Comptia A+ (core 1)

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Shielded Twisted Pair (STP)

Cabling for networks composed of pairs of wires twisted around each other at specific intervals. The twists serve to reduce interference (also called crosstalk). The more twists, the less interference. The cable has metallic shielding to protect the wires from external interference. See also Unshielded Twisted Pair (UTP) for the more commonly used cable type in modern networks.

Accelerometer

Can detect when the device is moved and change the screen orientation appropriately

Thunderbolt 3

Max speed 40 Gbps; USB Type-C connector

Plug and Play (PnP)

Peripheral devices that are added to the computer and the operating system will detect the device automatically and prompt you to configure it using a hardware or device or device setup wizard. Most devices also come with setup programs which will do the same job. They are required if the OS does not ship with the drivers required by the device.

simultaneous multithreading

Simultaneous multithreading, abbreviated as SMT, is the process of a CPU splitting each of its physical cores into virtual cores, which are known as threads. This is done in order to increase performance and allow each core to run two instruction streams at once

T568A

Standards for wiring twisted-pair network cabling and RJ-45 connectors and have the green pair connected to pins 1 and 2 and the orange pair connected to pins 3 and 6.

Symmetric Multiprocessing (SMP)

(Multiple CPU resources) or multiple physical processors, multi-core, or HyperThreading-will greatly benefit performance, especially if more than one guest OS is run concurrently. each processor is self-scheduling, all processes in common ready queue, or each has its own private queue of ready processes

mass storage device

(Non-volatile) A device that stores a large amount of information, even when it is powered off.

non-parity

The RAM does not verify, check-for, or correct errors in the RAM.

Post Office Protocol (POP)

(port 110) A protocol used to retrieve email from a mail server. POP3 is a later iteration of the POP protocol and can be used with or without SMTP.

voltage regulator

(used to correct the voltage supplied from the PSU to the voltage required by the component)A device that maintains a constant voltage level for either AC or DC electrical energy.

Digital Subscriber Line (DSL)

(uses RJ-11 connector) uses the higher frequencies available in a copper telephone line as a communications channel. provides high-speed digital data transmission over standard telephone lines using broadband modem technology, allowing both Internet and telephone services to work over the same phone lines

Full Tower Case

(usually has 6 bays) are usually used for PC servers. These require the extra internal space for additional hard disks, adapter cards, and redundant power supply units.

File Transfer Protocol (FTP)

(port 20/21) a simple network protocol that allows the transfer of files between two computers on the internet. It allows a client to upload and download files from a remote server. It is widely used to upload files to websites. port 20- to transfer data in ''active'' mode port 21- to establish a connection

Simple Mail Transfer Protocol (SMTP)

(port 25) An Internet-standard protocol for sending email messages between servers on IP networks. Because SMTP is generally used to send messages from a mail client to a mail server, you should specify both the POP or IMAP server and the SMTP server when configuring an email application.

Service Location Protocol (SLP)

(port 427) The Service Location Protocol is a service discovery protocol that allows computers and other devices to find services in a local area network without prior configuration. SLP has been designed to scale from small, unmanaged networks to large enterprise networks.

Kerberos protocol

(port 88) On a Windows domain, the user database and authentication service is provided by active directory, using a mechanism based on kerberos protocol.

Cable access TV (CATV)

A cable internet connection is usually available along with CATV service. These networks are often described as hybrid fiber coax (HFC)

T568B

- Wiring standards used for configuring twisted pair networking cable with RJ-45 connections based on a specified color order of the individual wires. - The color order for this standard is as follows: orange-white, orange, green-white, blue, blue-white, green, brown-white, brown - This particular scheme is the accepted standard.

RAM (Random Access Memory)

(volatile- it loses its contents when power is removed)Memory modules on the motherboard containing microchips used to temporarily hold data and programs while the CPU processes both. Information in RAM is lost when the PC is turned off. RAM holds data such as the contents of a spreadsheet or document, while its being modified.

fiber-optic cable

A cable that transmits data at close to the speed of light along glass or plastic fibers.

Subscriber Identity Module (SIM)

A card that identifies a phone with a user and a number.

Wireless Print Device Interfaces

-Bluetooth -Wifi 802.11 -infrastructure versus ad-hoc -Adhoc- is a specific mode of peer to peer connection associated with legacy standards. (802.11a/b/g0. -You are more likely to encounter device supports a software-implemented access point to facilitate connections.

Second-Level Address Translation (SLAT)

A feature found in many newer Intel and AMD CPUs and required by some hypervisors.

power-on self-test (POST)

(post will not run without a CPU) The first job the basic input/output system (BIOS) performs, ensuring that essential peripheral devices are attached and operational. This process consists of a test on the video card and video memory, a BIOS identification process (during which the BIOS version, manufacturer, and data are displayed on the monitor), and a memory test to ensure memory chips are working properly.

Central Processing Unit (CPU)

(the brain of the computer)executes program instruction code, performs mathematical and logical calculations and controls input/output (I/O) functions.

parity checking

(Motherboards use this simple error detection method) a data transmission control in which the receiving device recalculates the parity bit to verify accuracy of transmitted data

dye-sublimation printer

(thermal printer) A type of nonimpact printer that prints high-quality images by using heat to transfer colored ink to specially coated paper.

Graphics Processing Unit (GPU)

(Core of a video adapter)A set of processors on a video card in a computer performing data parallel calculations to render objects (windows, etc.) on screen.

Converter

(DC to AC) Changes direct current to alternating current

Demilitarized Zone (DMZ)

(DMZ can be like two firewalls. DMZ you can have an internal and external firewall) is a means of establishing a more secure configuration. The idea of a DMZ is that hosts placed within it are untrusted by the local network zone. Some traffic may be allowed to pass between the DMZ and the local network, but no traffic is allowed to pass from the internet to the local network through the DMZ

DirectX

(Graphic APIs) A Microsoft software development tool that software developers can use to write multimedia applications, such as games, video-editing software, and computer-aided design software.

OpenGL

(Graphics API) Is an alternative standard to DirectX that is used by some applications. Often used in game to create 2D and 3D effects. Developed by silicon graphics

USB 2.0

(High Speed) runs at 480 Mb/s with aa max cable length of 5 meters.

HTTPS (Hypertext Transfer Protocol Secure)

(SSL/TLS is typically used with the HTTP application) An encrypted version of HTTP. It uses port 443.

Mid Tower Case

(Usually has three or four bays) are used for high-end user PCs. These PCs do require extra devices and adapter cars, but not as many as a server.

System Memory

(Volatile) The primary computer memory that holds instructions and data for currently executing software.

Port Triggering

(basically opens another port) is used to set up an application that require more than one port. Basically, when the firewall detects activity on outbound port A destined for a given external IP address, it opens inbound access for the external IP address on port B for a set period.

Ping Utility

(communication with another host) the ping utility is a command-line diagnostic tool used to test wheater a host can communicate with another host on the same network or on a remote network. It is the basic tool to use to establish that a link is working. Ping uses the internet control message protocol (ICMP) Sends "echo request" packets to a destination and hopes for "echo replies" indicating that that destination is responding and on the network

switch

(connecting devices within the network) allows local computers and other host types to connect to the network via RJ-45 ports. This will be an unman aged switch so no configuration is necessary. A computer networking device that connects network segments

Router

(connects outside the network) forwards packets over the WAN (internet) interface if they do not have a local destination IP address. Some appliances may provide the ability to configure local subnets, though this is not typical of the devices supplied by the service providers. A device that transfers data from one network to another in an intelligent way

Network Address Translation (NAT)

(converts private IPs to public IPs) A technique that allows private IP addresses to be used on the public Internet.

enhanced data rate (EDR)

(devices supporting Bluetooth 3.0) the standard has a maximum transfer rate of 3 Mbps, otherwise, the maximum rate is 1 Mbps.

Syslog

(equivalent system in UNIX and Linux) This was designed to follow a client-server model and so allows for a centralized collection of events from multiple services. It also provides an open format for event logging messages.

Alternating Current (AC)

(flows in both directions around the circuit) rapid and interrupted current, flowing first in one direction and then in the opposite direction

molex connectors

(for older computers)The main connector used to hook a power supply to a motherboard. Has 4 pins plus red, yellow, and black wires.

m.2

(laptops) this is a new set of form factors for mini card interfaces. An M.2 SSD usually interfaces with the PCI express bus, allowing much higher bus speeds than SATA.

infrared (IR)

(line of sight)Electromagnetic radiation has a longer wavelength than visible light but shorter than microwaves. We can feel infrared radiation as warmth. -Many mobile devices are also equipped with an infrared(IR) sensor or blaster. This is not used for data connections as such but does allow the device to interact with appliances such as TVs and set-top boxes. An app on the device can be installed to allow the mobile device to be used as a remote control for the appliance.

Mean Time Between Failures (MTBF)

(mean time to failure is time hardware has till it dies) A statistical value that is the average time until a component fails, cannot be repaired, and must be replaced. Such as hardware.

Modem

(modem uses RJ-11 connector) works at the same level as a switch, making a physical network link with ISPs network. A device that allows computers to communicate over telephone lines

P1 adapter

(motherboard power cable) original ATX specification, the 20-pin P1 (2x10) adapter also called the main connector supplies power to the motherboard.

Expansion cards

(or add-on cards) can be installed on the motherboard to add functions or ports not provided as part of the chipset. An Expansion card can be fitted to an appropriate slot(PCI or PCIe on the motherboard.

Integrated GPU

- A feature of some newer CPU's which incorporates the hardware required to process a visual output into one built-in package. - This is useful for most computers unless you are running a more graphics intensive environment such as gaming or video editing. In that case it may be wise to acquire an expansion card.

RJ-11 connectors

-2 pair to handle two phone lines. RJ-11 connectors are used for telephone systems(for example, to connect a modem to a phone jack).

Microsofts Hyper-V virtualization platform (three types of virtual switch can be created)

-External-binds to the host NIC to allow the VM to communicate on the physical network. -Internal-creates a switch that is usable only by VMs on the host and the host itself -Private-creates a switch that is usable only by the VMs. They cannot use the switch to communicate with the host. When the VMs are allowed to interact with a ''real network", the host must support a high bandwidth, high availability network link. An failure of the physical link will affect multiple VMs.

ZigBee

-Has similar uses Z-wave and is an open-source competitor technology to it. -Zigbee uses the 2.4 GHz Frequency band -no hop limit -A form of wireless communications frequently used in security systems and heating and cooling control systems. 802.15.4 - Low cost cable replacement technology - Close to 100M nodes in 2012 - Honeywell = HVAC systems - Zigbee used for low power consumption and rely on long, multi-year battery life

A built in laptop display will be one of three types:

-LCD(TFT) with fluorescent backlight- This has been the standard display technology for the last few years. The backlight is a fluorescent bulb that illuminates the image making it bright and clear. An inverter supplies the correct AC voltage to the backlight from the laptop's DC power circuits. -LCD with LED backlight- manufactures are increasingly switching to this technology. LED backlights do not require an inverter. -OLED- this technology is expensive at the screen size required by laptops and there are issues with power draw and battery life. OLED has nor really been mainstream for laptop displays.

hardware-assisted virtualization (HAV)

A feature of a processor whereby it can provide enhanced support for hypervisor software to run virtual machines on a system. The feature must be enabled in UEFI/BIOS setup.

impact printers can be used with either plain, carbon, or tractor-fed paper

-Plain paper is held firmly against the moving roller (the platen) and pulled through the mechanism by friction as the platen rotates. -carbon paper(or impact paper) is used to make multiple copies of a document in the same pass (hence carbon copy or cc) -Tractor fed paper- is fitted with removable, perforated side strips. The holes in these strips are secured over studded rollers at each end of the platen.

Parallel Advanced Technology Attachment (PATA)

A legacy hard disk technology that uses ribbon cables to typically attach up to four hard disk devices to a single computer.

Patch Cord

A patch cord is used to connect a port on the patch panel to a port on the switch.

Windows Image Acquisition (WIA)

-The software will present options for the image output format(PDF or JPEG, for instance) and tools for selecting and correcting the image. Another option may be to use Optical Character Recognition (OCR) software to convert a text image into a computer-editable text document. -photoshop works with windows and your digital camera or scanner software to import images directly into photoshop

airplane mode

A setting within a mobile device that disables the cellular, Wi-Fi, and Bluetooth antennas so the device cannot transmit signals.

Mean Time Between Failures (MTBF)

A statistical value that is the average time until a component fails, cannot be repaired, and must be replaced.

public key authentication

-host based authentication cannot be used with fine grained access controls as the access is granted to a single user account. -A feature of encryption that allows one computer to know that a computer trying to communicate with it is genuine

Secure Shell (SSH) (port 22)

-is designed to replace unsecure administration and file copy programs such as Telnet and FTP. -SSH uses encryption to protect each session. -A UNIX-based command interface and protocol for securely accessing a remote computer.

Optical Character Recognition (OCR)

-software can be used to convert scanned text into digital documents, ready for editing. Historically, scanners could be connected using the parallet port or via a SCSI bus. Nowadays, scanners are connected via USB or via an Ethernet network port (RJ-45) or wireless (Wi-Fi) 802.11 network. -the capability of specialized software to interpret the actual letters and numbers on a page to create a digital document that can be edited, rather than a flat picture

SATA Connector

15-pin (1x15) SATA connectors are used to deliver power from the power supply to a peripheral device such as a hard drive. This is newer technology replacing Molex connectors. Has one red (+5v), one yellow (+12v) and a black wire for each (grounds).

HDMI 2.0 and 2.1

2.0 high speed 18Gbps 2.1 Ulta high speed 48 Gbps

Thunderbolt 2

20 Gbps. Up to six devices can be connected to a single port by daisy-chaining the devices.

USB 3.2

20 gbps, but only over USB-C ports and cabling.

IA-64

64-bit cpu instruction set

entry level power supply EPS specification

8-pin +12V connectors. EPS12V PSU can be connected to a ATX motherboard with a 4 pin +12 V port.

Internal USB connectors

9 pin headers which accept up two 4 pin connections

VGA (Video Graphics Array)

A 15-pin display device resolution of 640 × 480. A VGA interface uses a 3-row DB-15 connector. Standard for the video graphics adapter that was built into IBM's PS/2 computer. It supports 16 colors in a 640 × 480 pixel video display.

Molex connector

A 4-pin power connector used to provide power to a PATA hard drive or optical drive.

MAC (Media Access Control) address

A 48-bit hardware address assigned to each network card in the format aa:bb:cc:dd:ee:ff. IEEE assigns blocks of possible addresses to various NIC manufacturers to help ensure that the address is always unique. The Data Link layer of the OSI model uses MAC addresses to locate machines.

Basic Rate Interface (BRI)

A BRI circuit contains two 64-kbps B channels and one 16-Kbps D channel. Although such a circuit can carry two simultaneous voice conversations, the two B channels can be logically bonded together into a single virtual circuit (by using PPP's multilink interface feature) to offer a 128-kbps data path.

DVI-I

A DVI mode that supports both analog and digital video signals.

DVI-D

A DVI mode that supports digital video signals and is partially compatible with HDMI. See also digital video interface and High-Definition Multimedia Interface.

DVI-A

A DVI-A supports only analog equipment. mode that supports downward compatibility with analog displays.

Global Positioning System (GPS)

A GPS chip is built into most smarthpones and many tablets and other smart devices, but there are also dedicated GPS, navigation devices (also called sat navs, for "satellite navigation"). These come n 5-6 models aimed both in-vehicle use and smaller clip-on devices for walkers and cyclists.

NetBIOS over TCP/IP (NetBT)

A Microsoft-created protocol that enabled NetBIOS naming information to be transported over TCP/IP networks. The result is that Microsoft naming services can operate on a TCP/IP network without the need for DNS services. Name service (UDP port 137) Datagram Transmission service (UDP port 138) Session service (TCP port 139)

Plain Old Telephone Service (POTS)

A POTS connection connects a customer device (such as a telephone) to the public switched telephone network (PSTN).

Secure Sockets Layer (SSL)

A Protocol developed by Netscape for securely transmitting documents over the Internet that uses a private key to encrypt data.

international mobile subscriber identity (IMSI)

A SIM card is registered to a particular user and can be transferred between devices.

ifconfig

A TCP/IP configuration and management utility used with UNIX and Linux systems.

Simple Network Management Protocol (SNMP)

A TCP/IP protocol that exchanges management information between networked devices. It allows network administrators to remotely monitor, manage, and configure devices on the network.

