the earliest extensions to 802.11

60 Hz =

60 cycles/second

x64

64-bit CPU Program Files holds 64-bit programs

HDTV Resolutions

720p; stood for progressive scan; 1280x720, 1366x768; 2560x1440 was QHD or WQHD 1080p was 1920x1080 4K was 3840x2160 5K was 5120x2880

Binary

8 different values; 8 bits = 1 byte

TIA 568A Cable Order

8 pins green-white, green, orange-white, blue, blue-white, orange, brown-white, brown

TIA 568B Cable Order

8 pins orange-white, orange, green-white, blue, blue-white, green, brown-white, brown

Popular Public DNS Servers

8.8.8.8 8.8.4.4 These two come from Google

MicroATX Form Factor

9.6 inches X 9.6 inches

Virtualization Workstation

A computer system that hosts guest operating systems and that must have maximized RAM and CPU enhancements in the form of multiple CPUs with multiple cores. Maximum RAM and CPU cores; need storage

Bridged Network

A connection type that allows a virtual machine adapter to have a direct connection to the physical network with a unique IP address. Virtual Machine uses network card of computer; Virtual Machine installs virtual network card onto same network that goes through computer; basically, virtual machine joins same network as host computer

UDP (User Datagram Protocol)

A connectionless Transport-layer protocol that is one of the protocols in the Internet protocol suite, and is used with IP. It is also known as the Universal Datagram Protocol. A connectionless protocol; data is already ready for you before you've even made a connection

RJ-11

A connector that contains two to four wires and usually attaches phone cables to modems and to wall-mounted phone jacks Has 4 contacts

RJ-45

A connector that is slightly larger than an RJ-11 connector and contains eight wires. RJ-45 connectors most commonly attach twisted-pair cables to Ethernet network cards Has 8 contacts

ICMP (Internet Control Message Protocol)

A core protocol in the TCP/IP suite that notifies the sender that something has gone wrong in the transmission process and that packets were not delivered. Single-packet only

1 GHz =

= 1 billion cycles/second

1 Hertz =

= 1 cycle/second

Block =

= 4096 bytes

Bus Speed (base motherboard speed) X Multiplier =

= Core Speed

Volts X Amps =

= Watts

Chkdsk =

= check disk

WPA2 (Wi-Fi Protected Access 2)

A data encryption standard compliant with the IEEE802.11i standard that uses the AES (Advanced Encryption Standard) protocol. WPA2 is currently the strongest wireless encryption standard.

Redundant Array of Independent Disks (RAID)

A data storage scheme that uses multiple hard drives to share or replicate data among the drives. Provide speed and data redundancy. Can setup RAID through hardware, system setup, software.

Registry

A database that Windows uses to store hardware and software configuration information, user preferences, and setup information. Registry Editor (regedit.exe) is used to manually edit the Registry Regedit organizes registry files into five root keys; HKey: Classes Root, Current User, Local Machine, Users, Current Config

Worm

A destructive computer program that bores its way through a computer's files or through a computer's network. first generation of malware that would use networking to replicate (sometimes through e-mail, netview computers and connect to them); most malware today is a worm

Hardware Token

A device held by a user that displays a number or a password that changes frequently, such as every 60 seconds. The number is synchronized with a server and used as a onetime password.

Smart Card Reader

A device that can read a smart card used to authenticate a person onto a network.

Mantrap

A device that monitors and controls two interlocking doors to a small room (a vestibule), designed to separate secure and nonsecure areas.

Patch Panel

A device that provides multiple network ports for cables that converge in one location such as an electrical closet or server room.

Router

A device that transfers data from one network to another Routers connect multiple LANs together in a WAN Routers are sensitive to different local area networks (LANs) Uses number system to allow it identify LANs; Logical Addressing MAC Address is a physical address Logical Address defines LAN as particular LAN Routers use Logical Addressing (IP Addressing) to determine local vs. remote traffic

Hub

A device that uses its ports to connect devices (computers, printers, etc.) together Hub takes a signal (frame) from a computer and repeats it and sends it back out where everyone is connected; everyone receives the data Problem is data sent is shared by 10 megabits/sec, so it slows stuff down Hubs repeat all traffic on the LAN to all nodes Hubs are not modern

PoE Injector

A device which uses PoE to transmit electrical power over Ethernet cables. can plug in AC adapter to injector, then ethernet cable from injector to a device to power it and another ethernet cable to a switch

Upstream vs. Downstream

A Connectors are downstream B Connectors are upstream B connectors starts at device; A connector connects to motherboard Sautured connector is still a B connector

Root Server

A DNS server maintained by ICANN and IANA that it is an authority on how to contact top-level domains, such as those ending with .com, .edu, .net, .us, and so on. ICANN oversees the operation of 13 root servers around the world. Control domain name. These servers are authoritative

Event Viewer

A GUI application that allows users to easily view and sort events recorded in the event log on a computer running a Windows-based operating system. tells you about events that happen on your computer; can tell you what went wrong when a computer malfunctions

Windows Recovery Environment (Windows RE)

A diagnostic and recovery tool included with Windows PE.

dd command

A Linux command that can be used to write image files to a device such as a USB flash memory drive or hard disk. A bit by bit copier. Ex: dd if=/dev/sda of=/dev/sdb "if" is source; "of" is destination Can make an image file: Ex: dd if=/dev/sda2 of=~/backup.img Wiping a drive: ex: dd if=/dev/zero of=/dev/sdb; zero means that you just write zeros to the destination

Kernel Panic

A Linux or OS X error from which it cannot recover, similar to a blue screen of death in Windows.

net share

A Microsoft Windows command that manages shared resources. net share (name)=(file/folder you want to share) Example: net share shareit=c:\stuff

Light-Emitting Diode (LED)

A diode that will produce light when current flows through it. Used by today's LCDs

Hard Disk Drive (HDD)

A direct access storage device used to store and retrieve data from rapidly rotating disks coated with magnetic material. 3.5 inch and 2.5 inch drives.

Plain Old Telephone Service (POTS)

A POTS connection connects a customer device (such as a telephone) to the public switched telephone network (PSTN). Dial up; landlines Takes system designed to provide analog (voice) and allow it to send digital data; have to have telephone service Dial-up plugs RJ-11 connectors to a phone system; has a DB 25 serial connection; establishes a comport on a system Dial-up is maxed out at 56 kbps Modems convert analog POTS to digital COM port connections Modems connect to other modems using a phone number

Integrated Scripting Environment (ISE)

A PowerShell development environment that helps in creating PowerShell scripts.

Patch Antenna

A directional antenna that has a planar surface and is usually mounted on a wall or column. flat look; half of a big fuzzy ball; can send in one direction

Hardware RAID

A RAID system controlled by hardware located on a disk controller card within the computer. Need to treat hard drives as RAID array, and not as AHCI (which are regular old hard drives) A completed array looks like a single drive to the operating system

Simple Network Management Protocol (SNMP)

A TCP/IP protocol used to monitor network traffic. Able to see how much bandwidth is going through the switch Enables querying of network devices

Netstat

A TCP/IP troubleshooting utility that displays statistics and the state of current TCP/IP connections. It also displays ports, which can signal whether services are using the correct ports. Shows protocol (TCP or UDP), local address (IP Address and port number), foreign address (destination), and state For State: time_wait connection means that it's done, but they're going to wait a certain amount of time; close_wait means it sent out a close and is waiting for the close request to be granted or for it to time out; established means ongoing connections; listening netstat -a -n (see everything, in numerics)

Secure Shell (SSH)

A UNIX-based command interface and protocol for securely accessing a remote computer. Telnet's big brother Offers point to point encryption. Port 22

Diskpart

A Windows command to manage hard drives, partitions, and volumes. command diskpart; puts you into an interactive screen (not in the usual command prompt); "help" gives you a list of commands list disk shows all of your disks (don't select the disk that is your bootable); select disk # selects the disk you want to modify Create partition primary creates a primary partition List partition shows you the partitions on your drive; select partition # selects the partition you want to modify Format FS=NTFS quick will do a quick format in Diskpart Assign letter=x: gives the drive a letter

BitLocker

A Windows feature that encrypts an entire drive; back up recovery key Bitlocker To Go is designed for removable media; don't need a TPM module, so you'll need a password to unlock the drive

Active Directory

A Windows server directory database and service that is used in managing a domain to allow for a single point of administration for all shared resources on a network, including files, peripheral devices, databases, Web sites, users, and services.

Domain Controller

A Windows server that has Active Directory installed and is responsible for allowing client computers access to domain resources. has own set of names and passwords; can log into the domain from other computers, so you don't have to set up names and passwords on all of the computers in the network One name and password is made on the domain (aka Active Directory) macOS: File Sharing and Print Sharing Linux: Samba

System Configuration

A Windows utility (msconfig.exe) that can identify what processes are launched at startup and can temporarily disable a process from loading. Located in Administrative Tools; can set up how computer starts up (normala, diagnostic, selective); can select what OS you want to boot off of; can select which services to start and not start; can select what programs startup

System Configuration (Msconfig.exe)

A Windows utility that can identify what processes are launched at startup and can temporarily disable a process from loading. can select startup type (normal, diagnostic, selective; boot information, can select safe boot (turns off virtual memory, high-end video), can select safe mode with network either on or off; can select services, tools, startup apps

Error Checking

A Windows utility that checks for lost files and fragments as well as physical errors on a hard drive or SSD

Task Scheduler

A Windows utility that enables you to schedule tasks to run automatically at predetermined times with no interaction necessary on your part.

System File Checker (SFC)

A Windows utility that verifies and, if necessary, refreshes a Windows system file, replacing it with one kept in a cache of current system files. For command lines: type sfc /scannow; will overwrite and fix files

Hexadecimal

A base-16 number system that uses sixteen distinct symbols 0-9 and A-F to represent numbers from 0 to 15. All numbers are divisible by 4 A set of 4 numbers (0s and 1s) are replaced with a single character, for a total of 16 combinations 0h-9h; can't do 10 so we use A (Ah); Ah-Fh Example: 11011101 = DDh h stands for hexadecimal and isn't in the address Hexadecimal used as shorthand for long streams of binary values (1s and 0s) Each hex character represents 4 binary numbers (0000-1111)

Windows Recovery Environment (WinRE)

A boot option available on the windows server 2008 installation DVD or by pressing F8 when the system boots; allows restoring Windows after a disk crash or similar catastrophic failure.

Main Distribution Frame (MDF)

A cable rack that connects and manages wiring used for telecommunication between a service provider and intermediate distribution frames (IDFs). The MDF connects private or public lines coming into a facility with the networking devices in the facility. Closet where equipment is Heights on equipment rack ("u") are standardized

CDMA (Code Division Multiple Access)

A cellular standard that uses spread-spectrum technology, in which a signal is spread over a wide bandwidth so that multiple users can occupy the same channel. A cellular device on a CDMA network does not require a SIM card because, on a CDMA network, devices are compared against a white list, which is a database of subscribers that contains information on their subscriptions with the provider. Don't come with a SIM card Have lots of stuff that need to be updated; updated by firmware that's stored on ROM Issue with CDMA phones is the PRL (Preferred Roaming List); sometimes phones are slower to make calls or send/receive texts, and need to update PRL

Trusted Platform Module (TPM)

A chip on the motherboard of the computer that provides cryptographic services. key built-in to chip, which allows you to unlock drive; make sure TPM is turned on (security, securiity device support)

Twisted Nematic (TN)

A class of LCD monitor that has fast response times to keep fast-moving images crisper, but monitors are brighter, consume more power, and have limited viewing angles. Inexpensive and fast

In-Plane Switching (IPS)

A class of LCD monitor that offers truer color images and better viewing angles, but is expensive and has slower response times. Wide range of view

Access Control List (ACL)

A clearly defined list of permissions that specifies what actions an authenticated user may perform on a shared resource.

Rapid Elasticity

A cloud computing service that is capable of scaling up or down as a customer's need level changes. can take copy of popular virtual machine and move an identical copy somewhere else to deal with additional and widespread demand

Platform as a Service (PaaS)

A cloud service in which consumers can install and run their own specialized applications on the cloud computing network. can hand you a public URL to help you test out your code and web page; good for programmers

Thunderbolt

A combination of PCIe and Display Port Also used as mini display port A port that transmits both video and data on the same port and cable. The port is shaped the same as the DisplayPort and is compatible with DisplayPort devices.

Edge/Network Firewall

A combination of hardware and software that filters traffic between private networks or between a private network and a public network, such as the Internet.

Net command

A command that can display all kinds of important networking data and allows you to configure various networking options such as services.

ipconfig /all

A command to display your computer's IP address.

PowerShell

A command-line interactive scripting environment that provides the commands needed for most management tasks in a Windows Server 2012/R2 environment. .ps1 extension

cmdlet

A command-line tool available in Windows PowerShell. Many different options for what you can do with cmdlets.

Deployment Image Servicing and Management (DISM)

A command-line tool that can be used to service Windows 10 images offline or online and perform imaging operations. DISM finds version of Windows you are running and compares your system store to Microsoft's system store online use command: dism /online /cleanup-image /restorehealth

Integrated Services Digital Network (ISDN)

A communication standard for sending voice, video or data over digital telephone lines. uses terminal adapters instead of modems; idea was that it was a completely digital line; faster and digital ran at 64 kbps and 128 kbps

Network Interface Controller (NIC)

A computer card plugged into a slot on the motherboard inside of the computer and allows a network cable to be plugged in so it can interface or communicate with other computers

Switch

A computer networking device that connects network segments Switch collects MAC Addresses; switch can make direct connections from one computer to another; doesn't slow stuff down Switch = Smart Repeater Switches are modern Switches filter traffic based on MAC Address; Switches provide full bandwidth for all nodes

System Protection

A feature in Windows that creates restore points. On Windows Vista and Windows 7, it also captures previous versions of user files. can set up restore point space allocation, setup

Device Manager

A feature in the Windows operating system that lets individuals view and change the properties of all hardware devices attached to the computer.

CIFS (Common Internet File System)

A file access protocol. CIFS runs over TCP/IP and is the cross-platform version of SMB used between Windows, UNIX, and other operating systems.

.exe

A file extension that indicates that the file is a program file.

ISO Image

A file format that has an .iso file extension and holds an image of all the data, including the file system that is stored on an optical disc. ISO stands for International Organization for Standardization. Perfect copy of what was originally optical media; can burn ISO files to optical media or thumb drives Recognized as Disc Image File on Windows

exFAT

A file system type that improves upon FAT32 by having a theoretical maximum file size of 16EB, maximum volume size of 64ZB (but 512TB is current limit), smaller cluster sizes than FAT32, and an increased number of files allowed in a directory. Created for external storage media such as Flash drives and hard drives for saving images/video. hybrid of NTFS and FAT32; supports same sizes at NTFS; less overhead; thumb drives work well for this

NTFS (New Technology File System)

A file system used on Windows-based systems. It is more efficient and provides much more security than do FAT-based file systems. massive volumes up to 16 EiB; individual files can be up to 256 TiB; uses MFT (Master File Table); supports compression; supports encryption; has system and network security for most operating systems; problem is that its so powerful that it has extra data structures that make it really big

Stateless Firewall

A firewall that manages each incoming packet as a stand-alone entity without regard to currently active connections. Stateless firewalls are faster than stateful firewalls, but are not as sophisticated. says I'm blocking this IP Address or Port Number no matter what is happening

Liquid Crystal Display (LCD)

A flat-panel monitor that creates an image when liquid crystals become electronically charged. LCD either lets light pass or blocks light; LCD needs backlighting

Stateful Firewall

A flrewall that monitors communication paths and data flow on the network. Looks at the state of a situation

GNU General Public License (GNU GPL)

A free software license allowing users to run, share, and modify software as long as all software copies include the GNU GPL license terms and the copyright notice If you compile something, you have to provid the original source code either with it or when asked

Administrative Tools

A group of tools accessed through the Control Panel that you can use to manage the local computer or other computers on the network.

