CompTIA A+ 801 and 802 Comprehensive Set

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Network Components

(Starting at the client) -network adapter (or Network Interface Card - NIC) -Cable -Central network box (hub or switch)

Port Numbers

(common port numbers for TCP/IP Services on the Exam) -HTTP 80 -HTTPS 443 -FTP 20, 21 -POP3 110 -IMAP4 143 -SMTP 25 -DNS 53 -DHCP 67, 68 -Telnet 23 -SNMP 161 -NTP 123

Common Operational Problems: Critical Error Message or Crash

--BSoD (blue screen of death) --find the STOP code on the screen & look it up online

Floppy Drives and Disks

-1.44 MB of data -invented 1987 -Floppy Disk Drive connects via 2 cables: --4-pin mini power connector and a 34-pin ribbon cable to motherboard

2.1 speakers

-2 stands for the pair of stereo speakers or satellites -1 refers to the subwoofer (bass)

Reporting as a Security Measure

-2 tools in Windows will report problems to you so you can let the network admin or tech know to resolve them: Event Viewer Auditing

Common Operational Problems: Application will not Start or Load

-3 common causes 1. application was not installed correctly 2. version conflict 3. computer is experiencing memory access errors

Cache (CPU cache)

-A special kind of RAM -one way CPUs got beyond 4GHz -superfast RAM directly on the CPU -also found on the HD and other components on CPU: Level 1 (L1) - smallest, fastest Level 2 (L2) - bigger, slower Level 3 (L3) - biggest, slowest (found only on highest end CPUs) Bigger cache = More efficient CPU EXAM: cache is measured in KB and MB. L1 could be 512 KB, L2 <= 2 MB

Subnet Masking

-A subnet mask hides, or "masks," the network part of a system's IP address and leaves only the host part as the machine identifier. -A common subnet mask for a Class C IP address is 255.255.255.0. Each section of the subnet mask can contain a number from 0 to 256, just like an IP address. Therefore, in the example above, the first three sections are full, meaning the IP addresses of computers within the subnet mask must be identical in the first three sections. For example, the IP addresses 10.0.1.201 and 10.0.1.202 would be in the same subnet, while 10.0.2.201 would not. -A subnet mask such as 255.255.255.128 can be used to split a network into two subnets

Enterprise Software

-Business and Goverment use, not individual -about display, manipulation, and storage of large amounts of often complex data and the support or automation of business processes with that data -performance|scalability|robustness -a collection of computer programs with common business applications, tools for modeling how the organization works, and development tools for building organization-specific applications

Disposal of IT Equipment: CRT Disposal

-CRTs emit radiatin -contain lead

Monitoring Your System: Task Manager

-CTRL+SHIFT+ESC or CTRL+ALT+DEL and select -view performance information about open applications and end any application tasks that are frozen or not responding -information on current processes, workload, network traffic, and network user status

SuperComputers

-Contains hundreds or thousands of processors -are typically one-of-a kind, custom designs -often priced in the millions of dollars EX: Titan Cray @ Oak Ridge National Lab in TN -200 cabinets -speed of 17.59 petaflops (Quadrillion) calcs/ps

Maintaining Software

-Disk Cleanup -Backup -File Compression

Green IT: Energy Star

-EPA runs the program -certifies products that meet low-energy consumption standards -established to: --reduce greenhouse gases and other pollutants --make it easy for consumers to identify savings EX: Laser Printer must: --use @ least 25% less NRG than standard --allow duplex --run cooler --last longer without maintenance

Troubleshooting Your System

-Follow basic steps to troubleshoot common problems. -fix manually or with Microsoft Fix It -identify cause, tools, and methods to resolve

Satellite Technologies (WAN Transmission Media)

-Geosynchronous = 1 type of orbit for satellites; means they rotate at the same speed as the earth and are always in a fixed relation to the ground -home TV satellites are aimed at this type

Email in the Cloud

-Gmail allowing you to link accounts and reply from those accounts appropriately

Office Applications in the Cloud

-Google Apps is 1 example -a web-delivered service that is part of cloud computing

Browser Config: Cookies and Internet Cache

-IC is copies of graphics and other items cached locally to allow page to load more quickly next time AKA Temporary Internet Files -cookie is a small text file containing information about you --used to identify you as a registered user of a Web site, keep track of shopping basket goods, etc --also used to present different looks and content to different users and to track access to Web sites, including products you look at, even if you don't buy them --privacy and personal info concern but not executable (not a huge security threat) -some browsers and browser add-ins can be set to partially or completely block cookies

Software Upgrades

-Initial Release -Tested by users, who provide feedback -Updated by: Patch: -fast, fixes problems, 1-2 over program life Service Pack: -bundle of patches, usually for an OS Upgrade -new program version that is purchased

Physical Controls (Access Control Methods)

-Locks -Physical Security of Hardware

Troubleshooting Your System: Error Correction Tools

-Microsoft provides software called Fix It -consists of automated scripts that provide users with the means to apply automated fixes, workarounds, and configuration changes -can avoid manual work and reduce problem solving time

Monitoring Networks

-Network Admin needs to monitor various aspects of a network -requires a lot of tuning and supervision -thresholds/tolerance for reporting must be set for every object -can take months to properly tune a system

Operating System

-OS is software that maintains control of hardware through the use of drivers -schedules and manages programs to run multiple apps at the same time (prior, computers could only do 1 at a time) -has a set of pre-written functions, called Application Programming Interfaces, to make software programming easier and less likely to have errors. -EX: email timestamping - the email program isn't allowed access to the internal clock, so it asks the OS for the current time

Protocol Characteristics

-Protocols can be divided into connection-oriented (allows data checking in the transport layer) and connectionless -connection-oriented AKA stateful are by far most used and ensure that the data is received properly; transmissions before and after actual message are considered overhead (opens/closes transmission) -connectionless AKA stateless protocols send data to the destination with no regard for whether it is received (bad for downloads or sharing) -good for quick exchanges or streaming (i.e. video or voice) but do not perform error checking EX: User Datagram Protocol, which is used for streaming media

Short Message Service (WAN Transmission Media)

-SMS (texting) -enabled by 2G cellular technology

Monitoring Networks: with SNMP

-Simple Network Management Protocol -connectionless application, so it can work with components from many vendors -SNMP manager is a device on the network with SNMP management software loaded on to it. -can configure, monitor, and troubleshoot the network -AGENTS are the devices that can be managed by the SNMP manager and can include routers, hubs, NICs, servers, and other compenents of intranets -SNMP uses ports 161 an 162

Netbooks

-Smaller form factor than laptops -smaller disks (HD) -lacks key laptop features such as optical drives -smaller screen NOTE: Laptops are being down-sized while maintaining memory and CPU power, almost becoming indistinguishable from netbook form factor. Meanwhile, the upsizing from PDAs to tablets is creating more netbook competition.

TCP/IP Services

-The World Wide Web -E-mail -FTP (File Transfer Protocol) -VoIP (Voice over IP) -each service requires a special application, each with special settings

Common printer connections

-USB -parallel

Preventing Network Attacks

-User Awareness and Education --password best practice -Software: Antivirus, Anti-Spyware, Anti-SPAM -Security Certificates -Encryption: Wireless, File

Advanced Switch Functions

-VLANs -Spanning Tree: avoids loops by ensuring that only one link is used at a time; provides redundancy if another switch goes down

Universal Serial Bus Speeds

-Variety! peripheral attachment, supported by every OS, hot-swappable -USB 1.1 has 2 stds: USB 1.1 and Hi-Speed USB -1.1 gets 1.5 (slow) or 12 (high) Mbps data transfer -USB 2.0 gets up to 480 Mbps & backward compatible -3 form factors: A, B (printer) , Mini (camera) -SuperSpeed USB 3.0 gets up to 5 Gbps; looks like 2.0 w/slight diffs and is blue (says faster than FireWire and eSata but probs isn't)

Windows printer

-Windows sees a printer as a program, not a physical device. -one "printer" may control many physical devices -spooler is a software that channels the print jobs from the PC to the printer

Event Viewer

-Windows's default tattletale program -Control Panel>Administrative Tools -view application or system errors

User Account Control

-XP almost forced an admin acct to be primary -UAC is a feature that enables standard users to do common tasks and provides a permissions dialog when standard users and administrators do certain things that could potentially harm the computer (like installing a program). -Vista and 7 function more like user accts in Mac and Linux and ask for admin pws to proceed

Cellular Technology (WAN Transmission Media)

-a cell-style architecture is used to enable frequency reuse -Wi-Fi, Wi-MAX, and many other techs use the structure -typically used to describe Voice and Data services, but actually refers to the architecture of the transmitters -reuses frequencies without letting them interfere with each other

Circuit-Switching on a WAN

-a circuit-switched network provides a dedicated circuit path between source device and end device -packets are sent in order over one path -Main Advantages --data is ensured enough bandwidth and a dedicated path --all data sent over the same path in the correct order -Main Disadvantages --established connection cannot be used for any other transmission until connection is released, even if nothing is being transmitted --data can take only the path established by the circuit, even if a better, faster path becomes available -Circuit-switching technologies include: --ISDN (Integrated Services Digital Network) --POTS (Plain Old Telephone Service) --56 Kbps circuits (Switched 56) --Leased lines (including TI) --xDSL (all digital subscriber lines)

Voice over IP

-a collection of protocols that make phone calls over the data network possible -low network latency is important

Wi-Fi Alliance

-a group of 175 companies that create and design wireless networking products -certify products that conform to 802.11 (a, b, g, or n) as Wi-Fi certified

Domain Name

-a naming device "for humans" -part of a Uniform Resource Locator (URL). -consists of two parts: the site's host and a suffix that indicates the type of organization. (Example: popsci.com) -easy to remember and provide consistency for the user (IP address can change w/o affecting domain name.)

Communication Protocols

-a set of rules that governs how devices communicate with each other -there are hundreds of unique communication protocols in use for computers -two types: proprietary and standardized (aka Internet) --problem with proprietary is that devices might not be able to communicate with devices outside the company w/o fixes --TCP/IP is an example of standardized

Domain Name System

-a worldwide system of servers that maps names to IP addresses, and the way the numbers are grouped is called the IPv4 protocol -Domain and HOST names are resolved to IP addresses by the DNS, and the IP addresses are resolved to MAC addresses by the Address Resolution Protocol (ARP) -Port 53

Data Storage in the Cloud

-about 1/2 the cost of a traditional Microsoft file server -doesn't require the buyer to do backups and maintenance

Webcam

-actually a PC cam, but most common use is Internet communication, hence Webcam -VAST differences btwn cheap and expensive ones -image quality: 100,000 pixels to millions --1.3 million is highest w/o killing broadband -frame rate: 30 fps is considered the best -most use USB connections (Hi-Speed=make sure it is plugged into a 2.0 port) -many are built-in to monitors or laptops -Find the camera's program in systray, computer, or ctrl panel -Get the apps to recognize it and test it -in Windows, only 1 program can use it at once

Wireless Network Modes

-ad hoc -infrastructure

Ad Hoc Wireless Network Modes

-aka peer-to-peer -node is in direct contact with every other node -decentralized -each node needs the same SSID and a unique IP -suited for small groups (<12) -temporary study groups or business meetings -can't go beyond group (like to connect to the Internet)

Simple Peer-to-Peer Network Architecture

-all computers are connected together without a hierarchy -all resources are located on each individual's machine (a printer connected to one user's computer, for example) -need a different user account to access resources on each different computer--DECENTRALIZED authentication -easy to set up but it leaves all security, information backup, and performance to the end user

Session Layer of OSI

-allows applications functioning on devices to establish, manage, and terminate a dialog (or session) through a network -establishes sessions between users and token management (a service that controls which user's computer talks when during the current session by passing a software token back and forth). -establishes synchronization points, or backup points -AKA layer 5

Green IT: Use of Equipment: Voice over IP

-allows voice data to be carried as packets over IP networks -VOIP phones in place of traditional phones -headset in computer allows conference calls, Web conferences, and video conferences for less cost -eliminate need for telephone equipment, PBX (private branch exchange), and telephone wiring

Broadband over Powerlines

-an extension of HomePlug outside the home -for remote users (rural)

Single-Factor Authentication

-antiquated and inadequate -EX: username and password

node

-any device connected on a network (computer, printer, client, server, whatever)

Consolidating Drives: Cloud Computing

-apps and resources accessible via Internet AKA Saas "Software as a Service" -efficient use of energy by use of server farm

Minimizing Risks: Damage to Equipment

-avoid spills -use a UPS -periodic cleaning of hardware -avoid physical trauma -safely minimize ESD

Satellite Phones (WAN Transmission Media)

-better signal in heavy terrain or isolated areas because they need only a clear view of the sky, not a ground-based tower -popular in the military -available to public from Globalstar and Iridium -$$$$

Availability (A of CIA Security Triad)

-broken down into Authentication, Authorization, and Accounting: Authentication - proving that you really are who you say you are Authorization - having proper permission to perform some function in a network Accounting - logging security events so access can be monitored

Wireless Access Point

-centrally connects wireless network nodes in the same way that a network hub or switch connects wired PCs -in a company, a WAP is connected by a wired cable to a switch and then to the network and requires rigorous authentication by the devices (nodes) -residential users typically have the WAP integrated into a router that is connected to the cable modem -many can also act as high-speed switches and Internet routers

Disk Cleanup Tools (Maintaining Software)

-chdsk.exe - verifies the logical integrity of files and can even repair file system data -sfc.exe - Finds corrupted system files and restores them -cleanmgr.exe - frees up space on hard drive by removing unnecessary files that are no longer in use (included in Windows) -defrag.exe - takes parts of files that are physically located in different parts of the disk and moves them together, which increases read/write performance (does not free-up space but organizes available space)

Green IT: Use of Equipment: Replacing Drives

-choose energy efficient -look for NRG Star

Maintenance of Equipment: Repairing Equipment

-choose items that can be repaired instead of needing replaced

Maintenance of Equipment: Managing Dust

-clean it -reduce heat -reduce workload on cooling fan

Hypertext Transfer Protocol

-communication between a Web browser and a Web server -port 80 -not secure without SSL (HTTPS = HTTP over SSL)

Common Operational Problems: Peripheral with Driver does not Function

-compatibility issue -check driver's minimum requirements

Accidental Misconfiguration (Security Threats)

-configuring browser/security settings incorrectly and exposing computer to risks

WAN connections

-connect multiple LANs -usually through a public network, such as a telephone system, leased lines, or satellites -service provider gives "end-to-end" service to each connected LAN

LAN Bridge

-connects 2 or more LANs at layer 2 (Data Link Layer) -extends a network range -are network layer protocol transparent -can separate traffic between departmental LANs, but unlike VLANs, still allow sharing of information without going through the router -considered legacy; replaced by switches

SCSI host adapter

-connects to motherboard -adds 2 SCSI connectors (internal, external)

Consolidating Drives: Virtualization

-consolidating services on one piece of hardware -saves money on purchase, maintenance, powering, and cooling

Disposal of IT Equipment: Battery Disposal

-contain hazmats such as mercury, cadmium, and lithium -Nickel-metal hydride batteries (NiMH) are considered to be more green; no heavy toxic metals

Application Layer of OSI

-contains the networking application protocol that is used to "Carry and present" the "payload" or data -is the protocol that defines the data that the user views while using applications -AKA layer 7

Web Browser Configuration for Protection

-cookies, Internet cache, plugins, add-ons, and firewall

Formatting a Hard Drive

-creates a files system for the drive

Partitioning a Hard Drive

-creates distinct sections on a hard drive. -each appears in Windows as a separate drive

Physical Layer of OSI

-creates the physical link between 2 devices -referred to as the PHY ("fie") -format varies more than any other layer due to many standardized and proprietary physical layers -has error-checking but different for each PHY type -AKA layer 1

Backup Tools (Maintaining Software)

-critical measure for preventing data loss -ntbackup.exe is a Windows backup utility, which backs up files not already marked as backed up -system and registry backups should be done Windows can do these with: -Last Known Good Configuration -Registry Backup -System Restore -Safe Mode -ASR (Automated System Recovery)

Cleaning Exterior Surfaces

-dampen a lint-free cloth or cotton swabs in mild household cleaner or rubbing alcohol -NO AMMONIA NEAR LASER PRINTERS

Spyware

-defines a family of programs that run in the background on our PC, sending information about your browsing habits to the installing company -runs Distributed Computing applications -captures your keystrokes to steal passwords -reconfigures your settings -uses your contacts lists to propagate itself like a virus -hogs bandwidth -don't install programs it hides in (like custom cursor effects, etc) -install detection and removal software

Network Architecture

-design of communications on a network -describes or models specifications for a network's physical components and their functional organization and configuration; it's operational principles and procedures; and the data formats used in its operation -There are 2 main types: Simple Peer-to-Peer and Client/Server (modern)

Servers

-designed for multiple user access -substantially faster CPU than a PC -very large data storage capacity -RAID (redundancy array of independent disks) and other redundancies built into components and power -high-power cooling fans -OS + Apps are Server Specific -the software is really what defines a server -- you can put Windows Server 2008 on a desktop and make it a server, not a good one

Card Services

-device drivers that recognize the function of a particular PC card and provides the specialized drivers necessary to make the card work -handled by Windows

Socket Services

-device drivers that support the PC Card socket -recognizes card insertion and removal -handled by BIOS

Browser Config: Firewall

-devices or software that protect an internal network from unauthorized access to/from Internet -hardware firewalls: hide IP addresses, block TCP/IP ports; most home offices use hardware firewalls, like a Linksys router. --many routers use Access Control Lists (ACLs) that can filter by port number, IP address, or several other attributes -Windows XP and later come with Windows Firewall

Safe Wire Placement (Maintain Hardware)

-don't put them where you can trip and kill the computer

Disposal of IT Equipment: Recycle or Reuse

-donate

Green IT: Use of Equipment: Printing Considerations

-duplex -reduces paper consumption -all NRG star must offer duplex -recycle -Fonts: switching from Arial to Century Gothic can save 31% more ink but uses more paper

ESD Equipment (Maintain Hardware)

-electro-static discharge -anti-static cloths, vacuums, bags -air ionizers -grounded wrist straps

Maintenance of Equipment: Heating and Cooling Office Space

-eliminate cool air leaks in server room -provide space between devices and face cool to cool and hot to hot to create cooling aisles -use energy efficient fans; change settings in BIOS