Internet Control Message Protocol (ICMP)

A TCP/IP protocol that is used by devices to communicate updates or error information to other devices. ICMP works at the network layer. ICMP delivers status and error messages and is used by diagnostic utilities such as ping and tracert.

CHKDSK

A Windows command to verify the hard drive does not have bad sectors that can corrupt the file system.

Remote Assistance

A Windows service designed to allow a user to invite someone to help troubleshoot a problem.

type 1 hypervisor

A bare metal virtual platform means that the hypervisor is installed directly onto the computer and manages access to the host hardware without going through a host OS.

Advanced Encryption Standard (AES)

A block cipher created in the late 1990s that uses a 128-bit block size and a 128-, 192-, or 256-bit key size. Practically uncrackable. Much stronger than RC4/TKIP.

power supply unit (PSU)

A box inside the computer case that receives power and converts it to provide power to the motherboard and other installed devices. Provides 3.3, 5, and 12 volts DC.

Hybrid Fiber Coax (HFC)

A broadband cable system architecture that uses both fiber-optic and coaxial cable.

bus

A bus is a subsystem that is used to connect computer components and transfer data between them. For example, an internal bus connects computer internals to the motherboard. a Bus is implemented on the motherboard as tiny wires(called traces). A bus may be parallel or serial. Parallel buses transmit data across multiple wires. Serial buses transmit data in bit-serial format. A bus was originally an electrical parallel structure with conductors connected with identical or similar CPU pins, such as a 32-bit bus with 32 wires and 32 pins.

riser card

A card that plugs into a motherboard and allows for expansion cards to be mounted parallel to the motherboard. Expansion cards are plugged into slots on the riser card.Riser cards enable you to connect additional adapters to the system in an orientation that is parallel to the motherboard and thus save space within the system case. This can happen when some PC case designs are slimline, meaning that there is not enough space for full height expansion cards.

trickle charge

A charge at a low rate, balancing through self-discharge losses, to maintain a cell or battery in a fully charged condition.

real-time clock (RTC)

A chip that keeps track of the date and time on a PC. Set the date and time through your operating system or in the BIOS Setup program.

complementary metal-oxide semiconductor (CMOS)

A chip that retains system settings such as the time, keyboard settings, and boot sequence.

In-Plane Switching (IPS)

A class of LCD monitor that offers truer color images and better viewing angles, but is expensive and has slower response times.

Twisted Nematic (TN)

A class of LCD montior that has fast response times to keep fast-moving images crisper, but monitors are brighter, consume more power, and have limited viewing angles

Exchange ActiveSync

A client synchronization protocol based on XML that enables you to connect your mobile device to your Exchange mailbox.

Lightweight Directory Access Protocol (LDAP)

A client/server-based directory query protocol loosely based upon X.500, commonly used for managing user information LDAP uses TCP and UDP port 389 by default.

collated and uncollated (printing)

A collated print job is one where all pages of the first copy are printed, followed by all pages of the second copy, and so on. uncollated option is all copies of page 1 are printed first, followed by all copies of page 2, and so on.

Integrated Development Environment (IDE)

A collection of programs that support software development, such as debuggers, editors, toolkits, and libraries, that lets programmers perform several tasks within the shell of a single application.

eSATAp (external serial ATA powered)

A combination of an eSATA port and a USB port that can provide power to external SATA devices. It requires a special 5-V cable to carry 5 V of power or a special 12-V cable to carry 5 V and 12 V.

tracert

A command-line utility is used to trace the route a packet of information takes to get to its target. Like, Ping, it uses ICMP status messages. TTL(time to live) is the same as hops. Max hops is 30 hops. a * most likely means a firewall if packet attempts to go past 30 hops, the packet is dropped.

Integrated Services Digital Network (ISDN)

A communication standard for sending voice, video or data over digital telephone lines.

Internet Service Provider (ISP)

A company that has a permanent connection to the internet backbone.

drive controller

A component located on the motherboard, that provides a drive interface, which connects disk drives to the processor.

Home Server PC

A computer system used in the home for sharing resources and streaming video. The ideal home server has media streaming capabilities file sharing services print sharing services one or more gigabit NICs and a RAID array.

Standard Thick Client

A computer used to run locally stored and locally processed applications. Ex: word processor, spreadsheet, and presentation, email, web browser.

chip creep

A condition in which chips loosen because of thermal changes.

Remote Desktop

A connection mode that enables a user to access any network system from their workstation and perform tasks on the remote system. Ability to connect to a computer, over a network, as though you were physically present at the keyboard.

User Datagram Protocol (UDP)

A connectionless transport protocol. Connectionless transport protocols provide unreliable transport, in that if a segment is dropped, the sender is unaware of the drop, and no retransmission occurs.

F-Connector

A connector used with an RG-6 coaxial cable and is used for connections to a TV and has a single copper wire.

Near Field Communication (NFC)

A contactless reader that uses very short range radio links based on Radio Frequency ID(RFID). NFC normally works at up to 2 inches (6cm) at data rates of 106, 212, and 424 Kbps.

Hub

A device can be a hub (providing ports for additional devices) or function. Functions are devised into classes,such as human interface(keyboards and mice), mass storage(disk drives), printer, audio device,and so on.

smart card reader

A device that attaches to the system internally or externally by USB or through a dedicated adapter to provide power for the chip that is embedded in the smart card.

power supply tester

A device that can test the output of each power cord coming from a power supply.

phablet

A device that combines the features of a smartphone with a tablet.

Terminal Adapter (TA)

A device that connects a computer or a fax to an ISDN line. A TA simply converts a digital signal to a protocol that can be sent over a digital telephone line.

Host Bus Adapter (HBA)

A device that connects a host system such as a computer to a network or storage device.

AC adapter

A device that converts AC to DC and can use regular house current to power a laptop computer. -Typical AC adapters power output ranges around 65-120 W.

loopback plug

A device used to test a port in a computer or other device to make sure the port is working and might also test the throughput or speed of the port.

Second-Level Address Translation (SLAT)

A feature found in much newer Intel and AMD CPUs and required by some hypervisors. -improves the performance of virtual memory when multiple VMS are installed. Intel implements SLAT as a feature called Extended Page Table (EPT) and AMD calls it Rapid Virtualization Indexing (RVI)

Light Emitting Diode (LED)

A diode that will produce light when current flows through it.

hard disk drive (HDD)

A direct access storage device used to store and retrieve data from rapidly rotating disks coated with magnetic material. The computer's nonvolatile, primary storage device for permanent storage of software and documents.

Electronic paper display

A display used by e-book readers instead of LCD screens. An electronic paper display consumes less power and provides higher contrast in bright lighting than LCDs.

SCSI (Small Computer System Interface)

A fast interface between a host adapter and the CPU that can daisy chain as many as 7 or 15 devices on a single bus. Up to 320 MBps data rates. High Density 68-pin connectors or single connector attachment (SCA)80 pin connectors.

Multiple Input Multiple Output (MIMO)

A feature of the IEEE 802.11n standard for wireless networking whereby two or more antennas are used at both ends of transmissions to improve performance. The configuration of 802.11n devices is identified by AxB:C notation, where A is the number of transmit antennas. B is the number of antennas, C is the number of simultaneous transmit-receive streams

bus mastering

A feature that allows a network adapter to take control of the computer's bus to initiate and manage data transfers to and from the computer's memory, independent of the CPU.

multi-mode fiber (MMF)

A fiber optic cable used to transmit multiple signals at the same time. It cannot transmit signals as far as SMF can. Has a larger core (62.5 or 50 microns) and is designed to carry a shorter wavelength light (850nm or 1300 nm) transmitted in multiple waves of varying length

Page Description Language (PDL)

A file format that describes a page's layout, contents, and position within the larger document in a manner the output device can understand.

heat spreader

A flat heat sink of sorts that adds surface area to a heat-producing component, allowing better heat transfer to the surrounding air; often coupled with a fan for devices that run at a higher temperature.

liquid crystal display (LCD)

A flat-panel monitor that creates an image when liquid crystals become electronically charged.

Primary Rate Interface (PRI)

A form of ISDN that contains 23 64Kbps B channels and 1 64Kbps D channel.

Long Term Evolution (LTE)

A fourth-generation wireless broadband technology that was developed to allow GSM cellular technology to evolve to provide very high-speed Internet access. LTE has a maximum down link of 150 Mbps but around 20 Mbps is more typical.

Virtual LAN (VLAN)

A group of hosts with a common set of requirements that communicate as if they were connected together in a normal fashion on one switch, regardless of their physical location.

Drive encryption

A hard drive can be encrypted to prevent data theft. Encrypting changes the data into code that cannot be understood. Without the correct password, the computer does not boot, and the computer cannot decrypt the data. Even if the hard drive is placed in another computer, the encrypted data remains encrypted.

port

A hardware interface that you can use to connect devices to a computer. The port can referred to as an endpoint

Domain Name System (DNS)

A hierarchical system for naming resources on the Internet. It uses a distributed database that contains information on domains and hosts within those domains.

Multiport Repeater

A hub simply ensures that all devices receive signals put on the network, working as a multi-port repeater.

enterprise LAN

A larger network with hundreds or thousands of servers and clients. Such networks would require multiple enterprise-class switch, access point, and router appliances to maintain performance levels.

Frequency Response

A measure of an audio system's ability to reproduce a range of frequencies with the same relative loudness; usually represented by a graph.

dots per inch (dpi)

A measurement of image quality for printers. -the basic measure of image quality is the maximum supported resolution, measured in dots per inch (dpi). Printer dots and screen image pixels are not equivalent. The minimum resolution for a monochrome printer should be 600 dpi. Photo-quality printers start at 1200 dpi.

Multimeter

A measuring instrument for current, voltage, and resistance

Dual Inline Memory Module (DIMM)

A memory module (stick) that installs into matching DIMM sockets found on many motherboards. The word "dual" refers to the separate pins or connections on both sides of the module and socket. 184-pin

Pretty Good Privacy (PGP)

A method of encrypting and decrypting e-mail messages. It can also be used to encrypt a digital signature.

Software RAID

A method of implementing RAID that uses software to implement and control RAID techniques over virtually any type of hard disk(s). RAID software may be a third-party package or utilities that come with an operating system NOS.

LAN (Local Area Network)

A network of computers and other devices that is confined to a relatively small space, such as one building or even one office.

Personal Area Network (PAN)

A network of devices such as smartphones, notebooks, and tablets using Bluetooth technology

WAN (Wide Area Network)

A network that spans a (Multiple geographic locations) long-distance and connects two or more LANs.

Automatic Private IP Addressing (APIPA)

A networking feature in operating systems that enables DHCP clients to self-configure an IP address and subnet mask automatically when a DHCP server isn't available. The computer selects an address at random from the range 169.254.1.0 to 169.254.255. When a host is using an APIPA address, it can communicate with other hosts on the same network that are using APIPA, but cannot reach other networks or communicate with hosts that have managed to obtain a valid DHCP lease.

paper jam

A paper jam is one of the most frequently occuring printer problems. • Tray problem or bad pickup rollers may not feed paper properly • Creased paper may cause problems in the paper path • Check the paper weight with printer manufacturer specifications -There could be a problem with a roller, too. Identify whether or not the jam occurs in the same place each time, and take appropriate preventive maintenance (clean or replace the part)

heat sink

A piece of metal, with cooling fins, that can be attached to or mounted on an integrated chip (such as the CPU) to dissipate heat.

RJ-45 connector

A plastic connector on an Ethernet cable, containing four twisted pairs of wires (eight wires total). Like a telephone cable connector, but slightly wider. This means that all eight potential wire positions are supplied with contacts, so that they can all carry signals if needed.

Port Address Translation (PAT)

A port number is tracked with the client computer's private address when translating to a public address

Southbridge

A portion of a computer's chipset that controls communications between the CPU and such I/O busses as USB, IDE, PS2, SATA, and others.

Dual Rail

A power supply with a second +12-V circuit or rail used to ensure the first circuit is not overloaded.

Virtual Desktop Infrastructure (VDI)

A presentation of a virtual desktop made to a client computer by a server that is serving up a virtual machine.

Virtual Desktop Infrastructure (VDI)

A presentation of a virtual desktop made to a client computer by a server that is serving up a virtual machine. In a typical VDI, desktop computers are replaced by low-spec, low-power thin client computers. when the thin client starts, i boots a minimal OS, allowing the user to log on to a VM stored on the company server or cloud infrastructure.

hard copy

A printer output of electronic documents

multithreaded

A process or program divided into two or more threads, each of which can be scheduled and executed independently.

Transport Layer Security (TLS)

A protocol based on SSL 3.0 that provides authentication and encryption, used by most servers for secure exchanges over the Internet.

Multipurpose Internet Mail Extensions (MIME)

A protocol that enables operating systems to map file name extensions to corresponding applications. Also used by applications to automatically process files downloaded from the Internet.

Server Message Block (SMB)

A protocol used by Windows to share files and printers on a network.

Internet Message Access Protocol (IMAP)

A protocol used to retrieve email messages. IMAP is similar to POP3, but with some advanced features. The main difference between the two is that IMAP generally leaves the email on the mail server.

Interrupt Request (IRQ)

A request to the processor so that a currently operating process, such as a read from a disk drive, can be interrupted by another process, such as a write into memory.

fuse

A safety device with a thin metal strip that will melt if too much current passes through a circuit. Fuses come in different rating such as 3A,5A, and 13A. Most computer equipment is rated at 3A or 5A. (with fuses you measure the resistance)

Structured Cabling System

A second patch cord is used between the computers network adapter and the wall port. This use of patch cords, permanent links, and patch panels is referred to as a structured cabling system.

Network Level Authentication (NLA)

A security method that enables authentication to take place before a Terminal Services connection is established and that involves verifying the user account, client computer and network server.

802.11

A series of network standards that specifies how two wireless devices communicate over the air with each other. 2.4 GHz and 5GHz bands

AAA server

A server that is dedicated to performing authentication, authorization, and accounting functions.

Domain Name System (DNS) server

A server that maintains a database of domain names and converts domain names to Internet protocol addresses. Performs the task of taking a domain name (for example, www.ciscopress.com) and resolving that name into a corresponding IP address

Domain Name System (DNS) server

A server that maintains a database of domain names and converts domain names to Internet protocol addresses. These servers proide resolution of host and domain names to their IP addresses and are essential for locating resources on the Internet. AKA FQDNS (fully qualified domain name system.

VT-x (Virtualization Technology)

A set of Intel CPU hardware enhancements improving support for virtualization AMD calls it AMD-V. Most virtualization products also benefit from a processor feature called Second Level Address Translation (SLAT)

QoS (Quality of Service)

A set of parameters that controls the level of quality provided to different types of network traffic.

protocol suite

A set of protocols that are commonly used together and operate at different levels of the OSI seven-layer model.

Universal Plug and Play (UPnP)

A set of protocols that enable networked devices to automatically discover each other's presence.

Sony/Philips Digital Interface (S/PDIF)

A single-pin RCA phone jack for transferring digital audio from CD and DVD players to amplifiers and speakers.

Local Connector (LC)

A small form factor connector with a tabbed push/pull design. LC is similar to SC but the smaller size allows for higher port density.

USB 2.0 Type B Mini(5-pin)

A smaller connector for connection to a device like cameras

Micro-ATX

A smaller variation of the ATX standard. • Maximum size of 9.6" x 9.6". -up to 4 expansion slots Designed to keep the same benefits of ATX but reduce overall cost. Less I/O slots and smaller motherboard. Still good for games. • Mounting holes for both are located in the same place.

zero insertion force (ZIF) socket

A socket for a PGA CPU that has a retention lever as well as contacts to match the number of pins on the CPU. The lever is used to attach the CPU to the socket in a manner that does not require force to insert or to remove the CPU.

Thermal Paste

A special compound used between CPUs and heat sinks. It fills in microscopic gaps and helps draw heat from the CPU into the heat sink where it is dissipated.

Global System for Mobile Communications (GSM)

A standard created to replace first-generation (1G) analog cellular networks and was first used with second-generation (2G) networks, allowing digital cellular data communication for mobile devices.

Super VGA (SVGA)

A standard set by the Video Electronics Standards Association (VESA) for a CRT monitor that includes a minimum refresh rate of 70 Hz and a minimum resolution of 800 x 600.

Unmanaged Switch

A switch that provides plug-and-play simplicity with minimal configuration options and has no IP address assigned to it. Unmanaged switches are inexpensive, but their capabilities are limited.

Sampler

A synthesizer which records sounds from actual external sounds such as instruments or non-musical sounds.

wear leveling

A technique used on a solid-state drive (SSD) that ensures the logical block addressing does not always address the same physical blocks in order to distribute write operations more evenly across the device.