Navigating Windows CLI

"cd \"; brings us to the root directory (i.e. C:\); cd means change directory . says where you are; .. says this folder connects to the next one upstream; "cd .." Use dir to see what folders are in your path; use cd "folder name" to go into that folder; can also do cd c:\folder\folder If we want to get to another drive, type in the drive letter; ex. D:; if you go back to the previous drive, it will take you back to the folder/directory you were in before you switched drives

Logical Block Addressing (LBA)

"is a common scheme used for specifying the location of blocks of data stored on computer storage devices, generally secondary storage systems such as hard disks. LBA is a particularly simple linear addressing scheme; blocks are located by an integer index, with the first block being LBA 0, the second LBA 1, and so on in a sequential matter." If operating system needs to save file, it goes to LBA; LBA takes file and allocates blocks necessary to save file. LBA values are binary.

DOCSIS

(Data Over Cable Service Interface Specification) A security technology used for filtering packets and maintaining customer privacy on cable Internet services Used for cable modems

IP Address Classes

(Dated attitude about classes) Class A could start between 1.0.0.0 to 126.0.0.0 Class B could start between 128.x.0.0 to 191.x.0.0 Class C could start between 192.x.x.0 to 223.x.x.0 Class D starts with 224.x.x.x; Multicast Address; used with presentation software Class E starts with 240.x.x.x; reserved; nobody touches it

KVM Switch

(keyboard, video, mouse) allow set of input devices and monitor share between different computers Enable multiple computers to share a single keyboard, monitor, and mouse

Internation Mobile Equipment Identity (IMEI)

*#06# will automatically get you to your IMEI information; identifies the phone; when phone gets activated, IMEI gets connected to IMSI

Horizontal Runs

-network/telephone cabling runs from closets to workstations -always use solid cord (less flexible) runs into to different wall outlets and runs into the patch panel Switch has patch cable to patch panel to wall outlet to computer (one horizontal run) TIA rules that the longest horizontal run you can have is 90 meters

Botnet

A logical computer network of zombies under the control of an attacker.

Serial Attached SCSI (SAS)

A marriage of SCSI and Serial ATA, this uses a serial interface to a SCSI bus.

Brute Force

A method for determining a solution to a problem by sequentially testing all possible solutions.

Software RAID

A method of implementing RAID that uses software to implement and control RAID techniques over virtually any type of hard disk(s). RAID software may be a third-party package or utilities that come with an operating system NOS. Downside with software RAID is that you don't have a dedicated RAID controller; can really slow down smaller CPUs

Windows Preinstallation Environment (Windows PE)

A minimum operating system used to start the Windows installation.

Locator Application

A mobile app used to locate a device through GPS. Devices usually need to be configured to be accessible remotely. For Android devices, the website for locating a device is http://google.com/android/devicemanager. For iOS devices, the website for locating a device is http://icloud.com/#find. For Android devices, devices are linked to one's Gmail account. For iOS devices, devices are linked to one's Apple ID.

Universal Naming Convention (UNC)

A naming system used by Windows computers to locate network file shares and network printers. The format is \\servername\sharename.

Patch Cable

A network cable that is used to connect a PC to a hub, switch, or router.

DHCP (Dynamic Host Configuration Protocol)

A network service that provides automatic assignment of IP addresses and other TCP /IP configuration information. Server that automatically gives you all the information like IP Address, etc.

Wide Area Network (WAN)

A network that connects devices in geographically separated areas.

IP Address

A number that uniquely identifies each computer or device connected to the Internet. Example: 192.168.4.100 Every device inside LAN gets a unique address. First three set of numbers are the same in a LAN. The last set of numbers is different for each device that is connected to the router/switch If computers want to talk to a device that doesn't have the same IP Address, they have to send it out to router (default gateway) to another LAN

Point-to-Point Protocol over Ethernet (PPPoE)

A protocol that was originally designed to encapsulate PPP frames into Ethernet frames. Used by DSL providers to force customers to log into their DSL connections instead of simply connecting automatically. Used to charge internet per person; routers allowed people to get around this

SMB (Server Message Block)

A protocol that works on the Application layer and is used to share files, serial ports, printers, and communications devices, including mail slots and named pipes, between computers.

Post Office Protocol (POP)

A protocol used to retrieve email from a mail server. POP3 is a later iteration of the POP protocol, and can be used with or without SMTP. Uses TCP Port 110 You have set up all of your folders on the client itself

Internet Message Access Protocol (IMAP)

A protocol used to retrieve email messages. IMAP is similar to POP3, but with some advanced features. The main difference between the two is that IMAP generally leaves the email on the mail server. Current version is IMAP4; uses Port 143 Stores alll of your folders and organization and also sends it down to your e-mail client

Encrypting File System (EFS)

A public/private key encryption first used in Windows 2000 on NTFS-formatted disks. The file is encrypted with a symmetric key, and then a public/private key is used to encrypt the symmetric key.

5 GHz Band

A range of frequencies that comprises four frequency bands: 5.1 GHz, 5.3 GHz, 5.4 GHz, and 5.8 GHz. It consists of 24 unlicensed bands, each 20 MHz wide. The 5-GHz band is used by WLANs that follow the 802.11a and 802.11n standards. 5.150 - 5.875 GHz Has channels 36-64; no odd channels, then has 100-144, then 149-165 (odd)

RADIUS Server

A server that offers centralized authentication services to a network's access server, VPN server, or wireless access point via the RADIUS protocol.

Restore Point

A representation of the state of your computer's system files at a particular point in time

Man-in-the-Middle

A security attack in which network communication is intercepted in an attempt to obtain key data Main fix is through encryption

Principle of Least Privilege

A security discipline that requires that a particular user, system, or application be given no more privilege than necessary to perform its function or job.

TKIP (Temporal Key Integrity Protocol)

A security protocol created by the IEEE 802.11i task group to replace WEP. Improved upon RC-4

Frame Check Sequence (FCS)

A sequence of bits placed in a frame that is used to check the primary data for errors. Checks to see if the data came in properly

Password Policy

A series of Group Policy settings that determine password security requirements, such as length, complexity, and age. minimum length, type of complexity, how often changed, whose in charge of passwords, how are passwords stored, etc.

Logical Drive

A portion or all of a hard drive partition that is treated by the operating system as though it were a physical drive. Each logical drive is assigned a drive letter, such as drive C, and contains a file system. Also called a volume.

Thermal Printer

A printer that applies heat to special thermal paper, turning select areas black to produce text and basic graphics. Has paper that is thermally sensiitive; when hit with heat, it changes color multi-part forms; special thermal paper

Control Panel

A program accessed from the Windows Start menu that provides specialized features used to change the way Windows looks and behaves. Has a lot of overlap with Settings

Virtual Network Computing (VNC)

A program that allows you to control a computer at a remote location. Used for Linux and Macs for remote desktop connections TightVNC will run on Windows; is a server and a client

Spooler

A program that helps coordinate all print jobs being sent to the printer at the same time.

Transport Layer Security (TLS)

A protocol based on SSL 3.0 that provides authentication and encryption, used by most servers for secure exchanges over the Internet.

Remote Desktop Protocol (RDP)

A protocol that allows for separate channels for carrying presentation data, serial device communication, licensing information, and highly encrypted data (keyboard, mouse activity). Uses Port 3389

Dynamic DNS (DDNS)

A protocol that enables DNS servers to get automatic updates of IP addresses of computers in their forward lookup zones, mainly by talking to the local DHCP server.

Link Layer Discovery Protocol (LLDP)

A protocol that identifies devices connected on the local area network and allows them to automatically exchange information.

NetBT (NetBIOS over TCP/IP)

A protocol that runs in the Session and Transport layers of the OSI model and associates NetBIOS names with workstations. NetBIOS allows old applications designed for out-of-date NetBIOS networks to work on TCP/IP networks. Got rid of NetBEUI and allowed for IP Addresses to connect, but still did same naming convention of NetBIOS

APIPA (Automatic Private IP Addressing)

A service that enables a DHCP client computer to configure itself automatically with an IP address on the 169.254.x.x (Class B Address) network in case no DHCP servers respond to the client's DHCP discover broadcast. APIPA is fall back plan if you can't find DHCP server In ipconfig, if your IP Address (IPv4) is 169.254.x.x, you have a DHCP server problem. Ipconfig /renew will give you the proper IP Address to see if problem is resolved; will connect to DHCP server Ipconfig /release to disconnect from DHCP server

IEEE 802.11

A standard used to ensure compatibility between devices Primary way all of our wireless stuff communicates 2 modes: infrastruccture mode or ad hoc mode Based on the Industrial, Scientific, and Medical (ISM) Radio Bands

Solid State Drive (SSD)

A storage device that uses the same kind of memory that flash drives use but that can reach data in only a tenth of the time a flash drive requires. SSDs are organized into pages; chip on SSD can have thousands of pages; in a page, atom (block); pages can store lots of blocks; each block assigned an LBA number SSD memory cells are called pages 2.5 inch SSD; M.2 SSD Sticks Faster than HDDS First generation SSDs use SATA

Sysinternals

A suite of tools designed to assist with troubleshooting issues with windows. Made by Mark Russinovich

Managed Switch

A switch that can be configured via a command-line interface and sometimes can be configured in groups. Usually, they are assigned their own IP addresses. VLANs can only be implemented through managed switches. have features like VLAN; gets IP Address through DHCP Configure via IP Address and Web Browser (Internet Explorer) Can define VLANs; assign ports to a particular VLAN; port security

Captive Portal

A technical solution that forces wireless clients using web browsers to complete a process before accessing a network. It is often used to ensure users agree to an acceptable use policy or pay for access.

Omni-Directional Antenna

A type of antenna that radiates the signal beam out in all directions and has lower gain but a wider coverage area. Radiation pattern looks like a bug fuzzy ball; the more power, the larger the ball; looks like a car antenna

Inkjet Printer

A type of printer that uses a nonimpact process. Ink is squirted from nozzles as they pass over the media. have ink cartridges and connected to them is the jet; ink brough into the jet, heated up, and jet shoots out the ink with a charge on it Print Head can have CYMK and stores all of the jets; moves back and forth across carriage and shoots ink across the paper Inkjets don't havae high voltages and heats that laser printers do Ink cartridges have colors in separate cartridges, instead of just one cartridge for all colors Multifunction Device (MFD); has scanner functions, fax functions

Host Firewall

A type of software firewall installed on a host and used to protect the host from network-based attacks.

Process ID (PID)

A unique identifier assigned to every process as it begins. every program that's running in memory (RAM) gets its own Process ID

Media Access Control (MAC) Address

A unique identifier assigned to network adapters by the manufacturer. This address is six octets in length and is written in hexadecimal. Every network on local network identified by MAC Address; 48 bit address manifested as 12 hexadecimal characters. Every network card gets unique MAC Address; first 6 characters are OEM ID; other 6 can be changed Physical Address = MAC Address To see MAC Address: Windows: ipconfig / all Linux/Macs: ifconfig / all MAC Address uniquely identifies a host on a LAN

International Mobile Subscriber Identity (IMSI)

A unique number that identifies a cellular subscription for a device or subscriber, along with its home country and mobile network. Some carriers store the number on a SIM card installed in the device. Built into the SIM card; won't ever be on a CDMA phone

WPS (Wi-Fi Protected Setup)

A user-friendly—but not very secure—security setting available on some consumer-grade APs. Part of the security involves requiring a PIN in order to access the AP's settings or to associate a new device with the network. The PIN can be easily cracked through a brute force attack, so this PIN feature should be disabled if possible. Can connect devices by pressing a button on the router and the device you are connecting.

System Restore

A utility in Windows that restores system settings to a specific previous date when everything was working properly.

Nslookup

A utility that is used to test and troubleshoot domain name servers Can show if a DNS Server is functional or not

Windows Server

A version of Windows that has been specifically designed and configured for server use.

Mapping Drives

A way to access a single file, specific folders, or an entire drive between different operating systems over a network map network drive, then give drive letter; can select to reconnect at sign-in; could connect with different credentials

Power over Ethernet (PoE)

A wired networking standard that allows electrical power to be sent along with data over standard Ethernet cables PoE (First Generation) PoE+ (provides more electricity)

Wireless Mesh Network (WMN)

A wireless network in which multiple APs work as peer devices on the same network, thereby providing more fault-tolerant network access to clients. Ad Hoc mode on steroids; easy to set up One base station connected to network; configure SSID; place external stations where you want better coverage Network name, network password, IP Address information Mesh devices use third party types of encryption

AMD Sockets

AM4 (mainstream) TR4 (higher end CPUs)

AMD vs Intel caches

AMD believes in big caches Intel believes in small smart caches

Power Users

Accounts granted greater privileges than normal user accounts when it is necessary for the user to have greater control over the system, but where administrative access is not required one step below Administrator; power users can't take control of other user accounts stuff

Time Domain Reflectometer (TDR)

Advanced cable tester that tests the length of cables and their continuity or discontinuity, and identifies the location of any discontinuity due to a bend, break, unwanted crimp, and so on. Uses speed of light to detect how long a cable is

Authenticator Applications

An authenticator application is a specialized app called an "authenticator." The app is pre-set by you to work with the service and provides a constantly rotating set of codes that you use to utilize two-factor authentication or verification. The codes in authenticator apps sync across your accounts and provide an extra layer of security. For example, implementing two-factor authentication on your Gmail account would require you to use your username, password and one of the generated codes from the authenticator apps to log in to your Gmail account.. It may take a little longer to in, but it provides you with an added layer of security.

Small Computer System Interface (SCSI)

An interface standard developed by the American National Standards Institute (ANSI), it is used for both internal and external hard drives and optical drives as well as devices such as printers, modems, scanners, and many other peripherals. Used parallel interface (multiple wires). Competed with ATA. SCSI is dead today. SCSI language lives on in serial SCSI versions

Command-Line Interface (CLI)

An interface that accepts text commands at a prompt, usually for immediate execution with immediate display of output. Shells are different types of command-line interfaces

Cold Cathode Fluorescent Lamp (CCFL)

An older backlighting technology that uses one or two fluorescent tubes to light a monitor panel. Used by first generation LCDs for backlight

GSM (Global System for Mobile Communications)

An open standard that uses digital communication of data, which is separated by time slots on a channel. GSM is accepted and used worldwide to provide cellular service. Come with a SIM card Usually updated automatically; exception is Android and iOS, where you can choose to update automatically

DVD (digital video disc or digital versatile disc)

An optical disc standard introduced after CDs. A DVD can hold 4.7 GB of data. DVD-ROM is most common Dual-Layer (DL) format, Double-Sided (DS) format DVDs can store 4.37 - 15.9 GB

CD (Compact Disc)

An optical disc technology that uses a red laser beam and can hold up to 700 MB of data. 74 minute, 80 minute sizes for music 650-700 MB

Baseband Update

An update to a mobile phones baseband OS which manages all wireless communication.

Full-Duplex

Any device that can send and receive data simultaneously.

Logical Addressing

As opposed to physical addressing, the process of assigning organized blocks of logically associated network addresses to create smaller manageable networks called subnets. IP addresses are one example of logical addressing. Value typed in to identify LANs Type of Logical Addressing we use is IP Addressing

Crossover Cable

An Ethernet cable that swaps the pair used for transmission on one device to a pair used for receiving on the device on the opposite end of the cable. In 10BASE-T and 100BASE-TX networks, this cable swaps the pair at pins 1,2 to pins 3,6 on the other end of the cable, and the pair at pins 3,6 to pins 1,2 as well. If you make one side TIA 568A and the other side TIA 568B, you have a crossover cable; can plug two computers directly together

Static IP Address

An IP address that is manually assigned to a device and remains constant until it is manually changed. Type in IP Address, Subnet Mask, and Default Gateway

Private IP Address

An IP address that is used on a private TCP/IP network that is isolated from the Internet. Class A: 10.x.x.x; 10 means private Class B: ranges from 172.16.x.x to 172.31.x.x Class C is 192.168.x.x

Broadband Connection

An Internet connection such as DSL or cable modem that offers higher bandwidth, and therefore faster transmission speed, than standard modem connections. always on connection

Access Policy

An SNMP security concept where agent may wish to give different access privileges to different managers You can define port number, time of day, filter by MAC Address, etc.; can combine access policies for your own situation

Loopback IP Address

An address used for testing of the host itself 127.0.0.1 sends ping packet (a single ping) to a particular IP Address; can verify if network card is up and running

Dipole Antenna

An antenna that detects signals from all directions equally (also called omnidirectional antenna). two omni-directional antennas pointing in opposite directions; stomped donut for a flat circular signal; good for one floor of an office

Highly Directional Antenna

An antenna that sends a narrowly focused signal beam long distances. Yagi Antenna signal looks like a stretched football; good for shooting long distances

Open Database Connectivity (ODBC)

An application programming interface that provides a common language for application programs to access and process SQL databases independent of the particular DBMS that is accessed. based on compuer language Structured Query Language (SQL), which allows any application to talk to any database; application uses ODBC to link to that database

Phishing

An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information

Distributed Denial of Service (DDoS)

An attack that uses many computers to perform a DoS attack. Malware distributed by mainly by e-mails; affected computers are referred to as zombies; a server is in charge of zombies

Recycling Guide:

Batteries: throw alkaline batteries in the trash; recycle lithium-ion batteries Toner cartridges: can be recycled; refilled and working again CRT Monitors: people will get metal out of them Cell phones and tablets: will be bought by others; delete your accounts and factory reset

AAA

Authorization, Authentication, Accounting

3.5 mm jack

Blue is auxiliary line in Green is for front two stereo speakers Pink is for microphone Silver is for side speakers Black is for rear speakers Orange is for subwoofer or center channel

NAS (Network Attached Storage)

Box that sits on a network; file sharing; Gigabit NIC (high speed network card); RAID array (way to protect data) A dedicated computer system used to provide disk storage on a network. It's often a small device that is easy to plug in and use.