Terminal Server

-enables users to login and work with applications directly on the server -used with thin clients

Confidentiality (C of CIA Security Triad)

-ensuring that the data cannot be read by unauthorized individuals and is secured through encryption techniques

HomePlug

-ethernet over power lines w/in a home

MAC Address

-every device that communicates on a network has a unique MAC address -48-bit hexadecimal format -provides NO information for grouping -AKA: Physical Address (by Windows) -device will have one for each medium, so if you're connected on Ethernet and WiFi, you'll have 2 -1st 3 bytes (24-bits) are the OUI, last 3 bytes are assigned by the card manufacturer

Common Operational Problems: System or Application Lockup

-expressed as the system or application "hanging" or "freezing" -run Task Manager to end any processes that are not responding -choose Processes tab and end any processes monopolizing CPU -restart

Repeater

-extend the range of a wireless LAN by gathering a weak or degraded signal from one end and putting a regenerated, full strength signal out the other

Flash-Based Storage

-faster and tougher than HDD -uses small memory chips similar to RAM but nonvolatile -found in phones, mp3 players, ebook readers, and GPS in addition to external drives

kernel

-focal point of any OS -communicates w/CPU -indicates what program is being used and what you want it to do -kernel is useless w/o programs

SystemRoot

-folder in which Windows has been installed -usually C:\Windows -C:\Windows\System32 - all of Windows's most critical files and programs

Android OS

-for touchscreen devices such as tablets and smartphones -owned by Google with an open source community of developers -uses a Linux Kernel

Data Link Layer of OSI

-formats data according to the medium it will be sent over -takes "packets" from Network Layer and packages them into "frames" (contains an identifier that signals the beginning and end of the frame) -data is @ network card ready for transmission, and the data link layer knows if the physical layer is busy and waits to move the data -sending data over wireless requires completely different formatting than over a wired medium -AKA layer 2

VOIP as green

-fraction of the cost of phone -great for sales

Uniform Resource Locator

-full domain name + the protocol (http://www.totalsem.com)

WAN Technologies

-function at the lower 3 layers of the OSI model (network, data link, and physical) -different and much more diverse than on a LAN

Pop-Ups

-generated by spyware -small programs that launch automatically when visiting certain web pages -can bring up competitor's ads on pages -many mimic legitimate pop-ups -security risk because they contain malware that is launched when it is clicked -close with ALT F4 instead of clicking -use ALT TAB to bring to front if needed

Crossover Cable Connections

-has 568A at one end and 568B at the other end -used to connect like devices EX: -PC to PC -Router Ethernet port to Router Ethernet port -PC to router Ethernet port -Switch to Switch -Hub to Hub -Hub to Switch

Straight-Through Cable Connections

-has the same standard at both ends -used to connect unlike devices EX: -PC to Hub -PC to Switch -Router Ethernet port to Hub -Router Ethernet port to Switch

Ethernet Ports

-have a transmit port (Tx) and a receive port (Rx) -Tx must connect to Rx at the other end

-PCMCIA card (PC Card)

-hot-swappable or hot-pluggable -68-pin -parallel --comes in 2 types: 16-bit (2 functions) and CardBus (32-bit, 8 functions) ---3 physical sizes Type I, II, and III ---2 Type II ports stacked can take 2 type I or IIs or a Type III -power = 3.3 V or 5.0 V -requires socket or card services to run

Common Operational Problems: Input Device will not Function

-if caused by hardware, could be related to a malfunctioning port on the computer, cable integrity, a connection problem (VERY COMMON), or the malfunctioning of the device (such as a wireless mouse with a weak battery)

Common Operational Problems: Cannot Login to Network

-if caused by hardware, most likely related to a cable that is loose or damaged, a switch port that is malfunctioning, a switch or router that is down, or an Ethernet adaptor card that is malfunctioning

Quarantine (Resolve Security Breach Step 2)

-if it can't be eliminated, quarantine it

Advanced Network Troubleshooting: Cable Testers

-if you suspect a bad cable, you can use a simple cable tester to check it -2-piece system: tester and responder -push button to test PHYSICAL LAYER

Parental controls

-in Vista, limit and monitor activities of any acct -Activity Reporting logs apps, websites, files downloaded, etc --can block sites by type or URL or only allow certain sites --limit time logged in and when

Green IT: Reparable Equipment

-include as many elements as possible that can be repaired

Cookies (Security Threats)

-info stored in your browser that can reveal passwords, usernames, Internet activity -can facilitate identity theft, cyber-spying, or other criminal activity

Data Destruction

-intentionally or accidentally erasing or corrupting data or using the data elsewhere

Device Driver

-interface between hardware and OS -provided by the hardware manufacturer, although OSes frequently include drivers for common hardware like keyboards

Game Controllers

-joystick -gamepad -force feedback game controllers are output as well as input devices -all modern ones plug into USB -decent force feedback ones need their own power as well -ancient ones had a dedicated port, usually as part of the sound car, called a MIDI/joystick port (had 15-pin sockets in 2 rows)

Thin Client

-keyboard, mouse, monitor, and a small box that enables authentication to the terminal server -cheaper, a lot less electricity than fat-client networks

Virus Prevention

-know the source of any software before you download it -run antivirus shields and swords -keep those programs' definition files up to date -pay to update the actual programs (engines) periodically

ping -l

-l is the switch that allows you to identify the # of bytes per ping

Heating and Cooling Office Space: Telecommuting

-laptops -remote login -reduces emissions, heating, cooling, lighting, etc

Switch

-learns the network address of every machine connected to it -reads the recipient address on the frames, sending them along only the appropriate connection -full-duplex -operates at layer 2 (data link), so it can understand Mac addresses

Internet Service Provider

-leases connections to the Internet from one of the backbone networks and, in turn, rents a portion of those connections to you

Cleaning Contacts and Connections

-lint-free cloth or paint brush

Products for cleaning hardware

-lint-free cloths -small vacuums -compressed air canisters -various liquid cleaning compounds (citrus-based are environmentally friendly -- greenseal.org to find green ones); specific ones for specific devices -never apply liquid to equipment; apply to cloth

Global Positioning System (WAN Transmission Media)

-listens to at least 3 satellites to calculate location, and a 4th for altitude -satellites it listens to are constantly broadcasting timing information -the delay of time between transmissions from one satellite vs another helps to calc location -GPS units are receive only

Minimizing Risks: Data Loss

-lock computer or logoff when away -run up-to-date security software -backup regularly to a different drive

Physical Controls (Access Control Methods)

-lock doors, secured drawers, etc -logout when leaving PC -Smart cards for verification/access -Fingerprint readers

Tree Network Topology

-logical, not physical -combines Star Topology and Bus Topology characteristics -consists of groups of stars connected to a linear bus backbone cable -allows for expansion of existing network

Infared

-low frequency -short distances -15-ft or less -common in TV remotes

Material Data Safety Sheet

-made by manufacturer of equipment -provide details about potential environmental hazards and proper disposal methods

Minimizing Risks: Loss of Service

-maintain a secondary computer that is data-synced with your primary computer -maintain a bootable external storage device -store data and user profiles centrally, allowing users to work from any networked computer

Integrity (I of CIA Security Triad)

-maintaining the data as it should be, without allowing unauthorized users to modify or delete it. This includes data in transit over a network as well as data stored on hard drives, optical media, tapes, or other media

File server

-makes stored data accessible

Malware

-malicious software -most common types are grayware, spam, viruses, Trojan horses, and worms

Servers

-manage network resources (like printers and email) -provide central storage and services

Green IT: Use of Equipment: Power Management

-manage power settings w/in organization by setting policies and procedures for shut down -shutdown scripts can provide an opportunity for daily data backup: automatically copy specified files from HD to an internal, external, or networked storage each time powers down -computers can be configured to automatically power off in Standby mode after a certain time of no activity

Cleaning Removable Media Devices

-manufacturer recommended kits and solutions, lint-free cloth, compressed air

Full Duplex

-means the device can send and receive at the same time

Half Duplex

-means the device can send and receive but not at the same time

Security Threats (local computer)

-mitigated through user awareness -Backup Media, Screen Visibility, Cookies, Pop-Ups, Accidental Misconfiguration

Satellite Television (WAN Transmission Media)

-modern receivers are small, can receive more channels, and do not need to be moved -again, for rural folks -DirectTV and DISH are big players in US

Router (WAN Device)

-most common and popular WAN device -connect networks to each other -most common use for household is to connect a HAN (SOHO) to a WAN

SCSI Chain

-most mobos don't have an SCSI connector, so a separate SCSI host adapter must be installed -typical internal SCSI devices connect to a 68-pin ribbon cable with multiple connectors (like a PATA cable) -external devices can use 50-, 68-, or 80-pin connectors. (D-shaped) -externally, chain is connecting one device to another in a DAISY CHAIN up to 15 devices -the SCSI ID is a number from 0-15 that is assigned to each device on the chain

Cloud Computing

-moves routine tasks into the hands of specialists instead of people at every individual company -provides services such as data storage, email, and applications (Google apps)

WAN Switch (WAN Device)

-multiport internetworking devices used in carrier networks -operates at Data Link layer (layer 2) -switches are different depending on WAN type

Backup Media Theft or Loss (Security Threats)

-must be kept physically secure -data in them should be encrypted -periodically copying to a new media is necessary to prevent data loss

Latency

-network latency is the amount of time a packet takes to get to its destination and is measured in milliseconds

Monitoring Networks: Monitoring and Managing Tools

-network monitoring software color codes the status of the devices & sends out alert messages -common to manage networks with software on a server or a hardware device that is dedicated to the task of monitoring and managing equipment -usually has a lot of visual displays of the network -gives network admin good look at structure -visual indicators such as yellow or red equip gives good snapshot -notify correct people of alert -software can make calls -more common to page, text, or email network admins

Green IT: Solid State Drives

-no moving parts -quieter -faster -more rugged -smaller and lighter -consume less power and generate less heat

Ring Network Topology

-nodes connected along a single wire with no endpoints -a PHYSICAL ring has no technical advantage in LANs, so rarely used there; however, logical rings with star physical layouts (Token ring and Fiber Distributed Data Interface) are both used in LANs -used in WAN environments where a fiber cable ring around a city provides a connection for telephone companies to service voice and data networks

Inkjet Printer

-non-impact -processes an entire page before printing (page printer) -common problem is for ink inside jets to dry when not in use (park position prevents this) -low cost, so usually most effective to replace rather than repair

802.11a

-not backward compatible -came out after 802.11b -operates in 5 GHz range -less prone to interference because that range is less popular -great throughput of 54 Mbps speeds -range suffers, topping out at 150 feet -not widely adopted until after g came out -24 usable channels = great for high-density environment with many devices

Bluetooth

-not meant to compete with wireless -not designed to be full-functioning networking solution -3 Classes with different power usage and distance --1 100 mW, 100 m --2 2.5 mW, 10 m --3 1 mW, 1 m

File Compression Tools (Maintaining Software)

-not recommended if disk space is not an issue -saves significant disk space

Clients

-often a computer running Windows, Mac, or Linux -also, game consoles, tables, smartphones, DVRs, etc

Small Computer System Interface

-older than USB, FireWire, and eSATA and has fallen out of favor, but the newest SCSI is still faster than the best SATA -was used for scanners and printers -various types -SCSI-2: Uses a 50-pin connector instead of a 25-pin connector, and supports multiple devices. It is one of the most commonly used SCSI standards. Data transfer speeds are typically around 5 MBps.

Telecommuting

-one way to green workers

Data Classification and Compliance

-organizing data according to its sensitivity -keeping hardware and software as uniform as possible -compliance means that members of an organization must abide by all of the rules -for a tech; software related is most common, such as what sort of software users can be allowed to install

Cell Processors

-originally made for games -very small share of market but growing -advantage is ability to share computing resources with other cell processors -EX: computer, smartphone, HDV can all share computing resources and increase performances -power supply diff from AMD and Intel CPUs

Presentation Layer of OSI

-performs 3 main functions: -data formatting: converts data to/from standardized formats -data compression/expansion: reduces large amounts of data into smaller file sizes -data encryption/decryption:makes data unreadable w/o the correct key (apps don't understand encryption, so this layer does it) -responsible for presenting information to the application layer in the manner expected -AKA layer 6

Run an Anti-Virus Scan (Resolve Security Breach Step 1)

-personal firewall software -make sure definitions are current

LaserJet Printer

-photoconductive (particles of toner conduct electricity when exposed to light) -some use LED instead of laser -some support duplex -non-impact page printer -capable of 2400x2400 dpi

Patch

-piece of code inserted in an executable program as a temporary fix of a bug aka fixes or hotfixes (a service pack is a bundle of patches and constitutes a major software update)

Traffic Sorting (Port Numbers)

-port numbering tells the computer what type of data is being received so it can be sorted -each type of data is assigned a port number that are mostly standardized for common types of traffic -1,024 common ones, though they actually range from 0-65,535 (16-bit) -some well-known ports are: --80 for HTTP --110 for POP3 email receipt -the IP Address + the port is the "socket" -A field in a TCP or UDP header that identifies the application that either sent (source port) or should receive (destination port) the data inside the data segment.

Power Management: Standby Mode

-power-saving state in which a computer's processing functions are powered down w/just a small amount of power maintaining memory in RAM (NOT saved to HD) -computers can be configured to automatically power off in Standby mode after a certain time of no activity -can come out almost instantly

Use a Surge Protector or UPS (Maintain Hardware)

-prevent voltage spikes -use UPS (Uniterruptable Power Supply), which is a surge protector and battery backup

Browser Config: ActiveX and Java

-programming languages that can be integrated into Web sites to allow interactivity -ActiveX is specific to IE in Windows -Java applet is similar but runs on any system and is not as flexible but more secure -both act as subprograms w/in a program requiring less code to be written -never allow to run from untrusted sites

Script

-programming the computer to perform a specific task -when it runs, for example, the computer will shut down, etc.

Grayware

-programs that intrude into your computing experience but don't actually do any damage to your systems or data -3 basic types --pop-ups, spyware, and adware

Troubleshooting Networks: Advanced

-protocol analyzers capture and analyze data traffic to discover problems with the protocol -cable testers check cable continuity

Advanced Network Troubleshooting: Protocol Analyzers

-protocol problems exist in the data link layer (layer 2) -usually a mistake from manufacturer or software vendor -reads the actual data being passed between 2 devices -can be used on wired or wireless networks -displays the actual protocol, right down to the binary level -analysis is a specialized skill set and not every network admin can do it properly

Router

-provide points of connection between networks -determine the route for the data packet to take from the source network to the destination network -home, or broadband routers, often have Wireless Access Points and Switches built in

Browser Config: Anti-Phishing Features

-provide protection from inadvertently connecting to a malicious phishing site or maliciously downloading software -IE's SmartScreen is one example

Frame Relay switches (WAN Device)

-read DLCI (data link connection identifier) numbers in the Frame Relay header, used to switch the frame through the switch

Maintenance of Equipment: Choosing Cleaning Supplies

-read labels, reduce toxins -greenseal.org - lists products certified as green -householdproducts.nlm.nih.gov for MSDS for cleaning supplies and products

Cleaning Monitors

-refer to manual -vary from IPA (Isopropyl alcohol) to Hexane or Petroleum Benzene to Palmolive -don't press on LCDs - they scratch and crack

Authentication

-refers to verification of a user's identity. 3 factors: -something you know (username/password) -something you have (picture ID, ATM card) -something you are (finger print, retina scan, voice recognition)

Troubleshooting Your System: Common Operational Problems

-related to issues with hardware OR software

Hub

-repeats the frame of data down every network cable attached, hoping one is the correct recipient -half-duplex -simple central connectivity device -operates at layer 1 (physical), so it doesn't understand addressing

Disposal of IT Equipment: Toner Disposal

-replacable cartridges -hazardous -clean toner with an electronics vacuum -never clean with regular vacuum -brush off and wash with cool water -refill/recycle -NO AMMONIA BASED CLEANERS

WAN Devices

-routers -switches -modems -CSU/DSUs

Broadband Router

-routers operate at the network layer of the OSI model (layer 3) and read logical addresses (IP) -home broadband routers do more: --provide DHCP --provide wired and wireless connections --provide firewall functions

Web Servers

-run specialized software to to provide Web sites -Web browsers access them by using HTTP on port 80

Application server

-runs programs across the network

Power Management: Hibernation Mode

-saves everything in memory to hard drive just before power off -when woken, displays all programs and files that were open

Regular Antivirus and Malware Scans (Resolve Security Breach Step 4)

-scan periodically -train users to do so -scan any file opened from an outside source

Monitoring Your System: Event Viewer

-see logged activities, events, warnings, and error messages -review regularly to recognize common, harmless messages and distinguish them from problems -Start>My Computer>Manage>+Event Viewer --4 categories: Application, Internet Explorer, Security, System

Packet-Switching on a WAN

-sends the data packets over any available path -packets are re-assembled into the original message at the end device based on their numbers -more modern than circuit-switched -paths followed by packets are called Virtual Circuits -each packet has a # in the header to tell switches in the cloud to switch the frame -each packet takes a different destination based on availability and speed -Main Advantages --sent over fastest path --paths are available for other transmission whenever there is a lag -Main Disadvantages --packets have to wait for an available path --greater chance of packet loss because of all the different routing Technologies Include: -X.25 -Frame relay -ATM (Asynchronous Transfer Mode) -MPLS (Multiprotocol Label Switching)

ExpressCard

-serial -performs much better than serial -PC Card devices can't work in this socket -54 mm or 34 mm wide -75 mm long, 5 mm thick -connects to hi-speed USB 2.0 or PCIe -USB max throughput of 480 Mbps -PCIe version max throughput 2.5 Gbps -power = 1.5 V or 3.3 V -plug and play, so doesn't require socket or card services; plug and play (own drivers)

RAM - DIMMS and SODIMMS

-small circuit boards with a row of connectors on each side at the bottom and RAM chips on 1 or both sides. DIMMS - Dual In-Line Memory Modules;most common type in desktops; about 4 inches wide SODIMMS - Small Outline Dual In-Line Memory Modules; most common in laptops; about 1/2 the size of DIMMS (OLD RAM was SIMMS - single...)

Hardware Authentication

-smart cards and biometric devices Smart cards -credit-card sized cards with circuitry that can identify the bearer (like a subway/mass transit card) -fairly uncommon in computers Biometric devices -keyboards, key fobs, retinal scanners, or PC cards for laptops can all be biometric devices if they require some sort of physical, flesh-and-blood authentication They can be combined ( ex: key fob with RFID for identifying bearer and fingerprint scanner).