Thin Film Transistor (TFT)

A technology for LCD displays in which transistors are positioned at each pixel. has two types: Twisted Nematic (TN) and In-Plane switching (IPS)

federated identity management (FIM)

A technology that uses a single authenticated ID to be shared across multiple networks owned by different organizations.

x86

A term applied to a CPU, motherboard, or other components that conform to the Intel 32-bit x86 specification. Also referred to as 32-bit.

A user reports their internet connection is not working. Which of these tools might you use to troubleshoot the problem?

A tone generator and probe tool is used to trace a cable from one end to the other. This is the primary tool for testing for bad network cables. A loopback plug is used to test a port. It involves connecting pin 1 to pin 3 and pin 2 to pin 6. A multimeter can be used as a basic cable-testing tool by testing the continuity of copper wires inside the cables. You would use this to identify broken wires. Crimpers are tools to fix a jack to a cable. The wires are laid in the appropriate terminals in the jack and the crimper tool then closes and seals the jack. If you replaced a cable, you would need this.

Haptic Feedback Touch Screen

A touch screen display that feels like you are pressing real buttons. This effect is made possible by a small motor like the one that vibrates a cell phone.

Floating Point Unit (FPU)

A type of arithmetic logic unit (ALU) that is used to perform specialized functions, such as division and large decimal number operations. Also called a math coprocessor.

Global System for Mobile Communications (GSM)

A type of cell phone that contains a Subscriber Identity Module (SIM) chip. These chips contain all the information about the subscriber and must be present in the phone for it to function.

Synchronous DRAM (SDRAM)

A type of memory stored on DIMMs that runs in sync with the system clock, running at the same speed as the motherboard.

Double Data Rate SDRAM (DDR SDRAM)

A type of memory technology used on DIMMs that runs at twice the speed of the system clock. Also called DDR SDRAM, SDRAM II, and DDR.

thermal wax transfer printer

A type of printer that uses a film coated with colored wax that melts onto paper. These printers are similar to dye-sublimation printers but differ in two major ways: the film contains wax rather than dye, and these printers do not require special paper.

direct thermal printer

A type of thermal printer that burns dots onto special coated paper as was done by older fax machines thermal printers are often used in cash registers and for printing labels.

direct thermal printer

A type of thermal printer that burns dots onto special coated paper as was done by older fax machines.

Windows Remote Assistance

A utility similar to Remote Desktop Connection but allows one person to connect to another user's computer to provide "hands-on" help.

Management Information Base (MIB)

A virtual database included in an SNMP-compliant device, containing information about configuration and state of the device that can be queried by the SNMP management station.

Virtual LAN (VLAN)

A virtual network that is implemented to segment the network, reduce collisions, organize the network, boost performance, and, hopefully, increase security. Each VLAN is associated with a different logical subnetwork address. Traffic passing between VLANs can be easily filtered and monitored to ensure it meets security policies.

secure sockets tunneling protocol (SSTP)

A virtual private network (VPN) uses a protocol such as IPsec or SSTP to create a tunnel through a carrier network. The contents of the tunnel can be encrypted so that no one with access to the carrier network (such as open access point) can intercept information passing trough the VPN.

CMOS (complementary metal-oxide semiconductor)

A volatile form of memory that uses a small battery to provide it with power to keep the data in memory even when the computer is turned off. It stores settings that are used by the BIOS.

Internet Exchange Point (IXP)

A way of connecting Internet service providers (ISPs) that's made up of one or more network switches to which the ISPs connect. These trunks and IXPs are mostly created by telecommunications companies and academic institutions.

wireless mesh network (WMN)

A wireless network in which multiple APs work as peer devices on the same network, thereby providing more fault-tolerant network access to clients. Unlike an ad-hoc network, nodes in a WMN (called Mesh stations) are capable of discovering one another and peering, forming a Mesh Basic service Set (MBSS).

evil twin

A wireless network with the same name as another wireless access point. Users unknowingly connect to the evil twin; hackers monitor the traffic looking for useful information.

802.11ac

A wireless standard that operates at 5GHz and claims to provide wireless speeds of 1Gbps or higher.

Audio/Video Workstation

A workstation used to edit Audio/Video (A/V) files, create animations or produce music will have high performance requirements.

Which of these Integrated Drive Electronics (IDE) interface standards has a maximum transfer rate of 66 MBps?

ATA/ATAPI-5 uses UDMA mode 4 (Ultra ATA/66) and has a maximum transfer rate of 66 MBps. ATA/ATAPI-4 uses UDMA mode 2 (Ultra ATA/33) and has a maximum transfer rate of 33 MBps. It is also known as Ultra DMA and uses Cyclic Redundancy Checking. ATA/ATAPI-6 uses UDMA mode 5 (Ultra ATA/100) and has a maximum transfer rate of 100 MBps. It uses 48-bit LBA expansion and disk noise reduction. ATA/ATAPI-7 uses UDMA mode 6 (Ultra ATA/133) and has a maximum transfer rate of 133 MBps. It has multimedia streaming as a special feature.

Add-on card

Adding cards like graphic cards or network cards to improve computer specific performance

Trusted Platform Module (TPM)

Adds advanced cryptographic functions • Used by full disk encryption software • May be a separate module or integrated into the motherboard

VGA Port (Video Graphics Array)

Also called a DB-15 port, this 15-pin female port transmits analog video. All older monitors use this type of port.

all-in-one units

All in one means that all the computer components, except the keyboard and mouse, are contained within the monitor case.

Input/Output Ports

Allow additional devices to be connected to the PC. Some ports are designed for a particular type of device (such as a graphics port). Other ports such as USB, support different device types.

managed switches

Allow network admins to configure and manage functions by interfacing with the operating system. *Assigned an IP address only so the system admin can remote access the device.

USB OTG (USB on the go)

Allows a port to function either as a host or as a device. For example, a port on a smartphone might operate as a device when connected to a PC but as a host when connected to a keyboard.

Multithreading

Allows different parts of a single program to run concurrently.

paper/quality tab

Allows you to choose the type of paper stock (size and type) to use and whether to use an economy or draft mode to preserve ink/toner. You can also use the color tab to select between color and grayscale printing.

Hybrid Drive

Also called a Solid State Hybrid Drive (SSHD), these are a compromise between a magnetic HDD and an SSD. They are faster than an HDD but less expensive than an SSD. They are a magnetic HDD with an onboard SSD serving as cache. The SSHD drive automatically caches data that is frequently accessed.

RAID 1

Also called mirroring, this RAID array type provides fault tolerance because all the data is written identically to the two drives in the mirrored set.

IPv6

An IPv6 address is a 128-bit number (contrast with 32 bit number used in v4.) This massively increases the available pool of available addresses compared to IPv4 The Internet Protocol version 6 provides a large number of new addresses to route Internet traffic, using "from" and "to" addresses written as colon-hexadecimal notation, such as "fe80::42:acff:feaa:1bf0". 64-bit for Network ID 64-bit for Interface ID

Static Address

An IP address that does not change and is usually assigned manually by a network administrator

WYSIWYG

An acronym that stands for "What you see is what you get." Which means that the screen and print output are supposed to be the same. To achieve this, several components are required: -the print driver provides an interface between the print device and Windows -Support for one or more print languages determines how accurate the output be. the technology used by the printer determines the quality, speed, and cost of the output.

Adapter Card (Expansion Card)

An adapter card is any internal expansion card that allows the computer to communicate with another peripheral. A good example is a monitor or a video card. Expansion card, Hardware terms, Internal.

Media Access Control (MAC)

An address for communications on the physical network segment.

I/O address

An assigned address or range of addresses on a system's address bus that, together with an interrupt request line (IRQ), allows a device to be recognized by the processor.

digital-to-analog converter (DAC)

An audio device that accepts a bitstream representing sound samples and generates a continuous analog signal that can be amplified and routed to a speaker.

preshared key (PSK)

An authentication protocol that uses a passphrase to generate the encryption key and must be created and entered into both the access point and all wireless devices prior to the devices communicating.

E-Ink (electronic ink)

An e-reader technology that creates a screen that is easy on the eyes and most like the experience of reading a printed books

Advanced Host Controller Interface (AHCI)

An efficient way for motherboardsmother- boards to work with SATA host bus adapters. Using AHCI unlocks some of the advanced features of SATA, such as hot-swapping and native command queuing.

RJ-45 connector

An eight-position connector that uses all four pairs of wires. It is usually used for network connectivity

overcurrent protection (OCP)

An electrical device designed to open the circuit and stop the current when a high-current situation exists due to a fault in the circuit.

Integrated Circuit (IC)

An electronic circuit having many components, such as transistors, diodes, resistors, and capacitors, in a single package.

WiFi Protected Access (WPA)

An enhancement of 802.11 encryption that secures WiFi communications. The current standard is WPA2. a wireless security protocol to protect wifi networks uses 128-bit key TKIP (temporal key integrity protocol) - improvements over WEP - support EPA

expansion bus

An expansion bus is an assortment of wires that allows for computer expansion with the use of an expansion board, a printed circuit board inserted into an expansion slot on the motherboard or backplane that provides additional features to a computer system.An expansion bus provides an input/output pathway for transferring information between internal hardware, such as RAM or the CPU, and expansion devices such as a graphics card or sound card. Ex:PCIe

Sound Card

An expansion card that attaches to the motherboard inside the system unit and that enables the computer to produce sounds by providing a connection for the speakers and microphone.

Network Interface Card (NIC)

An expansion card that enables a computer to connect other computers or to a cable modem to facilitate a high-speed Internet connection.

Network Interface Card (NIC)

An expansion card that enables a computer to connect other computers or to a cable modem to facilitate a high-speed Internet connection. Such as an access point.

eSATA (External Serial Advanced Technology Attachment)

An extension to the Serial ATA standard that enables SATA drives to be attached externally.

Superpipelining

An improvement over pipelining. Superpipelining uses a larger number of shorter stages and support for a higher clock rate to improve performance.

Subscriber Identity Module (SIM)

An integrated circuit or hardware element that securely stores the International Mobile Subscriber Identity (SMSI) and the related key used to identify and authenticate subscribers on mobile telephones

Campus Area Network (CAN)

An interconnection of networks located in nearby buildings (for example, buildings on a college campus).

Graphics Device Interface (GDI)

An interface on a Windows network print client that works with a local software application, such as Microsoft Word, and a local printer driver to format a file to be sent to a local printer or a network print server. Under GDI, the print file can be spooled in one of two formats: -EMF (enhanced Metalife)- a small efficent, printer-independent file type. As the file is smaller, it is written to disk more quickly, therefore freeing up resources. The printer must support EMF for this to work. -RAW- this file type differs depending on your printer. RAW files must be formatted for the printer at the spooling stage, therefore it will take longer to spool the file and the file will be larger. The RAW spool format is a useful troubleshooting tool.

Micro SATA

An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) International Organization. An mSATA SSD has a smaller form factor than a standard SSD and is designed for use with portable, power-constrained devices such as laptops, tablets and netbooks. The mSATA SSD has also seen use in commercial products such as digital signs, point-of-sale devices, retail kiosks and multifunctional printers. An mSATA SSD is roughly the size of a business card. Advantages of mSATA SSDs include the small form factor, low power consumption, shock/vibration resistance and fast boot/shutdown capabilities. The maximum bandwidth of an mSATA SSD is 6 gigabits per second (Gbps).

Cold Cathode Fluorescent Lamp (CCFL)

An older backlighting technology that uses one or two fluorescent tubes to light a monitor panel.

Small Computer System Interface (SCSI)

An older parallel bus disk technology still used on some servers but has reached its performance limits at 640 MB/s transfer rates.

disk defragmentation

An optimization utility that will reorganize files and fragments to place related ones nearer to each other.

USB 2.0 Type B Micro (5-pin)

An updated connector for smaller devices, such as smartphones and tablets.

Micro-B USB

Android based devices usually have a Micro-B USB port for charging and connectivity.

Fiber to the Home (FTTH)

Broadband service provided via light-transmitting fiber-optic cables. Such pure fiber solutions are not widespread and generally carry a price premium above other types of internet access.

walled garden model

Apps that have to be submitted to and approved by Apple before they are released to users. This is also referred as the Walled garden model and is designed to prevent the spread of malware or code that could cause faults or crashes.

global address

Any address that appears on the outside portion of the network.

MFD (multifunction device)

Any device that performs more than one function. Multifunction printers that can print, scan, copy, and fax are common MFDs.

Equipment Identity Register (EIR)

Any phone connected to a GSM network must have the IMEI number stored in the EIR

Which of these is a proprietary cable used on Apple products?

Apple's iPhone and iPad mobile devices use a proprietary 8-pin Lightning port and connector. The Lightning connector is reversible (can be inserted either way up). Intel developed the Thunderbolt (TB) interface for use on Apple workstations and laptops. It connects display devices (like DisplayPort) and peripheral devices (like USB). Serial port is an old type of cable where the data is transmitted over one wire one bit at a time. The Universal Serial Bus (USB) has become the standard means of connecting peripheral devices to a computer. It is an example of a multipurpose cable that can be used to attach a wide range of peripherals and storage devices.

OSI Model

Application, Presentation, Session, Transport, Network, Data Link, Physical

Denial of Service (DoS)

Attack on a host machine, host OS, or hypervisor will cause far more damage to the server infrastructure than a DoS on a single web server. The security problem in which users are not able to access an information system; can be caused by human errors, natural disasters, or malicious activity.

file recovery

Attempts to recover a file that has been erased

Superpipelining

CPU's process multiple instructions at the same time(for example, while one instruction is fetched, another is being decoded another is being executed, and another is being written back to memory.

Integrated Drive Electronics (IDE) and (SCSI) small computer system interface

Both use parallel transfers of data per clock signal to improve bandwidth. Have been replace with SATA

3D print process

Builds a solid object from successive layers of material. The material is typically some sort of plastic but there are printer types that can work with rubber, carbon fiber, or metal alloys too.

CPU form function

CPU packaging refers to the CPU's form factor and how it is connected to the motherboard.

For the office network upgrade to Gigabit Ethernet, you need proper cabling. What is your choice of cabling?

Cat 5e has a capacity of 1 Gbps and is suitable for the network. Cat 6 cable has a capacity of 10 Gbps and both are suitable for the network. Cat 5 cable has a capacity of 100 Mbps and is unsuitable for the network. Cat 5e has a capacity of 1 Gbps and is suitable for the network. Cat 6 cable has a capacity of 10 Gbps and is suitable for the network. Cat 5 cable has a capacity of 100 Mbps and is unsuitable for the network. Cat 5 cable has a capacity of 100 Mbps and is unsuitable for the office network. Cat 6A has a capacity of 10 Gbps and is suitable for the network.

Which category of Ethernet cable is 250MHz and carries 1-10 Gbps of data?

Cat 6 uses 250MHz and carries 1Gbps of data up to 100m (328ft) and can carry 10Gbps of data up to 55m (180ft). 1Gbps is used in 1000BASE-T neworks and 10Gbps is used in 10GBASE-T neworks. Cat 5 uses 100MHz and carries 100Mbps of data up to 100m (328ft) and is used in 100BASE-TX networks. Cat 5e uses 100MHz and carries 1 Gbps of data up to 100m (328ft) and is used in 1000BASE-T networks. Cat 6A uses 500MHz and carries 10 Gbps fo data up to 100m (328ft) and is used in 10GBASE-T networks.

CAT 5e

Category 5e wire; TIA/EIA standard for UTP wiring that can operate at up to 1 Gbps.

Tracks

Circles on a magnetic storage device where data is stored or retrieved.

ipconfig /flushdns

Clears the DNS resolver cache Flush the DNS resolver cache

Coax cables use which type of connector?

Coax installations also use screw-down F-connectors. A broadband cable service, for example, is likely to use the F-connector for drop cables. Straight tip is a bayonet-style connector that uses a push-and-twist locking mechanism; used mostly for multi-mode networks. Twisted pair cabling for Ethernet is terminated using modular RJ-45 connectors. RJ-45 connectors are also referred to as 8P8C, standing for 8-position/8-contact. RJ-11 connectors are used with 2- or 3-pair UTP or with flat ribbon "silver satin" phone cables. Typically only one pair carries the dial tone and voice circuit (also called the Tip and Ring wires after the way older phono plugs were wired).

RG-6 Cable

Coaxial Cable used for connecting homes to cable networks. Larger conductor and higher frequencies than RG-59. Often used as a drop/patch cable for Modern Cable Access TV(CATV) and broadband cable modems.