Bluetooth Classes

Class; Power; Range Class 1; 100 mW; 100 m Class 2; 2.5 mW; 10 m Class 3; 1 mW; 1 m

Windows Installation Options:

Clean install: simplest Upgrade install: have previous Windows version; upgrade keeps all of your stuff; some limitations; if you have older home version, can only upgrade to new home version Multiboot: ex. Either boot to Windows Server or Windows 10; Windows 10 in boot information in beginning; choose operating system in menu Unattended Installation: create answer file, which answers as many of the questions as possible when installing; use Windows System Image Manager; create autounattend.xml and move to Windows ISO; when computer boots up with thumb drive, reads xml and starts unattended installation With bunch of new identical computers: windows installed on one computer; image distributed to all the other computers and simultaneously update all computers from that one image; tools like User State Migration Tool (USMT) and Ghost; other benefits include applications, setting up firewalls for all computers

Physical Safety guidelines:

Disconnect power before repairing PC Radio Frequency Interference (RFI) can interfere with wireless signals Equipment grounding Remove jewelry Fire extinguisher; ABC; A) wood, solids; B) grease, liquids; C) electrical Lifting techniques: lift with our legs Weight limitations: 25 pounds or more needs assistance Use a handtruck

RAID 6

Disk striping with parity. RAID-6 uses four or more disks and provides fault tolerance. It can survive the failure of two drives. 1 piece on 1st drive, another piece on 2nd drive; 1 parity each on 3rd and 4th drive Can lose up to 2 drives before losing any data.

net view

Displays shared resources and available network domains/workgroups net view [ex:]mikewin10pc; can see the shares on the computer

DHCP Range

Dynamic Host Configuration Protocol range. A contiguous list of IP addresses in a DHCP pool. Passed out to any computer connecting

.dll

Dynamic Link Library. A compiled set of code that can be called from other programs.

Dynamic Host Configuration Protocol (DHCP)

Dynamically (automatically) assigns IP address information (for example, IP address, subnet mask, DNS server's IP address, and default gateway's IP address) to network devices. Routers can act as a DHCP server. In Settings, when you select obtain IP Address automatically, it means you want to use DHCP.

ipconfig/all

Enables the MAC address information to be displayed from the command prompt Can show you your IP Address, Subnet Mask, Default Gateway, MAC Address (physical address)

Port Triggering

Enables you to specify outgoing ports that your computer uses for special applications; their corresponding inbound ports open automatically when the sessions are established. Can select FTP Active and set triggering port to 21, which allows router to accept anything back if something is sent out on Port 21

Environment Variables

Environment variables are like variables in programming languages—they hold data to be referred to by the variable name. Environment variables differ from programs' internal variables in that they're part of the environment of a program, and other programs, such as the shell, can modify this environment. Ex: homepath=\Users\michaelm; usually that line won't work for other users; using environment variable, it will adjust depending on the user logged in Back in bat file; c:%homepath%\Desktop\Logs

Error Correction commands in Windows CLI

Error correction uses command chkdsk; checks drive chkdsk only checks, but does not fix to fix, use chkdsk /f (f means fix)

European voltage vs. United States voltage

European voltage: 230 V United States voltage: 110 V

Example of CPU name: i7-5820k

Ex: i7 - (gen# 2-9) SKU (sale inventory code) (letter defining feature)

FAT32

File allocation table that uses 32 bits to address and index clusters. Commonly used with USB flash-media drives and versions of Windows prior to XP. has 8 hexadecimal characters on each side; right side value is made by saying which block that files continues into; 0000FFFF means end of file

RAID 5 (Striping with Parity)

File blocks are striped along with a parity block. This requires at least three disks. Efficient use of disk space as files aren't duplicated, but space is still used for parity. High redundancy Data is available after drive failure but parity calculation may affect performance. Need minimum of 3 drives. First piece of file on 1st drive; Second piece on 2nd drive; multiply together creates parity value on third value. If any drives die, you can reverse math to recreate type of data. If you lose more than one drive, you lose the data. You get speed and redundancy of data.

CDFS (Compact Disc File System)

File structure, rules, and conventions used when organizing and storing files and data on a CD. designed to allow optical discs to organize file system that we can read with our operating systems; files up to 4 GiB

Fox and Hound

Fox = tone generator Hound = tone probe Fox makes noise, hound finds noise Finds homeless cable

DLP projector (digital light projection)

High-end projector with extremely high light (up to 15,000 lumens) and scan output. Most commonly used for very large screen and room applications.

Firewall example:

Http out on destination port 80, source port is 14421; router allows outgoing port 80; firewall blocks incoming port 80; goes to server which is listening on port 80; source port is 80, destination is port 14421; since destination is now 14421, firewall does not block it If firewall on server blocks incoming port 80, it won't receive it, so we can't block incoming port 80 on a server

Inventory Management

IT uses asset tags and barcodes to keep track of inventories

Expansion Cards Troubleshooting

If any problems: First assume device driver. Can be compatibility issues. Can show blue screen of death. Make sure it's plugged in right; make sure it's power connection is connected.

Troubleshooting Wireless Connections:

If no connectivity: SSID might not exist or may have changed; pas word may have changed; Low RF (radio frequency) signal, may need to get closer, look at antennas; SSID broadcasting might be off If limited connectivity: some of the same situations for no connectivity; slow transfer speeds may be caused by some devices; low RF signal If intermittent connectivity (as in, runs great, then suddenly not working well): sometimes interference causes this; too many people on wireless network, may need more WAPs; may need to establish QoS

Network Troubleshooting: Wired Troubleshooting

If no connectivity: are wires all plugged in?; look at IP addressing with static IP Addresses, may have IP conflicts; ping by IP Address to see your system If limited connectivity: DHCP problem; look for APIPA addresses; Rogue DHCP Server is possible If intermittent connectivity: problem with the cable itself; interference with cable If unavailable resources: might be problem with the server or the shared resources itself If slow transfer speeds: go through your processes that are eating up your network bandwidth

Trouble Shooting Applications

If system is running slow: Malware could be causing an issue In task manager, see what is using high CPU and Disk; look at Performance charts; start killing tasks; storage can be an issue; defragmentation, chkdsk, event viewer Applications blowing up: Can try to repair an application; case by case basis; can delete application and try again; can apply updates Problems with Services: Services that fail to start; restart the service; something else might be keeping it from starting

Administrator Account

In Windows 2000/XP/Vista, an account that grants to the administrator(s) rights and permissions to all hardware and software resources, such as the right to add, delete, and change accounts and to change hardware configurations. God of the computer; can manage, add, delete other accounts

Storage Spaces

In Windows 8 and later, a software RAID solution that enables users to group multiple drives into a single storage pool Storage Pool is preassigned group of drives that work together

Workgroup

In Windows, a logical group of computers and users in which administration, resources, and security are distributed throughout the network, without centralized management or security. Most basic type of networking organization; used as organizational tool; no security, no central administration; good for small networks

Windows Basics for CLI

In Windows, running as administrator will allow you to use any command; some commands are very powerful "Dir"; shows date, time, size, name of file or folder; dir signals a folder (directory); dir /p shows dir one page at a time Anything put on the end of a command line is called a switch (ex. "Dir /p") /? Is a switch that will teach you about what command you use (ex. "Dir /?" will tell you more about the dir command); or you can type "help dir" Cls clears the screen C:\Windows\system32>; as we look in different folders, it will change

default gateway

In a TCP/IP network, the nearest router to a particular host. This router's IP address is part of the necessary TCP/IP configuration for communicating with multiple networks using IP.

DHCP Reservation

In addition to having DHCP supply a random address from the scope, you can configure it to supply a specific address to a client. Such an arrangement is known as a reservation. Reservations are a means by which you can still use DHCP for a system but at the same time guarantee that it always has the same IP address. DHCP can also be configured for exclusions. In this scenario, certain IP addresses are not given out to client systems. Reserves one of the IP Addresses in the IP Pool for a specific device

Process Explorer

In addition to listing the running programs, Process Explorer can list the files and directories each process has open, as well as open handles and loaded DLLs. can see the dependency tree in this program

MIMO (multiple input-multiple output)

In the context of 802.11n wireless networking, the ability for access points to issue multiple signals to stations, thereby multiplying the signal's strength and increasing their range and data-carrying capacity. Because the signals follow multipath propagation, they must be phase-adjusted when they reach their destination. Allows a single WAP to use multiple antennas to change its radiation signal so it zeroes in on a device; just need 802.11n WAP and NIC to use this feature

Windows Logs

Keeps logs for application, security, system, and setup Application; anything happening within an application that might be of interest Security; information about logons Setup; information about setup of windows, updates System; anything that has to do with the Windows core system

Real-Time Clock (RTC)

Keeps system time without external power using a CMOS battery All computers in a network need to be synchronized to the same time in order to boot up; runs with a CMOS battery that is built-in to the motherboard (CR 2032 battery) If you don't have a battery, you lose time or it slows down If the battery dies, all of the system information that you have saved gets erased

What are the different Cache Levels?

L1 Cache: runs at multiplied speed of CPU (KB) L2 Cache: feeds L1 cache; bigger (KB), but runs at half multiplied speed L3 Cache: biggest (MB); runs at base motherboard speed, but faster than RAM itself

LBA 0

LBA of the protective MBR (first position) LBA 0 is where MBR tells computer to find operating system

Link Lights

LEDs located next to the Ethernet port on the NIC that indicate activity on the link. 1. Connected (steady and always on) 2. Speed Light (different color, no standard) 3. Activity (always flickering)

Intel Sockets

LGA 1151 (mainstream) LGA 2066 (in higher end CPUs)

Three ways to connect printers:

Local Printer (plug in to local system) Network Printer (RJ-45 cable or wireless) Cloud Printing

Printer Protocols

MAC - SLP Windows - LLDP gets own IP Address via DHCP

Inkjet Printers Maintenance

Maintenance Area's job is to plug the ink jets so it won't drip ink and clog Maintenance: 1. Clean Heads 2. Calibration 3. Replace Cartridges 4. Clear jams, paper jams

Image-Level Backup

Makes a copy of the virtual disk and configuration associated with a particular VM. Backup is saved as a singled entity called as a VM Image. Also supports file-level recovery. Doesn't require the hypervisor resources

Types of Threats

Man-In-The-Middle Spoofing Denial of Service (DoS) Distributed Denial of Service (DDoS) Zero Day

Corporate-Owned Personally Enabled (COPE)

Means the organization issues a mobile device, but unlike COBO, employees are allowed to install a specific number of preapproved (white-listed) apps for their personal use.

Magnetic Disk Drives

Memory storage device that uses the magnetic state of ferrous coating to record data; arm picks up 1s and 0s

Troubleshooting Printers: Printer Errors

No image on printer display: turned on?; sleep mode?; key stroke that administratively locks you out of printer? Paper not feeding, paper jam: problem with pickup rollers or separate pads; replace them; humidity can kill paper Low memory errors: laser printers; reduce resolution or buy more RAM, use regular RAM Error Code: research error code

Three Shells of Physical Security

Perimeter Security: keeps people off the property Rooms: locks, badges, etc. Individual Devices: cable lock, server lock, privacy screen, etc.

ping -t

Ping continuously until stopped with Ctrl+C

Quality of Service (QoS)

Policies that control how much bandwidth a protocol, PC, user, VLAN, or IP address may use. toolset that allows you to meter how much bandwidth things get (certain IP Addresses, MAC Addresses, Ports) Can give things higher or lower priority

Symptoms of Malware:

Pop-Ups; manifests as separate window Browser Redirection: type in a website, then sends you to a different website Security Alerts: desktop notifies you of problem; notices pop-ups, browser redirection, system files being changed Application Crashes OS Update Failure: OS doesn't let you update; malware prevents patch from being applied Spam or Hijacked E-mail: usually from someone you know's e-mail or your e-mail sends out spam Automated Replies: sign of hijacking e-mail Invalid Certificates (Trusted Root CA): website says certificate is invalid; check so see what problem is

TCPView

Port Monitoring. A Windows program that displays all active TCP and UDP endpoints on your system, indicating which process is associated with each local and remote IP address and relaying continuous, detailed real-time data on system's TCP/IP activity.

What is built into the BIOS?

Power-On Self-Test (POST) System Setup (CMOS) reads data

Cloud Printing

Printing to a printer anywhere on the Internet from a personal computer or mobile device connected to the Internet. Google Cloud Print; print to a printer installed to a Google Account; has to be a wireless capable printer and has to have Google Print Services support built into it; can print to that printer no matter where you go as long as that printer stays on the same wireless network

robocopy

Powerful command-line utility for copying files and directories, even over a network. Can handle more verification and speed than xcopy. Ex: robocopy c:\backup x: /s /xa:h /xa:h (no hidden files) xcopy and robocopy are network aware: Ex: robocopy D:\VMs "\\ Server\vmbackup"; allow you to make copies across a network as if it were another drive

Parity/ECC (Error Correction Code) RAM

RAM that has an extra (9th) chip called a parity chip

RG Ratings

RG-58, RG-59, RG-6

RWXRWXRWX

RWX(user) RWX(group) RWX(other) Read Write eXecute

Common Problems with Malware:

Ransomware Botnet Keylogger Spyware

3D Printing

Rapid prototyping process that builds a part by ejecting adhesive bonding material onto successive layers of powders. Note that this term is often used to describe all rapid prototyping processes. Heating element moves back and forth; uses heated thermal plastic and makes a shape based on 3D images; can use 3D program to make image, then use tool to prepare it for printing, and then go through printing process Filament is unmelted raw material; makes 3D objects; can melt them and they harden very quickly; usually thermal plastic Can select number of layers pasted, can select how hollow it is Slicing process makes a slice file, which then goes to printer Printing process requires preheating the various print elemens, such as the filament, extruder, and bed

CAT Ratings

Ratings for twisted pair cabling CAT 5 - 100 mbps CAT 5e - 1 Gbps CAT 6 - 1 gbps up to 100 m, 10 gbps up to 55 m) CAT 6a (10 gbps at 100 m segments)

Windows 10 Task Manager

Right-click on Windows key will give you the option of Task Manager In Processes, will see total CPU%, Memory%, Disk%, Network% Background Processes are Services; can right-click and open file locations, properties; there still is a Services Tab Performance Tab; shows how much memory is available; shows disk utilization, how hard network is running Still has a Resource Monitor; shows each core running

RC-4

Rivest Cipher 4; encryption used on WEP

Delete Commands for Linux CLI

Rm "file" deletes a file Rm M* deletes all files starting with M Rm * deletes all files within the directory/folder

Universal Plug and Play (UPnP)

Technology designed to allow wirelessaware devices to connect to a wireless network automatically declare themselves to other devices and discover other devices. Allows devices to connect more easily; helps find a router that you have connected

TACACS+

Terminal Access Controller Access Control System Plus

Dynamic Disks

Special feature of Windows that enables users to span a single volume across two or more drives. Dynamic disks do not have partitions; they have volumes. Dynamic disks can be striped, mirrored, and striped or mirrored with parity. Drives must be converted from basic to dynamic in Disk Management; dynamic disks enable shrinking, extending, and spanning volumes without losing the data on the disk For GPT; keep the boot drive basic (not dynamic); set boot drive to GPT; easy to create dynamic disks; will lose all data if you change dynamic drive to basic drive

Parallel ATA (PATA)

The older and slower ATA standard. Hard drive spoke this language.