Handheld computing devices

-smart cellular phone -ebook reader -portable digital music player

Infiltration

-social engineering by physically entering the building under the guise of someone else Tailgaiting = infiltrating by following someone through the door

Phishing

-social engineering by trying to get people to reveal their usernames/passwords by pretending to be someone else online

Telephone Scams

-social engineering via the phone

Worm

-software program that can copy itself and infect a computer but does not need a human to install -often exploit security flaws in OSes, so updating security patches is as important as running anti-virus software (IE: patch management)

Domain Name Service servers

-special computers that keep databases of IP addresses and their corresponding names

Consolidating Drives: Terminal Servers

-store and control apps on a network-based server using Thin Clients -AKA Thin Client Computing

Antivirus Programs

-sword and shield -uses a library of signatures to detect viruses -signature=code pattern of a known virus -sometimes legit programs can bear the signature of a virus, so the antivirus program's creator has to provide a patch

Minimizing Risks on Computers

-take steps to reduce the risk of data loss, loss of services, and damage to equipment

Application-Specific Integrated Circuits

-technology on switches that bridges used to perform only much faster (hardware instead of software)

Cellular Telephone Standards (WAN Transmission Media)

-the "G" or "generation" in the name of cellular technology is used to signify significant changes -1G: analog; used into early 2000s -2G: digital, encryption-enabled, intro 1991; increase phone capacity per cell tower; allowed SMS -3G: includes tech for data transfer and streaming services -4G: fully based on TCP/IP; all voice is packetized for transfer as data

World Wide Web

-the addressable set of files, images, and other resources located on the Internet -a standardized language and file system used over the Internet

Users and Groups as Security Measure

-the bedrock of access control -locally, Windows user is limited, power, or admin, and using NTFS with it allows highest level of control over data Networked -Principle of Least Privilege -don't use the default groups; set up your own -reduces work of network admins by allowing them to add people to groups instead of permissions to people -allow you to keep track of your user accounts and make sure people can only access what you want them to

Effective permissions

-the combined permissions an individual user has based on his/her assignment to more than one security group

Fat Client

-the computer that workers use to connect to the network in a traditional client/server network -has all computing power built in -worker can still work locally if network goes down

Authentication

-the first step of properly implemented security -how a computer determines who can or should access it and, once accessed, what that user can do -computers can authenticate through software, hardware, or both

Network Topology

-the geometric arrangement of the physical layout of the computers (and other network devices) in a network -categorized in 2 ways: --Physical: physical connection between nodes (points of connection) EX: Wiring and connection devices --Logical: the way communication takes place between nodes EX: path data will take; the way the wires are laid out is not necessarily the way the data flows

Incidence Reporting

-the human factor: telling your supervisor what you found

Patch Panel

-the non-technical connection point of a wire from a node on a LAN star ethernet network -used to connect to the hub or switch

Domain Name

-the part of the url that represents a recognizable name for humans to remember (i.e. www.totalsem.com); Domain Name Service servers match these names to IP addresses -they must be registered and kept with a fee

Internetworking

-the practice of connecting a computer network with other networks through the use of gateways that provide a common method of routing information between networks -the result is an internetwork, or internet

Social Engineering

-the process of using or manipulating people inside the networking environment to gain access to that network from the outside -humans using other humans to gain unauthorized information, such as a password, login, credit card #, etc

Auditing

-the security tab of Event Viewer -pretty much already configured in Win 7, but not in XP -must be set up to do event auditing (when someone tries to login) and object access auditing (when someone tries to open a file)

802.11b

-throughput of up to 11 Mbps (actual speeds of 4-6 Mbps) -comparable to 10BaseT speed -max range 300 ft -uses very popular, crowded 2.4 GHz frequency -only 3 channels

Browser Config: Plug-ins

-tiny pieces of software that add functionality to a browser -often able A/V content -be careful! only install well-known, reputable plugins like Adobe Flash or Microsoft Silverlight -millions available, many for free

Coding

-to provide redundancy in digital communication -increases reliability -message takes up more space, so less actual data can be transmitted (but information is repeated, so STOP! becomes STOP! STOP! STOP! STOP!) -systems like WiFi employ multiple coding schemes: --simple w/less redundancy when signal is good --complex w/more redundancy when signal is bad

802.11g

-transfer speed of a (54 Mbps) with range of b (300 ft) -backward-compatible with b -only 3 usable channels (bad for high-density areas)

Encryption

-transforming plaintext (raw data) using an algorithm called a cipher into an unreadable format to all except those who possess the key. Used in 2 ways: -make data on storage devices unreadable -scramble data while in electronic transit

Trojan Horse

-true, free-standing programs -does something other than what the user thinks it does (virus masquerading as anti-virus program) -Ex: once installed, allows an unauthorized user to access computer by unlocking firewall and remote access tools

Satellite Internet (WAN Transmission Media)

-two-way satellite communication allows Internet access from almost anywhere in North America -heavy cloud cover or rain can obstruct the signal -meant to serve rural and remote areas -used to be upstream via phone and downstream via satellite -receiver can be fixed or mobile -high latency caused by long distance of travel -last resort for people who can't get Internet any other way

Physical and Logical Bus Network Topology

-unreliable and difficult to troubleshoot; has been replaced -was used in a LAN where multiple computers were connected on a single wire w/exactly 2 endpoints -endpoints had to have TERMINATORS, which are devices that absorbed the extra electrical energy of a message at the end point so it could not echo and flood the wire -if a single computer's wire became unplugged, it created an unterminated endpoint, causing the echo effect, and no one's computer could communicate -easy to know problem; hard to locate; caused frequent outages

Spam

-unsolicited email -huge % of Internet traffic -set up filters or filtering software -don't post email address publicly

Keep Applications and OS systems up to (Resolve Security Breach Step 5)

-updated with latest updates and patches -most software updates are about security

Infrastructure Wireless Network Mode

-use one or more WAps to connect the wireless nodes to a wired network segment

Monitoring Your System

-use tools such as the Task Manager and Event Viewer provided in Windows -learn to recognize and diagnose problems

Spanning Tree

-used in an environment when 2 switches are connected -rather than having only one connection between the switches (where a failure of that connection means an entire segment of the network goes down), you have multiple connections between them, but that can cause loops -the spanning tree avoids loops by ensuring that only one link is used at a time; provides redundancy if another switch goes down -spanning tree decides priority and only allows transmission over one link at a time -if one link goes down, it switches to the other -gives a level of reliability between switches

Modem (WAN Device)

-used to connect a digital output device (like a computer) to an analog transmission line (like dial-up)

Troubleshooting Networks: with Ping

-used to test connectivity -sends a simple packet to a destination by IP address (network layer; layer 3) -called an echo request, and the device on the other end responds with an echo reply -if you get a reply, that means the connection to the device is working -if you get "Request Timed Out," it means there is something wrong PING TESTS OSI LAYERS 1-3. Single greatest troubleshooting tool in networking

Client/Server Network Architecture

-user computers are connected to central computer(s) that is used for data storage, resource security, and backup -the data SHOULD be stored on the server so the failure of any 1 user's computer will not result in the loss of any data accessed by others (in reality, people still save locally) -uses CENTRALIZED authentication to access resources

802.11n

-uses MIMO -up to 4 antennae -officially 600 Mbps but much less in reality -standard is to run on 2.4 GHz BUT with a dual band WAP, can run at 2.4 and 5 GHz, so it is backward compatible with devices built for all previous standards -a bit more expensive

Monitoring Networks: Baselining

-uses monitoring and reporting software to record network utilization and traffic patters during smooth operation -allows you to set alerts in the software -establishes what network performance should look like

Solid State Drive

-uses the same chips as memory cards (many stacked inside a hard drive enclosure) -uses same connectors as traditional drives (usually SATA)

x86

-usually implies a program compatible with the 32-bit instruction set (codebook) of Intel's series of CPUs that ended in -86. (Intel 8086, 80386, etc) -This is why Program Files x86 folder in Win7 64-bit houses the 32-bit programs

Unauthorized Access

-when a person accesses resources without permission -resources = data, applications, and hardware -not always malicious -can be gained through intrusion (trying passwords or Dumpster Diving)

Shoulder Surfing

-when people spy on you from behind, watching what you type

Transport Layer of OSI

-where raw data from upper layers gets split into manageable pieces -every layer has a different name for these pieces; at transport layer, they are called "segments" -checks that data was delivered properly and not damaged or lost -separates data by types: email, IM, Internet downloads -AKA layer 4

Network Layer of OSI

-where real addressing occurs -"segments" of data are called "packets" -packet is appended with an address ("logical address") -performs error-checking but can only reject, not ask for resend or indicate that it didn't receive the packet like transport layer would -provides info for QoS (prioritization of traffic) -AKA layer 3

Administrative Access

-you have full control over just about every aspect of the computer

Top-level Domains

.com, .edu, .net, .gov, .biz, etc.

Bluetooth Class ___ uses 100 mW of power and has a maximum distance of 100 meters.

1

A PCI-X port's max speed is _____.

1 GBps (1000 MBps)

Universal Symbols of On and Off

1 and 0

Bits & Possible Combinations

1 bit --> 0 or 1 2 bits --> 00, 11, 01, 10 3 bits --> 000,001,010,100,011,101,110,111 4 bits --> 0000, 0001, 0010, 0100, 0011, 0110, 0101, 0111, 1000, 1001, 1010, 1100, 1011, 1110, 1101, 1111 1 bit = 2^1, so 2 combos 2 bits = 2^2, so 4 combos 3 bits = 2^3, so 8 combos 4 bits = 2^4, so 16 combos 8 bits = 2^8, so 256 combos (0-255)

5 Main Parts of Processing

1. Hard Drive - stores data but is too slow to interact w/CPU directly 2. CPU - "the brain", handles the majority of processing tasks 3. RAM - CPU must load the OS onto it (as well as any other software stored on the HD that it needs to use) 4. OS - series of programs and code that create an interface for the user to interact w/the computer 5. Application - enables user to complete a specialized task

5 Basic Computer Hardware Components

1. Input devices (keyboard, microphone, mouse) 2. Output devices (monitor, printer, speaker) 3. Processing devices (CPU) 4. Storage Devices (Hard Drive) 5. Communication pathways connecting all other components (motherboard, buses)

4 ways of getting beyond 4 GHz CPUs

1. Move from 32-bit to 64-bit computing 2. Add multiple cores to a single CPU 3. Refine how CPUs work w/programs 4. Use RAM specialized to optimize CPU operation (cache)

3 advantages of HDD over SSD

1. Price (2TB HDD <$100; 1TB SSD >$3000) 2. Capacity 3. Electronic Longevity (SSDs get worn out after many overwrites)

Steps of Recognizing and Resolving Security Breaches

1. Run an anti-virus scan 2. Quarantine the virus when possible 3. Escalate to an IT professional when needed 4. Conduct regular antivirus and malware scans 5. Keep applications and operating systems up to date

2 Key Points about RAM

1. You can't mix stick types or technologies. (DDR2 has different connector notches from DDR3.) They only fit the motherboard designed for that technology. (Mobos are designed for DDR2 or DDR3 - read manual.) 2. You can always install RAM that is "too fast" for the Mobo, but you can NEVER install RAM that is too slow. PC will read dead.

Pinging Strategy

1. start with the nearest device on the network and work your way out 2. to troubleshoot connectivity problems, first test the connectivity on devices closest to your computer; Ping a device on your network 3. If that comes back good, ping the router (default gateway) 4. If that is functioning, ping other devices until you find an unresponsive device (hard for user to know all the IPs needed)

USB pin counts

1.1 and 2.0 A and B - 4; the rest of 1.1 and 2.0 have 5; 3.0 uses 9 or 11 pins (to provide extra power)

4 advantages of SSD over HDD

1.Speed 2. Physical Durability 3. Energy Use 4. Storage Efficiency (no need to defrag-disable)

MOBO form factor: MicroBTX

10.4x10.5 inches; fewer expansion slots

MOBO form factor: PicoBTX

10.5x8 inches; only 1 or 2 expansion slots

When referring to resolution, the term XVGA represents ______.

1024x768

What speed of DDR3 RAM does a 133 MHz motherboard need?

1066 MHz

Modern Ethernet Networks

10baseT (10 Mbps) 100baseT (100 Mbps) - CAT 5 cables 1000baseT (1000 Mbps (1 Gbps)) - CAT 6 cables

MOBO form factor: Mini-ATX

11.2x8.2 inches; same power and mounting holes as ATX

POP3 is port # ____.

110

USB transfers data at speeds of 1.5 bytes or ___ bits per second.

12

Power Conversion by the PSU: 3.3., 5.0, 12.0V

12.0V current to power motors on devices such as hard drives and optical drives; 5.0V and 3.3V current for support of onboard electronics

A IPv6 address is ____-bit

128

A Windows 7 video card needs at least ____ of RAM to run the interface properly.

128 MB

MOBO form factor: AT

12x13.8 inches; an original; CMOS appeared

A PCI port's max speed is _____.

133 MBps

6-pin, 400 Mbps FireWire is called _____.

1394a

9-pin, 800 Mbps FireWire is called _____.

1394b

MOBO form factor: Baby AT

13x9 inches; was very popular

IMAP4 is port # ____.

143

SATA Power

15-pin; L-shaped; can also use a 6-pin slimline connector with a 9-pin micro connector

eSATA runs at either ____ or ____ MBps, making it faster than USB or FireWire

150, 300 (1.5 Gbps, 3 Gbps)

Max # of bytes in an Ethernet frame

1500

64-bit CPU can support ___ amt of RAM

16 exabytes

SNMP Port

161

SNMP is port # ____.

161, 162

SDRAM DIMM form factors

168-pin most common; Laptops had 68-pin, 144-pin, or 172-pin micro-DIMMs or 72-pin, 144-pin, or 200-pin SO-DIMMs

DVI

18-, 22- or 24-pin; DVI-A (analog); DVI-D (digital-only); DVI-I (integrated)

DDR SDRAM DIMM form factors

184-pin DIMMs; 200-pin SO-DIMMs; 172-pin micro-DIMMs

Master Boot Record

1st bit of code on an MBR-formatted disk; contains the partition table

Bluetooth Class ___ uses 2.5 mW of power and has a maximum distance of 10 meters.

2

WAN Communication

2 Basic Methods: Circuit-Switched and Packet-Switched -WANs commonly use point-to-point topology

Mesh Network Topology

2 Kinds: True and Hybrid True -all nodes are connected to every other node -expensive, so rarely done Hybrid -some nodes are connected to every other node, but not all nodes are connected together -redundant connections do exist but not all nodes are required to connect to every other node

Monitoring and Troubleshooting Networks

2 approaches: Proactive (monitoring) and Reactive (responding)

Access Control Methods

2 categories: Physical and Software -physical should always be first layer of control

CPUs

2 major manufacturers: Advanced Micro Devices (AMD) and Intel own most of market -CPUs plug into mobos & are brand specific, so mobos are designed to work with either AMD or Intel (or other) CPUs. -CPUs worth is based on speed (Intel) and efficiency (AMD) -manufacturers are trying to optimize: speed, sophistication, and electricity usage/heat output (greenness) -CPU speed = how many calculations/cycles it can do @ once under perfect conditions. -Today, CPU speed is measured in GHz (billions of cycles per second)

CPU Operational Characteristic: Multicore Processing

2+ CPUs (or cores) on a single chip with 2+ execution units (sets of pipelines) but shared caches and RAM

Mac Addressing is part of layer ____.

2, the data link layer

An AGP 8x card can move data at _____

2.1 GBps (2048 MBps)

If a motherboard runs at a bus speed of 100 MHz, and the CPU has a 25x multiplier, at what speed does the CPU run?

2.5 GHz (or 2500 MHz)

FTP is port # ____.

20, 21

P1 Power Connector

20- or 24-pin MOBO power connector

Power Supply: ATX 12V 1.3

20-pin P1 mobo power + 4-pin P4 mobo power to give more 12V power (now, all power supplies with a P4 connector are ATX12V)

IP Address Class D

224-239; for multicasting

Power Supply: ATX 12V 2.0

24-pin connector; backward compatible w/20-pin; requires 2 12V-rails; requires SATA HD connectors

IP Address Class E

240-255; for experiments

DDR3 SDRAM DIMM form factors

240-pin DIMMS; 204-pin SO-DIMMs

DDR2 SDRAM DIMM form factors

240-pin DIMMs; 200-pin SO-DIMMs

SMTP is port # ____.

25

SCSI connections

25-pin, 50-pin, 68-pin, or 80-pin connectors depending on type; found in server, not client (usu);

A PCIe 1x card can move data at up to ____.

250 MBps

ASCII defines __ # of characters

256 characters are defined by ASCII

An AGP 1x card can move data at ____

266 MBps

The ___ Cellular Telephone Standard allowed SMS, and the ____ CTS is completely based on TCP/IP.

2G, 4G

Bluetooth Class ___ uses 1 mW of power and has a maximum distance of 1 meter.

3

A PCIe 16x card can move data at up to ____.

3.9 GBps (4000 MBps)

DDR3

30% less power than DDR2; 8-bit buffer so grabs 2x as much data every cycle as DDR2; can be over-clocked with extended memory profile; higher density

An IPv4 address is ___-bit.

32

An SSID is ____-bit

32

16-bit PC cards are one type, and the other type, called CardBus are ____.

32-bit

10 Versions of Windows Vista

32-bit: Home Basic, Home Premium, Business, Ultimate, Enterprise; 64-bit: Home Premium, Business, Ultimate; Enterprise

5 Versions of Windows XP

32-bit: Home, Pro, and Media Center; 64-bit: 64-bit Edition, Pro x64 Edition

9 Versions of Windows 7

32-bit: Starter, Home Premium, Pro, Ultimate, Enterprise; 64-bit: Home Premium, Professional, Ultimate, Enterprise

How many pins are on a Floppy Drive's ribbon cable?

34

32-bit CPU can support __ amt of RAM

4 GB

A WEP uses ___-bit encryption.

40

What speed of DDR2 RAM does a 100 MHz motherboard need?

400 MHz

HTTPS is port # ____.

443

A MAC address is ____-bit.

48

Modern scanners can do ___-bit scans.