Color Laser Printer

Color lasers use separate color toner cartridges (Cyan, Magenta, Yellow, and Black) but employ different processes to create the image.

Serial ports

Computer ports that can transmit data one bit at a time; often used by a modem or a mouse.

subscriber connector (SC)

Connector with a push/pull design that allows for simpler insertion and removal than FC. There are simplex and duplex versions through the duplex version is just two connectors clipped together. It can be used for single-or multi-mode.

Virtual NIC

Connects a VM to a virtual switch and functions like a physical NIC. Has a unique MAC address and IP addresses. Forwards the VMs network I/O in the form of Ethernet frames to the virtual switch -however there will also need to be a physical NIC to get the thin client computer onto the network.

internal bus(or local bus)

Connects core components such as the CPU, Memory, and the System Controllers

blacklists

Content filtering works on the basis of blacklists of URLs that are known to harbor a particular type of content. There will be separate blacklist for different types of content that users might want to block. There are also blacklists of sites known to host malware. The firewall will block any IP address or domain name appearing on a blacklist for which a filter has been configured.

Liquid-Based Cooling

Cooling system for CPU, GPU, and other components that replaces air cooling with heat blocks, a heat exchanger, and liquid-filled hoses; used for extreme overclocking.

Point of Presence (POP)

Customers connect to an ISPs network via local Point of Presence (PoP). The ISP uses a back haul link (or a transit arrangement with another ISP) to connect each POP to their core network infrastructure and one or more IXPs.

Obtain an IP address automatically option

DHCP can allocate an IP address to a new machine joining the network.

SDRAM (synchronous DRAM)

DRAM that is synchronous, or tied to the system clock. This type of RAM is used in all modern systems.

DDR (Double Data Rate)

Data is transmitted on both sides of the clock signal and uses 184 pins. Sometimes called DDR SDRAM or DDR RAM.

Serial port (RS232)

Data is transmitted over one wire one bit at a time. Supports data rates up to about 115 Kbps only.Used to be used to connect serial mice, modems, and older model printers.

Volatile

Data that cannot be stored without a power supply. System memory/RAM

(PAT) Portable Appliance Testing

Device that ensures that a device is safe to use. The frequency will depend on the environment in which the device is used.

Memory Card Reader

Device used to connect flash memory cards to the PC and allow for data transfer

RAID-0 (Disk Striping)

Disk Striping. Disk striping requires at least two drives. It does not provide redundancy to data. If any one drive fails, all data is lost.

Windows Presentation Foundation (WPF)

Display and print functions for compatible application are handled by the Windows Presentation Foundation (WPF) -A WPF print job is formatted and spooled as an XML Print Specification (XPS) file in the printers spool folder (systemRoot\system32\spool\Printers.

Which of these was developed as a royalty-free standard?

DisplayPort

ipconfig /displaydns

Displays the DNS resolver cache. This contains host and domain names that have been queried recently. Caching the name-to-IP mappings reduces network traffic. displays all cached dns entries in a windows system

Sectors

Divisions on magnetic media used for storing digital information.

Which type of cable would you use to run through walls?

Drop cables are solid cabling used for "permanent" links, such as cable running through walls. This is often also called drop cable, as the installer drops the cable through the wall void to the hole cut out for the port. Drop cables are solid cabling used for "permanent" links, such as cable running through walls. This is often also called drop cable, as the installer drops the cable through the wall void to the hole cut out for the port. Plenum cable is fire retardant and must not emit large amounts of smoke when burned, be self-extinguishing, and meet other strict fire safety standards. A patch cord is used to connect a port on the patch panel to a port on the switch. A crossover cable uses a T568A connector at one end and T568B at the other. Crossover cables were once used to connect computers directly.

cover

Each case has a cover, which is removed by either undoing the screws at the back or pressing together clips that release it.

Direct Current (DC)

Electric current that flows in only one direction

grounded

Electrical equipment must also be grounded(or earthed). If there is a fault that causes metal parts in the equipment to become live, a ground provides a path of least resistance for the electrical current to flow away harmlessly. Most computer product

expansion slots

Enable you to install plug-in adapter cards in a computer to extend the range of functions it can perform. A narrow slot on the motherboard where an expansion card can be inserted. Expansion slots connect to a bus on the motherboard. Computers can support more than one expansion bus. PCs use a multi-bus design, to support older technologies and allow for upgrades.

Wake on LAN (WoL)

Enables you to wake up the computer remotely by sending data to it through the network adapter

Single-mode fiber (SMF)

Fiber-optic cable that allows only a single light wave to pass down the cable. has a samll core (8-10 microns) and is designed to carry a long wavelength, near infrared (1310 or 1550nm) Light signal, generated by a laser.

RAID 5 - Striping with Parity

File blocks are striped along with a parity block. This requires at least three disks. Efficient use of disk space as files aren't duplicated, but space is still used for parity. High redundancy Data is available after drive failure but parity calculation may affect performance.

plenum cable

Fire resistant and non-toxic; it must be used when wiring above ceiling tiles. PVC cable cannot be used to wire above ceilings because it is toxic when burned.

F/UTP

Foil over twisted-pair cabling

USB 2.0 Type B (4-pin)

For connection to a device

USB 2.0 Type A (4-pin)

For connection to the host.

Server Consolidation

For server computers and applications, the main use of virtualization is better hardware utilization through server consolidation. Using virtual machines as small servers hosted by a hypervisor running on a larger machine; reduces total hardware requirements because not every server has to be installed on a separate computer.

Error checking and correcting (ECC) memory

For systems that require a high level of reliability such as workstations and servers. ECC memory is enhanced parity circuitry that can detect internal data errors and make corrections

pin grid array (PGA)

Form factor chips designed to fit in a Zero insertion force (ZIF) socket.A feature of a CPU socket whereby the pins are aligned in uniform rows around the socket.

Comma Separated Values (CSV)

Format that contains a comma between each value. The CSV format can be used to import and export information from other third-party applications.

PC Disasembly

Guideline for disassembling PCs(terms) Before you start to disassemble a PC, consider the following: -Back up all the data -Create a clean work environment -Gather all necessary tools and equipment -Make sure that all devices are powered off and unplugged -Take anti-static precautions to minimize the chance of damaging sensitive components.

Mobile Equipment Identifier (MEID)

Handsets are identified by a MEID. CDMA locks the handset to the original provider and does not require any sort of SIM card.

RG-59 coaxial cable

Has a thinner core conductor and was used as a drop cable for older CATV/cable modem installs and is also used for CCTV cabling. An older and thinner coaxial cable once used for cable TV.

Universal Serial Bus (USB)

Has become the standard means of connecting peripheral devices to a computer. A USB bus consists of a host controller and up to 127 devices.

Dolby Digital 7.1

Has two extra side speakers than 5.1

Printed Circuit Board

Houses the processor, chip-set, memory, and expansion slots. A board used for mounting electrical components. Components are connected using metal traces "printed" on the board instead of wires.

silicon chip

Hundreds of transistors packed into an integrated circuit on a piece of silicon.

Which of these cables was invented by Intel?

Intel developed the Thunderbolt (TB) interface for use on Apple workstations and laptops. It connects display devices (like DisplayPort) and peripheral devices (like USB).

Motherboard Form Factor

In computing, the form factor is the specification of a motherboard - the dimensions, power supply type, location of mounting holes, number of ports on the back panel, etc. common motherboard form factors: ATX (Advanced Technology Extended, Micro-ATX, Mini-ITX

Language

In windows, the type of keyboard layout is configured through the Language applet in control Panel/settings so that the computer knows which symbol to use when a particular key or key combination is pressed.

Negative Acknowledge (NACK)

Indication that a communication has failed

Preferred Roaming List (PRL)

Information that the cellular radio needs to connect to the network. A list of preferred service providers or radio frequencies your carrier wants a mobile device to use and is stored on a Removable User Identity Module (R-UIM) card installed on the device.

Disk Management

Initializes disks, creates partitions, and formats partitions

What are most PCs manufactured by?

Intel and AMD

(TB)thunderbolt

Interface developed by Intel and is primarily used on Apple workstations and laptops. Thunderbolt can be used as a display interface (like DisplayPort or HDMI) and as a general peripheral interface(like USB).

SATA (Serial ATA), (Serial Advanced Technology Attachment)

Interface for connecting storage devices like hard disks. support up to 1 device

input voltage

Is determined by the total power required by the A/C loads and the voltage of any D/C loads.

audio subsystem

Is made up of a sound card to process audio signals and provide interfaces for connecting equipment and one or more input (microphone) and output (speaker) devices.

Serial Advanced Technology Attachment (SATA)

Is the standard means of attaching internal storage drives to a desktop PC.

SATA (Serial Advanced Technology Attachment)

Is the standard means of attaching internal storage drives to a desktop PC. Each SATA host adapter port supports a single device.A newer hard drive technology that is replacing PATA. SATA connectors have a distinctive L shape.

internet of things

Is used to describe the global network of personal devices such as phones, tablets, and fitness trackers, home appliances, home control systems, vehicles, and other items that have been equipped with sensors, software, and network connectivity.

Dynamic Host Configuration Protocol (DHCP)

It can be used to allocate an IP address and subnet mask(plus other settings dynamically. Dynamically assigns IP address information (for example, IP address, subnet mask, DNS server's IP address, and default gateway's IP address) to network devices. The computer contacts the DHCP server as it starts up and is allocated a lease for an IP address.

proxy server

It takes a whole HTTP request from a client, checks it, then forwards it to the destination computer on the internet. A computer system (or an application program) that intercepts internal user requests and then processes that request on behalf of the user.

trip hazard

Items such as extension cords or tools lying on the ground in walkways that can cause someone to stumble.

What distance between hosts in a network is considered local?

LAN

field replaceable units (FRUs)

Laptops have fewer field replaceable units than desktops. That said, laptop components and designs have become better standardized. using components sourced from the laptop vendor is still recommended, but basic upgrade options, such as memory and disks, have become much simpler as it reduces warranty support cost for the vendors. Parts that are designed to be able to be replaced by a technician working in the field. Examples include memory, motherboards, mice, and printers.

LED printer

Laser printer that uses a row of laser diodes to "write" the image rather than a laser beam.

switches

Like hubs, switches can connect nodes together in a single network, repeating and regenerating signals over multiple ports. Like bridges, switches are used to reduce the effect of contention on network performance.

Attenuation

Loss of power in a signal as it travels from the sending device to the receiving device

Onboard adapter

Low-end graphics adapters are likely to be included with the motherboard chipset or as part of the CPU itself.

Port male and female

Male- meaning they have pin connectors Female-meaning they have hole connectors

Single channel memory

Means that there is one 64-bit bus between the CPU and RAM.

Advanced Technology Extended (ATX)

Measures 12"x9.6" Have an integrated port cluster on the back can contain up to 7 expansion slots RAM slots and expansion bus slots are perpendicular to each other

External Transfer Rate

Measures how fast data can be transferred to the CPU across the bus.

CAD/CAM design workstation

Media design workstations are configured to support the needs of graphic designers, engineers, architect's, 3D media developers, and other design driven roles.

Small Outline DIMM (SODIMM)

Memory module used in small form factor and laptop computers

Which of these is NOT part of a fiber optic strand?

Mesh conductor A mesh conductor is part of a coaxial (coax) cable that serves both as shielding from EMI and as a ground. It is not found in fiber optic cables. The core of an optical fire is an ultra-fine strand of glass that carries the light signals. The cladding is either glass or plastic, and guides the light pulse along the core by bouncing the light signal back into the core. The protective coating around the cladding is called the buffer. This prevents light from entering the cable and also helps to bounce the light signal back into the core.

Cable Modem Termination System (CMTS)

More coax then links all the premises in a street with (CMTS) which routes data traffic via the fiber backbone to the ISP's Point of Presence (PoP) and from there to the internet. is used to terminate, manage, and translate high-speed Internet sessions between cable modems in a local access network (LAN) and other devices in a wide area network (WAN). Acts as the hand-off point between the RF-based HFC network and other networks such as the Internet and the PSTN.

Indoor positioning system (IPS)

Most devices use a combination of GPS and IPS which uses information from nearby Wi-Fi, hotspots, to provide location services.

I/O adapter and storage cards.

Most input/output(I/O) bus functions are provided on the motherboard, which will typically have USB ports for external peripherals and SATA ports for internal storage drives. An adapter card can be installed to provide additional ports or a bu type that is not supported on the motherboard. Typical example includes an eSATA host adapter to make external storage ports available, a flash memory card reader, a card with extra USB ports, or a card supporting wireless peripherals, such a Bluetooth.

infrastructure mode

Most wifi networks are configured in what is technically referred to as infrastructure mode. Infrastructure mode means that each client device or station is configured to the network via an Access Point (AP).

network address port translation (NAPT)

NAPT works by allocating each new connection a high level TCP or UDP port.

Near Field Communication (NFC)

NFC allows for very short-range data transmission (up to about 20 cm/8in) to activate a receiver chip in the tactlessness) credit card reader. A set of standards primarily for smartphones and smart cards that can be used to establish communication between devices in close proximity. -NFC allows a mobile device to make payments via contactless Point-of-Sale (PoS) machines. To configure a payment service, the user enters their credit card information into a Mobile Wallet app on the device.

Network Basic Input/Output System (NetBIOS)

Netbios allowed computers to address one another by name and establish sessions. As the TCP/IP suite became the standard for local networks, NetBIOS was re-engineered to work over the TCP and UDP protocols, referred to as NetBIOS over TCP/IP (NETBT)

Unshielded Twisted Pair (UTP)

Networking cable that has four twisted pairs of copper wire and a flexible outer coating.

Very Small Aperture Terminal (VSAT)

Networking services such as data, voice, video, and fax transmissions are delivered using geostationary satellites

thin client

Networking system whereby client computers rely on servers to perform their processing tasks.

TWAIN based software

Older scanners use TWAIN based software, modern scanners are more likely to use output format PDF or JPEG

DSL modem

On a DSL modem, the RJ-11 port on the modem connects to the phone point. A device that demodulates an incoming DSL signal, extracting the information and passing it to the data equipment (such as telephones and computers), and modulates an outgoing DSL signal.

port number

One of the critical functions of the transport layer is to identify each type of network application. It does this by assigning each application a port number between 0 and 65535. For example, data addressed to the HTTP web browsing application can be identified as port 80 while data requesting an email application service can be identified as port 143.(IMAP) (internet mail access protocol). At the transport layer, on the sending host, data from the upper layers is packaged as a series of segments and each segment is tagged with applications port number. The segment is then passed to the network layer for delivery. *At the network and data link layers, the port number is not significant, it becomes part of the data payload and is "invisible" to routers and switches working at the network and data link layers.

Rapid Elasticity

One of the most often cited benefits of implementing cloud computing is that the cloud provides rapid elasticity. This means that the cloud can scale quickly to meet peak demand. For example, a company may operate a single web server instance for most of the year, but provision additional instances for the busy Christmas period and then release them again in the New Year. -storage, network bandwidth, and computing capacity can be increased or decreased immediately, allowing for optimal scalability

The Serial Advanced Technology Attachment (SATA) replaced which of these technologies?

PATA

FRUs(Field Replaceable Unit)

PC components that are easily user-replaceable or (upgradeable)are referred to as field replaceable units (FRUs)Ex: Mouse, CPU , keyboards

Power Sourcing Equipment (PSE)

POE enabled siwtches are reffered to as end-span (or end-point)

Address Resolution Protocol (ARP)

Part of the TCP/IP protocol for determining the MAC address based on the IP address. ARP finds the MAC(network adapter) address associated with an IP address.

passive cooling device

Passive cooling means that it does not require extra energy (electricity) to work. Ex: Heat-sinks.

USB Power

Power is supplied by the host at 5V and a single device may draw up to 500 mA (milliamps) or 2.5W (increased to 4.5 W inch with the USB 3.0 specification).

throttling

Power reduction/thermal control capability allowing CPUs to slow down during low activity or high heat build-up situations. Intel's version is known as Speed- Step, AMD's as PowerNow!.

which computer component presents the most danger electrical shock?

Power supplies

Basic Service Set Identifier (BSSID)

Present in almost all 802.11 frames, used to distinguish traffic between networks with identical SSIDs. Typically the MAC address of the AP

Apple Filing Protocol (AFP)

Protocol developed by Apple to facilitate file transfers between computers. It is no longer the default protocol used by Mac OS X.

USB to RJ-45 dongle (laptops)

Provide an Ethernet port for a laptop or mobile device. Ultra thin laptops often omit a built-in RJ-45 port as it is too tall to fit in the chassis. An adapter that plugs into a USB port and provides an RJ-45 port for a network cable to connect to a wired network.