Visual Basic

The Microsoft graphical user interface (GUI) programming language used for developing Windows applications. A modified version of the BASIC programming language. .vbs extension

Domain Account

The accounts used to access Active Directory or network-based resources, such as shared folders or printers. Resides in the Active Directory on a Windows Domain Controller.

Port Number

The address on a host where an application makes itself available to incoming data. IP Address gets us to the computer; Port Number gets us to the right application on that computer Port Numbers range from 0-65535 Web server listens to a port; computer sends data to ports of a particular IP Address Server; data can be sent between ports on a server Resource Monitor shows the connections on a system

Disaster Recovery

The administrative function of protecting people and resources while restoring a failed network or systems as quickly as possible.

Tower Case

The largest type of personal computer case. Tower cases stand vertically and can be as high as two feet tall. They have more drive bays and are a good choice for computer users who anticipate making significant upgrades.

Protocol Data Unit (PDU)

The name given to data at different layers of the OSI model. Specifically, the PDU for Layer 4 is segment. The Layer 3 PDU is packet, the Layer 2 PDU is frame, and the Layer 1 PDU is bit. Looks at ethernet frame and determines what part you are interested in We organize packets by PDUs

Serial ATA (SATA)

The newer and faster ATA technology. Hard drives speak this language; used today

VGA Connector

This is a connector for analog video. It has 3 rows and 15 pins. It is also sometimes referred to as the DE-15 or HD-15 connector.

Network ID

The portion of an IP address common to all nodes on the same network or subnet 0 gets put at the end to show that we're talking about a Network ID (not a computer) Subnet Mask example: 255.255.255.0

Memory Controller Chip (MCC)

The portion of the chipset that controls communications between the CPU and system RAM

Port Forwarding

The process of redirecting traffic from its normally assigned port to a different port, either on the client or server. In the case of using SSH, port forwarding can send data exchanges that are normally insecure through encrypted tunnels. Preventing the passage of any IP packets through any ports other than the ones prescribed by the system administrator.

Encrypting

The process of transforming data into a non-readable form for security purposes.

2.4 GHz Band

The range of radio frequencies from 2.412 to 2.4884 GHz. The 2.4 GHz band, which allows for 11 unlicensed channels, is used by WLANs that follow the popular 802.11b and 802.11g standards. However, it is also used for cordless telephone and other transmissions, making the 2.4 GHz band more susceptible to interference than the 5-GHz band. different WAPs can use different ranges so they don't stomp on each other; premade channels so you don't have to specify band 14 channels in Japan; 13 channels in Europe; 11 channels in USA

Basic Input/Output Services (BIOS)

This program is dedicated to enabling your CPU; every motherboard has programming that's designed to communicate with assumed hardware of computer (called BIOS)

110-Punchdown Tool

This tool is used to permanently connect wires to patch panels and RJ-45 wall jacks

Format comands for Windows CLI

To format example: format e: /FS:NTFS To quick format example: format e: /FS:NTFS /Q

Internet Tier 1

USA; about 10 companies that provide Internet to very large customers; none provide complete coverage of entire USA; have to work together to cover all of USA; created peering agreement to cover all of USA, agree to let each other's traffic go through; need a place to interconnect, so they use Network Operation Centers (NOCs) that are owned by third-parties

Troubleshooting Printers: Computer Errors

Unable to install printer: don't have rights to istalll printer, set at administrative level No connectivity: physically connected?; getting good DHCP?; are other able to connect to it?; usualy a network problem, not a printer problem Mental Reinstall: install printer, shows up in device manager, printer queue shows up in device manager, sent print test page; if problems, go through uninstall process; rollback device driver if something isn't working after an update Access denied: administrative issue

Troubleshooting Power Supplies: Signs of slow death

Unexpected shutdowns, boot up and have no power Capacitor breaks down Undervolted

Formatting in Windows:

Windows uses Disk Management Can choose exFAT or NTFS can select alloccation unit size (determine how big the blocks are) can choose quick format, but it will only build data structures, but not test them can choose to enable file and folder compression (can always do that later)

Super User Account Names

Windows: Administrator Linux & macOS: Root

Bluetooth

Wireless PAN technology that transmits signals over short distances between cell phones, computers, and other devices looks like 802.11; big difference is bluetooth is designed to connect only two devices at a time in a Personal Area Network (PAN)

802.11ac

Wireless networking standard that operates in the 5-GHz band and uses multiple in/multiple out (MIMO) and multi-user MIMO (MU-MIMO) to achieve a theoretical maximum throughput of 1 Gbps. 5 GHz; 1300 mbps Improves MIMO by creating Multi-User MIMO; can zoom in on multiple clients at a time depending on number of radios put it in it 802.11ac WAP also has 2.4 GHz radio in there for backwards compatibility AKA Wi-Fi 5

WEP (Wired Equivalent Privacy)

Wireless security protocol that uses a standard 40-bit encryption to scramble data packets. Does not provide complete end-to-end encryption and is vulnerable to attack.

WPA (Wi-Fi Protected Access)

Wireless security protocol that uses encryption key integrity-checking/TKIP and EAP and is designed to improve on WEP's weaknesses. Supplanted by WPA 2. TKIP is WPA. AES is WPA2.

Blue Screen of Death (BSOD)

a Windows error that occurs in kernel mode, is displayed against a blue screen, and causes the system to halt. The error might be caused by problems with devices, device drivers, or a corrupted Windows installation. also called a stop error.

SAMBA

a Windows folder and printer sharing emulation tool; built-in to Linux and Mac

ASCII code

a code that defines how keyboard characters are encoded into digital strings of ones and zeros

RAID 10 (Striping Mirrors)

a combination of RaID 1 and RaID 0 that requires at least four disks to work as an array of drives and provides the best redundancy and performance. Need minimum of 4 drives; 2 pairs; 1st and 2nd pairs are mirrored (RAID 1); data on first pair, another piece mirrored on second drive in pair; stripe across to mirrored pairs. Can lose one drive on each pair and still be fine; if you lose a whole pair, you lose half of the stripe.

Virtual Reality (VR)

a complete virtualized environment; includes a headset that detects head movements (tracking) HTC Vive Pro; controllers, headset, sound, tracking, infrared transmitters

The Cloud

a computer full of different Virtual Machines on a big server that people have remote access to

Materials Safety Data Sheet (MSDS)

a document that summarizes key information about a chemical, its composition, which exposures may be dangerous, what to do if an exposure should occur, and how to clean up spills

Cache

a little bit of what you have put closer to you; a computer memory with very short access time used for storage of frequently or recently used instructions or data

Virtual Local Area Network (VLAN)

a logical network that can separate physical devices without regard to the physical location of the device Takes one physical switch and electronically turns it into two or more switches Separates a LAN into two or more LANs

Zero Day

a new type of threat that nobody has seen before

Magic Packet

a packet that triggers a computer to wake up from a low power state

Firewalls

a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.

Firewall

a part of a computer system or network that is designed to block unauthorized access while permitting outward communication. can block certain IP Addresses, port numbers; can block based on time of day, keywords of websites, etc.

Performance Baseline

a performance baseline identifies the network's or system's normal hardware utilization statistics gives idea of how well computer runs before adding applilcations

Spear Phishing

a phishing expedition in which the emails are carefully designed to target a particular person or organization

Trojan Horse

a program designed to breach the security of a computer system while ostensibly performing some innocuous function; zombifies your computer for a later use

Band

a range of radio frequencies

Demilitarized Zone (DMZ)

a separate network located outside the organization's internal information system that permits controlled access from the internet anything that comes from the internet can be set to be sent to one particular system

Shoulder Surfing

Watching an authorized user enter a security code on a keypad.

Types of Port Numbers

Well-Known Ports are 0-1023; applications like web, secure web; nobody else can ever use these port numbers Registered Ports are 1024-49151; came after well-known ports, but wanted their own ports Dynamic/Ephemeral Ports are 49152-65535; always need two port numbers; 2nd port number is ephemeral port number, spun up by system every time it makes connection to give return port number for whatever server you're connecting to

How does a computer save data?

When saving, CPU instructs data written on RAM, then copies it over to mass storage

File Transfer Protocol (FTP)

a simple network protocol that allows the transfer of files between two computers on the internet Usees port 21; need FTP Client Every browser is an FTP client; can upload to and download from FTP Servers Passive Mode is when everything is done on Port 21 Can use Active Mode: Client sends data on Port 21, but server sends data back on Port 20, but most routers may block Port 20; active mode is 5x faster than passive mode

Extended SSID (ESSID)

a single SSID name, but it's the same SSID on all the different WAPs in an enterprise; allows handoffs between WAPs depending on your location

Mobile Device

a single, sealed unit; runs specific mobile OS on an embedded system; wireless connectivity Smart phones run iOS or Android; features like GPS, accelerometers, battery chargers, battery packets Wearable technology: smart watches, heart rate monitor

Spyware

a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission

Graphics Processing Unit (GPU)

a specialized logic chip that is dedicated to quickly displaying and calculating visual data such as shadows, textures, and luminosity GPU has own memory (RAM); memory stores what's on the monitor Video Card CPU with integrated GPU is called APU

Secure Sockets Layer (SSL)

a standard security technology for establishing an encrypted link between a web server and a browser, ensuring that all data passed between them remain private

Current User

a subset of Users; infor for whoever is logged in

Ethernet

a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems. Defines cabling, hubs, speeds, and that you can only make your data in discrete chunks of 1500 bytes so you don't hog the network; 1500 byte chunks called a frame

Intrusion Detection System (IDS)

a system that creates logs of all network traffic that was permitted to pass the firewall and then analyzes those logs for signs of attempted or successful intrusions either a box or piece of software running on a system Just alerts you of an issue, doesn't resolve the issue

Spoofing

a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network certificates are used by web pages for verification in to prevent spoofing

Asymmetric DSL (ADSL)

a type of DSL service that provides higher downstream bandwidth to the user and less upload bandwidth upload speed slower than download speed

DB-9 Connector

a type of connector with 9 pins that's used in serial communication and conforms to the RS-232 standard; technically RJ-45

Open-Source License

a type of license for computer software and other products that allows the source code, blueprint or design to be used, modified and/or shared under defined terms and conditions.

Ransomware

a type of malicious software designed to block access to a computer system until a sum of money is paid.

Homegroup

a type of peer-to-peer network where each computer shares files, folders, libraries, and printers with other computers in the homegroup. access to the homegroup is secured using a homegroup password. hybrid of workgroup and domain; convenience of workgroup, security features of domain; all files would be automatically shared in a homegroup; not around much today

Traceroute

a utility application that monitors the network path of packet data sent to a remote computer tracert in Windows

Extensions

abbreviation of a type of file, usually 3 letters, on the end of the file name can allow for file association; certain file types will be opened by a certain program

Windows Professional/Workstation Editions

all basic tools; ability to join Windows domain; can have more than 20 people connect to ou; can take advantage of CPU power

PWM connectors (4 pin)

allow CPU to communicate with fans (speed up/slow down)

PCIe Expansion Slot

allows for more things to be connected to the motherboard; sends/receive data on one wire; uses serial connections

ATX12V power supply

an aTX Version 2.1 power supply that provides a 12 V power cord with a 4-pin connector to be used by the auxiliary 4-pin power connector on motherboards used to provide extra power for processors.

Uninterruptible Power Supply (UPS)

an alternative power supply device that protects against the loss of power and fluctuations in the power level by using battery power to enable the system to operate long enough to back up critical data and safely shut down

Rainbow Tables

an attack on a password that uses a large pregenerated data set of hashes from nearly every possible password

JavaScript

an object-oriented computer programming language commonly used to create interactive effects within web browsers. Used for client-side applications, where applications are sent from the web server and run on the client side

Linux

an open-source version of the UNIX operating system Linux refers to the kernel of the operating system GNU's Not Unix Popular Linux distros (distributions): Ubuntu; Fedora Linux (KDE desktop environment; alternative to KDE is GNOME); Linux Mint distro (has Cinnamon environment, which is similar to Windows) Ubuntu Features: to bar has network, wifi, power on/orr; dash on the side that is similarish to a taskbar; activities can bring up multiple desktops; bottom left shows all applications installed on system Uses Terminal command prompt

Vi

ancient text editor vi "name" will make a file

Strings

any combination of letters, numbers, etc... that are enclosed by "quotations"; can put anything you want in a string

Per-Processor License for Windows

any workstation version of Windows (Home, Pro) can be used on any computer with up to two physical CPUs on it; challenges happened when you have CPUs with multiple cores; server motherboards also could have multiple CPUs with multiple cores; Microsoft changed rules for server system; today Microsoft uses per-core licensing system

Solid Core

Type of UTP goes into the wall; each of the 8 wires is a solid piece of copper

Stranded Cable

Type of UTP more flexible and won't break Use for patch cables

64-bit operating system

Type of operating system that processes 64 bits at a time. built into every CPU is the ability to addres memory; dedicate # of wires to be able to alke to the memory; 64 bits today

Chipset

defines all of the features that the motherboard can do (# of USB slots, etc.)

Local Machine

defines all settings for this computer

Set Association

defines how different types of cache are how efficient and handing code to CPU

Current Config

defines what software and aspects of the system are being used right now; subset of Local Machine

Infrastructure as a Service (IaaS)

delivers hardware networking capabilities, including the use of servers, networking, and storage, over the cloud using a pay-per-use revenue model We can logon to a site and create our own virtual machines instead of setting up our own web servers; very inexpensive compared to what it used to be

Windows Home Edition

designed for homes and small offices; can't join Windows domain; come with media tools; can onlly have 20 people connect to you; can't take advantage of CPU power

2.5 inch Labtop

designed many for laptops and mobile devices; popular today because you can fit many; a bunch can be used in servers

SO-DIMM

designed where long sticks of RAM won't work; usually in laptops DDR4 260 Pin DDR3 204 Pin

iOS

developed by Apple, is a proprietary mobile operating system specifically made for Apple's mobile devices Uses the App Store; requires iCloud account Swipe down for notifications and Spotlight Search; swipe up for Control Center

Surge Suppressor/Protector

device that absorbs extra voltage from a surge catch big spikes of voltage and eat them in themselves With trip alert: let's you know when spike/surge happens Can protect ethernet cabling, landline, USB Cheap suppressors only work once, and then turn into a regular power strip

Shells

different types of command-line interfaces; command prompt, powershell are both different types of shells

Virtualization with Host-Only Adapter

directly connected to particular host network card

Signed Drivers

are drivers that include a digital signature; say their device isn't spreading Malware

Crimps

attached at end of cable (look like ethernet) Crimps have a CAT rating

Denial of Service (DoS)

attack floods a network or server with service requests to prevent legitimate users' access to the system; malformed http requests

Clock

bell in CPU; clock's job is to tell CPU to do something

Internet Tier 3

big internet service providers (i.e. Comcast, AT&T); not totally interconnected; sell internet services to individuals and corporatios; no peering agreements, paying for internet from Tiers 1 and 2

Graphic/CAD/CAM Design Workstation

big powerful multi-core processor and high-end video Mother board support multicore processor; high-end video, maximum RAM

ATX Form Factor

biggest common form factor we have 12 inches X 9.6 inches

Rogue AP Detection

blocks access points that aren't listed in the network

CPU (Central Processing Unit)

brain of the computer, or really powerful calculator; runs programs

USB Controller

built into motherboard; controls USB devices USB allows you to connect up to 127 devices by using USB hubs Sometimes have multiple controllers (ex: 1.1 and 3.1 controller) and plugged into own separate root hub USB Hubs are devices you connect to root hub to allow for more USB ports (may need AC power to support devices)

Virtualization with Internal Network

bunch of computers attached to internal network, but no router out to internet through own computer

DVD+R

burn once DVD+RW, DVD-RW were competing standards; used to need different players

Riser Rating

cable that runs in between floors More fire resistance than non-plenum, but not as much fire resistance as plenum