48

USB 2.0 transfers data at speeds of up to ____ Mbps

480

An ExpressCard that plugs in to USB 2.0 gets a speed of _____; whereas a PCIe ExpressCard gets _____.

480 Mbps, 2.5 Gbps

SuperSpeed USB transfer data at speeds of up to ____.

5 Gbps (500 MBps)

Virus Recovery

5-step process: 1. Recognize - look for strange network traffic 2. Quarantine - cut the computer off from the rest of the network 3. Search and destroy - get to a safe environment like Windows Safe Mode to run anti-virus software - do the most comprehensive scan; check all removable media (also computers of people who received email from the machine) 4. Remediate - fix things the virus harmed; usually means replacing corrupted or destroyed files with backups like the Backup and Restore applet in Windows Control Panel 5. Educate - show the user the problems and how to prevent them (scheduling antivirus runs, etc)

DNS is port # ____.

53

Common HDD speeds

5400, 7200, 10,000, and 15,000 rpm

Ethernet Standards for RJ-45 connectors

568A and 568B -Set by TIA/EIA -each color goes with its "white on" match to make a pair 568A - wires to pins 1-8 -WG -G -WO -BL -WBL -O -WBR -BR -pins 1, 2, 3, and 6 used to transmit data 568B - wires to pins 1-8 -WO -O -WG -BL -WBL -G -WBR -BR -pins 1, 2, 3, and 6 used to transmit data

PCIe Power Connector

6-pin or 8-pin with 2 that come off (some high-end PCIe come with an 8-pin socket)

MOBO form factor: mini-ITX

6.7x6.6 inches; designed in 2001 to consume less power; needs less cooling b/c of this

When referring to resolution, the term VGA represents ______.

640x480

SATA drives connect via a __-pin cable.

7

Open Systems Interconnection Model

7 layers -certain processes performed @ each layer -each layer builds upon another -the top 3 layers can be thought of as "upper" and are controlled by applications -the bottom 4 layers can be thought of as "lower" and are controlled by the network 7 Application 6 Presentation 5 Session 4 Transport 3 Network 2 Data 1 Physical

A strong password should be at least __ characters and contain letters, numbers, and special characters.

8

Ethernet Cabling

8 wires in 4 twisted pairs Pair 1 -blue -white on blue Pair 2 -orange -white on orange Pair 3 -green -white on green Pair 4 -brown -white on brown for MOST Ethernet standards, only these pairs are used for signal transmission: (Pairs 2 and 3) --orange & white on orange --green & white on green

HTTP is port # ____.

80

What is another name for a PATA cable?

80-pin ribbon cable

When referring to resolution, the term SVGA represents ______.

800x600

standard keyboard

84 (XT, AT), 101 (AT E), or 104 (Windows) keys

How many times per motherboard clock cycle does DDR3 RAM transfer data?

8x

MOBO form factor: NLX

8x10 or 9x13.6 inches; designed to replace LPX for better memory and graphics; unpopular and replaced by micro-ATX, FlexATX, and Mini-ITX

DB/D-Shell/D-Sub connectors can have this range of pins/sockets

9-37 pins or sockets, though you rarely see more than 25

MOBO form factor: micro-ATX

9.6x9.6 inches; w/integrated graphics, popular for home entertainment PCs; backward compatible with full size--same chipsets; fewer I/O ports; needs external drives more often

MOBO form factor: LPX

9x11 or 9x13 inches; designed for low profile and slimline cases; uses riser cards; has a Mini-LPX version at 8x9 or 10x11 inches

A byte represents values 0 to 255

A byte is made of 8 bits. Bits (or binary digits) can only be 1 or 0. A byte can be any combo of 8 1s & 0s, from 00000000 to 11111111 or anything in between. When converting to base 10 (decimal), the numbers are: 00000000 = 0 11111111 = 255, or [(2^7x1)+(2^6x1)+(2^5x1)+(2^4x1)+(2^3x1)+(2^2x1)+(2^1x1)+(2^0x1)] 10111010 = 186 01001011 = 75

Program (basic definition)

A series of commands sent to the CPU in a specific order for a CPU to perform work

Green IT

AKA Green Computing -movement toward more environmentally-friendly use of technology -goal is to combine social responsibility with cost-effective use of power and technical resources, minimizing negative effects on environment -refers to considerations for individuals, companies, communities related to manufacture,use, maintenance, and disposal of computer equipment

Escalate (Resolve Security Breach Step 3)

AKA Incidence Reporting -the human factor: telling your supervisor what you found -even if you have eliminated or quarantined the threat, write the report

bus speed

AKA front side bus rate -The specific clock speed (measured in MHz) at which the mobo runs -CPU runs @ some multiple of that speed (clock multiplier) such as 10x or 25x -if the Mobo runs @ 100MHz & CPU has a 25 multiplier, the CPU runs @ 2500 MHz (2.5 GHz)

AM/FM

AM = Amplitude Modulation -changes in the height of the wave FM = Frequency Modulation -changes in the length of the cycle of the wave (over time--how often a cycle occurs)

This brand of CPU has pins; the socket has holes.

AMD

Which CPU company calls the South Bridge the Fusion Hub?

AMD

CPU Socket: F

AMD's version of LGA for Opteron and Athlon 64 FX; older; 1207 pins

CPU Socket: FM1

AMD; Fusion and Athlon II; 905 pins

CPU Socket: AM3+

AMD; aka AM3b; more efficient, less power use; 942 pins

CPU Socket: AM3

AMD; not backward compatible b/c of pin layout; 941 pins

CPU Socket: 940

AMD; primarily for 64-bit servers; Opteron and Athlon 64 FX

CPU Socket: AM2+

AMD; replaces AM2 and is similiar; 940 pins

CPU Socket: AM2

AMD; uses DDR2; Athlon 64, etc; 940 pins

External Bus Form Factors

ATA/IDE/EIDE - 1st industry standard to attach storage peripherals; 80 or 40 wires and 40 pins (80w40p is faster than 40w40p); PATA is one kind SATA - faster, more efficient, 7-pin, female, serial SCSI - (Small Computer System Interface) "scuzzy" - usually servers and not PCs; many different types; some have 50, 68, or 80-pin connectors (or other); supports 7 or 15 drives, depending on the type; SATA will probably replace it

Asynchronous Transfer Mode switches (WAN Device)

ATM -uses numbers called VCIs (virtual circuit identifiers) and VPIs (virtual path identifiers) to switch ATM cells

Touch Screen

ATM, grocery store, restaurant

What is the name for the 24-pin main power connector on the motherboard?

ATX

AGP

Accelerated Graphics Port -old, small, often brown, moves several times per mobo click -AGP 1x up to 266MBps thru AGP 8x up to 2.1GBps -Faster than PCI and PCI-X

Active PFC

Active Power Factor Correction; extra circuitry that smooths out the way the power supply takes power from the power company and eliminates harmonics

______ and ______ are programming languages, one native to IE and the other to any browser. They are dangerous because they can allow they can run malicious code.

ActiveX, Java

hdwwiz.exe

Add Hardware Wizard in Vista/7

Address Bus Patterns to RAM Rows

All 0s (all off) means the CPU wants the 1st row. All 1s (all on) means the CPU wants the last row, and every pattern in between

System Tools: Character Map

All the weird symbols like ¿Øдờ۞€; can be customized

ASCII

American Standard Code for Information Interchange is one of many binary codes that represent the letters on the keyboard.

Multi-Core CPUs

Another way we got beyond 4 GHz CPUs Each core can pickup the slack when the other gets too busy. Multicores can be offered in dual-, quad, hexa, or octa

CPUs handling of programs

Another way we got beyond 4 GHz CPUs This is called the CODEBOOK or INSTRUCTION SET. Programmers write APPs in different computer languages that are translated into code understood by that CPU's Instruction Set Processors work w/incoming commands and data differently. So, 2 diff CPUs might process an image. A beats B. But then B beats A when copying a bunch of files. This is why efficiency is as important as speed. BTW, very $$$ Intel holds both speed and efficiency records just now.

Internet Explorer's Smart Screen is one example of a browser's __________ feature.

Anti-Phishing

OSI Layer 7

Application

The OSI layer that contains the networking application protocol that carries and presents the data is the ____ layer.

Application

Local Area Networks

Arranged in different physical arrangements called Topologies

Software Controls (Access Control Methods)

Authentication -proper passwords (8+ numbers, letters, symbols) Screensavers Parental Controls One-time passwords (new pw every time)

Windows boots when...

BIOS looks for the MBR, which finds the boot code that launches bootmgr.

backup files in Vista

Backup Status and Configuration

backup files in Win7

Backup and Restore

Green IT: Disposal of IT Equipment

Battery Disposal CRT Disposal Toner Disposal Recycle or Reuse

BNC

Bayonet Neill-Concelman; radio equip; aviation electronics; video signals; 50 or 75 ohms

Binary Notation aka Base-2

Binary notation uses zeros (0) & ones (1) to denote two values. Starting from right to left, the first placeholder is __x2^0; the second is __x2^1; the third is __x2^2; the fourth is __x2^3 and so on. Whether a 0 or a 1 is in each place will determine the final math. So, 110101 in base-10 (decimal) is [(1x2^5)+(1x2^4)+(0x2^3)+(1x2^2)+(0x2^1)+(1x2^0) --> 32+16+0+4+-+1 = 53

Program Files

C:\Program Files - where all the programs/apps store their files Windows Vista and 7 64-bit have 2 versions: C:\Program Files = 64-bit programs C:\Program Files (x86) = 32-bit programs

Troubleshooting: Read/Write Failure

CHKDSK to attempt to recover data; use Device Manager to look for indications of drive failur

What are the minimum requirements for Windows Vista 64-bit?

CPU: 1 GHz x64 RAM: 1 GB HD: 15 GB

What are the minimum requirements for Windows 7 64-bit?

CPU: 1 GHz x64 RAM: 2 GB HD: 20 GB

What are the minimum requirements for Windows 7 32-bit?

CPU: 1 GHz x86 RAM: 1 GB HD: 16 GB

What are the minimum requirements for Windows XP (32-bit)?

CPU: 233 MHz RAM: 64 MB HD: 1.5

What are the minimum requirements for Windows Vista 32-bit?

CPU: 800MHz x86 RAM: 512 MB HD: 15 GB

Lead, Phosphorous, and Mercury are all found in which computer component?

CRT (Monitor)

Carrier Sense Multiple Access

CSMA -most common form of data coordination on a network -Carrier Sense: "listening" to the medium to see if it is busy or okay to transmit -Multiple Access: taking turns on the shared medium (one at a time can talk)

Carrier Sense Multiple Access with Collision Avoidance

CSMA/CA -PROACTIVE -Available on 802.3 (Ethernet) and 802.11 (Wireless) -came about because some devices (wireless ones) cannot listen and transmit at the same time -uses randomization to decide when to transmit, so the time lost in counting down (microseconds) makes CA slower than CD

Carrier Sense Multiple Access with Collision Detection

CSMA/CD A network's access method specified for use by IEEE 802.3 networks. Each node waits its turn before transmitting data to avoid interfering with other nodes' transmissions. If a node's NIC determines that its data has been involved in a collision, it immediately stops transmitting. Next, in a process called jamming, the NIC issues a special 32-bit sequence that indicates to the rest of the network nodes that its previous transmission was faulty and that those data frames are invalid. After waiting, the NIC determines if the line is again available; if available, the NIC retransmits the data -REACTIVE -only available on 802.3 (Ethernet); wireless cannot detect a collision -uses randomization after a collision occurs to decide when to resend -faster than CA because countdown only occurs if there is a collision

Channel Service Unit/Data Service Unit (WAN Device)

CSU/DSU -device used to connect a LAN-based device like a router to the Public Switched Telephone Network (PSTN)'s Time-division Multiplexing (TDM-based) digital system. -the LAN uses 2-voltage-state signalling, but the PTSN uses a TDM based on alternate mark inversion, which is a different signal system. -So, the DSU translates the signaling scheme and the CSU filters the voltage spikes -Operates at the PHY layer (layer 1)

Dual Band

Capability of 802.11n devices to run on both 2.4 and 5 GHz frequencies

Multi-Card Readers

Card reader that is attached to a computer and can read many form factors of solid state memory -USB 2.0 for desktops; often built-in to laptops -EX: can read camera SD cards, Sony voice recorder Memory Stick, etc

CAT5 STP

Category 5 Shielded Twisted Pair -must be used if electromagnetic interference from light ballasts, radios, appliances, motors, etc are a problem -protective metal sheath around the 4 enclosed pairs, as with a coax cable -highly immune to EMI

CAT5 UTP

Category 5 Unshielded Twisted Pair -copper core can be stranded or solid -stranded is usually for outside the wall where fragile solid could break after much bending -solid core is for permanently installed wiring -TIA/EIA standards should be used for running UTP in buildings -Fire codes require plenum grade, Teflon-coated

CRT

Cathode Ray Tube -high pwr consumption (about 30,000 volts still in hours after being powered down) -contains lead, mercury, and phosphorus -DO NOT OPEN; DO RECYCLE -very high resolution -relatively cheap -VGA port -considered legacy

What is the name of the CPU, developed by IBM and others, in the XBOX 360?

Cell

Which CPU has the advantage of being able to be share resources with other computers?

Cell

Steps of the Laser Printing Process

Cleaning; Erasing; Charging/conditioning; Writing; Developing; Transferring; Fusing

Green IT: Use of Equipment: Consolidating Drives

Cloud Computing Terminal Servers Virtualization Network Attached Storage

Web-delivered services are a form of _______ and Google Drive is a type of Web-delivered service called SaaS, or _____.

Cloud-computing, Software as a Service

Types of Software Licenses

Commercial - usu 1 computer (multi-user and site available), read fine print, some allow install on a 2nd machine if uninstalled on 1st, some don't Shareware - trail/eval period, expiry, multiple computers ok, usually limited features w/o upgrading/paying Freeware - usu. under GNU Public License (GPL), multi-installs ok, can modify but must share and cannot profit from modifications

Optical Disc Technologies

Compact Disc (CD) Digital Versatile Disc (DVD) Blu-Ray Disc (BD) -Each format has read only, writable, and rewritable formats, but not all named the same -CD-ROM = read only -Multi-Drive = DVD+-R -BD-ROM = read only -BD-R = write 1x -BD-RE = write multiple CD = 700 MB DVD Single Layer = 4.7 GB DVD Dual Layer = 8.5 GB BD Single Layer = 25 GB BD Dual Layer = 50 GB Double-sided Dual Layer DVD (rare) = 17 GB Connected by PATA + molex power or SATA + SATA Power

Compatibility Tools: Windows 7

Compatibility Center

Which tool allows programmers to share objects between apps and computers?

Component Services

Power supplies wsill not start if they are not ____.

Connected to a MOBO

Backside Bus

Connects the CPU to the L2 (external) cache

Permissions for moving and copying files/folders

Copy inherits the permissions of the destination wherever the copy is made-ALWAYS; Move only inherits the permissions of the destination if on a different partition or drive, if on the same partition, it retains its original permissions

6 Basic Types of Connections in the Back of the PC

Cover most of the 50+ different connectors you might see: DIN (Deutsche Industry Norm) or Mini-DIN aka PS/2 aka DIN-6; USB; Firewire/IEEE1394; DB (D-shell, D-sub, D-subminiature)- includes parallel, serial, VGA, etc; RJ-; Audio (3.5mm)

A connnection with fifteen pins in 2 rows that control a joystick is call a _____ connection.

DB-15

VGA

DB-15; pins 4, 11, 12, 15 receive from display; pins 1, 2, 3, 13, and 14 send to display

Dynamic Host Configuration Protocol

DHCP -creates a pool of addresses that are given temporarily -network equipment and servers should never acquire addresses by DHCP. The server/network admins should assign them static IPs

A monitor connection with up to 29 pins is known as a ____.

DVI

3 Types of DVI connectors

DVI-D (digital); DVI-A (analog); DVI-I (both digital and analog)

A LAN bridge works in the ____ OSI Layer.

Data Link

OSI Layer 2

Data Link

The switch works in the _____ OSI Layer.

Data Link

The only OSI Model Layer with Sublayers is the _____

Data Link Layer, or Layer 2

Measurements: Data Speed vs. Data Storage

Data Transfer Speed is measured in bits (b) per second, whether bps, kbps, mbps, gbps, etc. The b is bits. Data Storage is measured in Bytes (B). (Remember: a Byte is 8 times the size of a bit.)KB, MB, GB, TB, etc 256 Megabytes = 256 MB 256 Megabits = 256 Mb

What computer maintenance tool is found by going to My Computer or Computer, right-clicking the drive, going to Properties, and choosing the General tab?

Disk Cleanup

Which maintenance tool is run automatically in Windows Vista/7?

Disk Defragmenter

diskmgmt.msc aka fdisk

Disk Management - primary tool for partitioning and formatting drives after installation; CTRL Panel>Computer Management> OR Start>Run>diskmgmt.msc (XP) | Start>dskmgmt (Win7);

PC Hardware: Ventilation, Dust, and Moisture Control

Dust -open towers and use compressed air to blow out dust, focusing on CPU heatsink and fans -dust is an insulator -clean ventilation openings and power supply fans Moisture -humidity should be 40-60% -not good for laptops to go from A/C to a hot summer day -use 2 cases to help prevent and let it sit between transitions to allow moisture to evaporate

File Systems in Windows

Each file system has a different effect on HD capacity FAT16 allowed HD partitioning up to 2 GB (because it could only look as deep as 2 GB worth of code--remember binary); compatible with many OSes; no security FAT32 is more efficient than FAT16. Incompatible w/many non-Windows OSes; partitioning up to 2TB; no security NTFS (New Technology File System) security = has file compression, encryption (using Encyrpting File System - EFS), and file/folder permissions; up to 16TB

ECC RAM

Error Correction Code RAM is typically used in bank servers; suffers slowness from error checking; has an extra byte (8 bits) for error checking; requires a special MCC and, therefore, special MOBO

1000BaseT

Ethernet network speed of 1000Mbps (aka Gigabit Ethernet); starbus and UTP CAT 5e or greater cables

100BaseT

Ethernet network speed of 100Mbps; starbus and UTP CAT 5 cables

802.3

Ethernet standard that determines the type of wiring (such as twisted pairs) and connecting devices (such as hubs and switches) used in a LAN -set by IEEE after development by DIX -physical star topology -logical bus topology -CSMA/CD collision handling

Green IT: RoHS Directive

European Union's Restriction of Hazardous Substances Directive -took effect in 2006 -restricts the use of hazardous materials in the manufacture of electronic and electrical equipment, specifically restricts: Mnemonic: Lonely Moms Control Horribly-Crazy People-Because Parents-Dictate-Everything -Lead -Mercury -Cadmium -Hexavalent chromium -Polybrominated biphenyls -Polybrominated diphenyl ether -other regions are starting to follow

Auditing via a Security Log can be set up in _______ in Windows.