Personal Area Network (PAN)

Provide communication over a short distance that is intended for use with devices that are owned and operated by a single use. A PAN refers to using wireless connectivity to connect to devices within a few meters, printers,smartphones, headsets, speakers, video displays, and so on.

Bluetooth

Range is 10m(30ft) at 2.4 ghz Uses radio communications and supports speed up to 3Mbps. Adapters supporting version 3 or 4 of the standard can achieve faster rates up to 24 Mbps. Though the ability to negotiate an 802.11 radio link for large file transfers (BT+HS (High speed) -bluetooth does not require line of sight

client-side virtualization

Refers to any solution designed to run on ''ordinary'' desktops or workstations. Each user will be interacting with virtualization host directly. Desktop virtual platforms usually based on some sort of guest OS hypervisor, are typically used for testing and development. such as: -virtual labs -support legacy -Development environment -training Using this virtualization, a personal computer provides multiple virtual environments for applications.

Resource pooling

Resource pooling means that the hardware making up the cloud providers' data center is not dedicated to or reserved for a particular customer account. In order to respond quickly to changing customer demands, cloud providers must be able to provision resources quickly. This is achieved through resource pooling and virtualization. Cloud computing services to multiple customers that are hosted on shared physical resources and dynamically allocated to meet customer demand.

standoffs

Round plastic or metal pegs that separate the motherboard from the case, so that components on the back of the motherboard do not touch the case.

Overclocking

Running a processor at a higher frequency than is recommended by the manufacturer, which can result in an unstable system, but is a popular thing to do when a computer is used for gaming.

Software Defined Networking (SDN)

SDN means that network access devices-access points, switches, routers, and firewalls-can be configured using software programs and scripts.

Two common types of rapid prototype 3D printing

SLA (stereolithohraphy (SLA) uses liquad plastic resin or photopolymer to create objects which are cured using an ultraviolet laser. SLS Selective laser sintering (SLS) fuses layers together using a pulse laser. The object is created from a powder and lowered into a tank as each layer is added.

Secure Boot

Security system designed to prevent a computer from being hijacked by malware. A UEFI feature that prevents a system from booting up with drivers or an OS that are not digitally signed and trusted by the motherboard or computer manufacturer.

eSATA (external serial ATA ) external Serial Advanced Technology Attachment

Serial ATA-based connector for external hard drives and optical drives. Sends the SATA bus to external devices. eSATA connectors are similar to SATA connectors but they are keyed differently so you don't get them confused.

Why would you use Shielded Twisted Pair (STP) Ethernet cable rather than unshielded cable?

Shielded cable is less susceptible to interference and crosstalk. Each pair was surrounded by a braided shield. This cable construction is referred to as Shielded Twisted Pair (STP). Fire retardant cables are used in the plenum space, where the chance of fire is much greater so the cable is required to meet strict fire safety codes. STP is bulky and difficult to install as a braided shield surrounds each pair, making the cable harder to install. Interference on the cable degrades communications so you want to prevent this. Shielded cable makes it less susceptible to interference and crosstalk and does not generate interference.

Augmented Reality (AR)

Similar to VR technology. Rather than provide a completely simulated environment, AR project digital artifacts onto ordinary reality. This could be as simple as providing context sensitive notes, messages, or advertising or as complex as generating digital avatars within e real world.

With which type of hardware would you expect to use a USB to Ethernet adapter?

Slimline laptop

Memory module

Small circuit board that houses RAM chips and is held in a memory slot on the motherboard.

Hypervisor

Software that enables a single computer to run multiple operating systems simultaneously. Some of the main functions of the hypervisor include: -Emulation-each guest OS expects exclusive access to resources such as the CPU, system memory, storage devices, and peripherals. The hypervisor emulates these resources and facilitates access to them to avoid conflicts between the guest OS. -Guest OS support- the hypervisor may be limited in terms of the different types of guest operating systems it can support. Virtualization if often used as a means of installing old OSs, such as MS-DOS or Windows 9x, as well as modern version of Windows and Linux. -Assigning resources to each guest OS- for example, if the host computer has 4 GB memory, 1 GB might be required by the host OS, leaving 3 GB to assign to each guest OS. You could have three guest each configured with 1 GB. Configuring networking- a hypervisor will be able to create a virtual network enviornment through which all the VMs can communicate. It will also be able to create a network shared by the host and by VMs on the same host and on the hosts.

Firmware

Software that is permanently stored in a chip. The BIOS on a motherboard is an example of firmware.

virtual machine (VM)

Software that simulates the hardware of a physical computer, creating one or more logical machines within one physical machine.

Type 2 hypervisor

Software to manage virtual machines that is installed as an application in an operating system. examples of host based hypervisors include VMware Workstation, Oracle, Virtualbox, and Parallels. -The Hypervisor software must support the host OS.

drop cable

Solid cable is used for permanent links, such as the cable running through walls. This is often known as drop cable, as the installer drops the cable through the wall void to the hole cut out for the port. This cable links the RJ-45 port on a wall plate and patch panel.

Ingress protection (IP) scale

Some cases are able to provide a degree of waterproofing. Some mobile devices are designed to be inherently waterproof. Waterproofing is rated in the IP scale. A case or device will have two numbers such IP67. The first (6) is a rating for repelling solids, with 5 or 6 representing devices that are dust protected and dust proof, respectively. The second value (7) is for liquids, with a 7 being protected from immersion in up 1 m and 8 being protected from immersion beyond 1 m.

Wake on Wireless LAN (WoWLAN)

Some devices with wireless chips come with wake on wireless LAN. Sends magic packets wireless to wake up a computer

drive enclosure

Specialized case designed to hold and power disk drives while providing a mechanism to allow them to communicate to one or more separate computers

RS232

Specifies a 25-pin hardware interface but in practice,PC manufacturers used the cheaper 9-pin D-Shell (DB-9)

frame rate

Speed at which video frames appears on a screen; measured by FPS (frames per second)

Laser Printing Process

Step 1: Processing • Build the entire page in memory Step 2: Charging • Prepare the drum with a negative electrostatic charge Step 3: Exposing • Write the image with the laser Step 4: Developing • Add toner to the charged areas of the imaging drum Step 5: Transferring • Move the toner from the drum to the paper Step 6: Fusing • Heat and pressure Step 7: Cleaning • Remove excess toner

USB 3.0

SuperSpeed: 5 gigabits per second, 3 meters Full duplex

Shaded units

Support the special effects built into games and other software. These calculations include 3D shading, realistic shadows and lighting, surface textures, and so on.

Digital Light Processing (DLP)

Technology that bounces light off microscopic mirrors on a computer chip used by small computer projectors.

DTLS (datagram Transport Layer Security)

TLS that can be used with UDP applications

Fiber to the Curb (FTTC)

Takes the fiber even closer to the subscriber, bringing the optical fiber directly to the "curb" near customer homes and/or businesses.

Fiber to the Premises (FTTP)

Technology that uses fiber-optic cables to provide high-speed Internet access to home and business users.

Channel Selection (1,6,11)

The 2.4 GHz band for 802.11 b/g/n is subdivided into 11 channels (in the US) spaced at 5Mhz intervals.

P4 and EPS connectors

The ATX12V standard speifies an additional 4-pin (2x2) +12 V connector (often labeled P4) to support the operation of the CPU.

Northbridge

The CPU is connected to the RAM via this bridge. Is an integrated circuit that is responsible for communications between the CPU interface and the memory.

globally unique ID (GUID) Partition Table (GPT)

The GUID Partition Table (GPT) is a standard for the layout of partition tables of a physical computer storage device, such as a hard disk drive or solid-state drive, using universally unique identifiers, which are also known as globally unique identifiers (GUIDs).

Mini HDMI

The HDMI Type C interface with the same 19 pins as the standard Type A interface. This compact HDMI interface allows smaller devices to output HDMI quality audio and video. ex: camcorders

IPv4

The Internet Protocol version 4 is the dominant protocol for routing traffic on the Internet, specifying "to" and "from" addresses using a dotted decimal such as "122.45.255.0". IPv4 address is 32 bits long and is used within an IPv4 packet to define the source and destination of the packet.

Public Switched Telephone Network (PSTN)

The PTSN is the national and gloabal telecommunications network. The voice grade copper wire part of this network (between subscribers and the telecom provider's switches) is sometimes referred to as the Plain Old Telephone Service (POTS) local loop or last mile. The world's collection of interconnected commercial and government owned voice-oriented systems.

Which SCSI connector was commonly used by Apple and Iomega devices?

The SCSI DB25 connector is a 25-pin connector used primarily by Apple and Iomega (Zip external data storage drives) hardware. The SCSI IDC50 connector is a 50-pin internal connector used with early SCSI devices (SCSI-1 5 MBps 8-bit bus width hardware). The SCSI HD68 connector is a 68-pin connectors used for internal and external ports. These 68-pin adapters support the 16-bit bus width Wide SCSI technology. The SCSI Single Connector Attachment (SCA) connector is an 80-pin connector that incorporates both a power connector and configuration wires, allowing for hot swappable drives.

Temporal Key Integrity Protocol (TKIP)

The WPA and WPA2 encryption technology. A WPA encryption technology. An encryption technology that replaces the Wired Equivalent Privacy (WEP) protocol.

hot-swappable

The ability to plug or unplug devices without first powering down the system. USB devices are hot-swappable.

CMOS battery

The battery on the motherboard used to power the CMOS chip when the computer is unplugged. The batteries last 5-10 years.

front side bus (FSB)

The bus between the CPU and memory on the motherboard. The bus frequency in documentation is called the system speed, such as 400 MHz. Also called the memory bus, front-side bus, local bus, or host bus.

system bus

The bus between the CPU and memory on the motherboard. The bus frequency in documentation is called the system speed, such as 400 MHz. Also called the memory bus, front-side bus, local bus, or host bus.

instruction set

The collection of instructions that a CPU is designed to process.

What is the main connection difference between USB-C and earlier versions of USB?

The connector is small, flat and reversible.

CPU Socket

The connector on the motherboard that houses a CPU and forms the electrical interface and contact with the CPU. Ex: LGA (longrid array) PCA (pingrid array) RGA

Encryption

The crucial step in enforcing wireless security is to enable encryption. Encryption scrambles the messages being sent over the WLAN so that anyone intercepting them is not able to capture any valuable information. An encryption system consists of a cipher, which is the process used to scramble the message and a key. The key is a unique value that allows the recipient to decrypt a message that has been encrypted using the same cipher and key.

Finishing tab

The finishing tab lets you select output options such as whether to print on both sides of the paper (duplex), print multiple images per sheet, and/or print in portrait or landscape orientation.

Access Control List (ACL)

The firewall may provide the option to accept all packet accept for those on the reject list or, alternatively, t may provide the option to reject all packets except for those on the accept list.

Master Boot Record (MBR)

The first 512-byte boot sector of a partitioned data storage device such as a hard disk. It is used to hold the disk's primary partition table and contains the code to bootstrap an operating system, which usually passes control to the volume boot record and uniquely identifies the disk media.

power-on self-test (POST)

The first job the basic input/output system (BIOS) performs, ensuring that essential peripheral devices are attached and operational. This process consists of a test on the video card and video memory, a BIOS identification process (during which the BIOS version, manufacturer, and data are displayed on the monitor), and a memory test to ensure memory chips are working properly.

Android application package (APK)

The format used by Android apps for distributing the app in a package of files wrapped into one file with an .apk file extension.

fully qualified domain name (FQDN)

The full name of any host. FQDNs reflect the hierarchy, from most specific (the host) to least specific (the top level domain followed by the root). For example: www.widget.com

FQDN (Fully Qualified Domain Name)

The host name combined with the host's domain name.

hub

The hub contains a number of ports-typically between 4 and 48 to provide connections for network devices.

filament

The ink for a 3D printer is supplied as a spool of filament. Filament is provided either as 1.75 mm or 3mm diameter. To change a filament, the extruder must be heated to the appropriate temperature.

Mini-ITX

The largest and the most popular of the three ITX form factors. At a minuscule 6.7 by 6.7 inches, Mini-ITX competes with microATX and proprietary small form factor (SFF) motherboards. - 1 expansion slot

top-level domain (TLD)

The last section of a domain name, specifying the type of organization or its country of origin. Ex: .com,.org,.net,.info.biz,.gov,.edu,.uk,.ca,.de)

Very High Bitrate DSL (VDSL)

The latest form of DSL with download and upload speeds of up to 100 Mbps. VDSL was designed to run on copper phone lines, but many VDSL suppliers use fiberoptic cabling to increase effective distances.

LTE-Advanced

The latest version of LTE, achieving theoretical downlink rates of up to 3 Gbps and uplink rates up to 1.5 Gbps. LTE-A is around 40 Mbps.

Internet backbone

The major infrastructure of the internet. a collection of high-speed data lines that connect major computer systems located around the world. Consist of very high bandwidth trunks connecting internet exchange points.

Dynamic RAM (DRAM)

The most common type of system memory, it requires refreshing every few milliseconds.

Digital Single Lens Reflex (DSLR)

The most expensive and versatile type of digital camera. A high-end digital camera that enables you to change the lens, attach a hot shoe flash, manually adjust focus and exposure, and look through the viewfinder to frame your shot

Relative Distinguished Name (RDN)

The most specific attribute. As it uniquely identifies the object within the context of successive (parent) attribute values.

RJ-45 (registered jack 45)

The network adapter that's already installed as part of the motherboard chipset will have an RJ-45 port to connect the computer to the network, via another Rj-45 port in the network equipment. This port will be marked "LAN"(local area network. The standard connector used with shielded twisted pair and unshielded twisted pair cabling.

revolutions per minute (rpm)

The number of times per minute that a hard disk platter rotates. High performance drives are rated at 15,000 or 10,000. Average is 7,200 or 5,400 rpm.

autosheet feeder (ASF) mechanism

The paper pickup mechanism is quite similar to that of laser printer. Paper is fed into the printer by an AutoSheet Feeder (ASF) mechanism.

Feed Assembly

The part of a computer responsible for taking the paper through the printer.

Arithmetic Logic Unit (ALU)

The part of the central processing unit that performs arithmetic computations and logical operations.

DSL Access Multiplexer (DSLAM)

The phone line makes the connection a bank of DSL modems in the exchange. A network device that connects multiple customer digital subscriber line (DSL) interfaces to a high speed digital communications channel using multiplexing techniques.

connectors

The pieces of hardware that connect the wire to the network device, be it a file server, workstation, switch, or printer.

access point (AP)

The point at which access to a network is accomplished. This term is often used in relation to a wireless access point (WAP)

Interface

The point at which two devices connect and communicate with each other

Collision Domain

The portion of an Ethernet network in which collisions could occur if two nodes transmit data at the same time. Because each port is in a separate collision domain, collisions can only occur if the port is operating in half-duplex mode.

Print Head Alignment

The process by which the print head is calibrated for use. A special utility that comes with the printer software is used to do this.

data synchronization

The process of automatically merging and updating common data that is stored on multiple devices.

Full Disk Encryption (FDE)

The process of encrypting all the data on the hard disk drive used to boot a computer, including the computer's operating system, and permitting access to the data only after successful authentication with the full disk encryption product

IA-32

The processor instruction set identifies all instructions (operations) that a processor can perform. 32-bit processors use the ____ instruction set (also referred to as x86).

Common Internet File System (CIFS)

The protocol that NetBIOS used to share folders and printers. Still very common, even on UNIX/Linux systems.

PPP over Ethernet (PPPoE)

The protocol used by DSL to send PPP information over an Ethernet connection.

2.4-GHz band

The range of radio frequencies from 2.4 to 2.4835 GHz. The 2.4 GHz band, which allows for 11 unlicensed channels, is used by WLANs that follow the popular 802.11b and 802.11g standards. However, it is also used for cordless telephone and other transmissions, making the 2.4 GHz band more susceptible to interference than the 5-GHz band.

CPU Speed or Advanced Chipset features

The rate at which the CPU can perform a task, such as moving data to and from RAM, or performing a numerical calculation.

Aspect Ratio

The relationship of width to height in a picture or shape.

In which atmospheric conditions is the risk of ESD(Electrostatic discharge) highest?

The risk increases during dry, cool conditions when humidity is low.

Uniform Resource Locator (URL)

The set of letters that identifies the address of a specific resource on the Web.

Internal transfer rate

The speed at which data moves from a platter's surface to the internal buffer of the disk.