Windows Version 8

came out in 2012; Microsoft wanted something that would work on other devices, like tablets and smartphones; metro desktop; taskbar, but no start button introduced Microsoft Store; Charms Bar introduced Settings (took many settings from control panel, but there was still a control panel) introduced OneDrive (cloud storage) Windows Version 8.1 came out a year after 8; had a start button Not many people were fans of 8 and 8.1

Virtualization with NAT Network

can create two completely separate networks; set Virtual Machine to attach to your created network; Virtual Machines will populate the created networks

Hot Spare / Swappable Drive

can have a drive sitting there ready to go in case one of your drives dies; will rebuild array automatically Hot swappable means you don't have to turn off system to take out hard drive and put in a new one

Rate Limit

can limit upstream and downstream rates on a network

Virtual Printers

can print to pdf, print to onenote, etc. doesn't actually print, just sent to to files or make it a file

CD-R (CD-Recordable)

can't erase from also were CD-RW (CD-Rewritable)

Windows Enterprise Edition

can't purchase from store; for large organizations; special features to be able to take control of 10s or 100s of thousands of computers

Endpoint Management

central system in network watches for intrusions and makes sure anti-malwares and patches are up to date

chown

change ownership; Linux ex: sudo chown timmy fred; gives ownership of timmy file to fred user

chmod

change permission modifiers; Linux RWX(user) RWX(group) RWX(other) 4+2+1=7 4+2+1=7 4+2+1=7 chmod 777 fred; all given rwx permissions; fred is file name 4+2=6 4+2=6 4=4 chmod 664 fred; changes permissions to: RW, RW, R

Simple Main Transfer Protocol (SMTP)

e-mail protocol; uses TCP Port 25 sends mail up to SMTP server; then can use POP3 or IMAP, which brings e-mail down to your email client

Wireless Access Point (WAP)

enables devices to connect to a wireless network to communicate with each other Bridge between an ethernet network and a wireless 802.11 network

Internet Tier 2

entities that aren't as big as Tier 1, but have decent-sized coverage area; don't have a peering agreement with the Tier 1 providers, but have some peering agreements with others

Resolution

example 1280 X 1024

End Process Tree

example is winword.exe doesn't know how to scroll or change window sizes, so other processes are taken care of by dynamic link libraries (.dll or .exe) that store that information some programs lean on other programs; get dependency hierarchy; end process tree will end a lot of programs that depend on that program

Lightning Connection

exclusive to Apple products; used for charging, data transfer Runs at 5 Gbps

HFS+ (Hierarchical File System Plus)

exclusive to macOS; 8 EiB volumes and files

Organic LED (OLED)

doesn't use a backlight, as the pixels make their own light; can make really thin monitors with it

3.5 inch mass storage

dominant for for mass storage for many decades

Screen Lock

features: putting a lock on a screen after the device times out Use fingerprints, pin codes, passwords, or facial recognition

Linux Files Systems on exam

ext3: supports 32 TiB volumes and 2 Gi files ext4: supports 2 EiB volmes and 16 TiB files

Restore Point

file that contains info about your systems configuration at a particular time, helps backup the computer

S/MIME (Secure/Multipurpose Internet Mail Extensions)

for e-mail attachments, you use MIME; turns every 8 bits of filie into an ASCII code; for a while, we couldn't encrypt the mail, so we enrypted the files, creating S/MIME

Satellite

for people out in the country or the ocean Speeds are 3mbps/25mbps or better (upload/download) Latency is an issue

Impact Printer

forms characters and graphics on a piece of paper by striking a mechanism against an inked ribbon that physically contacts the paper Platents are what the pins push up against Paper used was Tractor Feed Paper Impact Paper can be used, so there are copies of the documents you've printed; multi-part form Maintenance includes replacing the ribbon and keeping it clean

Routing Table

generated automatically by software, is used to determine the best possible route for a packet tells router where to send stuff Routing Tables have a Default Gateway

DDR (double data rate) SDRAM

gives two bits of information for every click of the clock DDR speed rating is double the clock speed (Clock Speed X 2 = DDR Speed) DDR speed (Bits) X 8 = PC Speed rating (bytes)

80 Plus Rating System

guarantees you get an 80% efficiency

Comport

how Windows recognizes different serial ports

Wattage Rating

how efficient a power supply is; wattage rating only measures at room temperature

IP Address

identifies which LAN you are a part of and gives you a unique Host ID No computers can have the same IP Address 4 numbers; each set of numbers is an octet; can range from 0-255; about 4 billion possible address combinations

Infrastructure Mode (\)

if you have a WAP(s); most common way we do 802.11

Hybrid Cloud

includes two or more private, public, or community clouds, but each cloud remains separate and is only linked by technology that enables data and application portability Part of the cloud is private, part of the cloud is public

File-Level Backup

individually selecting which files you want to backup; usually consists of personal files

NTFS vs. Share Permissions

• NTFS permissions apply from local and network connections • Share permissions only apply to connections over the network • The most restrictive setting wins - Deny beats allow • NTFS permissions are inherited from the parent object • Unless you move to a different folder on the same volume

command to make a folder/directory in Windows

md

Orientation Notch

means CPU fits into socket in only one way

ACPI Level 0

means a laptop is on; enabled but unused

micro SD Card

mini SD is adapter for micro SD

command to make a folder/directory in Linux

mkdir

Thick Client

most basic type of desktop office computer Meets recommended requirements for selected OS; install desktop applications

m.2 format mass storage

mostly replaced 1.8 inch mass storage

Gaming PC

multicore procesor; high-end power supply; high-end motherboard; high-end cooling; high-end video/specialized GPU; high-definition sound card; large storage

NetBIOS/NetBT

naming convention used for Windows

Domain

needs a Windows Server System; domain used today is called an Active Directory Domain provides lots of security, central administration; very powerful and very expensive

Metropolitan Area Network (MAN)

network that spans a metropolitan area, usually a city and its major suburbs. Its geographic scope falls between a WAN and a LAN We connect LANs using routers, creating a WAN. If WAN gets spread out through an entire town, we have a MAN.

Molex connector

older power connector; provides 5 V and 12 V

PCI

older type of expansion; 32-bit wide bus; ran 32 wires wide

Hyper-Threading

one super smart pipeline that can handle two incoming pieces of codes at the same time

ATX Power Connector

originally had 20 pins, now have 24 pins

Response Time

panel needs to reset self for persistence of vision; how long it takes for pixel to go from all black to all white and back to all black response times are about 1 ms - 4 ms

Change Board

people who meet and look at requests for changes and either approve or disapprove them Look at: Documented Business Practices Purpose of the Change Scope of the Change Risk Analysis Plan for the Change End-User Acceptance if it doesn't workout, need a Backout Plan Document all changes and events that take place; lessons learned

Recovery Disk

personal copy of Windows installation media; can installl onto 16 GB thumb drive

Virtualization

running multiple systems simultaneously on one physical computer Virtualization takes physical hardware and allocates it to a separate internal system, but it can't do anything you don't already have

Python

runs on every operating system; easy to read and to make variables .py extension

whoami command

says what user is logged in

Ethernet Standard

says you can't connect more than 1,024 computers to a switch because system will become overloaded; in reality, 30-40 computers is standard size for a network

Flatbed Scanner

scans paper documents; downside is it can only take one document at a time

CPU Sockets

physical types of packages of the CPU; the mount where a CPU connects to the motherboard

Hash

plaintext that has been transformed into short code; used for storing passwords one-way-value; fixed length

Bring Your Own Device (BYOD)

policy allows employees to use their personal mobile devices and computers to access enterprise data and applications

1.8 inch mass storage

popular with SSDs

Troubleshooting Power Supplies: Signs of fast death

power supply will burn, create smoke

Synchronization

predates the cloud chunk of data in one place, and you want the same chunk of data elsewhere; update each other on the fly to update two or more data stores to their information is identical Android syncs with Google Drive; iOS syncs with iCloud

FAT32

predates windows; allowed us to make files with long names; could support 8 TiB volumes; each single file could be as large as 4 GIB; FAT32 works on small drives and thumb drives today

System Crystal (Quartz Oscillator)

presses the clock button; acts like a metronome

Virtualization with Generic Driver

pretends to be different type of network card; used for old operating systems; actually is emulation

Motherboard

primary device that we connect innards of system unit together (RAM, CPU, internal hard drives)

Duplex Printing

prints on both sides

Decimal vs IEC counting

problem is when can use both in out industry People who sell hard drive measure 4 tb in decimal value; computer uses LBA values (binary), so it shows different capacity that decimal values advertised Just different ways of counting

Virtual Memory

process of optimizing RAM storage by borrowing hard drive space Use to avoid "Out of Memory" errors Swap File = Virtual Memory when using virtual memory, computer slows way down; hard drive light starts going crazy; to fix this problem, add more RAM

Rootkit

program that hides in a computer and allows someone from a remote location to take full control of the computer seats itself within boot sector of drives, and tries to hidde itself from the operating system

Services

programs that manages services on computer; shows installed services; can see which services are running and not running; can turn services on/off; can choose start to be automatic, automatic (delayed start), manual, disabled If you can't find Service in Details in Task Manager, it is a service host

Antistatic Wristbands

protects chips and electronics from electrostatic discharges; use in professional environment

Digital Rights Management (DRM)

protects different type of copyright with audio and video; licensing done by the hardware when using HDMI

Spike

provided more voltage than what you're expecting; also called surges dangerous because they can destroy your computer

Modular Power Supply

provides connectors at the power supply end, allowing unused cables to be detached from the power supply, producing less clutter, a neater appearance and less interference with airflow.

Windows Server System

provides developers with dynamic development tools that allow businesses and customers to connect via the internet domain needs this

Digital Subscriber Line (DSL)

provides high-speed digital data transmission over standard telephone lines using broadband modem technology, allowing both Internet and telephone services to work over the same phone lines early version of broadband; used telephone lines Asymmetric DSL and Symmetric DSL

Active Directory Domain

provides lots of security, central administration; very powerful and very expensive

Overclock

push system beyond its rated speeds

Parallel vs. Serial

sending data over 1 wire vs. 32 wires; sending data over 1 wire is better than sending it over 32 wires; single lane Sometimes need more than one lane for things like 16 lane graphic cards or video cards that need big bandwidth

Community Cloud

serves a specific community with common business models, security requirements, and compliance considerations Smaller organizations use a community cloud; they chip in to afford the cloud, because it is expensive; private use

Private Cloud

serves only one customer or organization and can be located on the customer's premises or off the customer's premises Private Virtual Machines; within organization

Thin Client

rarely counts on own internal storage; network connectivity is big Want motherboard with great network connectivity; meets recommended requirements for selected OS; basic applications

command to delete a folder/directory in Windows

rd to remove a folder rd /s to remove a folder and its contents

Active Directory repair

reestablish connection to active directory server

Telnet

remote command line tool; allows you to get to a command line on some other operating system one of the earliest application protocols used on the Internet Lacks encryption and offers no security Port 23

Mobile Device Management (MDM)

remotely controls smartphones and tablets, ensuring data security

Windows Version 10

removed Charms bar; start menu is resdesigned, has metro functions, many other features including a settings button; if you right click on start button, has a bunch of functionality features listed; no media center

Symptoms of Security Threats

renamed system files being denied from doing things you could do before disappearing filles file permission changes unauthorized people coming into the network

Attributes

settings you can apply to a file or folder; can make read-nly or hidden; in advanced, file ready for archiving, indexing, compress, or encrypt

Keystone projector

shape from projector

Pincushion projector

shape from projector

Skew projector

shape from projector (more uncommon) looks kind of like a tilted keystone

System Information (MSINFO32.EXE)

shows details about your computer's hardware configuration, components, and software, including drivers System Summary used when you need a quick snapshot

Task Manager

shows you the programs, processes, and services that are currently running on your computer (Ctrl + Alt + Del)

Shutdown command on Windows CLI

shutdown /s means to just shut down shutdown /r means to restart after shutting down

command to delete a folder/directory in Linux

rmdir for an empty folder rm -r to delete a folder and its contents

shutdown command on Linux CLI

shutdown will shut down computer after 1 minute shutdown -c will cancel the shutdown shutdown -r will reboot the computer after shutdown shutdown now will shutdown the computer immmediately

ACPI Level 3

sleep mode; CPU stops working, but RAM keeps running

Channels

slots where you can insert sticks of RAM

Mini-ITX Form Factor

smallest common form factor; designed for small systems

USB Lock

software designed to watch over USB ports; prevent people from using it, can also record when someone tries to use it

Commercial License

software license that gives permission to install a program on one computer can't reverse engineer it or change it; can only use it within the specifications of the EULA Types of Commercial Licenses: Personal License, Enterprise License

File-Based Encryption

softwware feature in OS where you can pick particular file/folder and say encrypt this

Modular vs. Solder

some say solder are more efficient; solder has wires coming from power supply; modular has wires that you can connect to power supply as you please

Audio & Video Editing Workstations

specialized audio and video card; large, fast hard drive; dual monitors

Optimization

way we can organize our hard disk drives so that they run more efficiently Optimization is also known as disk defragment or defrag Pages are the atom of the SSD; each page stores 2-8 kb; each block stores 32-256 pages; we can't erase pages, can only erase entire blocks; trim writes into individual, now unused pages, Available For Use (AFU)

Process

when a program starts to run a program that is running and taking up memory

Pipeline Stall

when pieces of codes aren't in cache when CPU needs it; entire pipeline shuts down and many clicks of clock to get line of code off RAM

Cname

when there's more than one name for a particular IP Address

Exception

when you allow something to get through a firewall

Overclocking

when you increase the multiplier; can make systems unstable

Emulation

when you pretend to have hardware that you don't have

kill command (Linux)

will kill any proccesses Ex: kill PID#

Data Over Cable Service Interface Specification (DOCSIS)

works well to watch TV and connect to the Internet; used by Cable Cable speeds were 1.5/10 mbps; today they are 50/100 mbps or better (Upload/Download)

IP Address Classes

x (you can choose your own number) Class C: 210.11.12.x; 254 hosts; first three numbers are locked Class B: 172.16.x.x; 65534 hosts; first two numbers are locked Class A: 6.x.x.x; millions of hosts; first number is locked Idea was that you wouldn't be more than 4 routers away from the top of the internet; they were wrong IP Addresses never end with a 0 or 255

ADF (Automatic Document Feeder)

take multiple documents at a time

On-Demand

take one virtual machine and clone it a bunch of times during busy times, and then shrink it back down once the demand dies down

Clock Multiplying

takes beat from system crystal and multiplies; clock multipliers are built into the CPU

Disk-Based Encryption

tool built-in to OS; say you want entire drive encrypted

TCP/IP (Transmission Control Protocol/Internet Protocol)

two different protocols working together to get the data between your systems TCP is a connection-oriented protocol; client talks to server, then waits until server responds (which is a handshake)

Yagi Antenna

unidirectional antenna; works well transmitting and receiving signals in some directions but not in others Yagi Antenna signal looks like a stretched football; good for shooting long distances

Flashing

updating firmware electronically; with BIOS, keep a copy of a flash update (called BIOS Flash Image)

Brightness

use Nit (nt) measure of light panels generally run 200-500 nts

Thermal Paste

used as a way to pull heat from the CPU into the cooling system

PS/2 Connector

used for keyboards and mice; keyboards are purple, mice are green Downside is after you connect, you have to reboot for it to register

5.25-inch mass storage

used for optical media; early

Magnetic Reader

used for swiping cards

PCIe Connector

used for video cards

POST cards

used if nothing works at all; show hexadecimal values, and the motherboard book shows you all of the codes and what they mean (POST error codes); only valid as the computer is booting up

SATA Cables

used to connect hard drives to the motherboard; also connect into SATA HDD connectors

Pipeline (aka core)

used to optimize the processing commands; 4 guys in conveyor belt, first guy decides who to give command to; first guy is prefetch

Digital Light Processing (DLP)

uses a grid of tiny mirrors; light source goes through a color wheel and hitting grid and reflecting out; popular with projectors

Radio Frequency Identification (RFID)

uses electronic tags and labels to identify objects wirelessly over short distances sticker that is a radio and stores some information; readers use radio frequency to power up stickers, then stickers have enough enery to transmit back whatever information they have

Non-Volatile Memory Express (NVMe) Drives

usually are m.2 drives; faster than SATA NVMe drives have one notch; SATA drives have 2 notches

USB Type-B

usually connects to scanners

USB micro-B

usually for Android phones; many other devices use this as well

USB mini-B

usually for cameras

Variables

values that change based on how we manipulate them integers, strings

PuTTY

a Telnet client; PuTTY can access a Telnet server

Ethernet Frame

Destination Address - Source Address - Data - FCS (Frame Check Sequence)

Boot Order

a BIOS setting for bootable partitions and devices

Half-Duplex

Communication between two devices whereby transmission takes place in only one direction at a time.