Event Viewer

Virtualization

Every OS has strengths & weaknesses, so many companies use different OSes for different things -Virtualization partitions the resources on one physical machine and makes each OS think that it is on a physical machine by itself -reduces hardware, electricity, and maintenance costs. -service separation -can divide multi-core CPU and give each OS a core -downside: single point of failure for multiple services

IP Address Classes

Ex of A: 10.0.0.0; Ex of B: 172.16.0.0; Ex of C: 192.168.0.0

Multimedia Device Installation Considerations

Expansion card slots; device drivers; cables and connectors; camera direct vs card reader

The serial version of the PC card is called the ______.

ExpressCard

EDB

External Data Bus - communication between the inside of the CPU and everything outside of it; contains the clock wire (CLK) through which voltage tells the CPU data is waiting; each charge is called a clock cycle; one part of the Frontside Bus

eSATA

External Serial Adv Tech Attach -connector is called a bus -cable can be up to 6ft -hot-swappable -runs as fast as internal SATA -- either 150 or 300 MBps -great for ext hard & optical drives like Blu-Ray drives

File Allocation Table

FAT -oldest format of the 3 Windows file formats

File Transfer Protocol

FTP -ports 20 (for data exchange; command, NOT the actual download), 21 is "listening" port -used to share files -must use an FTP client software to access an FTP site (ftp://ftp.example.com) -usernames and pws are not encoded (security risk) SFTP does exist, though

Heatsink

Fans draw in cool air and expel warm air, but they also move air across the heatsinks of components -A heatsink is a piece of hardware designed to efficiently transfer heat from a heated component to air or water to keep the component cool

4 Basic Stages of Processing w/in CPU

Fetch (get data from EDB); Decode (figure out what needs to be done); Execute (do it); Write (send data back to EDB); now some CPUs have up to 20 stages (some involving cache), but these are the 4 all have

FAT stands for _____.

File Allocation Table

Solid State Storage

Flash memory devices are solid state products, while hard drives are not. -uses electric charges to perform the same functions -seen as more durable than hard drives. -often used in portable products such as cameras -has a lifetime because as you write to each cell over and over again, it eventually loses its charge -NOT good for archival purposes

FDD connection

Floppy Disk Drives have 2 connections via 34-pin flat ribbon cable (parallel) for data and power

F6

Fn button to install mass storage device drivers during XP installation

NTFS vs Sharing

Folder permissions (sharing) only applies on the local machine. NTFS applies whether accessed locally or over the network; defaults to most restrictive when both applied (so, if I login to this computer and NTFS allows write but Sharing allows read

Disk Management Statuses

Foreign drive - a dynamic disk moved from another computer (right click-Import Foreign Disks); Formatting; Failed - damaged or corrupt; Online - healthy and communicating; Offiline - corrupted or not communicating

3 Types of partitioning supported by Windows

GUID partition table (GPT); Master Boot Record (MBR); Dynamic Disk (proprietary to Windows)

Aspects of Connectors

Gender - male or female Shape Size Function Communication Type (Serial or Parallel)

GUID Partition Table

Globally Unique Identifier Partition Table - newer, less limited than MBR; unlimited primary partitions (Windows only lets 128); no size limit (well, zettabyte); doesn't have to trick the BIOS; can be bootable on Vista and 7 64-bit if using UEFI instead of BIOS

CPU Operational Characteristic: Integrated GPU

Graphics Processing Unit is integrated within the die of the CPU so you don't need a dedicated graphics card; reduces NRG use, size, cost

Color coding system for encrypted and compressed files in Windows

Green - encrypted by EFS; Blue-compressed; Black- regular; Red-files only Windows can access

A monitor connection that supports both video as well as 8-channel audio is known as an ______.

HDMI

Digital cameras plug into Hi-Speed USB, FireWire, or ____ ports.

HDMI

Hypertext Transfer Protocol over Secure Sockets Layer

HTTPS -Port 443 -secure web browsing

Power Supply: ATX

Had mobo power connector and soft power (set in CMOS - means power button doesn't actually shut down; prevents losing data)

USB 2.0 is also called ____ USB.

Hi-Speed

Most important factor in a fast computer

High RAM capacity

HDCP

High-bandwidth Digital Content Protection - stop piracy; monitor and every part of the connection btwn the video card and the monitor must support it (HDMI and DVI do; VGA does not)

Media Center is on which Vista versions?

Home Premium and Ultimate

Central network box that makes all computers share bandwidth

Hub

What is another name for a PATA?

IDE (integrated electronics drive)

Most commonly used with cameras and external drives, this port type comes in 6-pin with a speed of 400 Mbps and 9-pin with a speed of 800 Mbps (also called FireWire).

IEEE 1394

FireWire connection

IEEE 1394 standard; can support up to 63 devices on one port; 400 Mbps 6-pin or 800 Mbps 9-pin connector; FireWire is Apple's name for it b/c they were the primary promoter

Internet Message Access Protocol version 4

IMAP4 -handles incoming mail -more features than POP3: --allows searching on server and choosing which to download --has provisions for low-speed links so only headers are downloaded instead of whole msgs -no encryption, so security has to be provided by ISP -Port 143

Internet Protocol

IP -computers use it to determine packaging and labeling of data -OS uses it to determine how to package, say, an email, and the receiving OS, how to unpack it (rebuild the data into an email) because of IP -used to put a numerical destination and return address (IP addresses) onto the packets -responsible for fast transfer of data w/in the network -does not check for errors -connectionless protocol

IPv6

IPv6 is a new IP protocol with 128-bit addresses (IPv4 was 32-bit) -written in "hexadecimal colon" notation -since each hexadecimal symbol needs 4 binary bits to represent it, the 128 bits become 32 hexadecimal characters -characters are grouped into 8 groups of 4 characters each, separated by a colon. -a typical address EX: 210A:14f2:2BBD:1CE4:0216:3AFF:FE4A:3B29

Industrial, Scientific, and Medical Radio Bands

ISM 2.4 GHz is one; 5.8 GHz (known as 5 GHz) is another

What happens to permissions when you copy from NTFS to FAT32?

If you copy the file this way, such as from an encrypted HD to a FAT32 flash drive, it loses all permissions--a problem for top secret files

System Image Recovery

In Vista, it's called CompletePC Restore

Systems Software

Instructions and data that are used by the computer to manage its resources EX: operating system, device drivers

CPU Operational Characteristic: IMC

Integrated Memory Controller - moves the MCC off a mobo chip and into the CPU die itself; allows faster control of things like the L3 cache; this means the CPU is made for certain types and capacities of RAM, so you must check

This brand of CPU has contact points; the socket has pins.

Intel

Problems with power supplies are always ____.

Intermittent

Proxy Server settings

Internet Options>Connections>LAN settings

IP Address

Internet Protocol Address -used to group devices on a network -IPv4 is: -32-bit (4-byte) binary number w/each byte separated by a period -states of being static or dynamic is what makes it a logical, rather than physical, address -breaks down into the network ID and the host ID, and however many digits are used by the network determines how many are left for hosts. So, if the network (group) ID is 172.16., there are 16 bits available for hosts (computers). so, network 172.16._ _ _._ _ _ can have 65,534 computers on it. (2^16 - 2)--Minus two because the 0 slot of the last byte is reserved for the network and the 255 is reserved for broadcast. -IPv4 and IPv6 on separate cards (4 vs 6 affects network layer only)

Measurement: Internet Connection Speed vs Data Download Speed

Internet connection speed (reported by ISPs) is measured in bits per second (bps). Data download speed is measured in bytes of data being downloaded (kBps) a 512 kbps internet connection may download 64 kBps of data. (Convert bits to bytes--> 512/8=64; 8 bits in a byte)

In what unit might we measure a CPU's L1 Cache?

KB

Binary Prefixes

Kilo --> 2^10 = 1024, not 1000 Mega --> 2^20 = 1024x1024 --> 1,048,576, not 1,000,000 Giga Tera Peta Exa data storage is measured on binary, not decimal

Router has 2 IP addresses; one connects to your ____ and the other to ____.

LAN's switch; next network

LGA vs PGA

Land Grid Array (Intel) vs Pin Grid Array (AMD) types of CPU packages

What are the 6 substances banned by the Restrictions on Hazardous Substances Directive?

Lead, Mercury, Cadmium, Hexavalent Chromium, Polybrominated Biphenyls, Polybrominated Diphenyl Ethers

Windows Interface: Navigation Pane

Left hand folders list in Vista/7 Windows Explorer

LCD

Liquid Crystal Display -small, thin, light -VGA or HDMI -no radiation (greener) -resolution not as good as CRT but improving -offers 16x9 aspect ratio (widescreen)

Two Jobs of NICs

Logical Link Control, Media Access Control

In what unit might we measure a CPU's L2 Cache?

MB

dual-channel architecture

MCC alternates between 2 sticks to increase speed of data retrieval (2 processes/cycle)

Green IT: Maintenance of Equipment

Managing Dust Choosing Cleaning Supplies Repairing Equipment Heating and Cooling Office Space -Telecommuting

Pipelining (CPU)

Means that each of the circuits completing a processing stage (fetch, decode, execute, or write) is doing it simultaneously w/the others instead of 1 at a time. This took a process from 4 clock cycles per to 1 process per clock cycle; allows the ALU and FPU to work at the same time, for example

MCC

Memory Controller Chip - retrieves whatever RAM row the CPU wants and puts it on the EDB, where the CPU can act on it

devmgmt.msc

Microsoft console window known as Device Manager

MS-DOS

Microsoft's first OS; from 1986; command line only

CPU Selection Factors: Compatibility

Mobo - AMD, Intel, or other?; voltage may need to be configured via jumper settings or in CMOS (too high will destroy CPU)

MOBO form factor: ATX

Mobo form factor; power supply has single 20-pin connector; CPU closer to cooling fan on power supply; mobo is accessible; 12x9.6 inches; can't be used in baby AT or LPX cases

AC/DC

Most electronics need DC, but all power companies provide AC b/c AC travels long distances more efficiently

Unix

Most powerful and diverse operating systems in computing history are some variation of Unix -originally developed @ MIT, AT&T, & Bell Labs -runs a significant portion of Internet servers -extremely stable and preferred for companies running real time applications

CPU Operational Characteristic: MMX

Multimedia Extensions is a set of additional instructions (another register), called microcode, to support sound, video, and graphics functions

MIMO

Multiple-In/Multiple Out -enables devices to make multiple simultaneous connections with multiple antennae

POST Criteria: Memory

Must be able to read by the CPU, and the first 64 KB of memboery must be able to hold the POST code

POST Critieria: Input/Output (I/O) bus or I/O controller

Must be accessible, and must be able to communicate with the video subsystem

POST Criteria: CPU

Must exit Reset status mode, and must be able to execute instructions

Simple file sharing (turning off)

My computer (in Explorer)>Tools>Folder Options>View>[scroll down to "Use Simple File Sharing" (uncheck)] to be able to see File Sharing and NTFS on the Security Tab when you right click a folder>Properties

Consolidating Drives: Network Attached Storage

NAS -designed for home and business -dedicated to managing file sharing -contain HDs that consume less power than HDs in a typical file server

Network Attached Storage

NAS -helps green servers by replacing general-purpose servers used as files servers with specialized devices for serving -most are controlled with a highly-customized version of LINUX -the only thing you can do on it is store and retrieve data -most are a box of HDs with a small mobo and electrical and ethernet connections

Legacy Ports

NOT HOT SWAPPABLE Serial aka DB-9 -male, 9 pin, D-shaped, old, now only used for some network devices Parallel aka DB-25 - female, 25-pins, D-shaped, only use today is receipt printers,some laser printers, fuschia

File Encryption

NTFS in Windows has a built-in file-encryption tool called Encrypting File System (EFS)

Network Time Protocol

NTP -synchronizes IP-based devices with master clocks -NTP retrieves and transmits the proper time as indicated by the atomic clocks maintained by the United States military -can be extremely accurate -Port 123

OSI Layer 3

Network

The OSI layer that packages and prioritizes data, appending packets with an IP address, is the _____ layer.

Network

The router works in the ____ OSI Layer.

Network

This OSI layer provides information for Quality of Service.

Network

NAT Box

Network Address Translation

NOS

Network Operating System (Such as Windows 7)

WANs work in the ___, ___, and ___ OSI Layers.

Network, Data Link, Physical

NTFS stands for ____.

New Technology File System

Motherboard - North and South Bridges

North Bridge is a chip used exclusively for data to/from the RAM and CPU (now integrated into the CPU die itself). Also provides access to CPU from South Bridge (other part of the core chip set). South Bridge implements slower capabilities. Soon to be on the CPU as well. Handles all input/output. Called Input/Output Controller Hub by Intel and Fusion Controller Hub by AMD.

Motherboard Buses

Northbridge and Southbridge make up the chipset that controls the flow of information over the buses. Buses include: -Frontside Bus/system bus (FBS) connects CPU to RAM -Backside bus connects CPU to its L-2 cache -Peripheral or external (I/O) buses that connect to external devices such as hard drives, CD/DVD drives, and USB ports NOTE: External means not built into the Mobo, not outside the tower necessarily

Linux

OS developed by Linus Torvalds on the notion of open-source software, that is, the code is freely copied or modified by anyone. -mostly found on servers, not PCs -was very unpopular until it got a GUI -currently the OS for the 2nd fastest computer in the world, the IBM Roadrunner

When to partition

OS installation on a new computer; when adding a drive

Greener CPUs

One of the things, along w/speed and sophistication, that manufacturers of CPUs strive to optimize is greenness. (If you need more elec, you make more heat, which is bad.) 2 ways to improve elec (energy) consumption: -make components smaller -refine the way the CPU processes its codebook (instruction set) More efficient CPUs can have lower clock speeds and use less power while still out-performing.

64-bit computing

One way we got beyond 4 GHz CPUs -32-bit architecture CPUs can handle data up to 32-bits in complexity (i.e. can work with numbers up to about 4 billion) and can handle an OS or App w/= # of lines of code -64-bit doubles the complexity at 33, at 34, and so on. So, when you get to 64, it can handle an App or OS w/18,744,073,709,551,615 lines of code. 64-bit CPUs are MUCH more powerful, even when working with 32-bit OSes or Apps

3 Main Types of UPSes

Online = constantly powered through UPS's battery; Standby = devices connected to UPS receive battery power only when the AC sags below 80-90 V; Line-Interactive handles moderate sags and surges without switching to battery

Optical drives connect via SATA or which other type of connector?

PATA

Motherboard to Hard Drive Connectors

PATA (Parallel Adv Tech Attachment) -each connection can handle up to 2 drives (2 connectors on cable) -must move the shunt if connecting 2 so HD controller can recognize both. (Can be master & slave or cable select and cable select.) -Shunt is on HD side of connection SATA (Serial ATA)-find a free SATA port

A parallel type of expansion card for laptops is called a _____ or PC Card.

PCMCIA card

Post Office Protocol version 3

POP3 -an email protocol within the TCP/IP suite -the POP3 requests and receives mail from an e-mail server -usernames/pws not encrypted, so security risk over an unsecured connection -uses port 110

POST code errors 020-029

POST codes related to the power supply

Which utility provides details on the processor, RAM, hard drive, and network connection?

Performance Monitor

PCIe

Peripheral Component Interconnect Express -current, long, slim, many colors -multiple lanes (ie.many wires) to increase data transfer rate -PCIe 1x up to 2.5 GBps thru PCIe 16x up to 3.9 GBps -Faster than PCI, PCI-X, and AGP

Which snap-in will monitor performance data while you are away?

Perofrmance Logs and Alerts

PDA

Personal Digital Assistant -less processing power -solid state (flash) memory, as opposed to disk-based -WiFi capable -Usually no external ports -Smartphone = PDA & Cellphone

CSU/DSU works in the ____ OSI Layer.

Physical

The hub works in the _____ OSI Layer.

Physical

Point-to-Point Network Topology

Physical -2 nodes connected by one single physical connection -typically doesn't connect computers but can -more commonly connects 2 LANs w/in a WAN -if connecting just 2 computers, use a crossover cable

OSI Layer 1

Physicial

Steps of the Impact Print Process

Pin strike; Ink transfer; Printhead move; Letter quality pass

What are the 3 main types of grayware?

Pop-ups, spyware, adware

Portable Flash Memory Card Formats

Popular Ones: -CompactFlash -Secure Digital (SD), SDHC, SDXC, miniSD, microSD -xD-Picture Card -Memory Stick -formats NOT interchangeable

Green IT: Use of Equipment

Power Management Replacing Drives Consolidating Devices Printing Considerations Voice over IP

PoE

Power over Ethernet; used by advanced WAPs in corporate settings; one cable provides power and ethernet

POST

Power-On Self Test checks your hardware to ensure everything is present and functioning properly

Gaming PC Requirements

Powerful processor; high-end video card and GPU; high quality sound card; high-end cooling w/liquid; MAX RAM; fast Interent connection; real-time video/audio I/O; HDMI output; specialized peripherals like steering wheels or goggles

Steps of the Inkjet Printing Process

Preparation; Ink Dispersion; Ink Deposit; Paper Advance

OSI Layer 6

Presentation

The OSI layer that formats, compresses, and encrypts the data is the ____ layer.

Presentation

Addressing Schemes

Private IP Addresses can be used freely on internal networks; not routable; Public IP Addresses are shared on the Internet - to protect individuals, router uses NAT to broadcast 1 external address and translate to/from internal/private addresses; APIPA - Automatic Private IP Addressing of Windows enables a DHCP client computer to configure itself with a random IP address in range of 169.254.0.1-169.254.255.254 when DHCP is not working/available - not routable

Video

Processed by the GPU or VPU -most computers have a card that holds the processor and some dedicated RAM -others have an integrated video processor right on the motherboard -Two major slot types are AGP (older) and PCIe (current)

Pros and Cons of Networking

Pros -enhanced communication and collaboration -easier sharing of files and resources -increased personal productivity -lower costs because of the sharing -easier management of machines in the network Cons -security risks -cost for servers, cables, and network cards -human cost (server manager)

Which type of memory is volatile?