Microsegmentation

The switch establishes a point-to-point link called a virtual circuit between any two network nodes. The process in LAN design by which every switch port connects to a single device, with no hubs connected to the switch ports, creating a separate collision domain per interface. The term's origin relates to the fact that one definition for the word "segment" is "collision domain," with a switch separating each switch port into a separate collision domain or segment.

rotational latency

The time necessary for the desired sector to rotate to the disk head

Transport Control Protocol (TCP)

The transmission protocol of the internet protocol suite. It is a reliable and a connection-oriented protocol. Uses acknowledgment messages that inform the sender the data was successfully received.

T568A/T568B

The two color codes used for wiring eight-position RJ45 modular plugs.

VM Sprawl

The uncontrolled deployment of more and more VMS. Growth that occurs on a large number of virtual machines and requires resources—usually administration related—to keep up with.

Service Set Identifier (SSID)

The user-supplied network name of a WLAN; it can generally be alphanumeric from 2 to 32 characters.

ipconfig

The utility used to display TCP/IP addressing and domain name information in the Windows client operating systems.

dual-channel memory

There can effectively be two pathways through the bus to the CPU, meaning that 128 bits of data can be transferred per "transaction" rather than 64 bits.

Tone generator and probe

These devices are used to locate cables in a wiring closet. The tone generator is typically placed at the user end, and a probe is waved around in the wiring closet to locate the connection. It will make a distinctive noise when it is near the correct cable.

Fiber to the Node (FTTN)

These extend the fiber link to a communications cabinet in the street servicing multiple subscribers. Fiber-optic broadband service delivered to the telco box in front of the house and not directly to the home. This is similar model to HFC, but instead of the coax segment, each subscriber is linked to the fiber service by running Very High Bitrate DSl (VDSL) over the existing telephone wiring. d

RAID

They are used to process critical data, where losing even an hours work might represent a huge loss to the business, most workstations will be configured with a RAID disk system, to provide insurance against disk failure.

software development kit (SDK) Xcode

Third party developers can create apps for IOS using apples software development kit (SDK) xcode and the programming language Swift. Xcode can only be installed and run on a computer using macOS.

Dolby Digital

This is a 5.1 channel digital film format that if optically recorded on to a film release print in the blocks of space located between the film's sprocket holes. (Sound)

Daughter Board

This is a general computing and electronics term for any circuit board that plugs into another. While often referred to as a riser card in everyday use, technically they are not the same.

internet protocol (IP) packet

This is the data that is being transported over the network. It will normally consist of a network packet, such as internet Protocol (IP) packet, with its own headers and payload. Putting layers of packets within one another like this is called encapsulation.

VM escaping

This refers to malware running on a guest OS jumping to another guest or to the host. As with any other type of software, it is vital to keep the hypervisor code-to-date with patches for critical vulnerabilities.

Latency

Time it takes for a bit to travel from its sender to its receiver.

Network Address Translation (NAT)

Translates the private IP address to a public address for routing over the Internet. When clients on the local network connect via a router, the router converts the client's private IP address into a valid public address using Network Address Translation (NAT)

Transmission Control Protocol/Internet Protocol (TCP/IP)

Transmission Control Protocol/Internet Protocol (TCP/IP) is the language a computer uses to access the internet. It consists of a suite of protocols designed to establish a network of networks to provide a host with access to the internet. TCP/IP is responsible for full-fledged data connectivity and transmitting the data end to end by providing other functions, including addressing, mapping and acknowledgment. TCP/IP contains four layers, which differ slightly from the OSI model. The technology is so common that one would rarely use the full name. In other words, in common usage, the acronym is now the term itself. TCP/IP protocols are packet-based. This means that rather than sending a data message as a single large whole, it is split into numerous small packets.

HDMI version 1.4

Transmission bandwidth of 10 Gbps. Maximum support resolution of 3840 × 2160 @ 30 Hz 4k

Print Monitor

Transmits the print job to the printer and provides status information. Most print devices have their own memory and processor, enabling the print job to be transmitted more quickly and reliably.

Which USB standard defines a data rate of up to 480Mbps?

USB 2.0

ifconfig (mainly a linux command line)

Unix and Linux hosts provide a command line called ifconfig, which provides output to Windows ipconfig program. Note some differences between the windows and Linux commands. -ifconfig can also be used to bind an address to an adapter interface, set up communication parameters, and enable or disable the adapter. -The windows switches for configuring the adapter with DHCP and DNS are not supported by ifconfig. -the ifconfig command output does not show the default gateway(Use route instead). it does show traffic statistics though. -A TCP/IP configuration and management utility used with UNIX and Linux systems.

5-GHz band

Used by newer types of WLANs. A range of frequencies that comprises four frequency bands: 5.1, 5.3, 5.4, and 5.8GHz. It consists of 24 unlicensed bands, each 20 MHz wide. This band is used by WLANs that follow the 802.11a and 802.11n standards.

duplexing assembly

Used in a duplex printer, a duplexing assembly contains several rollers, turns the paper around, and draws it back through the print process to print on the back of the paper. returned to the developer unit to print the second unit.

HDMI to VGA

Used to connect a VGA cable to an HDMI port

Workstation

Used to describe a computer that runs more demanding applications than standard office suites

dotted decimal notation

Used to make IP addresses easier to use. A representation of numerical data in which groups of base-10 numbers are separated by dots. This notation requires each octet to be converted to a decimal value.

OLED (organic light-emitting diode) display

Uses organic compounds to produce light when exposed to an electric current; Does not require a back-light to function, draws less power, & thinner display.

Which of these does NOT relate to a serial port?

VESA

IBM created which of these video connections?

VGA

Bluetooth Low Energy (BLE)

Version 4 of Bluetooth BLE is designed for small battery-powered devices that transmit small amounts of data infrequently. A BLE device remains in a low power state until a monitor application initiates a connection

Remote Authentication Dial-In User Service (RADIUS)

WPA and WPA2 can implement enterprise mode authentication, where the access point passes authentication information to a Remote Authentication Dial-in user service (radius) server for validation. This type of authentication is suitable for server/domain based networks.

Recursive resolver

When a client application wants to resolve a name or FQDN, it uses a recursive resolver to perform the query. The resolver contacts name servers in the DNS hierarchy until it either locates the requested record or times out

IEEE 802.11

Wireless Ethernet standard more commonly known as Wi-Fi.

virtual switches

Works the same as physical switch but allows multiple switches to exist on the same host (saving the implementation of additional hardware). Regularly used with VLAN implementations. A hypervisor will implement network connctiviy by means of one or more virtual switches (or vSwitches using VMwars terminology). These perform exactly the same function as Ethernet switches, except that they are implemented in software rather than hardware.

printer logs

You could also check for multiple failed jobs in the print servers log. -You may also be able to collect error logs from the device itself. management software will be able to retrieve these logs and report them to a centralized console.

Bonjour/AirPrint

You may also want to configure a network printer to support clients other than Windows. One option is to enable the Bonjour service to allow macOS PCs and IOS mobile devices to connect by using Apple AirPrint. Bonjour is the server part of the solution, while AirPrint provides the client connectivity. Through Bonjour, users can locate printers and file servers. It uses DNS service records to locate the devices offering print and file-sharing services. AirPrint is part of the macOS and IOS operating systems and supported by most third-party applications and apps.

Printer Data and Privacy and Security Issues

You should be aware of some of the data privacy and security issues exposed by shared printers -Hard Drive Caching- most printers have a local storage device to use to cache print files. -User Authentication- it may be necessary to prevent unauthorized use of a network or cloud-based printer. -Data Privacy- jobs sent over a network (such as via a cloud or remote print service) cloud potentially be intercepted and read, copied, or modified.

If you want to connect an older flat panel display to your brand new non-Apple laptop, which type of adapter would you use?

You would use the HDMI to VGA adapter to connect a laptop to an older flat panel display. This type of converter usually requires an active Digital to Analog Converter (DAC) chip. Older flat panels may only come with a VGA port so you would use the HDMI to VGA port to connect the new laptop to the old flat panel display. It is unlikely to find an older flat panel with an HDMI connector. DVI may be found on older laptops; however, the question indicates that your laptop is new. Most new laptops have HDMI ports. You would use a Thunderbolt to DVI adapter to connect an older Apple computing device to newer display devices.

HDMI (High-Definition Multimedia Interface)

a 19-pin (type a connetor) digital audio and video interface standard currently used on televisions and other home theater equipment and expected to ultimately replace DVI. backward compatible with DVI-D

DisplayPort

a 20-pin connector port that transmits digital video and audio (not analog transmissions) and is slowly replacing VGA and DVI ports on personal computers. allows connection with DVI-D and HDMI.

general purpose registers (GP)

a 32-bit CPU instruction General Purpose (GP) registers are also 32-bits wide.

PCIe connectors

a 6-pin (2x3) connector used to supply an extra 75 W power (+12 V) to PCIe graphics cards. This was updated to an 8 pin (2x4) connector delivering 150 W in the ATX 12V v2.2 specification. Some adapters or dual card systems require the use of multiple PCIe auxiliary power connectors.

Authoritative Name Server

a DNS server that has a single zone that lists all the host names on the domain and their corresponding IP addresses.

Straight Tip (ST)

a bayonet-style connector that uses a push-and-twist locking mechanism; used mostly for multi-mode networks.

print head cleaning

a blocked or dirty nozzle will show up on output as a missing line. Use the printers cleaning cycle (accessed via the property sheet or control panel) to try to fix the problem. if it does not work, there are various inkjet cleaning products on the market

small office/home office (SOHO)

a business-oriented network possibly using a centralized server in addition to client devices and printers but often using a single internet appliance to provide connectivity. Home and residential networks may also be classed as SOHO.

gyroscopes

a circular device with a heavy outer rim that spins at a very fast rate, stabilizing the axis so that the axis always points in the same direction

redundant array of independent disks (RAID)

a collection of disk drives used for fault tolerance and improved performance, and is typically found in large network systems

RAID 10

a combination of RaID 1 and RaID 0 that requires at least four disks to work as an array of drives and provides the best redundancy and performance.

Customer Relationship Management (CRM)

a company-wide business strategy designed to optimize profitability, revenue, and customer satisfaction by focusing on highly defined and precise customer groups

field replaceable unit (FRU)

a component in a computer or device that can be replaced with a new component without sending the computer or device back to the manufacturer. Examples: power supply, DIMM, Ram, motherboard, hard disk drive, mouse, keyboard. FRUs are often shipped in anti static bags to protect them from ESD damage.

embedded system

a computer system that is deigned to perform a specific dedicated function.

Asymmetrical DSL (ADSL)

a consumer version of DSL that provides a fast downlink but a slow uplink. Higher speed in the downstream than the upstream direction. Matches usage of home user. Designed for home users. Uses adaptive tech that tests the condition of the line before sending data. System uses a data rate based on the condition of the local loop line.

analog

a device or system that represents changing values as continuously variable physical quantities

power injector

a device that can be used switch doesn't provide Power Over Ethernet to a device that needs it.

bridge

a device that divides a local network into two or more segments. Hosts on one segment are able to communicate with those on another segment only via the bridge. A bride can be used to divide an overloaded network into separate collision domains.

repeater

a device used to overcome the distance limitations imposed by network cabling.

chip level multiprocessing (CMP)

a dual-core CPU is essentially two processor combined on the same die. *The market has quickly moved beyond dual-core CPU's to multi-core packages 3,4,8 or more processors.

Hybrid Fiber Coax (HFC)

a fiber optic core network with coax links to customer premises equipment, but are more simply just describes s "broadband cable" or just a cable. A broadband cable system architecture that uses both fiber-optic and coaxial cable.

cloud printing

a form of virtual printing that sends the print job to a remote printer

network

a group of two or more computer systems linked together by some form of transmission medium that enables them to share information.

e-reader

a handheld device for reading content such as books, newspapers, and documents; may also be used for other Internet content; one major advantage is the extremely long battery life

laser projector

a lampless projector still uses LCD or DLP imaging but replaces the bulb light source with laser light.

lane

a link can make use of one or more lanes. Each lane consists of two wire pairs(four wires in total) using low voltage differential signaling.

Power over Ethernet (PoE)

a means of supplying electrical power from a switch port over CAT 5 or better data cabling to a connected powered device such, such as a tablet computer, VoIP handset, security camera, or wireless access point.

power rating

a measurement of how much electrical energy an electrical device consumes for every second it is in use (V*I)

self grounding

a method to safeguard against ESD that involves touching the computer case or power supply before touching a component in the computer case.

SSID (Service Set Identifier)

a name for the WLAN. This can be up to 32 characters and must be different to any other network nearby. The name of an 802.11 wireless network. It can be up to 32 characters long and is case-sensitive.

Small and medium-sized enterprise (SME)

a network supporting tens of users. Such networks would use structured cabling and multiple switches, access points and routers to provide connectivity.

globally unique identifier (GUID)

a new partitioning style that uses a partition table called GUID partition table (GPT).

Kensington lock

a physical feature on laptops that allows users to connect a cable to their device to prevent theft -these are typically either key or combination operated. If key-operated, make sure you record the key code in case you need to get a replacement. -most laptops come with a connection point for a Kensignton lock in the chassis.

pointing device

a pointing device is usually used to move a cursor to select and manipulate objects on the screen.

thunderbolt

a port that transmits both video and data on the same port and cable. The port is shaped the same as the DisplayPort and is compatible with DisplayPort devices.

driver

a program or software that determines how a computer will communicate with a peripheral device. interface between the device and the operating system. includes tools for configuring and optimizing the device.

Signal-to-noise ratio (SNR)

a representation of the signal intensity compared to the background noise intensity calculated by subtracting the intensity of the noise from the intensity of the signal (in decibels)

heat pipe

a sealed tube containing some type of coolant( water or ethanol).

Defense in Depth

a security principle that calls for policies such as workstation hardening to ensure they cannot be compromised and used to attack the network from within.

Demilitarized Zone (DMZ)

a separate network located outside the organization's internal information system that permits controlled access from the internet

Network Attached Storage (NAS)

a server that is placed on a network with the sole purpose of providing storage to users, computers, and devices attached to the network

range extender

a simpler device for regenerating a signal from an access point to a more remote location, such as an upstairs room.

whitelisting

a site means that it will be accessible even if a filter is applied.

Cache

a small block of high-speed memory that enhances performance by pre-loading (caching) code and data from relatively slow system memory and passing it to the CPU on demand.

storage bus

a special type of expansion bus dedicated to communicating with storage devices, such as hard disks, solid state drives, and optical drives (CD,DVD,Blu-Ray)

Solid State Drive (SSD)

a storage device that typically uses flash memory to store data, instructions, and information

thread

a stream of instructions generated by a software application. Most applications run a single thread. Software that runs multiple parallel threads within a process is said to be multi-threaded.

Ethernet

a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.

Intrusion Detection System (IDS)

a system that creates logs of all network traffic that was permitted to pass the firewall and then analyzes those logs for signs of attempted or successful intrusions. Sensors that scans network traffic for signs of threats or other violations of security policy.

superscalar architecture

a type of architecture that uses multiple, pipelined instruction execution units with resolution of inter-instruction dependencies done at run time by the machine's control unit

Plenum Space

a void in a building designed to carry Heating, Ventilation, and Air conditioning (HVAC) systems.

Z-Wave

a wireless communications protocl used primarly for home automation. - z-wave creates a mesh network topology using low-energy low energy radio radio waves to communicate from one appliance to another.

Line of Sight (LOS)

a wireless connection method using ground based microwave antennas aligned with one another.

WiFi Protected Access (WPA)

a wireless security protocol to protect wifi networks uses 128-bit key TKIP An enhancement of 802.11 encryption that secures WiFi communications. The current standard is WPA2. - improvements over WEP - support EPA An enhancement of 802.11 encryption that secures WiFi communications. The current standard is WPA2.

quick charge (QC)

adapters can deliver up to 18 W over USB type A/B ports.

Intrusion Protection System (IPS)

adds some sort of real-time blocking (or shunning) functionality on top of the basic IDS. An IPS may drop packets, reset connections, or run a script to trigger a response on another server or network device(firewall, switch, or router.

file share

air drop for apple and near share for Microsoft. other third party application available.

virtual desktop environment (VDE)

all application processing and data storage in VDE or worspace is performed by the server. The tink client computer only has to be powerful enough to display the screen image, play audio, and transfer mouse, key commands and video, and audio information over the network.

services

allow your machine to provide network functionality to other machines.