Virtual Private Network (VPN)

Companies can establish direct private network links among themselves or create private, secure Internet access, in effect a "private tunnel" within the Internet VPN Client software will make a direct connection between Laptop and WAN side of router at the office; tell VPN client IP address of WAN side of router at office; router lets computer into the network, DHCP server gives computer IP Address, which is same address as if it were a DHCP client on network, and this proccess is called a VPN Tunnel A saved VPN Connection manifests as a new network card; acts like a network card If you open up a web browser while on a VPN connection, you get split tunneling

Frame with IP Addresses

Destination MAC - Source MAC - Destination IP - Source IP - Data - FCS

Ethernet Frame with Port Numbers

Destination MAC - Source MAC - Destination IP - Source IP - Destination Port - Source Port - Data - FCS

Public Cloud

Provides cloud services to just about anyone Public Virtual Machines; open to anyone

Data Execution Prevention (DEP)

Windows feature that uses a combination of software and hardware to prevent the execution of code in unintended areas of memory to protect against buffer overflow attacks. helps prevent programs for stepping over other programs

Local Security Policy

Windows tool used to set local security policies on an individual system (i.e. password requirements, log-in requirements, etc.)

Parabolic Antenna

focus the signal to a signal point uses a dish a highly directional antenna

Incident Response Guidelines:

1. Know your responsibility 2. Identify the problem - Report through proper channels - Data/Device preservation - Use of documentation - Document changes 3. Keep chain of custody (keep track of evidence when legality is in question) - Tracking evidence - Document process

Issues with Connecting to an SSID:

1. NIC is configurd as DHCP client; may get APIPA address, meaning you have a bad password; may still connect, but get APIPA address 2. Passwords can change 3. Set wireless NIC to a static IP Address

Secure DNS

1. Non-ISP DNS servers; Google 8.8.8.8; doesn't log or questionable redirections 2. Encrypt DNS requests; good to use on phones; install fully encrypted DNS Server; create VPN connection to DNS Server

Data You Need to Know:

1. Personally Identifiable Information (PII) 2. Protected Health Information (PHI) 3. EU General Data Protection Regulation (GDPR) - says that a person has the right to control information that people gather from you 4. Payment Card Industry Data Security Standard (PCI DSS) - all the banks that issue credit cards

Laser Printer 7 Steps:

1. Processing; print joobs comes in and stored on local memory 2. Charging; primary corona puts really strong negative charge on it 3. Exposing; laser writes onto photosensitive drum, reduces charge wherever laser hits it 4. Developing; toner comes out of toner hopper and goes onto photosensitive drum 5. Transferring; transfer corona charges paper with a positive charge, then as paper comes close to drum, and toner goes onto paper 6. Fusing; fusing assembly using heat and pressure pushes toner into the paper 7. Cleaning; rubber scraper scrapes residual toner

USB 1.1

1.5 mbps or 12 mbps (megabits per second); has white tab

Thunderbolt 1

10 Gbit/s (x2 channels) Used as mini display ports

802.11n

100 mbps; 2.4 GHz and 5 GHz Backwards compatible with all extensions because it has 2.4 GHz and 5 GHz bands Introduced MIMO (multiple in / multiple out) AKA Wi-Fi 4

Versions of Ethernet

10BaseT (10 mbps Baseband Twisted Pair); 1000BaseT; 1 GB BaseT

802.11b

11 mbps; 2.4 GHz

Colors for power supply voltages

12 V: yellow connector 5 V: red connector 3.3 V: orange connector

Loop Back Address

127.0.0.1

VGA (Video Graphics Array)

15 pins on the three rows; blue connector common; problem is that it is an analog signal (monitor may have to convert into digital) Standard for the video graphics adapter that was built into IBM's PS/2 computer. It supports 16 colors in a 640 × 480 pixel video display.

Binary / IEC Values

2^10 = 1024 = kibi 2^20 = mebi 2^30 = gibi 2^40 = tebi 2^50 = pebi 2^60 = exbi These are all IEC Values. Kibi similar to kilo, mebi similar to mega, etc.

Microsoft's Proprietary RAID

3-way mirror; needs five blank drives; helps protect from two simultaneous drive failures traditional drives need drives of about same size in order to not have space wasted; Microsoft's Propriietary RAID does not need drives of same size

x86

32-bit CPU Program Files (x86) holds 32-bit programs

Thunderbolt 3

40 Gbps Shaped like USB C; not USB C; still a lot of compatibility between them

USB 2.0

480 mbps; brought in USB thumbdrives; black tab

Swap Partition

A disk partition configured to be used as an extension to a computer's RAM. This enables a system to run more programs or to process larger data sets than would otherwise be possible. Similar to Virtual Memory.

Certificate of Destruction

A document that shows what data and records were destroyed, who destroyed those data and records, and the method used for that destruction.

FileVault

A feature in Mac Os X that, in earlier versions of the OS x, encrypted the home folder. In recent versions it encrypts the entire startup disk.

Extended Partitions

A partition on a basic disk that is created from unpartitioned free disk space, and is not formatted with a file system. The space is allocated to logical drives. limited to 4 partitions; 4 partitions called Primary Partitions, can create extended partition with extra space in 4th partition, called Logical Drives; logical drive made into 5th partition

Recovery Partition

A partition on a hard drive that contains a recovery utility and installation files. Used to bring OS back online In Windows, partitions manifest as drive letters; in Linux/macOS, partitions manifest as folders

Dictionary Attack

A password attack that creates encrypted versions of common dictionary words and compares them against those in a stolen password file.

Virus

A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data old term; first generation of malware would have virus on a floppy disk, passed from system to system; virus two jobs were to replicate and activate

Heat Sink

A piece of metal, with cooling fins, that can be attached to or mounted on an integrated chip (such as the CPU) to dissipate heat; copper block draws heat from CPU, heat transfers through copper tubes and goes to cooling fins

I/O Shield

A plate installed on the rear of a computer case that provides holes for I/O ports coming off the motherboard Size is extremely fixed; all form factors can fit any I/O Shield because of standardization Customized to fit the motherboard I/O Area

Acceptable Use Policy (AUP)

A policy that defines the actions users may perform while accessing systems and networking equipment. defines what you can and can't do with company equipment

Windows Update

A service that keeps a Windows system patched and updated is vitally important to maintaining proper security. Windows 7 has Windows Update; lists important updates and optional updates; can look up Knowledge Base (KB) numbers online to see what each update does; critical updates are also listed; can choose how often to update and check for updates; Windows Update won't update Device Drivers (windows 8 and 8.1 would); can update the System BIOS Firmware Windows 10 has Windows Update; can choose active hours so Windows knows not to update during those active hours; can view update history; no option to choose which updates you want to install

Form Factors

A set of specifications on the size, shape, and configuration of a computer hardware component such as a case, power supply, or motherboard; industry standards

Near Field Communication (NFC)

A set of standards primarily for smartphones and smart cards that can be used to establish communication between devices in close proximity. NFC is RFID Examples: Laser printer has tap to print; Tap-To-Pay

Network Discovery

A setting that when turned on allows a computer to see other computers on a network and to be seen by those other computers.

Flash Memory Reader

A slot or compartment into which the flash memory card is inserted. Reads different flash memory and memory cards.

SOHO (Small Office / Home Office) Router

A small business office with between 1 and 10 users. 4 port switch, WAP

Keylogger

A small hardware device or a program that monitors seach keystroke a user types on the computer's keyboard.

Intrusion Prevention System (IPS)

A technology that monitors activity like an IDS but will automatically take proactive preventative action if it detects unacceptable activity. could be a box or software on machines known as agents; if they see something they don't like, they will communicate with firewalls, which will turn off ports or URLs to kill the virus; need central administration or endpoint management

Batch File

A text file containing a series of OS commands. .bat extension

RG-58 Cable

A thin, flexible coaxial cable used in 10Base2 network. Also called thinnet. Used BNC Connector

Yost Cable

A twisted-pair patch cable in which all of the wires are reversed on one end of the cable as compared with the other end without regard to how they are paired. A rollover cable is used to connect a computer to the console port of a router. Also called Yost cable or Cisco console cable.

compiled code

All the code is turned into machine code at once; An .exe file is compiled code

Single Sign-On (SSO)

Allows a user to authenticate once to gain access to multiple systems, without requiring the user to independently authenticate with each system.

Component Object Model (COM+)

Allows you to build apps that can be distributed over a network; allows us to share more than databases; use Component Services

System Repair Disk

Also known as system recovery disk, this is a CD or DVD that you can use to boot your computer into the Windows recovery Environment after a serious error has occurred that shuts normal Windows operation down. a bootable media that helps with recovery

Organizational Units

An Active Directory logical container used to organize objects within a single domain. Objects such as users, groups, computers, and other OUs can be stored within a OU container.

HTTPS (Hypertext Transfer Protocol Secure)

An encrypted version of HTTP. It uses port 443.

AES (Advanced Encryption Standard)

An encryption standard used by WPA2 and is currently the strongest encryption standard used by Wi-Fi.

Network Interface Card (NIC)

An expansion card that enables a computer to connect other computers or to a cable modem to facilitate a high-speed Internet connection.

File Allocation Table (FAT)

An index of all sector numbers that the hard drive stores in a table to keep track of which sectors hold which files. Keeps track of where all your stuff is on an LBA by LBA basis on a particular partition

Troubleshooting Boot Problems

Black Screen: is computer turned on?; is there a problem with your boot order?; device driver issues, possibly with graphics card?; for device driver issues: boot to safe mode and rollback/update/disable device driver in device manager, and make note of driver versions; find out what event might have impacted a driver in Event Viewer; undo what you just did after problem starts If no OS found: check boot order; reset/update boot order WinRE can repair Windows; repair installation or reimage/reload OS

Ways to crack hash values or passwords:

Brute Force Dictionary Attack Rainbow Tables

SPD (Serial Presence Detect) Chip

Built into every stick of RAM; allows system to query the RAM chip (how fast, who made it, other info)

CD-ROM (Compact Disc/Read-Only Memory)

CD File System (CDFS), aka ISO-9660; CDFS allows us to put disc into a drive and see the files on a computer

How does a computer start a program?

CPU retrieves stuff from hard drive; takes copy off of mass storage and puts it on RAM; program that is running is on RAM

Fiber Optic Cable

Cable that uses light guided through thin glass tubes, instead of electrical signals, to transmit data. It is very fast but also expensive. Popular with 10 Gigabit ethernet situations and faster Two ways to propagate a light signal: Multimode (uses LED) Singlemode (uses lasers) Fiber Optic connectors come in pairs; one for send, one for receive

twisted-pair cable

Cables made of copper wires that are twisted around each other and are surrounded by a plastic jacket (such as traditional home phone wire). Unshielded Twisted Pair (UTP) - twists allow it to give off a better signal; run at about 100 meters Shielded Twisted Pair (STP); still RJ-45; can work better with some devices that usually cause interference

Users and Groups

Can add permissions directly to each user for each folder; if you lose a user, it's tough to recreate for a different user; Can put users into a group so that they get the same permissions for that group, so you don't have to adjust each individual user An individual user account can be a member of multiple groups; can have groups within groups

Augmented Reality (AR)

Computer data or graphics are overlaid onto the physical environment Augmented Reality places virtual objects in the real world Examples include snapchat filters

Windows 7 Task Manager

Can get to task manager by using ctrl+alt+delete, ctrl+shift+esc Applications Tab Processes Tab; shows what processes are running Services Tab; shows what services are running and stopped; can start/stop services Performance Tab; overview of how system is running; can show how much memory is available and free Networking Tab; shows how hard network is working Users Tab; shows who is currently logged in Resource Monitor is more powerful; click performance tab and go to resource monitor to access it Resource Monitor has CPU, Memory, Disk, Network; only place on Windows 7 where you can get your Process ID (PID) Memory is allocated in Pages; if a program needs a page, but it's not there, and has to go to a hard drive, called a Hard Fault; too many hard faults mean you don't have enough RAM

Causes of BSODs

Causes of BSoDs: caused by hardware, might not be compatible with Windows; can fix by updating hardware; safe mode, go to event viewer; might need to rollback or update a device driver

Resource Pooling

Cloud computing services to multiple customers that are hosted on shared physical resources and dynamically allocated to meet customer demand. Can have virtual machines share storage, electrical needs, etc.; allows fo incredible efficiencies; dominant way of the cloud

RG-6 Cable

Coaxial Cable used for connecting homes to cable networks. Larger conductor and higher frequencies than RG-59. Uses F-type connectors

xcopy

Command in the command-line interface used to copy multiple directories at once, which the copy command could not do. Can verify data as it's being copied. Xcopy "location of files" "destination" ex: xcopy c:\backup x: can add switches to the end, including /s (copy all sub-directories), /v (verify each copy as its being copied), /h (no hidden files)

recovery console

Command-line interface boot mode for Windows that is used to repair a Windows XP system suffering from massive OS corruption or other problems.

Wake-On-LAN

Configuring a computer so that it will respond to network activity when the computer is in a sleep state. Turns on upon receiving a Magic Packet.

Local Area Network (LAN)

Connects a group of computers in close proximity, such as in an office building, school, or home Runs wires to a central box (hub) so everyone is connected; for wireless, uses WAP (Wireless Access Point)

LogicalDisk

Counters in the LogicalDisk category monitor individual partitions and logical drives on a disk. to track stuff over time, use data collector sets; uses cyclic logs; can find your data sets under reports

Copy/Move Commands for Linux CLI

Cp command copies files; mv command moves files To copy all files: cp M* destination; Ex: cp M* Gather

How to Crimp Cables

Cut away blue jacket 4 pairs are orange, blue, green, brown Untwist each pair and slide into crimp into specific order Each pair has a white in each one

DVDs and Sizes: SS or DS = Single or Double Sided SL or DL = Single or Double Layer

DVD-5 (SS/SL): 4.37 GB DVD-9 (SS/DL): 7.95 GB DVD-10 (DS/SL): 8.74 GB DVD-18 (DS/DL): 15.90 GB

Ad Hoc Mode

Decentralized wireless network mode, otherwise known as peer-to-peer mode, where each wireless node is in meshed contact with every other node. No wireless access point; bunch of NICs and one person can be the host and set up a wireless ad hoc network; all other computers treat host as a WAP; handy if you want to connect to nearby devices

Delete commands for Windows CLI

Del "name" deletes a file Del *.txt would delete all files that have the extension .txt Del *.* deletes all files in that folder/directory

Laser Printer

Electrostatic printer that focuses a laser beam to form images that are transferred to paper electrostatically toner cartridge; photosensitive drum is cornerstone of all laseer printers; use laser to hit photosensitiv drum, which holds static charge, but the more light it sees, the less of a charge that that particular spot can hold Processing, print jobs are stored in memory on the laser printer Have CMYK (Cyan, Magenta, Yellow, Black)

FAT16

File allocation table that uses 16 bits to address and index clusters. Used as the primary hard drive format on DOS and early Windows 95 machines; currently used with smaller-capacity (2 GB or less) flash media devices. Has 4 hexadecimal characters on each side; on left side is LBA values for every block on that drive (0000-FFFF); on right side, defines content of that LBA value

Domain Levels

First Level: .com, .edu, .gov Second Level: examples are google.com, totalsem.com Inside second level domain, will have www then IP Address

DVI (Digital Visual Interface)

First digital connect; also can provide an analog signal with an adapter (DVI to VGA) Special video connector designed for digitalto- digital connections; most commonly seen on PC video cards and LCD monitors. Some versions also support analog signals with a special adapter. DVI-I (Digital and Analog) DVI-D (Digital only) Single-link DVI; Dual-link DVI Problem with DVI was that you needed to go through configuration to get it to work