RAM

Who slows down for whom--the motherboard or the RAM?

RAM (You can install RAM that is too fast but not too slow.)

RAM vs ROM

RAM - RANDOM ACCESS MEMORY -is volatile; lose power, it forgets -stores programs from the HD for the CPU to work w/in the present -comes in many sizes, types, speeds -a mobo can have only 1 size/type but many speeds ROM - READ ONLY MEMORY -stores info about how the computer works -It is not volatile; does not forget w/o power

RAM Technologies and Speeds

RAM has not only capacity (EX: 512MB) but also speed rating, which measures how fast it can transfer data. 4 common types (each 2x faster than one B4): SDR - Single Data Rate; runs @ high clock speed; synced to CPU bus; SDR has 168-pins DDR - Double Data Rate; 2x per clock cycle; (100 MHz Mobo needs @ least 200 MHz DDR RAM);184-pins DDR2 - runs @ 4x per clock cycle; 100 MHz Mobo needs @ least DDR2-400; 240-pins DDR3 - runs @ 8x per clock cycle; 100 MHz Mobo needs @ least DDR3-800; 240-pins

Rambus RAM

RDRAM; handled up to 800 MHz; sticks called RIMMs; introduced dual channel architecture; needed a CRIMM for a blank slot; came for Pentium 4; generally not adopted due to expense; 184-pins

The name for the network port on a NIC is the ____.

RJ-45

Which type of memory stores important information on how the computer works?

ROM

Wireless Device Connection Types

Radio Frequency (RF) receivers must be on same channel as antennae; Bluetooth - max 8 connections at a time - called a piconet connection 4 classes at different ranges and power usage; Infared (IR) - requires a line of presence

RAID

Redundancy Array of Independent Disks -Hard drives are the predominant storage technologies in network environments -Network configurations require performance, integrity, and redundancy, and configuring multiple hard drives in various arrangements can provide those benefits -RAID appears to the OS as a single hard drive (usu) 2 ways to implement: --Hardware solution: All drives controlled thru RAID controller --Software solution: RAID controlled thru OS, which is aware of all drives

Registration, Activation, and DRM

Registration - give personal data, get some tech support Activation - ties your computer to the software; an anti-piracy measure; popularized by Microsoft Digital Rights Management - one way is logging into a website/account to run an app

Coax RG- ratings

Relevant ones are RG-59 and RG-6; both have a 75-ohm resistance

Troubleshooting: Failure to Boot XP

Repair or Restore or Rebuid

RIM OS

Research in Motion (Blackberry)

Compatibility Mode

Right click executable of the program>Properties>Compatibility (see checkbox)

robocopy

Robust File Copy; copy files and folders from one computer to anotehr across a network

Simple Mail Transfer Protocol

SMTP -SENDs email to the server -port 25 -unencrypted content, usernames, and pws; security risk

Secure Mail Transfer Protocol

SMTP -the SMTP server handles outgoing email -same or close to the same name as the POP3 server

Simple Network Management Protocol

SNMP -uses UDP, which is connectionless -allows you to monitor and manage network equipment remotely via programs if the devices themselves are capable -uses traps that notify a management systems if a specific set of circumstances occurs -also used to perform automatic updates to a set of equipment at the same time -before SNMPv3, considered a big security risk -must be properly configured or still a risk -Port 161

Service Set Identifier

SSID -32-bit identifier broadcast by your WAP that is meant to be unique; however, many WAPs ship with the same SSID -once the node has the SSID, the data packets that are broadcast include the SSID in the header; packets without the SSID are dropped

Secure Sockets Layer

SSL -used to create a secure connection to Web sites -HTTP over SSL is HTTPS -ensures authentication and encryption

+/-10%

Safe variance range of PC power supply voltage

Schedule maintenance in XP with ___ and Vista/7 with ___.

Scheduled Tasks, Task Scheduler

Android OS 4 vs iOS 5

See Phoenix Logical book 395-396

S-Video

Separate Video - 2 signals (brightness and color); analog; 480i or 576i resolution

Keyboard and mouse connections and cables

Serial (obsolete); Standard DIN (obsolete); PS/2 (6-pin mini-DIN); USB; Wireless Infrared (IR); Wireless Radio Frequency (RF); Bluetooth

Serial Cables

Serial communication cables transfer data 1 bit at a time.

OSI Layer 5

Session

The OSI layer that establishes, maintains, and continues a conversation between 2 devices is the ____ layer

Session

Tokens work in the ____ OSI Layer.

Session

Troubleshooting Networks

Should follow the layered approach: start with Physical Layer and work your way up -physical layer is 80% of problems -full outage is easier to troubleshoot than intermittent performance

Screen Visibility (Security Threats)

Shoulder surfing -handled by proper placement of monitors, education of users, warning signs, and physical screen covers

Dynamic Disk Volume Types

Simple - like primary; Spanned - use unallocated space on multiple drives to create a single volume-risky; Striped - RAID 0; Mirrored - RAID 1; RAID 5 - needs 3+ disks w/equal space; making a disk dynamic from basic is fine but the reverse erases it

2 kinds of optical fiber

Single Mode -expensive -capable of long distances -higher data transmission rates -used for WAN (wide area network) applications Multimode -capable of high throughput in shorter distance -significantly less expensive -used in vertical floor runs in buildings (and between buildings on a campus)

Display selection criteria to consider

Size; Technical needs; Efficiency; Cost

What are two other terms for a port?

Socket Connector

CPU Socket: LGA 1366

Socket B; Intel; X58

CPU Socket: LGA 1155

Socket H2; Intel; Sandy Bridge and Ivy Bridge

CPU Socket: LGA 1156

Socket H; Intel; Core i3, Core i5, Core i7, Xeon, Celeron, Pentium

CPU Socket: LGA 2011

Socket R; Intel; Sandy Bridge and Ivy Bridge

CPU Socket: LGA 775

Socket T; Intel; Pentium 4, Celeron D, Core 2 Duo, etc

Network Protocol

Software that exists in every OS that creates unique identifiers for every system and a set of communication rules for issues like how to handle data chopped up into multiple packets and how to ensure those packets get from one subnet to another. The most famous is the TCP/IP suite.

How to open Control Panel

Start>Control Panel; My Computer>Control Panel

Windows Interface: Logon Screen

Starting with XP has a Welcome Screen but will be classic logon screen if you are using Pro with a domain login

Troubleshooting: Failure to Boot Vista/7: Using Windows Recovery Environment

Startup Repair (fixes almost everything); System Restore; System Image Recovery (7) or Windows Complete PC Restore (Vista); Windows Memory Diagnostics; Command Prompt

What feature of Ease of Access enables you to set up key combinations that allow the users to press one key to execute multiple keys?

Sticky Keys

IP Address Class A

Subnet Mask: 255.0.0.0; 16,777,214 nodes; network ID is 1st octet only; 1-126

IP Address Class C

Subnet Mask: 255.255.255.0; 254 nodes; network ID is 1st 3 octets; 192-223

IP Address Class B

Subnet Mask: 255:255:0.0; 65,534 nodes; network ID is 1st 2 octets; 128-191; (127 is used for loopback testing)

USB 3.0 is also known as ___ USB.

SuperSpeed

SVGA

SuperVGA aka Ultra VGA (UVGA) -actually refers to a collection of different SVGA standards that eventually superceded even XVGA -when referred to as Resolution Specific, it typically refers to 800x600; however, there are many higher resolutions allowed by it

Windows Interface: Aero Desktop

Supported by all versions of Vista and Win7 except Vista Home Basic and 7 Starter. Has transparency, Flip 3D; must have a video card that supports it

MBR Partitioning

Supports up to 4 primary partitions; partitions can be no bigger than 2.2TB; can have primary or extended partitions but only primary are bootable (can boot an OS); can have 4 primary with a different OS each; active partition loads by default

Central network box that makes each port its own network so call computers run at the network bandwidth

Switch

sfc

System File Checker - scans, detects, and restores important Windows system files, folders, and paths; restore a corrupt Windows environment; uses cached DLLs to replace corrupted or missing files; run with sfc/scannow; can repair errors that chkdsk cannot

msinfo32.exe

System Information tool; collects info about hardware resources, components, and software enviro; troubleshoot and diagnose issues and conflicts

Where do you enable System Restore in Vista/7?

System Properties>System Protection

Where do you increase virtual memory?

System>Advanced

Windows OS Folders: System Folder

SystemRoot; where Windows is installed; command prompt: cd %SystemRoot%

Transmission Control Protocol

TCP -controls the sending and receiving of information -computers use it to make a connection and handle the flow of data between them -connection-oriented protocol -provides error-checking at the destination end to see if data arrived safely and completely; if not, requests resend

Transmission Control Protocol/Internet Protocol Suite

TCP/IP are the core protocols in the suite -suite of commands and controls for networks to use -rules and guidelines (standards) for electrical signals, packaging of information, and so on -common tongue of the computer world -includes many protocols: TCP, IP, UDP, and many more -refers to Data Link Layer (Layer 2)

Which Windows app allows you to see other logged in user accts and to log them off?

Task Manager>Users tab

Where can you find the Process Identifier (PID)?

Task manager; Processes Tab; (not shown by default)

Telnet (Telecommunication Network)

Telecommunication Network -allows admins to remotely connect to network devices (mostly routers and switches to troubleshoot or change configurations) -not a secure protocol and is considered obsolete from a security perspective -Port 23

Windows 9x

Term referring to all of Windows 95, 98, 98 SE, and Me lumped together

P1 or ATX

The 24-pin connector from power supply to Mobo for primary power. Some also use a 4-pin (P4) connector to help run more stably.

Default Gateway

The IP address on the LAN port of your router used to send data to anything outside your network ID

Domain Controller

The Server system that is running Windows Server and on which the administrator has created a domain

What is the UAC consent prompt?

The User Account Control consent prompt is the pop-up seen when someone is trying to perform a sensitive task (like software install) in Windows 7. Admin sees "Are you sure?" or "Continue?"' others see an Admin accts prompt

Hard Disk Drive

The actual disk(s) are called platters. -Platter rotation speed affects data transfer rates. (Solid State hard drives move faster.) -Size of the cache helps overall performance. -Speed measured in rpm (revolutions per min) -Common speeds: 3600, 5400, 7200 (most) -Modern have a small amt of RAM (cache) of 8, 16, or 32 MB to help get data to/from drive

bit aka binary digit

The basic unit of information used in computing

FF-FF-FF-FF-FF-FF

The broadcast address: what a NIC sends out onto the wire when it wants to request the MAC address of a computer it has never sent to before. It uses an IP address or hostname to target.

Which part of a Laser Printer failing could cause ghost images?

The drum failing could cause ghost images in laser printing because it is not holding a charge

Modern Interface

The modern interface benefited from 2 technologies: -the Graphical User Interface (GUI, "gooey") -the mouse

Address Space (CPU Address Space)

The number of combinations of 1s and 0s that can exist on the address bus given its # of wires (20 wires can do 1,048,576 or roughly 1 MB of address space)

chkdsk [drive letter] /r

This command can locate bad sectors on the desk and recover and readable information.

chkdsk [drive letter] /f

This command can repair the file system data; it cannot fix system files -- SFC does that

TV Tuners

To watch TV on a computer, you need: a tuner device, an antenna or cable connection, a tuning application, and a program guide Tuner Hardware: -many expansion card varieties; some plug into PCI or PCIe; PC Card or ExpressCard for Laptops; or High-Speed USB (card comes with a coaxial connection for satellite or cable) -application can be something like Windows Media Center or a 3rd party software -the antenna strength is important. If for stationary computer, consider outdoor antenna

Green IT: Production of IT Equipment

Toxic eWaste (Electronic Waste) -refers to discarded electrical or electronic devices -rapid pace of obsoletion results in growing amt -According to EPA, US discards 2 million tons per year -frequently contain toxic substances

DVI single link vs dual link

Transition Minimized Differential Signaling (TMDS); transmits serial data over high-speed connection; single = 1 cable; dual = 2, so dual can transfer larger images more quickly

OSI Layer 4

Transport

The OSI layer that segments and separates data and does error-checking with the ability to request resend is the ____ layer.

Transport

Which type of malware is not the program it appears to be?

Trojan Horse

USB cable connectors

Type A is the computer end; device end may be Type B, Mini-A, Mini-B, Micro-AB, or Micro-B

Having many standards and speeds, one of the most common connectors for external peripherals is the _____ port.

USB

Mini, A, and B are varieties in the form factor of which socket?

USB 2.0

ExpressCards can connect to a ____ bus or a ______ bus.

USB 2.0, PCIe

USB connection

Universal Serial Bus connection that enables the connection of multiple peripherals (up to 127) to a single port with minimal device configuration (plug-and-play)

Optimizing a Device

Update Drivers (w/signed drivers); Use Device Manager; Performance Options; Hardware Profiles - XP only (could make 2 for laptops; when wireless, do this; when in dock, do this.);

File Systems as Security Measure

Use NTFS, not FAT32

Punch Down Tool

Used to secure UTP connection to a 11-punchdown block in a patch panel

What feature of a standard user account acts a gate keeper to sensitive Windows settings and allows the administrator to know what happens on the computer?

User Account Control (UAC)

What is the advantage of USMT over FSTW?

User State Migration Tool allows much more control over advanced configurations for the new computer than Files and Settings Transfer Wizard.

Common RAID Levels

Usu. have to sacrifice performance/capacity for reliability or vice versa -Level 0 - data split into stripes and spread over all drives. If 1 fails, all data is lost. Good for speed w/o concern for data loss -Level 1 - complete redundancy; 2 drives w/identical data, aka "Disc Mirroring", no speed or capacity advantage; best used for operating system partitioning on servers -Level 5 - more discs = more efficient; uses striping like Level 0 but also: each drive has a fraction (called parity) of the data from the other drives. So, if one fails, the others can rebuild its data; however, if more than one fails, you are out of luck. Increases capacity & speed

A monitor connection with 15-pins in 3 rows is known as a ______.

VGA

Virtual Local Area Network

VLAN -group computers that are not necessarily connected to the same network and make them act as if they were -possible to relocate computers geographically while still maintaining their connections and resources, such as shared folders -segregate a large LAN into smaller networks for each office and department -switches resolve data collisions -multiple logical resources on a single physical resource -members of VLAN 1 cannot "talk" to those on VLANS 2-4 until the data goes through the router, which uses IP addressing to connect the nodes (p 8-9 in GK book)

Virtual Private Network

VPN -a secure connection to a private network, such as your LAN, that travels over public links, such as the Internet -Works by wrapping encrypted local traffic in a piece of data that is understandable by the Internet. -device @ your company, called a concentrator, unwraps and de-encrypts the data and sends it to the LAN

Monitor Connections to Mobo

Video Card = Graphics Processing Unit (GPU) or Video Processing Unit (VPU) chip on Mobo 3 Connections btwn that and Monitor: VGA - Video Graphics Array, oldest, 15-pin DVI - Digital Video Interface, up to 29-pin HDMI - High-Definition Multimedia Interface, audio (8-channel) and video, started on TVs

VGA

Video Graphics Array -standard display interface -max resolution of 480x640

XP Mode

Virtual machine to run XP-based apps; can do it on Win7 Pro or better; is a separate download

Features of Versions of Windows: Vista Enterprise

Vista version for businesses that improves on Vista Business with BitLocker Drive Encryption and support for 2 CPUs; purchased only throuhg Microsoft (not in stores)

Features of Versions of Windows: Vista Home Basic

Vista version that is like XP home

Features of Versions of Windows: Vista Home Premium

Vista version that is like XP media center

Features of Versions of Windows: Vista Business

Vista version that is like XP pro

Features of Versions of Windows: Vista Ultimate

Vista version with game performance and DVD-ripping

BitLocker Drive Encryption full drive encryption is available in which versions of WIndows?

Vista/7 Ultimate and Enterprise

bcdedit.exe

Vista/7 version of boot.ini, which contains instructions for the bootmgr on the OS and how to load it

Windows Interface: C:\Users

Vista/7; XP; subfolders: All Users - settings that apply to everyone (install for? Me or Everyone -- when you pick Everyone, the app settings go here); <User Name> - settings defined user by user (has 4 important subfolders: Desktop, Documents, Downloads; and Start Menu)

Service Pack in Use is found in...

Vista: System window or System Information window; XP: System Properties window

Windows Interface: Windows Sidebar

Vista; can add gadgets like weather, clock, etc; Win7 removed the sidebar area but kept the app sidebar.exe. It just allows gadgets anywhere on the desktop

CPU Operational Characteristic: VRM

Voltage Regulator Module; replacable; used to regulate the voltage fed to the CPU

Wired Equivalent Privacy (Type of Wireless Encryption)

WEP -40-bit encryption used to scramble data packets -many vendors support 104-bit encryption

Wireless Encryption

WEP and WPA (and WPA2)

The wireless configuration utility in Windows Vista/7 is called ______.

WLAN AutoConfig

Wireless Protected Access (Type of Wireless Encryption)

WPA -replaced WEP as a more secure standard -offers user authentication through Extensible Authentication Protocol -uses encryption key integrity-checking

The _____ wireless security protocol uses encrypted usernames and passwords; whereas, ____ does not.

WPA, WEP

Wireless Protected Access 2 (Type of Wireless Encryption)

WPA2 -uses Advanced Encryption Standard (AES) -more secure than WPA

Green IT: WEEE

Waste Electrical and Electronic Equipment -another term for e-Waste

CMOS Fan Options

Where to turn on temperature alarms and adjust fan options

Windows Interface: Libraries

Win7 only; NOT folders but collections of folders; To create more: Windows Explorer>Right Click Libraries>Select New; to add a folder to a Library, right click it and choose "Include in Library" or right click the Library and choose Properties and use "Include a Folder"; to remove, right click the folder and choose "Remove from Library" 4 DEFAULT LIBRARIES: Documents, Music, Pictures, and Videos

Windows Interface: Jump List

Win7 only; shows context menu info about whatever is on your task bar; right-click icon or click and drag up to see

Features of Versions of Windows: Windows 7 Enterprise

Win7 that can only be bought through Microsoft; large business; network searches, app security; data protection w/BitLocker (Pro on steroids)

Features of Versions of Windows: Windows 7 Ultimate

Win7 vers has it all: adv networking, backup, security tools, RDC, etc

Features of Versions of Windows: Windows 7 Home Premium

Win7 vers that is most-widely used; media func and adv network FNs

Features of Versions of Windows: Windows 7 Professional

Win7 vers that supports domains, XP mode, and RDC

Features of Versions of Windows: Windows 7 Starter

Win7 version that is a stripped down edition for netwbooks; focused on Internet Access; the only one not to come in 64-bit

bootrec

WinRE command that repairs the master boot record, boot sector, or BCD store

diskpart

WinRE partitioning tool; diskpart /clean wipes all partitions/volumes on drive

Version of Windows that has USB as an install option

Windows 7 has USB DVD Download Tool

Compatibility Tools: Windows XP

Windows Catalog and HCL (Hardware Compatibility List)

Compatibility Tools: Windows Vista

Windows Logo'd Products List

Backup Status and Configuration

Windows Vista program that has a Complete PC Backup

Which version of Windows does not have a Services tab in Task Manager?