Input/output card

allows audio/video input to be sampled and saved as a digital file. An I/O card can use an HDMI or Thunderbolt connection to a recording device.

access point (AP)

allows hosts to connect to the network over Wi-Fi The point at which access to a network is accomplished. This term is often used in relation to a wireless access point (WAP).

virtual network computing

allows you to control a computer at a remote location as if you were sitting in front of it.

cloud-based network controller

allows you to register and monitor some (or perhaps all) of these different component networks, clients, and servers. Cloud-based network controllers (and network controllers generally) depend on software-defined networking meaning that network access devices-access points, switches, routers, and firewalls-can be configured using software programs and scripts.

Wireless Internet Service Provider (WISP)

an ISP that allows subscribers to connect to a server at designated hotspots or access points using a wireless connection

real-time operating system (RTOS)

an RTOS is often used for time-sensitive embedded controllers, of the sort required for the modulation and frequency shifts that underpin radio-based connectivity. A program with a specific purpose that must guarantee certain response times for particular computing tasks or else the machine's application is useless. Real-time operating systems are found in many types of robotic equipment.

charge-coupled device (CCD)

an electronic device that creates an electronic signal from an optical image formed on the CCD's array of pixels

Wired Equivalent Privacy (WEP)

an encryption algorithm designed to protect wireless transmission data. An IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmitted wireless information. WEP has significant vulnerabilities and is not considered secure. The encryption system is based on the RC4 cipher. RC stands for Ron's Cipher after its inventor. Under WEP version 1, you can select from different key sizes (64-bit or 128-bit). A larger key makes it more difficult to attack the security system.

Microprocessor

an integrated circuit that contains all the functions of a central processing unit of a computer.

Private Address Ranges

an ip address that is reserved for private uses (not public address) by Internet standards groups. 10.0.0.0 - 10.255.255.255 (Class A private address range) 172.16.0.0 - 172.31.255.255 (Class B private address range) 192.168.0.0 - 192.168.255.255 (Class C private address range) 169.254.0.0 to 169.254.255.255 (APIPA/link local auto-configuration)

CRT Monitor (Cathode Ray Tube)

an older type of computer monitor

Host names

and local domains are specified within the organization (for example, to identify a server located in the sales department of a company). The www host name is a common alias to indicate that the resource is a web server.

Inverter

apparatus that changes direct current to alternating current

Network Attached Storage (NAS)

appliance is a hard drive (or RAID array)with a cut-down server board, usually running some form of Linux, that provides network access, various file sharing protocols, and a web management interface.

TCP/IP Layers

application, transport, internet, link/network access 4. Link or network layer - Fourth layer in the TCP/IP stack. This layer adds MAC address of the sender and the recipient. Responsible four putting frames onto the physical network. 3. Internet Layer - This layer of TCP/IP is responsible for addressing, packaging, and routing functions. IP provides best-effort delivery of an unreliable and connectionless nature. 2. Transport Layer - In this layer protocols ensure that data are transferred from point A to point B reliably and without errors. this layer services include flow control, acknowledgment, error correction, segmentation, reassembly, and sequencing. Transmission control protocol(TCP) guarantees orderly transmission of packets at the transport layer. TCP can identify and recover from lost or out of order packets. User Datagram Protocol (UDP) provides unreliable non guaranteed transfer of packets. UDP is an alternative way of implementing the transport layer to TCP. 1. Application layer - it facilitates the user to use the services of the network. It is used to develop network-based applications. It provides user services like user log in, naming network devices, formatting messages, and e-mails, transfer of files etc. It is also concerned with error handling and recovery of the message as a whole.

quick response (QR) code

are a particular type of 2D barcode that have been widely adopted for consumer-oriented uses. A QR code can be scanned using a smartphone camera, a normal digital camera, or webcam. There is no need to install special barcode scanning hardware. a two-dimensional bar code that is used to provide easy access to information through a smartphone; also known as quick read code

(HIDs) Human interface devices or Input devices

are peripherals that enable the user to enter data and select commands.

Intranets and Extranets

are private corporate networks based on Internet technology that assemble information from disparate systems. intranets-if they permit only local access) extranets-if they permit remote access.

Protocols

are procedures or rules used by networked hosts to communicate. For communication to take place, the two hosts must have a protocol in common. Often, several protocols used for networking are designed to work together. his collection of protocols known as protocol suite.

encryption keys

are stored and exhanged using digital certificates

Connections

are the physical access points that enable a computer to communicate with internal or external devices.

link-local address

are used by IPv6 for network housekeeping traffic. (uses hex notation) The address that a computer running IPv6 gives itself after first booting. The first 64 bits of a link-local address are always FE80::/64.

Mini Tower Cases

are usually used for office or home PCs where the requirement for additional internal devices and adapter cards is limited.

Contention

arises in hub-based Ethernet because all communications are received by all connected to the hub.

Local Printer Connections

as with other PC peripherals, USB is now the dominant printer interface. -USB -Ethernet -Serial Port (RS-232 or COM)

contact image sensor (CIS)

based scanners use an array of LEDs(light emitting diodes) that strobe between red, green, and blue light to illuminate the image. This is relflected via rod-shaped lens onto an image senor. CIS scanners are typically used in sheet-fed scanners.

select (remote) users button

button to define which users can connect remotely. Users in the local administrator group already have this property.

32 bit address bus

can access a 4GB address space, 36 bit expands to 64 GB

packet-filtering firewall

can inspect the headers of IP packets. A firewall that examines each packet and determines whether to let the packet pass. To make this decision, it examines the source address, the destination addresses, and other data. IP filtering-accepting or blocking traffic on the basis of its source and/or destination IP address. Protocol ID/type- TCP,UDP, ICMP, and so on. Port filtering/security-accepting or blocking a packet on the basic of source and destination port numbers (TCP or UDP application type).

video adapter

circuit board that creates the images seen on a monitor

ipconfig /release

command releases any IP configurations received from DHCP server so that the network adapters will no longer have an IP address ex: ipconfig /release Adaptername

HTPCs (Home Theatre PCs)

compact form factor, surround sound, HDMI output, TV tuner.

Unified Threat Management (UTM)

comprehensive security management tool that combines multiple security tools, including firewalls, virtual private networks, intrusion detection systems, and web content filtering and anti-spam software

Virtual Private Network (VPN)

connects the components and resources of two (private) networks over another (public)network. The internet provides a cost-effective way of connecting both users to networks and networks to networks. A VPN is a "tunnel" through the internet ( or any other public network). it uses special connection protocols and encryption technology to ensure that the tunnel is secure and the user is properly authenticated.

Modem

connects to the service provider (ISP) cabling and transfers frames over the link. The modem type must be matched to the network type (ADSL, VDSL, or cable).

Chipset

consist of several controllers that handle the transfer of data between the CPU and various devices. Example of controllers include the following: -system memory controller -input/output(I/O) controller to handle disk drives and expansion buses. -controllers for any integrated video, sound, and network(cabled and wireless interfaces)

Coax Cable

consists of a central copper core surrounded by an insulator braiding or metallic shield, and an outer cover, sheath; the center core carries the signal; if the core is broken the network is down and data cannot be transmitted

broadband

covers a range of different connection technologies. a high-capacity transmission technique using a wide range of frequencies, which enables a large number of messages to be communicated simultaneously.

National institute of standards and Technology (NIST)

created a standardized definition for cloud computing. This allows consumers to more easily compare services and deployment models from different vendors if they all use the same definition.

hardware RAID solution

creating volumes form an array of physical disks is an operation supported by a plug in controller

(SFF) small form factor case

designs are semi-portable, space-saving designs typically used for domestic entertainment or Media Center systems that will not look out of place in a living room.They are usually cube-like or slimline. SFF-cases can hold only a limited number of components.

Machine to Machine (M2M)

devices that connect directly to other devices. Communicate and pass data between themselves and other traditional systems like computer servers.

LAN router

divides a single physical network into multiple logical networks. This is useful for security and performance reasons.

clock speed

dictates how many instructions the CPU can process each second

Digital Visual Interface (DVI)

digital interface used to connect a video source to a display device there are 5 types of DVI: DVI-A DVI-D (Single link) DVI-I (Single link) DVI-D(dual link) DVI-I (single link)

container virtualization

dispenses with the idea of a hypervisor and instead enforces resource separation at the operating system level . The OS defines isolated containers for each user instance to run in. Each container is allocated CPU and memory resources, but the processes all run through the native OS kernel.

ipconfig /all

displays detailed configuration, including DGCP and DNS servers, MAC address, and NetBIOS status.

link

each point to point connection is referred to as a link. The link sends both data and control/timing instructions. A link can make use of one or more lanes. Each lane consists of two wire pairs(four wires in total) using low voltage differential signaling. One pair is used to transmit and the other to receive(bi directional).

endpoint management server

facilitates this process by identifying computing devices running on the network and ensuring that they are securely configured.

ipconfig /renew

forces a DHCP client to renew the lease it has for an IP address ex: ipconfig /release Adaptername *if a DHCP cannot provide an IP address it gives it an APIPA that can only communicate within a network and not outside a network. Only communicates to other APIPAs range 169

MIDI (Musical Instrument Digital Interface)

format for recording music from synthesizers and other electronic instruments. Interface between a computer and a device for simulating musical instruments. Rather than sending large sound samples, a computer can simply send "instructions" to the instrument describing pitch, tone, and duration of a sound. MIDI files are therefore very efficient. Because a MIDI file is made up of a set of instructions rather than a copy of the sound, modifying each component of the file is easy. Additionally, it is possible to program many channels, or "voices," of music to be played simultaneously, creating symphonic sound.

impact printer

forms characters and graphics on a piece of paper by striking a mechanism against an inked ribbon that physically contacts the paper -one common type is the dot matrix printer, which uses a column of pins (also called print wires) to strike the ribbon.

What component helps to protect users of electrical equipment against a short circuit?

fuse

3D printer types

fused filament fabrication (FFF) also known as fused deposition modeling (FDM), lays down layers of filament at high temperature. -Print bed/build plate - a flat glass plate onto which the material is extruded. The bed is usually heated to prevent the material from warping. Bed/build surface - a sheet placed onto the base plate to hold the object position while printing, but allow its removal on completion. Exturder- the equivalent of a print head in a n inkjet. Gears/motors/motion control - enable precise positioning of the extruder. Fan - cools the melted plastic where necessary to shape the object correctly.

firewalls

hardware, software, or both designed to prevent unauthorized persons from accessing electronic information

rear panel

has cut-out slots aligned with the position of adapter card slots. These slots should either be covered by an adapter card or a metal strip known as a blanking plate. The rear panel provides access to the power supply unit (PSU) sockets. The PSU has an integral fan exhaust.

cloud

has lost of different definitions but generally refers to any sort of IT infrastructure provided to the end user where the end user is not aware of or responsible for nay details of the procurement, implementation, or management of the infrastructure. Its internal workings are a cloud, the end user is only interested in and pays for the services provided by the cloud.

dual heat pipe

has two tubes, providing better cooling.

hops

hops are stops such as routers were packets top. TTL standard is max 30 stops. Each line in tracert is a hop.

domain name

identifies a company, organisation , or even and individual. The name has to be unique and officially registered (a process that is normally handled by your ISP).

intermittent connection

if a device is within the supported range but the signal is very weak or you can only get an intermittent connection, there is likely to be interference from another radio source broadcasting at the same frequency. If this is the case try adjusting the channel that the device use. Another possibly is the interference from a powerful electromagnetic source, such a a motor oven. Finally there might be something blocking the signal. Radio waves do not pass easily through metal or dense objects.

Low memory or Out of memory

if a print job contains high-resolution graphics or multiple pages and printing is very slow, bear in mind that the printer may not have sufficient resources to handle the job and may display and error such as Low memory or Out of memory.

Access Denied

if a user is accessing a printer that has been shared over a network, an Access Denied message means that the user account has not been configured with permission to print documents.

remote credential Guard and RDP Restricted Admin (RDPA) Mode

if remote desktop is used to connect to a machine that has been compromised by malware, the credentials of the user account used to make the connection become highly vulnerable.

nslookup command

if you identify or suspect a problem with name resolution, you can troubleshoot DNS with the nslookup command, either interactively or from the command prompt. Can resolve a FQDN to an IP address on Microsoft Windows and UNIX hosts. Host can be either a host name/FQDN or an IP address. Server is the DNS server to query, the default DNS server is used if this argument is omitted. displays information about DNS names and their corresponding IP addresses, and it can be used to diagnose DNS servers.

friction feed

impact printers can use either tractor feed when printing on continuous- roll impact paper or friction feed when printing on individually cut sheets of paper. A paper-moving method in printers by which the feed mechanism grasps each piece of paper with a roller.

Land Grid Array (LGA)

in LGA, the pins that connect the CPU and socket are located on the socket. This reduces the likelihood of damage to the CPU but increases the chance of damaging the motherboard.

print head

in a dot matrix printer, the pinks are contained in the print head, which is secured to a moving carriage that sweeps across the paper. The part in an inkjet or impact printer that moves across the paper, creating one line of the image with each pass.

Radio firmware

in a mobile device contains an operating system that is separate from the end user operating system (for example, Android or IOS). The modem uses its own baseband processor and memory, which boots an RTOS.

anti static packaging

includes either anti-ESD shielding or dissipative material.

host firewall

installed on the host and only inspects traffic addressed to that host. A type of software firewall installed on a host and used to protect the host from network-based attacks.

Wireless Wide Area Network (WWAN or cellular)

internet access refers to using an adapter to link to a cellular phone providers network via the nearest available transmitter (base station). The bandwidth depends on the technologies supported by the adapter and by the transmitter (3G or 4G for instance.)

Virtual Private Network (VPN)

is a "tunnel" through the internet. It allows a remote computer to join the local network securely. Windows supports a number of VPN types but you may need to obtain third-party software. Companies can establish direct private network links among themselves or create private, secure Internet access, in effect a "private tunnel" within the Internet

telnet (port 23)

is a command-line terminal emulation protocol and program. The host server runs a telnet daemon listening for connection TCP port 23.

laptop

is a complete portable computer system. laptops have specialized hardware designed especially for use in a portable chassis and can run on battery or AC power. laptops use the same sort of operating systems as desktops PCs, however, and have many upgrade able or replaceable components.

printer

is a device that produces text and images from electronic data onto physical media such as paper, photo paper, and labels.

scanner

is a digital imaging device, designed to create computer file data from a real-life object. Typically, scanners handle flat objects, like documents, receipts, or photographs.

Laser printer toner

is a fine powder made of particles of iron, carbon, and resin. Laser printers require a toner cartridge, which is a single, replaceable unit that contains toner as well as additional components used in image production.

thermal printer

is a general term for any printer that uses a heating element to create the image on the paper with dye, ink from ribbons or directly with pins while the feed assembly moves the media through the printer.

barcode scanner

is a handheld or pen-shaped device designed to scan barcodes. A barcode is a pattern of different sized parallel bars, typically representing a product number, such as an ISBN, IAN/EAN, or UPC. the reader uses a sensor mechanism (one of a photo diode, laser, or CCD) to read the intensity of light reflected back by the barcode. The reader then reports the number back to application software, which links it to a product database. Barcode scanners are connected to a computer using a USB port.

Hotspot

is a location served by some sort device offering internet access via Wi-FI.

Radio Frequency Identification (RFID)

is a means of tagging and tracking objects using specially encoded tags. When an RFID reader scans a tag, the tag responds with the information programmed into it. -close range (up to about 25m) -an example is contactless payment readers such as restaurants or stores.

Application Virtualization

is a more limited type of VDI. Rather than run the whole client desktop as virtual platform, the client either accesses a particular application hosted on a server or streams the application from the server to the client for local processing.

Near Field Communication (NFC)

is a peer to peer version RFID; that is an NFC device can work as both tag and reader to exchange information with other NFC devices. -NFC normally works at up to 2 inches (6cm) at data rates 106,212, and 424 Kbps.

multi-function device (MFD)

is a piece of office equipment that performs the functions of a number of other specialized devices. MFDs typically includes the functions of: -printer -scanner -fax machine -copier

system case(or chassis)

is a plastic metal box that houses this second class of components, such as the motherboard, Central Processing Unit(CPU), memory adapter cards, disk drives, and power supply unit.

laser printer

is a printer that uses laser beam to project or draw a latent image onto an electrically charged drum, toner adheres to the drum and is transferred onto the paper as the paper moves through the mechanism at the same speed the drum rotates. The toner is fixed using high heat and pressure, creating a durable printout that does smear or fade.

agent

is a process running on a switch, router, server, or other SNMP(simple network management protocol) compatible network device. This agent maintains a database called a Management information Base (MIB) that holds statistics relating to the activity of the device.

maintenance kit

is a set of replacement feed rollers, new transfer roller, and a new fuser unit. The feed rollers guide the paper through the printer assembly. -Once you have replaced the maintenance kit, start the printer up and print a test page to check functionality.