Troubleshooting Printers: Paper Output Errors

Garbled characters on paper: bad/corrupted drivers; corruption in print job; dump print job out of spooler, reset printer, try again; may need to roll back driver Vertical lines on page: usually laser printers; foreign matter on optically sensitive roller; replace the toner cartridge Color prints in the wrong print color: driver issues; lost one color and it can't make a certain color Printing blank pages: thermal printer when heating element doesn't work; laser printer and primary corona is dead Streaks: inkjet issue; inkjets are clogging; maintenance mode Faded prints: laser printers probably low on toner; impact printer, ribbon is running out; injet, probably clogged jets Ghost images: on laser printers; replace toner Toner not fused to printer: something wrong with fuser assembly; replace it Creased paper: a pickup roller is in bad shape; put maintenance kit on it

USB 3.1

Gen 1: 5 Gbps; blue tab Gen 2: 10 Gbps; teal tab

Copy/Move commands for Windows CLI

Go to directory where files are; copy "name" "path where you want to copy to"; Ex: copy fred.txt k: Move command deletes original files after they're copied over To copy all of a certain file type: copy *.jpg k: To copy everything: copy *.* k:

16:10 aspect ratio

Golden Ratio WSXGA was 1440x900 WUXGA was 1920x1200

gpupdate/gpresult

Group Policy: could be a policy of a domain; could require complex passwords; need way to quickly update policies on all machines; group policies overwrite local policies gpupdate queries our domain controller to see if anything has been changed, while gpresult tells us what has been changed Gpudate command; then use gpresult gpresult /R is the smallest output you can generate only use these commands when told to by someone up high; not usually ran manually, and are run by scripts

HDMI (High-Definition Multimedia Interface)

HDMI transfers uncompressed digital data. Typically, it is used for connecting high definition video and audio devices. can do stuff with DRM; can do plug and play Mini-HDMI

Straight-Through Cable

In Ethernet, a cable that connects the wire on pin 1 on one end of the cable to pin 1 on the other end of the cable, pin 2 on one end to pin 2 on the other end, and so on. Pretty standard cable; wired same on both sides; same standard on each end (both sides TIA 568A or TIA 568B)

Subnet Mask

In IPv4 addressing, a 32-bit number that, when combined with a device's IP address, indicates what kind of subnet the device belongs to. Subnet Mask example: 255.255.255.0 255 says to take number from IP Address, 0 means it has to find host

Linux CLI Basics

In Linux, can't open bash shell as administrator; use the command "sudo" and then whatever command you want; Linux equivalent of "dir" is "ls"; marks folders in blue and files in white to clear screen, type "clear" switch example: ls -l (shows more information, like file and folder permissions, owner and group, size, date, time, name) type man and then the command you are interested in to learn more about that command (ex. "man ls")

NTFS Permissions

In Microsoft Windows, NTFS permissions are used to specify and control which users and groups can access certain files and folders and what each user or group can do with them. Permissions for folder: full control, modify, read and execute, list folder contents, read, writes Permissions for file: full control, modify, read and execute, read, write Inheritance: file/folder inside a folder will take on the same permissions as the folder that is put in Allow vs. Deny: can stop inheritance; can deny someone from having the same permissions they had before

Mobile Device Troubleshooting

Inaccurate/non-responsive touchscreen: system overloaded, so restart system; might have too many apps installed; might need to recalibrate screen Dim Display: might need to turn up the brightness; if still dim, might need to replace backlight; most likely need to replace device Cannot display to external monitor: are you on same network?; make sure you are talking to the correct external monitor No sound from speakers: check volume; unpair any bluetooth devices Intermittent/no wireless connectivity: interference; check password on your SSID No Bluetooth connectivity: make sure device is in discoverable mode; make sure someone else isn't already paired Apps not loading/app log errors: need to clear cache; could do force stop or shut down entire phone Slow performance: you're running too many apps Extremely short battery life: you're burning too much battery; GPS can use up a lot of battery life; use power saving tools Overheating: if you place device in area with no ventilation Frozen system: problem with app, can lead to black screen of death System lockout: typed in password wrong too many times; need to factory reset and reinstall

iSCSI (Internet Small Computer System Interface)

Internet Small Computer System Interface. A lower-cost alternative to traditional SANs. It supports sending traditional SCSI commands over an IP network. Used now in server situations.

Domain Name System (DNS)

Internet service that translates domain names into IP addresses. Computer gets the right IP Address from the DNS to connect to a server; data sent from computer to server, and then data sent from server to computer

Dumpster Diving

Involves digging through trash receptacles to find computer manuals, printouts, or password lists that have been thrown away

Mass Storage Troubleshooting: RAID not found or not working

Is RAID controller working? Right drivers? Can you get to system setup? Make sure hard drives are connected properly and have power. Look at RAID arrays like a hard drive.

Regulatory and Compliance Policy

Laws, industry standards, best practices, traditions, common sense

NetBIOS/NetBEUI

Legacy Microsoft protocol; a predecessor to DNS. When a computer booted up, it broadcast its name (Figure 10-2) along with its MAC address. Every other NetBIOS/ NetBEUI system heard the message and stored the information in a cache. Any time a system was missing a NetBIOS name, the broadcasting started all over again. NetBIOS was naming system for Microsoft; only 15 characters NetBEUI did communication and created connections between systems; only lived on MAC Addresses, so only useful on LANs

Wireless Network Card

Like a standard NIC, but without the use of wires, it has a transmitter/receiver for sending signals via radio waves Always going to have WAP and a Network Interface Controller (NIC)

apt-get (linux)

Linux command for installing or updating a program using the advanced packaging tool. Sudo apt-get update; onboard repository is being updated so that it knows the latest version of thousands of applications If you try to get an application called joe, type joe; will give you the options sudo apt install joe and sudo apt install joe-jupp; we use just apt usually To install program: sudo apt-get install joe To upgrade software: sudo apt-get upgrade; will upgrade every piece of software on system; for individual upgrade, use sudo apt-get upgrade joe To delete a program: sudo apt-get remove joe

Navigating Linux CLI

Linux doesn't use drive letters; root directory is just a slash /; we mount all of the volumes as folders; we still use the cd command; linux cares about capitalization; we use a forward slash (/) in the Linux environment; tab will autofill for you when typing a file or folder name Ex. cd Desktop/; cd ~ will always put you back in your home directory Cd / puts you in the root directory "Pwd" shows you what directory you are in

LCD Projector

Liquid crystal display projectors are devices that project light through panels made of silicone colored red, green, and blue. The light passing through these panels displays an image on a surface such as a screen or wall.

What do chipsets define?

Motherboard capabilities: how much RAM, how many video cards, how fast RAM, how many USB ports and speed, how many hard drives

Volt Meter readings

Multimeter V with squiggle = AC Multimeter V with line and three dots = DC

Master File Table (MFT)

NTFS uses this database to store and link to files. It contains information about access rights, date and time stamps, system attributes, and other information about files.

Thermal Printer Maintenance

Need to replace paper a lot; need to clean the heating element because it picks up dandruff over time; need to remove debris, because paper dander can build up

The two early chipsets and their functions:

Northbridge: acted as interface to CPU, doing the fast stuff Southbridge: handles slower stuff, like individual ports Today, CPUs take over all of Northbridge tasks; most chipsets are now single-chip Southbridge

Competitors for GPU

Nvidia, ATI/AMD, Intel

S/PDIF (Sony-Philips Digital Interface) sound port

Optical connector that plugs computer into a receiver system A sound port that connects to an external home theater audio system, providing digital output and the best signal quality.

Blu-Ray Disc (BD)

Optical disc format that stores 25 or 50 GB of data, designed to be the replacement media for DVD. Competed with HD DVD. BD-RE: (Blu-Ray Disc Recordable Erasable)

Android

OS used on some mobile devices Applications bought on Google Play Store; not a big screening process for apps Need Google account for Android phone Backs up everything to Google Drive

Ping command

One of the most commonly used command-line commands. It can check IP connectivity between two network devices. Multiple platforms (for example, routers, switches, and hosts) support the ping command.

Microsoft Management Console (MMC)

One of the primary administrative tools used to manage Windows and many of the network services provided by Windows. customize utilities; list of tools

GUID Partition Table (GPT)

One of two methods used to organize partitions on a hard drive. A GPT partitioning system installed on a hard drive can support 128 partitions and is recommended for drives larger than 2 TB. Compare with Master Boot Record (MBR). designed to take advantage of power of UEFI BIOS GUID = Global Unique Identifier; 128-bit unique value that defines your partitioning system Advantages of GPT: 128 partitions per drive; each partition can be 18.8 million terabytes per partition; backward compatible with MBR GPT uses a protective MBR (LBA 0) but the GPT starts at the Primary GPT Header (LBA 1) and includes a Secondary GPT Header (on a later LBA)

Laser Printer long explanation

One spot charged on the photosensitive drum by the primary corona, which puts uniform negative charge on the photosensitive drum (-400, -600 volt charge); as drum rotates, laser writes image onto the photosensitive drum; developing, toner is at -300V charge, and is repulsed from the other negative charges, repulsed from the areas that isn't exposed; exposed areas at -150V charge; toner yanked out and sticks where we have exposed image; toner now on the photosensitive drum; imaging, paper comes in, separation pads make sure only one paper is taken at a time; transfer corona has static charge of 150V onto paper; toner goes onto the paper and the image is now on the paper; toner gets sealed onto the paper by heat and pressure, which is done by the fuser assembly; antistatic device wipes static charge off the paper

Mini Connector

One type of power connector from a PC power supply unit. Supplies 5 and 12 volts to peripherals. Also known as a floppy connector.

Troubleshooting Core Components

Only plug in basic essentials when doing initial setup. Need some kind of graphics in order to boot up (built-in or not) Errors in System Setup can cause a dead PC; try clearing the CMOS jumper by shorting the two post for about 30 seconds. If loud noise coming from case, a cable might be caught in the fan. If loud noise coming from power supply, capacitor might explode. System Setup can show you if your RAM is there; if RAM is bad, use memory checking program; Windows Recovery Program Start over if you can't figure out what problem you are having and how to fix it. Use fire extinguisher if smoke comes out of the system. Look at what the indicator lights on your motherboard mean when you are having errors.

LAN IP Address

Only three private address schemes available; common one is 192.168.1.x Be careful when setting this up because you may get disconnected from router if you have a static IP Address set up

Performance Monitor

Operating system program that assesses and reports information about various computer resources and devices. uses counters to monitor system; gives idea of what happens to computer over time

Troubleshooting Monitors

Overheat Shutdown: video card overheats; possibly bad fans on video card or video card not getting enough ventilation Dead Pixels: happens on LCD monitors; go back to manufacturer and get new one Artifacts: pieces of stuff show up on screen but don't belong there anymore; look at video RAM to see if it went bad; run another video card to see if the same problem happens Incorrect color patterns: check cable; check video RAM DIM image: something making light isn't making enough light; replace part CCFL Flickering Image: check cable Distorted Image: make sure running at native resolution of monitor; for projectors, adjust geometry Burn In: on old-school plasma monitors, fixed image on screen burns in to the screen; LCDs can get burn-in (but called image persistence) and to fix, put different images on screen Over/undersized images & icons: on Windows; adjust text size

Linux and macOS Permissions:

Owner, group, everyone; each have own set of permissions Both have R W X (Read Write Execute) as options for permissions

Socket Names

PGA (Pin Grid Array) LGA (LAN Grid Array)

Encrypted Email Ports

POP3 encrypted port: 995 IMAP encrypted port: 993 SMTP encrypted port: 465 or 587 Gives Point-to-point encryption (P2PE) of your e-mail

Power-ON Self-Test (POST)

POST tells motherboard to check itself out; goes into internal diagnostics, then boots if everything is okay; a beep lets you know that the POST test has run well; if something is wrong, computer reports to human that there is a problem; POST checks CPU, RAM, video, etc.

VPN Clients:

PPTP, L2TP, IPsec VPN Client in Windows is limited

Booting over a Network

PXE Booting, Apple's NetBoot; allow you to boot from a network server; popular for diskless workstations

Address Bus

Pathway from memory to processing unit that carries the address in memory to and from which data is transferred. Direct connection between CPU and MCC that allows CPU to tell MCC which byte of data it needs

External Data Bus

Provides a channel for the flow of data and commands between the CPU and RAM

Change Management

Process of making sure changes are made smoothly and efficiently and do not negatively affect systems reliability, security, confidentiality, integrity, and availability. (see Change Board for steps in Change Management)

Component Services

Programming tools in Windows for the sharing of data objects between programs.

IPv6 (Internet Protocol version 6)

Protocol in which addresses consist of eight sets of four hexadecimal numbers, each number being a value between 0000 and FFFF, using a colon to separate the numbers. Here's an example: FEDC:BA98:7654:3210:0800:200C:00CF:1234. Uses 128-bit addressing scheme; use a hexadecimal notation IPv6 Example: 2001:0db8:85a3:0000:0000:8a2e:0370:7334 IPv6: Example: 2001:0000:0000:0001:0000:0000:0000:8a2e; shorthand version is 2001:0:0:1:0:0:0:8a2e; makes things easier by dumbing the leading zeroes; in place where we have 3 sets of zeroes in a row, can change to 2001:0:0:1::8a2e Today we have two separate IP Addresses: Link-Local Address starts with fe80:0000:0000:0000:[last half auto generated] Internet Address (global unicast address); brought from router; router determines first half, computer determines second half Link-local addresses are used for local connections. Global unicast addresses are used to connect to the Internet Computers can have temporary IPv6 addresses as a security feature IPv6 has prefix length fixed at /64; prefix used to talk to upstream routers to get our data to the places we need it the quickest

Mass Storage Troubleshooting: Single Drives

Read/Write Failure: all hard drives have a certain life span. S.M.A.R.T. can query a drive a check health of a drive; if bad drive, replace it. Slow Performance: not enough RAM to make system run as fast as it should; red write/read drive going mad Loud Clicking: click of death is terminal; replace drive Failure to Boot: is boot order correct? Drives not recognized: drive might have formatting problem; reformat drive; always need to initialize disk before Windows will recognize it. OS Not Found: usually messed up boot process; boot order might be messed up Attempts to boot incorrect device: boot order is messed up Continuous Reboots: corruption of OS

Troubleshooting at the GUI

Rebooting can fix many troubleshooting issues Safe Mode and Event Viewer; Look at logs in Windows, System, and look for errors; search error on Google to hopefully find an answer/fix applications and low RAM can cause Windows to be slow; can turn off applications that are automatically set to start up and run Corrupted Profile; can get to login screen, but not to a desktop; fix depends on your version of Windows; Windows 10 is automatic; Windows 7 in safe mode, control panel, administrative tools, computer management, local users and groups, then create new user, use robocopy to copy old profile into new profile, with the hopes that the corrupted part won't copy over

MX record

Records within DNS servers that are used by SMTP servers to determine where to send mail. Used by mail servers

Network Topology Diagrams

Refers to the geometric arrangement of the actual physical organization of the computers and other network devices) in a network Logical Diagrams: organizes network IDs, computers and IP addresses, routers, etc. Physical Diagrams: how everything looks; manifests as a floor plan; cable runs, distribution frame; real-world idea of how it is all organized

eSATA (External SATA)

Serial ATA-based connector for external hard drives and optical drives. Not used as much.

Best Practices for Passwords:

Set strong passwords: use upper and lowercase, numbers, extra characters (!, #, etc.); long passwords Password Expiration: make passwords that expire after 30 or 60 days Screensaver: forces people to reenter password Lockscreen Required Password BIOS/UEFI passwords Require passwords everywhere Multifactor authentication

Sag

Short Term Voltage Dip; same as brownout

Bash shell

The default shell used by the terminal for many distributions of Linux.

Device Driver

Software that facilitates the communication between a device and the operating system. While usually automatic, sometimes you need to manually download the correct driver for a USB device.