Windows XP does not have a Services tab in Task Manager

ntbackup

Windows XP's Backup Utility; can backup to network, local, tape, and USB, but not Optical discs (not default install in Home)

Windows Interface: %SystemRoot%\System32

Windows's most critical programs live here; 64-bit editions also store in %SystemRoot%\SysWOW64

Printer Drivers: PostScript printer description (PPD)

Windows, Mac, or LPD (Line Printer Daemon); renders print jobs into the PostScript printer language; displays specific information about the printer and its options to the user

The wireless configuration utility in Windows XP is called ______.

Wireless Zero Configuration

Wireless Peripherals

Wireless-wireless mice and keyboards -receiver plugs into USB port, & transmitters on the mouse/keyboard connect @ 2.4MHz -good for 6-ft or less Bluetooth -extends range up to 30 ft -requires a receiver (built-in or USB connect) -can connect multiple devices to 1 receiver to create a PAN (Personal Area Network)

NTBackup

XP Program that backs up individual files and settings

What is the major difference regarding partitions containing boot files and systems files for booting XP vs Vista/7?

XP allows the boot files and system files to reside on different partitions; Vista/7 does not

Features of Versions of Windows: XP

XP version better than 2000 b/c of built-in CD-writer and interface

Features of Versions of Windows: XP Home

XP version that is stripped down XP Pro; no domain, no encryption, only 1 processor, basic home Sharing instead of NTFS (no security tab on properties menu of a file)

Features of Versions of Windows: XP Pro

XP version tuned for the office/business; multiple users on single computers; only version of XP that can connect to a server (domain),NTFS file encryption, multiple physical processors; RDC

Features of Versions of Windows: XP Media Center

XP version with Personal Video Recorder (PVR) withTV Tuner Card allows you to watch and record TVs; geared to organize media like photos and music; otherwise like home

Automated System Recovery (ASR)

XP's last line of defense when restoring; back up boot and system volumes as well as Registry, boot files, and critical system files; has all apps and user data on ONE DRIVE ONLY; cannot be used without a non-bootable ASR floppy that has the restore info; also need XP install disc

How to see hidden files in diff vers of Windows

XP: Windows Explorer>Select C:/ drive>Tools>Folder Options>View>Choose "Show Hidden Files, Folders, and Drives" and uncheck "Hide protected operating system files">Click apply. Vista/7: Windows Explorer>Organize>Folder and search options>View>Choose "Show Hidden Files, Folders, and Drives" and uncheck "Hide protected operating system files">Click apply.

How to show file extensions in diff vers of Windows

XP: Windows Explorer>Tools>Folder Options>View>uncheck "Hide extensions for known file types" Vista/7: Windows Explorer>Organize>Folder and search options>View>same box

Windows Interface: C:\Documents and Settings

XP; subfolders: Default User (hidden)- template; All Users - settings that apply to everyone (install for? Me or Everyone -- when you pick Everyone, the app settings go here); Shared Documents - XP Simple File Sharing folder; <User Name> - settings defined user by user (has 4 folders: Desktop, Documents, Application Data (hidden), and Start Menu

Seteuperr.log

__ is the file that contains info about errors during OS installation

Ethernet

a Network Hardware Protocol adopted by most of the world; beat out Token Ring and others

patch panel

a box with a row of female connector ports in the front and permanent connections in the back

Floating Point Unit (FPU)

a chunk of CPU circuitry that handles complex numbers

Two-State Communication

a computer, or any electronic device, understands 2 states: on/yes/one and no/off/zero. That's it. Morse code is a 2-state communiation (dash or dot). So was 1 (lantern) if by land, 2 if by sea.

mount point

a drive on which you mount another drive as a folder instead of giving it a letter (ex: my photos is too much for your C:/ drive. By another HD and mount a partition as a folder w/in my photos; files put there will be stored on the new drive)

Auto-Negotiation

a feature on many modern NICs and switches that allow older, half-duplex devices to communicate -senses the duplex mode and the speed of the connected devices so that the network can transfer data at the fastest possible rate

Frame Check Sequence (FCS)

a piece (about 4 bytes) at the end of a frame of data that they receiving NIC processes using a cyclic redundancy check to verify that the data arrived in tact

Printer control language (PCL)

a print driver protocol used to render print jobs into PCL and transfer data from the CPU to the printer; standard used by HP; laser, thermal, and dot matrix

Network Technology

a term defining everything necessary to get data from one computer to another: practical application of a topology and other critical standards like frame type, cabling, and connectors

Hosts Files

a text file that contains a list of computer names and tehir associated IP addresses; pre-DNS; practical only on very small and stable networks

toner (network)

a tools used to trace a particular network cable or port; actually 2 devices used together--a tone generator and a tone probe (aka toner probe); generator connects to the cable and sends an electrical signal along the wire at a certain frequency; probe emits a sound when near a cable connected to the tone generator (Fox and Hound is one brand)

Packet filter

a type of firewall that analyzes the contents of the packet and decides whether to forward or drop the packet; can read send and receive info so can allow a known reply to a request from w/in LAN

CPU Operational Characteristic: Throttling

adjusting the CPU speed (down) when the computer is idle or there are hardware problems

msconfig>boot

advanced boot features; all OSes installed; change OSes default or delete an OS; safe boot; adjust CPU cores and memory

PATA connections

aka ATA, IDE, EIDE, UDMA; connect internal HDs, ODs, or Tape drives to the Mobo; 2 sockets provide connetions for up to 2 drives per socket; 40-pin cables with 40 or 80 wires

Windows Stop Error

aka Blue Screen of Death (BSoD); catastrophic failure; look up the stop code online

Dynamic Storage Partitioning

aka Dynamic Disks; creates partitions, but they are called volumes; not limited to 4 per disk; can do RAID; all Windows Pro and above support this

Troubleshooting: Missing Graphical Interface

aka Failure to Load GUI; restore from backup or rebuild from the installation media

Aritmetic Logic Unit (ALU)

aka Integer Unit is a chunk of CPU circuitry that handles integer math (no decimals)

Static RAM

aka SRAM aka CPU Cache; preloads instructions and keeps copies of already run instructions and data in case the CPU needs to work on them again; used b/c CPU runs much faster than system RAM

CPU Operational Characteristic: Hyperthreading (HT)

aka Simultaneous Multi-Threading; Intel feature that makes 1 physical CPU appear as 2 logical CPUs; adds 2 registers beyond the general purpose ones to overlap instruction streams; increases performance by about 30% (isn't double the performance because the systems resources aren't doubled); OS and apps must be designed to allow it

msconfig

aka System Configuration Utility - can help with long load times by disabling unwanted applications/services and modifying how the computer boots

Troubleshooting: Failure to Boot Vista/7: Accessing Windows Recovery Environment

aka System Recovery Options; aka Windows RE; access in 7: boot from CD and choose repair, f8>Repair Your Computer (Vista does not have this option), or create your own disk for it ahead of time

World Interoperability for Microwave Access (WAN Transmission Media)

aka Wi-MAX -802.16 protocol -point-to-point and point-to-multipoint -provides point-to-point data connectivity for "last mile" data access (not a physical mile; just the last distance to user's location) -not very developed in US -$$$ -has a licensed frequency

Windows Preinstallation Environment

aka WinPE or Windows PE; the graphical 32- and 64- bit graphical install enviro (Vista and later)

bootmgr

aka Windows Boot Manager; boot loader for Win7

peer-to-peer wireless

aka ad hoc; decentralized free-for-all forming an Independent Basic Service Set (IBSS); good for <dozen computers for transferring files/sharing printers in a temporary situation; doesn't need a WAP

Expansion Card

aka adapter card, I/O card, add-in, add-on, or board

Directory Services

aka network directory; centralized data base of objects such as servers, clients, computers, user names, and passwords; stored in 1 or more servers and avail throughout the enterprise; provides centralized admin and authentication

Peripherals: Digitizers

aka pen tablet; enables users to paint, ink, pencil, or otherwise draw on a computer

Star Network Topology

aka. Hub and Spoke -all nodes are connected together via a central connectivity device that facilitates communication between nodes -most commonly used topology in a LAN -central device can be passive or "smart" and decide the correct traffic paths -in Medium to large networks, stars are often connected to other starts through a local point-to-point connection linking the 2 central connection devices

Portable Media Player

aka. MP3 Player -embedded CPU -flash (solid state) memory -must be attached to a larger computer to transfer files on/off (usually)

PCMCIA cards

aka. PC Cards (stands for Personal Computer Memory Card International Association) -1/2 size of credit card -adaptors include: memory cards, hard drives, modems, ethernet adaptors, USB & Firewire Adaptors, SCSI cards--wireless card is the most recent type -68-pins -connected to Mobo using parallel bus communications -replaced by Express Cards, which use serial bus communication on the Mobo

Motherboard

aka. main board, system board, mobo -serves to connect all other components of the computer -has input jacks and external expansion ports -hardware and expansion ports are interconnected with multiple system buses -northbridge connects RAM directly to CPU -southbridge connects all inputs/outputs

Windows Interface: %SystemRoot%\Fonts

all installed fonts live here

CPU Cache: Instruction

allows CPU to retrieve and execute instructions faster

CPU Cache: Data

allows CPU to retrieve and store data quickly

CPU Cache: Translation Lookaside Buffer (TLB)

allows faster address translation for the CPU's Instruction and Data caches

Kerberos

allows single sign-on

System Tools: Disk Defragmenter

also in Computer Management Console; make the HD run faster by reorganizing bits of data on the HD so related bits are closer (never done on an SSD)

System Crystal

although a CPU may have a maximum speed rating, that is not the actual speed at which it will run when installed in a MOBO. The actual speed is determined by the ______, which is a quartz oscillator soldered onto the Mobo; it sends out an electric pulse that goes through a clock chip (which increases the pulse by a multiple the CPU can handle) and then to the clock wire (CLK), setting the beat for the CPU's activities (like a metronome)

Amperes

amount of electrons moving past a certain point on a wire; current; amperage

Wattage

amt of amps and volts needed so a device will function (VxA=W)

Volt-amps (VA)

amt of power the UPS could supply if the devices took power from the UPS in a perfect way.

Cipher

an algorithm used to encrypt raw data (plaintext)

Extended Unique Identifier (IUE-48)

another name for a MAC address or Mac-48

Network Resource

any device, file, or application that can be accessed from another device

The different areas of the Control Panel that allow you to change features are called _______.

applets

Media Access Control (MAC)

attaches the NIC's MAC address to frames and sends frames onto the network cabling A sublayer of the Data Link Layer

S/PDIF

audio connection (Sony/Phillips Digital Interface Format) that can be coaxial or optical and replaces all the mini-audio ports on your computer if your surround speaker system is also compatible for it

You risk exposing your computer to malicious software if you turn of Windows _________.

automatic updates

Native Resolution

automatically the crispest resolution for LCD

The first step of upgrading an Operating System is to check compatibility. The second step is to ________.

back up

System Tools: Backup

backup selected files and folders (in VISTA, you can't. It has Backup Status and Configuration, which is only personal data on home versions or the whole PC on business versions)

Baseband vs Broadband

baseband means a single signal sends data using the entire bandwidth of the transmission media, devices cannot simultaneously send and receive data; broadband provides high throughput by splitting communications into multiple channels transmitted simultaneously; neither is necessarily faster; no std for broadband speed but 1.5 Mbps is typically used

USB 3.0 looks different from 2.0 only in that it is _____.

blue

Troubleshooting: Failure to Boot XP: Repair w/ Recovery Console

boot from install CD; press r; press 1; provide Admin password; No Boot Device: use fxmbr NTLDR bad or missing: use cd\ to get to the root directory and use copy to copy it from your CD Boot.ini is gone or corrupted: use bootcfg /rebuild

Primary parition

bootable; gets a drive letter;

boots Vista/7

bootmgr

_____ is the term given to a computer component's failure within 30-days of installation

burn-in failure

Display installation considerations

cables & connectors; expansion cards; drivers; power source

Laser printer: crooked, mis-colored

calibrate printer

RSA token

can be a physical device located in a smart card or key fob to communicate with a security system

Extended partition

can contain multiple logical drives; can't boot from it; partition itself does not get a drive letter but drives w/in it do

System Tools: Easy Transfer (Vista/7)

can copy user accounts and other settings in addition to files done by FSTW

Network Attack Risks

can occur at various stages of communication Risks: -Social Engineering (ex: dumpster dive) -Viruses -Unauthorized Access: Hackers/Crackers,, Phishing, Malware, Spyware, Adware -Identity Fraud -Worms -Trojan Horses -Logic Bombs -File and Folder Sharing -Web Browser Risks: Phishing, Fraudulent sites, Applets, Executables, Caches -Operating System Vulnerability -Theft -Open or Free Networks

Frame size

can vary, but typically holds about 1500 bytes of data

bootrec /fixboot

can write a new boot sector and replace the bootmgr files in Win7/Vista

Distortion control

caused by EMI or hardware defect with the video card or cable; remove interference source or adjust settings on the display device itself

cd

change directory command (chdir)

Laser Printer: transfer corona wire

charges the paper for the toner to attract to it; if it fails, the page will be blank

What is the command prompt for error checking?

chckdsk

Logic Bomb

code inserted into software that executes if certain conditions are met

dxdiag

command for diagnosing problems with DirectX

CMD>systeminfo

command line command to see all system info

nbtstat

command line utility (aka NetBIOS or TCP/IP Statistics);

REGSVR32

command line utility for activating or deactivating ActiveX controls

net use

command line utility for mapping network shares

mstsc

command line utility for opening Remote Desktop

net

command line utility that enables you to view a network quickly;

Chckdsk /R

command line utility that verifies the integrity of a disk and can fix lost (or orphaned) files

icponfig /flushdns

command line utility to fix a failing DNS

User State Migration Tool (USMT)

command line version to move user state information to/from computers

hostname

command that tells you your computer name

attrib +[attribute] [file name and ext]

command to add attributes to a file

attrib +[attribute] *.[ext] /s

command to add attributes to all files of that type in the current directory

attrib -[attribute] [file name and ext]

command to remove attributes from a file

shutdown /?

command to shutdown

chkntfs

command utility that can be used to initiate chkdsk at boot time

fdisk

command-line program to partition drives; Disk Management is the graphical Windows equivalent; can use to partition

HDMI

compatible with the DVI standards; 19-pin; 50+ feet; 8 audio channels; HDTV, SDTV, EDTV modes

Access Control

composed of 4 interlinked areas: -physical security -authentication -users and groups -security policies

Windows Interface: %SystemRoot%\Temp

contains files for running applications to access quickly; deleted when app is closed; NEVER save here

xcopy

copy multiple directories at a time

CPU Operational Characteristic: CPU Speed

core clock speed (inside the CPU) and bus clock speed (transfer rate of instructions to the system board affect the overall CPU speed

CPU Operational Characteristic: Cores

cores read and execute instruction data from apps; single chip with 2 ore more cores that process simultaneously is multicore; 10+ cores is Many-Core, not Multi-Core

System Restore

create a restore point (XP); found in Accessories>System Tools; in Vista/7 does it auto but can go to Computer>Properties>System Protection>Tasks>System Protection tab>Create

System Restore

creates restore points that deal with settings

Windows SIM

creates the answer files for unattended installs in Win7/Vista

Setup Manager

creates the answer files for unattended installs in XP

Windows Interface: (My) Network Places

current network connections available to you

CPU Operational Characteristic: Clock Speed

cycles per second; technical rating that can be different in reality; aka performance

Recovery Console - Expand

decompresses a file as it copies it to the hard drive from the install CD

CPU Operational Characteristic: Cache

dedicated high-speed static RAM for storing recently used instructions and data

Global System for Mobile Communications (GSM)

default for making phone calls and transferring data via the Internet on a smartphone

Universal print driver (UPD)

designed to support multiple printers and MFDs with one driver; only available by some brands

You can plug a USB ______ to a Hi-Speed USB _____, but not the other way around.

device, port

Contrast

difference in intensity between adjacent colors in an image

Serial transmission

disassembles bytes into bits on the sending end; sends bits on wires; reassembles bits into bytes at receiving end

Administrative Tools: Computer Management

disk management, users and groups, and even viewer are some tools found here

gpedit.msc

displays the Local Group Policy Editor where you can make changes to the OS

Which type of optical storage disk can hold up to 17 GB of data

double-sided dual DVD

Printer resolution measurement

dpi (dots per inch

Scanner resolution is measured in ____.

dpi (dots per inch)

SATA connections

drive connection standard that enhances PATA; 7-pin connectors; smaller, thinner, more flexible cables than PATA

You can fix some hardware-related critical errors by updating the _____.

drivers

DIP Switches

dual in-line package switches work like jumpers to configure older motherboards; these hardware solutions have been replaced by software solutions on newer mobos

External drives frequently connect with this port that is faster than USB and FireWire by far.

eSATA

XVGA

eXtended Video Graphics Array -resolution 1024x768

RAM

electronically, a spreadsheet; physically, group of semi-conductor chips soldered onto small cards; allows the addressing of each row of memory for the CPU so it can easily jump to any line of stored code at or near the clock speed of the CPU

Windows Interface: Recycle Bin

empty it first when your HD is low on space

msconfig>startup

enable or disable any startup programs

Msconfig cannot stop services, it can only

enable/disable services

Lightweight Directory Access Protocol (LDAP)

enables OSes and apps to access directories; in Windows Servers with Active Directory, Windows uses LDAP to do anything w/AD; when you add a computer to the AD domain, Windows uses LDAP commands to update the AD w/the computer info; you don't see it

Address Bus

enables the CPU to say which row of RAM it wants from the MCC by turning the address bus wires on and off in different patterns; 1 part of the Frontside Bus

del [file name and ext]

erase a file

Administrative Tools: Computer Management>Event Viewer

events and problems recently occuring on computer

System Unit

everything inside the tower (CPU): internal hard drive, memory, etc.

Riser Card

expands motherboard capabilities the way a power strip increases the capabilities of electrical outlets

DDR2

faster than DDR due to buffering and cache; clock-doubles the input/output circuits to 4x per cycle; 4-bit buffer

PCIe, AGP, PCI-X, PCI are all video expansion slots are a listed in order from _____ to _____.

fastest, slowest

Ethernet connection from switch to data center

fiber optic

TCP/IP Command Line Utilities: tracert

followed by IP or hostname; shows the route a packet takes to get to its destination

TCP/IP Command Line Utilities: ping

followed by an IP address or DNS name, to send packets to it

TCP/IP Command Line Utilities: nslookup

followed by hostname; determine what info the DNS server is giving you about a specific host name

IPv6 Global Addresses

for now, begin with 2; used to access Internet (as opposed to a link-local address)

Power Supply: EPS 12V

for servers; 24-pin main mobo power; many other aux power; didn't remain popular long; most important intro was rails

Power Conditioning

found in better surge suppressors; filters out EMI and RFI

Virtual reality goggles/glasses

gaming use

ipconfig /?

gives all possible commands related to ipconfig

Parity RAM

gives the MCC an extra bit at the end for data check but can't correct it and doesn't always work

Scanners come in 8-bit, 12-bit, and 16-bit ______ varieties.

grayscale

Broadcast Domain

group of computers connected by one or more switches; a LAN is almost always one

Tech Utilities: Control Panel

handles most of the maintenance, upgrade, and configuration aspects of Windows; contains many applets like Device Manager

What does the abbreviation HDD stand for?

hard disk drive

USB, FireWire, and eSATA are all ways to connect external _____.

hard drives

Port

hardware interface that you can use to connect devices to a computer

Network-connected printer

has a built-in network adapter card and connects directly to a network cable; jobs are sent using a network protocol such as TCP/IP

3 main parts of a liquid cooling system

hollow metal block, a pump to move the liquid, a device to cool the liquid (minor parts: liquid, hosing)

UTP solid core is used for ___.

horizontal cabling - inside floors/ceilings

PS/2 is different from most modern sockets in that it is not _______.

hot-swappable (or hot pluggable)

Applets: System Tools

houses tools like System Information and Disk Defragmenter; access via - Start>All Programs>Accessories>System Tools

Wireless Network Adaptors

if not built in, it can be added via PCI, PCIe, or usb wireless NIC -most are plug-and-play and so immediately recognized by windows

Touch Screen: Optical Imaging

image sensors detect touch based on shadows created when screen is touched

how to access a hidden partition

in BIOS; it's usually a backup copy of the OS just in case (aka factory recovery partition)

Small Arrow in lower left of icon

indicates it is a shortcut

MOBO form factor: BTX

intended to replace ATX in 2005; low profile; better airflow; better hardware mounting points; ended in 2006

Proxy server

intermediates between a hostile (Internet) and a controlled (LAN) environment -LAN requests go through proxy, which decides whether to accept request. EX: many workplaces block internet radio and other distractors

DirectX

is a protocol that allows certain programs (video, sound, network, input devices, etc) to access cards/hardware directly without going through Windows (Ex: video game tweaking video card for max results);

PS/2 or mini-DIN (purple) connects a ____.

keyboard

ExpressCards use ____ power than CardBus cards

less (1.5-3.3 V vs 3.3-5 V)

UTP stranded core is ___.

less stiff than solid core but not as good a conductor; computer to wall

msconfig>tools

lists tools and utils; event vwr, perfmon, cmd, etc; found in other places

If you travel a lot, you'll want to make sure you use the _________ mechanism for the scanner light assembly on your scanner.

locking

HDDs top SSDs in price, capacity, and ______.

longevity (electronic longevity)

Frontside Bus

made up of the Address Bus and the EDB (connecting the CPU, MCC, and RAM)

md

make directory command

Is a worm malware or spyware?

malware

brightness

measured in lumens

time-domain reflectometer (TDR)

measures impedance in network cabling; (Fluke is one brand)

Power Cycle message

message on the printer when self-diagnosis fails; requesting shutdown and restart of the printer

Which 3.5 mm ports support speakers, microphones, and an audio line in?

mini-audio

All PATA drives use a 4-pin power cable called a _______.

molex

Cathode Ray Tube CRT

monitor that produces electromagnetic radiation

Liquid Crystal Display LCD

monitor that uses cold cathode fluorescent lamp as its backlight source

Light Emitting Diode LED

monitor that uses dynamic RGB or white edge LEDs as a backlighting source; uses less NRG than LCD but is more $$

Organic Light Emitting Diode OLED

monitor that uses organic compouds that emit light when electricity is present; advantage is variety of dimensions that can be used

Plasma

monitor tht uses xenon and neon rays; high contrast, brightness, and vibrant colors from many angles

Dvorak keyboard

more efficienct layout

Where is the first place you should go when upgrading your RAM?

motherboard manual

PS/2 or mini-DIN (green) connects a ____.

mouse

System Tools: Files and Settings Transfer Wizard (XP)

move settings and files from old computer to new one; won't copy programs or files for anything other than IE or Outlook

System Configuration Utility

msconfig - to troubleshoot OS and program startup and services; in XP, it could edit boot.ini; in Vista/7, it can't

Another name for a site license is a ____.

multiuser license

POST Criteria: BIOS Memory

must be readable (BIOS Memory)

POST Criteria: BIOS

must be readable (BIOS)

POST Criteria: Power Supply

must be turned on, and must supply its "power good" signal

TCP/IP Command Line Utilities: ipconfig

network settings /all is more useful in DHCPS; /release and /renew are helpful

Backup and Restore (Center) - Vista/7

no backup types other than files or computer (system image); no tape backup; backup files in Vista will NOT do apps or OS; 7 is better - will do an image with apps; Vista was all users; 7 lets you pick; 7 has Create a System Image

Classless Addressing

no strict dividing line btwn groups of addresses, and the network address/node address division is determined entirely by the number of 1 bits in the subnet mask

Backup Options - XP

normal - full, every selected file; copy - full backup with archive bits left on; incremental - only files with the archive bit on (only files changed since last backup), turns off archive bits; differential - like incremental but does not turn off archive bits; daily - (aka daily copy) - makes copies of all files changed that day without changing the archive bits

boots XP

ntldr

Color depth

number of bits used to store the color of a pixel: the more bits per pixel, the more colors can be displayed

Windows Interface: (My) Documents

on C:/ drive; includes subfolders for pics, music, etc; called "User's Files" in Vista/7

Archive bit

on when changes have been made since file's last backup; off when file has been backed up

Automated System Recovery (ASR)

option in XP that backs up the System State and other data

Windows Interface: %SystemRoot%\Offline Files (Offline Web Pages)

pages saved for offline browsing; auto-deleted from time to time

A legacy printer probably connects via a ______ port.

parallel

Another name for a DB-25 connector is a _____.

parallel port

Logical Link Control (LLC)

part of the NIC that talks to the NOS, places data coming from software into frames, and creates the CRC on each frame; it also processes incoming frames by sending the correctly address ones to the NOS and erasing incorrectly addressed ones A sublayer of the Data Link Layer

Partition Table

part of the master boot record that describes teh number and size of partitions on the disk

Windows Interface: Quick Launch Toolbar

part of the taskbar in XP and Vista; to enable, right click taskbar, select Properties, check "Show Quick Launch"; or Start>Settings>Control Panel>Appearance and Themes>Taskbar and Start Menu, check box; drag icons on/off; blended with running programs area in Win7 creating "pinned applications"

Sysprep

part of unattended installations that modifies the installs so every computer gets a unique SID, etc.

Laser Printer: Development Phase

phase to check for blank pages (how the toner is/is not applied) -- leads to toner cartridge

ping - f

ping with "Don't Fragment" flag set

ping -t

pings a target until stopped

ping -n

pings with a specific amt of packets instead of default 4

Resolution

pixels that make up the dimension of the display; given as horiz by vert or width by height; usually 4:3

Cable Tester

placeholder

Crimper

placeholder

Loopback plug

placeholder

Toner probe

placeholder

Wire stripper

placeholder

Binary ANDing

placeholder p312

NetBIOS Port

port 137

LDAP Port

port 389

TFTP Port

port 69

Media Design Workstation Requirements

powerful processor, high-end video card with integrated GPU, large flat panel display or multiple monitors, max RAM for mobo and CPU

Printer speed

ppm (pages per minute)

Voltage

pressure of electrons in the wire

CPU Operational Characteristic: Performance

price vs performance; know your client

Windows Interface: Desktop

primary interface underneath whatever apps you have open; also a folder in your computer; know how to get to it!

Uninterruptable Power Supply (UPS)

protects computer in an evente of power sag or surge;measured in watts and voltage-amps; they would be equal of devices took all power of the UPS

ntldr

read the boot.ini configuration file to load Windows XP

FireWire

real name: IEEE 1394 standard -hot-swappable -1394a - original, up to 400 Mbps (6-pin) -1394b - current, up to 800 Mbps (9-pin) -great for video transfer, HDs, real time storage

Administrative Tools: Computer Management>Performance Monitor

real time and cached performance data; can add counters to test something in particular (like a new NIC you've installed -- measure it's download speed)

ping -a

regular ping with hostname and IP

PC Cards (PCMCIA cards) can offer connections for ________ media.

removable (such as SD cards)

rd

remove directory

ren [old file name and ext] [new file name and ext]

rename a file

Plotter/vector

renders print jobs into specialized plotter language for making large-scale drawings with X-Y coordinates

Laser printer: shadowy/ghost image

replace drum (may be w/in toner cartridge itself)

Laser printer: smeared image

replace fuser

Domain

replaces a workgroup on a network with a server; login to this, not the local machine; 1 account per user, not per machine

Touch Screen: Resistive

resistive layer screen; pressure of finger creates charge between layers

What unit measures hard disk drive rotation speed?

rpm (revolutions per minute)

2 types of command lines

run>command is 16-bit; run>cmd is 32 or 64-bit

CPU Operational Characteristic: Overclocking

running the system board at a higher clock speed than the CPU is rated to handle; done by geeks; can fry your CPU due to overheating

msconfig>services

same as services tab in Task Manager; enable or disable any service

Administrative Tools: Computer Management>Services

see status of all services on system (running or not); change startup type of services to Automatic, Automatic (Delayed), Manual, or Disabled; also start, stop, pause, or resume

msconfig>general

select the type of startup you want for next boot

Touch Screen: Dispersive Signal

sensors detect vibrations when screen is touched

A legacy port that transfers data one bit at a time, has 9 pins, and is still used for some network devices is a _____ port.

serial

Another name for a DB-9 connector is a ____.

serial port

Codebook

set of instructions understood by the CPU

Which filetracks hardware as it is installed during Windows install?

setupapi.log

Which file tracks the WIndows installation process?

setuplog.txt

Network-based printer

shared print device managed by a network computer called a print server that holds the queue

Windows Interface: System Tray

shows programs running inteh backgorund (Have no open window)

Which type of optical storage disk can hold up to 25 GB of data?

single Blu-Ray

10BaseT

slowest Ethernet network speed; 10Mbps; starbus and UTP CAT3 cables

Power Supply: SFX 12V

small power supply for FlexATX mobos

Power Supply: TFX 12V

small power supply for low-profile ATX systems

Power Supply: Micro-ATX

smaller form factor designed for cases of the same name

Power Supply: Mini ATX

smaller form factor designed for cases of the same name

Firewall

software or hardware that enforces rules for data traffic -when properly implemented, provide a strong barrier to attack -network firewall is usually a piece of hardware -on servers or personal computers usually software -extremely complex balance of security and network availability

Virus

software program that can copy itself and infect a computer but needs a human to install -though many come from Internet, many also come from disks people bring to the network (USB, etc) or from local open networks (coffee shop) -designed to attach itself to a program on your computer (email, Word doc, game, etc) -whenever that program is used, the virus runs, too -can erase the HD -can also steal information or send SPAM through your email

Device drivers

software that enables the OS and peripheral device to communicate

de facto NIC LED indicators

solid green - connectivity; flashing green - intermittent connectivity; no green - no connectivity; amber - collisions on the network

A/V Editing Hardware Requirements

specialized audio and video cards to support CGI and 3D; large,fast hard drive, high-end graphics processing unit; large or multiple displays

Is a Pop-Up malware or spyware?

spyware

System Tools: Disk Cleanup

starts automatically when you get below 200 MB of HD space; looks for unnecessary files

RS-232 Null-Modem Connections

std serial interface used to connect devices like modems; replaced by Ethernet; can be used for debugging and close proximity; can be used to connect 2 computers in a simulated dial-up connection

SSDs top HDDs in speed, physical durability, energy use and _______.

storage efficiency

Master boot record

stored in 1st sector of hard drive; 512 MB; aka boot sector of a hard drive that houses an OS; for HDs w/o an OS, boot sector is the volume boot record (VBR);

Master File Table MFT

stored just after the MBR (boot sector); contains metadata info about every file and folder on an NTFS volume

Mini-Connector (Floppy Power)

supplies 5 and 12 V to peripherals; pretty much only used by Floppy Drive; can destroy devices if plugged into one that doesn't use it

Another name for a surge suppressor is a ____.

surge protector

/cmdcons

switch used with the winnt32.exe command to install the Recovery Console to the hard drive

Broadcast frames are allowed by ___ but destroyed trying to go through ____.

switches, routers

Windows Interface: Taskbar and Start Menu

taskbar runs along bottom; 4 sections: Start button, Quick Launch toolbar, running programs area, notifications area (aka system tray)

Stop a program from command line

taskkill /pid # or taskkill /name

Command line for Task Manager

tasklist

HKEY_

the beginning of the name of one of the five visible registry hives

Port forwarding

the best way to ensure external traffic to your website makes it to your LAN's web server (probably going to forward port 80 to the IP of your web server)

bootmgr.exe, winload.exe, and winresume.exe

the combination of Win7/Vista files that replaced NTLDR

What mode of Windows Vista/7 install inclused partitioning and formatting?

the graphical mode of installation

Cyclic Redundancy Check

the math performed by the receiving NIC on the Frame Check Sequence to ensure the frame's data arrived in tact (the math is like division with a remainder; if the numbers match, the data is good)

Computer connection

the physcial access point that enables a computer to communicate with internal or external devices

Type I, II, and III PC Cards differ only in their _____.

thickness

Refresh rate

times per sec that monitor is refreshed; measured in hertz

register (CPU register)

tiny storage areas made up of microscopic semi-conductor units that hold charges (charged - on; no charge - off = 1s and 0s in logic)

Troubleshooting in the Control Panel

tool in Win7 that can automatically check for performance issues

Bridge

transfers Ethernet from one media (like RJ-45) to another (like fiber)

Parallel connection

transfers data at 8 or more bits at a time over 8 or more wires; 25-pin FEMALE connectors; cable has a 25-pin male connector for the system unit and 36-pin male connector; burgundy or dark pink port; replaced by USB; AKA LPT

Serial connection

transfers data one bit at a time over a single wire; support 2-way communication; 9-pin (DB-9) to computer and 25-pin (DB-25) male connection to the device with female cables (legacy)

Power Supply: Rails

transformer takes AC power from socket and converts it into 3 primary DC rails: 12.0 V, 5.0 V, and 3.3. V

Recovery Console - XP

troubleshoot and manage the system; can be installed as a boot option or launch from the XP CD-ROM

Touch Screen: Surface Acoustic Wave

ultrasonic waves that are disrupted when screen is touched

Raster/bitmap

universal driver type

Flashing

updating firmware electronically

Troubleshooting: Failure to Boot XP: Rebuild

use Recovery CD or Recovery Partitoon to do a repair installation (which really means wiping the disk)

MSConfig

use for diagnosing driver problems

Jumpers

used to designate parallel devices as master/slave or cable select when there are 2 devices on one cable and controller

Projector

used to display to a large group of users

Applets: Device Manager

used to examine and ocnfigure all of the hardware and drivers in a Windows PC; organizes hardware into groups called types; enable/disable, upgrade drivers, problem device - right click>Properties>read error code

Remote Desktop

used to perate a Windows computer from a remote location; limited by 1 login at a time; better for management than diagnostics or troubleshooting

Dxdiag

used to troubleshoot video issues

Touch Screen: Infrared

uses Infrared LED and photodetectors that create a cross hatch pattern that is disrupted when the screen is touched

Infrastructure Mode

uses one or more WAPs to connect the wireless network nodes to a network segment; a single WAP servicing an area is known as a Basic Service Set (BSS); adding more WAPs to extend the area is Extended Basic Service Set (EBSS)

Touch Screen: Acoustic Pulse

uses unique acoustic sounds associated with a specific location on the screen to determine location

Touch Screen: Capacitative

useus electrical conductors to manipulate screen; screen coated with a conductor, so human body (also a conductor) results in a change to the electrostatic field

CPU Operational Characteristic: Virtualization Support

virtualization software built into the CPU chipset; Intel and AMD; allows CPU to process instructions from multiple OSes quickly & efficiently

Which type of malware needs a human to install it?

virus

Windows Interface: C:\Program Files

where programs install their essential files into a subfolder; C:\Program Files (x86) is the 32-bit program folder on a 64-bit OS

Windows Interface: Windows Explorer

where you manipulate files and folders; in XP, tasks are to the right of the drives/locations displayed; in Vista/7, tasks across the top

CPU Operational Characteristic: Architecture

width of the front side bus; either 32- or 64- (32-bit architecture or 64-bit architecture)

Ohms

wire's (medium's) resistance to the flow of electrons

Server Message Block (SMB)

works in Application layer and helps share resources; it's old, but it's the reason tools like Network can show you all the computers on the network

Which type of malware does not need a human to install it?

worm


संबंधित स्टडी सेट्स

Enlightenment Guided Reading Questions

View Set

Systems Planning: Ch. 1 Intro to Systems Analysis and Design

View Set

Quiz 11 - Unit 11: Body Composition

View Set

Prep U's - Chapter 24 - Asepsis and Infection Control

View Set

World Geography latin America and the Caribbean

View Set