Software as a Service (SaaS)

Software that is owned, delivered, and managed remotely and delivered over the Internet to contracted customers on a pay-for-use basis or as a subscription based on use metrics. Examples: google docs, google maps

Hypervisor

Software that runs on a physical computer and manages one or more virtual machine operating systems. Host that runs virtual machines

Type 2 Hypervisor

Software to manage virtual machines that is installed as an application in an operating system. hardware has OS already installed; then install hypervisor, then run virtual machines on hypervisor Example: Oracle VM Virtualbox

Type 1 Hypervisor

Software to manage virtual machines that is installed before any operating system is installed. hypervisor installed on hardware; then virtual machines run on top of hypervisor; runs as an OS Type 1 Hypervisors: VMware ESXi, Microsoft Hyper-V, KVM

Universal Serial Bus (USB)

Standard for computer ports that support data transfer rates of up to 12 million bits per second.

Structured Cabling

Standards defined by the Telecommunications Industry Association/Electronic Industries Alliance (TIA/EIA) that define methods of organizing the cables in a network for ease of repair and replacement.

Advanced Configuration and Power Interface (ACPI)

Standards used by system BIOS and other components that define power states for the system and processor used to conserve power when the system is not in full use.

Troubleshooting Theory

Step 1: Identify the Problem Step 2: Establish a theory of probable cause Step 3: Test the theory to determine cause Step 4: Establish a plan of action to resolve the problem and implement the solution Step 5: Verify full system functionality and, if applicable, implement preventative measures Step 6: Document findings, actions, and outcomes

Interpreted Language

Takes the most recently entered instruction, translates it into machine language, and executes it; Visual Basic, Python, JavaScript

Symmetric DSL (SDSL)

Supports same data rates for upstream and downstream transfers upload and download speeds were the same

MBR Partitioning

Supports up to 4 primary partitions; partitions can be no bigger than 2.2TB; can have primary or extended partitions but only primary are bootable (can boot an OS); can have 4 primary with a different OS each; active partition loads by default MBR = Master Boot Record Oldest type of partitioning MBR tells computer where to find operating system MBR broken up into 5 pieces: boot loader, partition tables (up to 4 different partitions, with idea being ou can load up to 4 different operating systems); boot loader has to be preassigned active partition in ordder to determine which operating system to boot MBR consisted of a boot loader and up to four partitions with one set as an active partition If you need more than four partitions on a single drive, you create an extended partition and and add logical drives to that partition

Bash Shell

The Bourne Again Shell; it is the default command-line interface in Linux.

IP Packet

The IP portion of a TCP/IP frame that acts as an envelope for data, holding information necessary for routers to transfer data between subnets.

Internet Protocol Version 4 (IPv4)

The Internet Protocol standard released in the 1980s and still commonly used on modern networks. It specifies 32-bit addresses composed of four octets.

Internet Tiers

The Internet is millions and millions of computers all joined together to form the largest network earth. To keep everything organized, the Internet is broken down into groups called tiers. The main tier, called Tier 1, consists of a small number of companies called Tier 1 providers. The Tier 1 providers own long-distance, high-speed fiber-optic networks called backbones. These backbones span the major cities of the earth (not all Tier backbones go to all cities) and interconnect at special locations called network access points (NAPs). Anyone wishing to connect to any of the Tier 1 providers must pay money. The Tier 1 providers do not charge each other to connect. Tier 2 providers own smaller, regional networks and must pay the Tier 1 providers. Most of the famous companies that provide Internet access to the general public are Tier 2 providers. Tier 3 providers are even more regional and connect to Tier 2 providers. The piece of equipment that makes this tiered Internet concept work is called a backbone router. Backbone routers connect to more than one other backbone router, creating a big, interwoven framework for communication.

Spinning Pinwheel of Death (SPoD)

The Mac equivalent of a BSoD. Disconnect any external hardware, restart the system, and see if the behavior repeats itself. If it does, perform all system updates available and run an antimalware scan.

Virtual Machine

The apparent machine that the operating system presents to the user, achieved by hiding the complexities of the hardware behind layers of operating system software. a self-contained computer running within a host operating system

System Image

The backup of the entire Windows 7 volume and can also include backups of other volumes. The backup is made using the Windows 7 Backup and Restore utility. A snapshot of the current state of the computer that contains all settings and data. image-level backup; a copy of the drives required for Windows to run

Lumens

The brightness of projector devices is rated in these units

ps command (Linux)

The command used to obtain information about processes currently running on the system. Ps aux lets you see all of the processes and gives a lot of details and info Ps aux | (weird line called a pipe); funnels output to whatever you type in after the pipe; example: ps aux | grep "libre" (libre spot is whatever string you're looking for; looks for all text in the quotation marks); essentially, grep will look for any processes that have libre in it

Fully Qualified Domain Name (FQDN)

The complete domain name of an Internet computer, such as www.CIWcertified.com. Must be unique; limited to 256 characters

Kernel

The core of an operating system that manages memory and devices, maintains the internal clock, runs programs, and assigns the resources, such as devices, programs, apps, data, and information. core part of operating system that handles primary memroy management

Advanced Technology Attachment (ATA)

The former name of the Parallel AT Attachment (PATA) interface standard. Hard drive spoke this language

Internet of Things (IoT)

The idea that objects are becoming connected to the Internet so they can interact with other devices, applications, or services. Gives internet capability to many things like thermostats, lightbulbs, door locks, etc. 3 Types of Technologies Used: 802.11 Zigbee (runs on 2.4 GHz band) Z-Wave (runs in 900 MHz band) Need a hub for Internet of Things (IoT)

File Explorer

The main tool for finding, viewing, and managing the contents of your computer by showing the location and contents of every drive, folder, and file; called Windows Explorer prior to Windows 8. Navigation Pane; on left side, shows folders and drives Preview pane: clicking on something, gives a preview of it Details pane: gives quick info about a particular file Quick Access: desktop, downloads, documents, some others; can add and remove folders from quick access This PC: can right click to see system information; shows desktop, documents, drives Cloud Services: OneDrive, others Network: see shared folders General Options: can customize file explorer; single vs double click, privacy View Options: can show hidden folders, files drives; can hide extensions, hide protected operating system files, many others

Audit Policy

The settings that define which operating system events are audited; accessed through Local Security Policy can help add things to monitor in Event Viewer; change certain thing to be audited

Console Port

The type of port on a router used to communicate with the router itself, such as when making programming changes to the device. A serial port using RS-232 language to act as a connection; terminal program can allow us to talk to the router

Right-Click

The use of the right mouse button to access special features of an application view context menu; can select properties

Service Set Identifier (SSID)

The user-supplied network name of a WLAN; it can generally be alphanumeric from 2 to 32 characters. name of the wireless network

Network Address Translation (NAT)

Translates the private IP address to a public address for routing over the Internet NAT takes all of the addresses from inside your network or LAN and gives them a private IP Address; gateway router removes private IP Address and inserts own WAN Address, which is a public IP Address When receiving data back, uses the private IP Address again; don't have to give away public IP Addresses for end users; everything inside the LAN is invisible to the internet Networks that use NAT are invisible to the public Internet

TCP/IP

Transmission Control Protocol/Internet Protocol. Protocol that connects computers to the Internet. Tells computers how to exchange information over the Internet. Adopted as protocol for ARPANET/the Internet

Broadband Speeds

Upload Speeds: 768 kbps to 3 mbps Download Speeds: 1.5 mbps to 7+ mbps

mac OS features:

Upper left corner, apple menu; changes depending on active application Dock on bottom: shows programs that are used the most; is customizable Some apps won't close even if you X out of them; black dot will still be under program if it is still running; use command Q to quit out of program Finder; shows folder contents; applications, documents, desktop, recent, etc System Preferences is similar to Settings or Control Panel instead of command prompt, we have Terminal in macOS

Troubleshooting Power Supplies: How to test power supply

Use power supply tester; test individual connections Use paperclip to see if power supply does supply power Use motherboard to test voltage; plug in; use volt meter

Security Policies

Use the application Local Security Policy Account Policies: password policy (max password age, minimum password length, password complexity requirements, enforce password history, store passwords using reversible encryption), account lockout policy (account lockout threshold, account lockout duration, reset account lockout counter after) Local Policies: User Rights Assignment (allow log on locally); Security Options (rename administrator account) For a computer that is a member of a domain, you can't change these settings; domain policies; domain administrator policies override local policies

Tailgating

When an unauthorized individual enters a restricted-access building by following an authorized user.

net use

a TCP/IP command that connects or disconnects a computer from a shared resource or can display information about connections. ex: net use v: \\mikewin10pc\mike net use (drive letter) (UNC address) use what you want to share

net user

a TCP/IP command used to manage user accounts. Net user (name) (password) /add; adds a user Net user (name) /delete; deletes a user

Printer Broadcasting Applications

Zeroconf (Zero Configuration) - Windows Bonjour - MAC Bonjour goes on wired network and does broadcasting for printer On wireless, AirPrint on Mac handles wireless printing

SATA Power Connector

a 15-pin flat power connector that provides power to SaTa drives; primarily for hard drives and optical media

MAC Clone

for cable modem; if you use a modem nor from the cable company, you can clone the MAC Address from the company cable modem and use it on your own modem

Liquid Cooling System

chunk of metal has coolant running through veins; two hoses; one hose pulls way hot fluid into a fan to cool it; other hose returns cool fluid and brings it back into meal; radiator behind fans; hot fluid goes to veins of radiator and fans are cooling it off; uses a pump, a radiator, and a cooling block with liquid to remove heat; quiet and and can yank out a lot of heat, more than any fan can

Functions

chunks of code that are run over and over again

Microarchitecture

circuit diagram on inside of CPU; single microarchitecture can create a broad cross section of different models

Laser Printer Maintenance

cleaning, can use anti-static vacuum Maintenance Kits have pickup rollers, transfer roller Can have laser printers do Maintenance Mode and print out statistics Laser printers may need to be calibrated; they have built in calibration features

icacls

command that can be used to take full access of a file

Duplex

communication system that allows simultaneous two-way communications by using two frequencies for each channel.

Unified Threat Management (UTM)

comprehensive security management tool that combines multiple security tools, including firewalls, virtual private networks, intrusion detection systems, and web content filtering and anti-spam software puts everything into one box/service/system; combines firewall for network, intrusion protection, anti-malware; can get cloud-based UTM

Dongles

connectors with cables that plug into the motherboard

TCP Segment or UDP Datagram

consists of Destination Port - Source Port - Data

A Record

contains the IPv4 address for a target host A Record is www or IP Address

Human Interface Devices (HID)

core device drivers that ensure mice and keyboards work

Virtualization with NAT

creating a virtual router; creates own network ID (10.0.0.x) and treats host computer as internet service provider; only allows one computer to connect to virtualized network ID

Social Engineering

hackers use their social skills to trick people into revealing access credentials or other valuable information Social Engineering attacks include telephone scams, tailgating, shoulder surfing, and dumpster diving Phishing and spear phishing attacks seek personal or financial information with targeted scams

USB Type-C

handles high speeds; can plug in both ways

Double-Sided RAM

has chips on both sides; not all motherboards support this

Single-Sided RAM

has chips on only one side

Windows Defender Firewall

has options for three different types of Firewalls: Domain networks, Private networks, and Guest or Public Networks Firewall features change depending on what type of network you are connected to; can customize these settings

Bash Script

have extension .sh

Wireless Printers

have network cards and are subject to same 802.11 rules Can set up for direct printing; can set up for ad hoc; bluetooth capable printers; WPS (pressing button on printer and pressing button on router)

Dual-Channel Memory

have to put two RAM sticks of same size and speed into these slots

ACPI Level 4

hibernation mode; everything on RAM is copied to file on hard drive, and then RAM is shut off

Barcode/QR Code Scanners

little printed black and white symbols that store numeric or alphanumeric information

Coaxial Cable

insulated copper wire; used to carry high-speed data traffic and television signals Uses RG Ratings

Brownout

intentional or unitentional drop in voltage; same as sag

Plenum Rating

is save for installation between a dropped ceiling and structural ceiling where air circulation takes place -made from a special; plastic which retards fire and produces less smoke than other cables Ability to resist fire; Plenum is resistant to fire PVC (non-plenum) is most burnable

Personal/Pre-Shared Key (PSK)

key needed by access points and wireless hosts for authentication

Certificate

keys that allow us to encrypt a connection that are signed by a third party have a key, date they were issued, serial number, name of website they're connecting to Possible Problems: expired; revoked certificate; self-signed

ITX Form Factor

larger version of mini-ITX; not common

Windows Version 7

last version of Windows that had Media Center; classic taskbar; dominant form of Windows until 2018-2019 when Windows 10 came along; had Control Panel

Beep Codes

let you know what is having a problem; primitive; depending on the types of beeps determine what the problem is

Users

lists all of the different users on the computer

Mark Russinovich

made the website Sysinternals

Sectors

magnetic disk storage device units

System Setup

makes changes to the changeable parts of our BIOS; access by holding down a key at startup Enables changes to CPU frequencies, RAM timings, BIOS passwords, boot options, and more

Isolation (for routers)

makes it co that computers can only tallk to the WAP; can't share with other computers on the network

For Statement

statement that directs program flow through a group of statements a fixed number of times a conditional loop;; as long as variable is doing something, then keep doing this

Power Supply

step-down transformer that converts AC power to DC power

RAID 0+1

striped sets in a mirrored set ( minimum four disks; even number of disks) provides fault tolerance and improved performance but increases complexity. The key difference from RAID 1+0 is that RAID 0+1 creates a second striped set to mirror a primary striped set. The array continues to operate with one or more drives failed in the same mirror set, but if drives fail on both sides of the mirror the data on the RAID system is lost. Mirroring some stripes; minimum of two pairs; 2 striped pairs Striped across first pair, mirrored over to second pair; can lose one complete pair and be okay; if we lose one on each side, we wouldn't be able to rebuild the mirror

Unified Extensible Firmware Interface (UEFI)

supplanted original BIOS, but is still called BIOS, UEFI BIOS is a common term

SDRAM

synchronized to the crystal; 168 pins, two notches; runs at motherboard speed

tasklist/taskkill

tasklist lists all of the processes running on your system taskkill allows us to shutdown any of these processes taskkill /"PID or name" Ex: taskkill /PID ####

Digital Rights Management (DRM)

technologies that let copyright owners control the level of access or use allowed for a copyrighted work, such as limiting the number of times a song can be copied

4:3 Aspect Ratio

the aspect ratio of a television that is 4 units wide by 3 units high VGA was 640x480 SVGA was 800x600 SXGA was 1280x1024 UXGA was 1600x1200

Partitioning

the building blocks for a hard drive A partition is a logical electronic device readable by an operating system Partitions define the location of operating systems, swap files, and recovery partitions

Fragmentation

the condition of a file that is broken up and stored in many different locations on a magnetic disk downside is it has to go all over the hard drive to retrieve broken up file when deleting file, still stays on drive, but first letter of file changed to lowercase sigma symbol (o'); symbolizes that those blocks can be written over; when making new file, overwrites the blocks, but file gets split apart over bllocks (as in a different file can exist in between the blocks of another file)

Swap File

the disk space that is set aside for virtual memory

Throw

the further out you have the projector, the larger the screen; the closer the projector; the smaller the screen Minimum and Maximum throw

HTTP (Hypertext Transfer Protocol)

the protocol used for transmitting web pages over the Internet Port 80 HTTP is insecure

Pixel (Picture Element)

the smallest component of a two-dimensional digital image 3 individual pieces that emit red, green, and blue light (RGB)

Multifactor Authentication

the use of two or more types of authentication credentials in conjunction to achieve a greater level of security

Standout

things that we place the motherboard on; form factors allow the motherboards to fit any of these standouts

Format

this process queries each LBA block if it can read/write data; will identify bad blacks, replaces 0000s on the right with a hexadecimal value signalling bad block (video used 0000FFF7)

Collate

to arrange into the proper order, especially documents has a bunch of trays and it prints out in order multiple times

RAID 1 (Mirroring)

• File blocks are duplicated between physical drives • High disk space utilization • High redundancy • Minimum of 2 drives (can use 4 drives) 1 copy on first drive, then second; then another piece of file on first, then second. Provides redundancy and can secure data better, but it is slower

RAID 0 (Striping)

• File blocks are split between physical drives • High performance • No redundancy • Minimum of 2 drives Gives us speed. Downside is if any drives die, you lose the data


Ensembles d'études connexes

Developing an Innovation Strategy

View Set

Chapter 11: Building Nursing Management Skills Zerwekh 9th ED

View Set

rev management exam 2 quiz chapter 4

View Set

Mendel's Laws Applied to Complex Traits

View Set