Bluetooth

is a short-range (up to about 10m) radio link, working at a nominal rate of up to about 3 Mbps (for v2.0+EDR) the latest versions of Bluetooth support a 24 Mbps data rate by negotiating a higher bandwidth link using the Wi-Fi radio. Bluetooth is used for so-called Personal Area networks (PANs) to share data with a PC, connect to a printer, use a wireless headset, and so on.

docking station

is a sophisticated port replicator that may support add-in cards or dives via a media bay. When docked, a portable computer can function like a desktop machine or use additional features, such as full-size expansion card. An external device that attaches to a mobile computer or device and contains a power connection and provides connections to peripheral devices.

register

is a temporary storage area unavailable to the different units within the CPU.

Distinguished Name (DN)

is a unique identifier for any given resource within the directory. uniquely identifies a certificate entity

digital assistant(virtual assistant)

is a voice interface designed to respond to natural language commands and queries. Most smartphones and computers now support a voice assistant and the are also implemented on smart on smart speaker hubs. -Google Assisstant -OK Google Amazon Alexa - Alexa Apple - Hey siri Microsoft Cortana - Hey Cortana

Tower Case

is designed to sit vertically on surface, so that it is taller than its is wide. Tower cases come in four basic sizes: full, mid, mini and slim line.

a mobile VPN

is one that can maintain the VPN link across multiple carrier networks, where the IP address assigned to the mobile device ma change often.

rogue VM

is one that has been installed without authorization

personal firewall

is one that is implemented as software on the individual host PC or server. a security tool that detects and protects a personal computer and its data from unauthorized intrusions

legacy system

is one that is no longer directly supported by its vendor. an old system that is fast approaching or beyond the end of its useful life within an organization

web server

is one that provides client access using the hypertext transfer protocol (HTTP) or its secure version (HTTPS)

default gateway

is the IP address of a router to which packets destined for a remote network should be sent by default. In a TCP/IP network, the nearest router to a particular host. This router's IP address is part of the necessary TCP/IP configuration for communicating with multiple networks using IP.

TCO

is the cost of the printer over its lifetime, including the cost of replacement components and consumables.

printer type or technology

is the mechanism used to make images on the paper. The most common types for general home and office use are inkjet (or ink dispersion) and laser, through others are used for more specialist applications. Some of the major print device vendors include HP, epson, Canon, Xerorx, Brother, OKI, Samsng.

Calibration

is the process by which the printer determines the appropriate print density or color balance (basically, how much toner to use. Most printers calibrate themselves automatically. If print output is not as expected, you can often invoke the calibration routine from the printers control panel or its software drivers.

Core Clock Speed

is the speed at which the CPU runs internal processes and accesses L1 and L2 cache.

Point-to-Point Protocol (PPP)

is typically used to encapsulate the network protocol, which will usually be TCP/IP, over the link to the ISP. PPP also provides a mechanism to authenticate the user and mage the connection between the local computer or network and the ISPs router. A protocol that allows a computer to connect to the Internet over a phone line.A common Layer 2 protocol offering features such as multilink interface, looped link detection, error detection, and authentication

subnet mask

is used to distinguish network ID and host ID within a single IP address. It is used to "masks" the host ID portion of the IP address and thereby the network ID portion. The value used in TCP/IP settings to divide the IP address of a host into its component parts: network ID and host ID.

Exchange

is usually an integrated provider option and clients can auto discover the correct settings.

Peripheral Component Interconnect (PCI) bus

it connects the CPU, memory, and peripherals. It supports bus mastering, IRQ steering, and PnP. 32-bit works at 33 MHz. 64-bit works at 66 MHz. allows for the connection of sound cards, video cards, and network cards to a computer system -Slowly being replaced by PCI Express. -First commercial version was 2.0. -Several revisions to the standard since then.

international mobile station equipment identity (IMEI)

it is used by the GSM network to identify valid devices and can be used to stop stolen phones from accessing the network, regardless of the SIM used. -You can access the IMEI number by dialing *#06# and it will display the IMEI on the device screen.

WAN or edge/border router

join a network using one type of media with a network using different media. A typical example is to join a LAN to a WAN, such as the internet.

Small Outline DIMM (SODIMM)

laptop DDR SDRAM is packaged in small modules call SODIMM. A type of DIMM memory module used in laptops. - DDR and DDR2 use 200 pin packages -DDR 3 uses 204 pin -DDR 4 uses 260 pins

lo-jack tracking software

laptop firmware that is a security rootkit designed to prevent theft.

Mass storage for laptops

laptops use the same kind of mass storage devices as PCs: -Hard Disk Drive(HDD)-magnetic disk technology offering low cost per gigabyte storage. -Solid State Drive(SSD)-flash memory technology offering much faster performance and less weight and power consumption. SSDs are now the mainstream choice for laptop.s -Hybrid- an HDD with a large (8 GB+) cache of flash memory, offering a performance boost compared to basic HDDs. A laptop typically supports on internal mass storage device only, with extra storage attached to an external port. -laptop mass storage drives are usually 2.5 form factor through sometimes the 1.8 for factor is used. Compared to 3.5 desktop versions, magnetic 2.5 form factor, there are also reduced height units designed for ultra portable laptops.

cellular radio

makes connection using the nearest available transmitter (cell or base station). Each base station has an effective range of up to miles (8 km).

Symmetric Multiprocessing (SMP)

making a computer system faster is to use two or more physical CPUs.

Cellular Data

means connecting to the internet via the device's cell phone radio and the handsets cellular network provider. The data rate depends on the technology supported by both the phone and the cell tower (3G or 4G, for instance). A cellular service separate from calling that is used to view email, web pages, and download apps.

RAID (redundant array of independent disks)

means of protecting data against the risk of a hard disk drive falling. Data is either copied to a second drive(mirroring) or additional information is recorded on multiple drives to enable them to recover from a device failure (parity)

Infrastructure as a Service (IaaS)

means of provisioning IT resources such as servers, load balancers, and Storage Area Network (SAN) components quickly

Virtualization

means that multiple operating systems can be installed and run simultaneously on a single computer. -a virtual platform requires at least three components: -Computer-the platform or host for the virtual enviornment. Optionally, there may be multiple computers networked together. -Hypervisor or Virtual Machine Monitor (VMM)- manages the virtual machine environment and facilitates interaction with the host hardware and network. -Guest operating systems or Virtual Machines (VMs)- operating systems installed under the virtual environment.

Mutual Authentication for multiple services (SSO {Single Sign On})

means that one service accepts the credentials from another service. this can also more usually described as federated identity management.

Autodiscover

means that the mail service has published special Domain Name system (DNS) records that identify how the account for a particular domain should be configured.

Port Forwarding

means that the router takes request from the internet for a particular protocol (say HTTP/port80) and sends them to a designated host on the LAN. The request could also be sent to a different port, so this feature is often also called port mapping. For example, the internet host could request HTTP on port 80, but the LAN server might run it HTTP server on port 8080 instead.

Backed up print queue

means that there are lots of jobs pending but not printing. The might occur because printer is offline or out of paper or ink/toner. It could also occur because of an error processing a particular print job. You can try to delete the print job from the print queue that you suspect is causing the problem. If this does not fix the problem, you will need to stop and restart the print queue. This will result in all jobs in the print queue being deleted. All users will have to resubmit their print jobs. - print server not working -spooler crash -restart spooler (in windows)

paper handling

means the type of paper or media that can be loaded.

Quality of Service (QoS)

means using a network protocol to prioritize certain types of traffic over others.

Quality of Service (QoS)

means using a network protocol to prioritize certain types of traffic over others. Policies that control how much bandwidth a protocol, PC, user, VLAN, or IP address may use. ex. VOIP

HDMI version 1.3

mini hdmi (type C) camcorders. Transmission bandwidth of 10 Gbps. Maximum support resolution of 2560 × 1600 @ 60 Hz

Baseband Update

modifies the firmware of the radio modem used for cellular, Wi-Fi, Bluetooth, NFC, and GPS connectivity. An update to a mobile phones baseband OS which manages all wireless communication.

signaling speed

most devices you will see will support Ggabit Ethernet, working at a nominal data rate of 1 Gbps. Older standards include Fast Ethernet 100 Mbps and plain Ethernet 10 Mbps.

USB optical drive

most ultra portable laptops no longer feature optical drives as they cannot fit within ultrathin chassis.

Metropolitan Area Network (MAN)

network that spans a metropolitan area, usually a city and its major suburbs. Its geographic scope falls between a WAN and a LAN

electronic discharge (ESD)

occurs when a path is created that allows electrons to rush from a statically charged body to another with an unequal charge.

multitasking

one way to make instruction execution more efficient is to improve the way the pipeline works. The basic approach is to do the most amount of work possible in a single clock cycle(multitasking).

closed network

one where the elements of the network are all known to the system vendor and there is no connectivity to wider computer data networks. Ex: Embedded systems might typically been designed to operate within a closed network.

An inkjet

or more generally ink dispersion- printer form images by firing microscopic droplets of liquid ink out of nozzles mounted together on a carriage assembly that moves back and forth across the paper. -inkjets work by firing microscopic droplets of ink about 50 microns in size at the paper.

network firewall

placed inline in the network and inspects all traffic that passes through it.(can also be known as software firewall) A combination of hardware and software that filters traffic between private networks or between a private network and a public network, such as the Internet.

802.3af Power over Ethernet (PoE)

powered devices can draw up to about 13 @ W over the link. Industry-standard method of supplying power over an Ethernet cable to attached devices.

802.3at (PoE+)

powered devices can draw up to about 25 W.

Hypertext Transfer Protocol (HTTP)

protocol that defines how messages are formatted and transmitted over the World Wide Web. HTTP enables clients (typically web browsers) to request resources from an HTTP server. A client connects to the HTTP server using its TCP port.(the default is port 80) and submits a request for a resource using a Uniform Resource Locator (URL). The server acknowledges the request and returns the data.

host bus adapters(HBAs)

provide a connection point for internal mass storage devices, such as hard drives, optical drives, and tape drives.

front panel

provides access to the removable media drives, a power on/off switch, a reset switch, and LED's( light-emitting diodes) to indicate drive operation.

print driver

provides an interface between the print device and windows. The technology used by the printer determines the quality, speed, and cost of the output.

System Firmware

provides low-level code to allow the computer components to be initialized and load the main operating system software.

desktop computer

refers to a PC that is not designed to be on the move.

mobile device synchronization (sync)

refers to cpying data back and forth between different devices. This might mean between a PC and smartphone or between a smartphone, a tablet, and a PC.

Inventory Management

refers to keeping a record of the systems running on your network. This is not a simple task to try to perform manually, so a number of protocols have developed to assist.

digital signal processing (DSP)

refers to manipulating analog information

Tethering

refers to using a mobile devices cellular data plan to get Internet access on a PC or laptop (or other device). Not all carriers allow tethering and some only allow it as a chargeable service add on.

Mobile Device Management (MDM)

remotely controls smart phones and tablets, ensuring data security

memory card

removable storage device used in digital cameras (such as SD cards, compact flash cards)

slimline cases

require low profile adapter cards but can be oriented horizontally or vertically.

router

responsible for moving data around a network of networks, known as an internetwork or internet. While a switch forwards frame using hardware (MAC) addresses within a single network segment, a router forwards packets around an internetwork using logical network and host IDs.

anti-esd service mat

sensitive components can be placed on the mat safely. the mats contain a snap that you connect to the wrist or leg strap.

Dynamic Host Configuration Protocol servers (DHCP)

servers assign IP address information to host automatically when they connect to the network.

radio frequency (RF)

signal from radio-based devices wakes considerable as the distance between the devices increases. If you experience slow transfer speeds or you cannot establish a connection, try moving the devices closer together.

WiFi analyzer

software such as inSSIDer is designed to support a site survey to identify nearby networks that may be causing interference problems and to measure signal strength. Tool for checking/diagnosing issues on a wireless network.

ad hoc mode

stations can also be configured to connect directly to one another. With older network standards, this is referred to as ad-hoc mode. Such peer to peer connections are now more likely to be implemented as Wi-fi Direct, which has the advantage of automatically configuring a secure link between the stations.

electronic component

such as a memory or logic chip, is composed of fine conductive metal oxides deposited on a small piece of silicon.

Data Over Cable Service Interface Specification (DOCSIS)

supports downlinks speeds of up to 38 Mbps (North America) or 50 Mbps (Europe) and uplinks of up to 27 Mbps. DOCSIS version 3 allows the user of multiplexed channel to achieve higher bandwidth.

Batteries

swollen or leaking bateries from laptop computers or within cell phones tablets must be handled very carefully and stored within appropriate containers. Use gloves and safety goggles to minimize any risk of burns.

system clock

synchronizes the operations of all parts of the PC and provides the basic timing for the CPU. Clock speeds are measured in Megahertz (MHz) or Gigahertz(GHz).

access time

the amount of time it takes the processor to read data, instructions, and information from memory

Ergonomics

the branch of technology that designes products with the comfort and needs of people in mind.

Total Harmonic Distortion (THD)

the distortion produced by an amplifier, as measured in terms of the harmonics of the sinusoidal components of the signal that it introduces.

ICANN (Internet Corporation for Assigned Names and Numbers)

the domain name system is operated by ICANN(icann.org) who also manage the generic top-level domains. Country codes are generally manged by an organization appointed by the relevant government. Each domain name has to be registered with a Domain Name Registry for the appropriate top-level domain.

message application programming interface (MAPI) protocol

the email client software on the sender's computer ([email protected] sends the message to the exchange email server.

CMYK (Cyan, Magenta, Yellow, Black)

the four ink colors used to create most process color printing

keyboards

the longest serving type of input device. Historically, keyboards were connected via the 6-pin mini-DIN PS/2 port. This is colored purple to differentiate it from the identical form factor mouse connector.All keyboards are now USB or wireless (typically Bluetooth though.

Frame rate (fps)

the number of frames per second at which an animation or video is intended to be viewed. 25 FPS is about minimum to make a game playable.

something as a service (*aaS)

the ownership model (public, private, hybrid, or community), cloud services are often differentiated on the level of sophistication provided. -Where something can refer to infrastructure, network, platform, or software.

carriage system

the print head is moved back and forth over the paper by a carriage system.

measured service

the providers ability to control a customers use of resources through metering. The customer is paying for the CPU, memory, disk and network bandwidth resources they are actually consuming rather than paying a monthly fee for a particular service level.

refresh rate

the speed at which the CRT redraws the image,measured in Hertz (Hz)

latency(delay)

the time it takes for a signal to reach the recipient. A video application can support a latency of about 80 ms, while typical latency on the internet can reach 1000 ms at peak times. Latency is a particular problem for 2-way applications, such as VoIP(telephone), online conferencing, and multiplayer gaming. ex:lag

response rate

the time taken for a pixel to change color, measured in milleseconds (ms)

default masks

these are masks comprising whole octets only. Each default mask is known by a particular class. many subnetting schemes use one of the default masks.

half or full duplex

this determines whether the connection transfers data in both directions simultaneously (full duplex) or not (half duplex). The overwhelming majority of devices use full duplex. Gigabit Ethernet requires full duplex to work.

die

this doping process creates millions of transistors and signal pathways.

dissipative packaging

this light pink or blue packaging reduces the build-up of static in the general vicinity of the contents by being slightly more conductive than normal.

USB to wifi/bluetooth

this might be used to upgrade to a better Wi-Fi standard than the laptops built-in adapter. Most dongles will also function as a Bluetooth adapter.

Anti-ESD Shielding

this packaging reduces the risk of ESD because it is coated with a conductive material(such as a nickel compound). This matierail prevents static electricity form discharging through the inside of the bag

Transmit power

this sets the radio power level. It physically set to the highest possible by default.

firmware upgrade

to perform a firmware update, download the update from the vendor's website, taking care to select the correct patch for your device make and model.

Code Division Multiple Access (CDMA)

transmits multiple encoded messages over a wide frequency and then decodes them at the receiving end

DB-9 port

used by routers for management and configuration purposes

CAT-5 Cable

used for ethernet, twisted cable 100 Mbps

Printing Preferences

used to specify additional information such as the default paper size, paper source, print re-sizing options, and more.

dial up connection

uses an analog modem to dial another modem on the ISPs remote access server, which then transfers the data onto the ISPs network and to and from the wider internet. The call is placed in the same way as a voice call and may incur connection charges. The maximum link speed is just 56 Kbps. a connection that uses a phone line to establish a temporary Internet connection

Radio Frequency Identification (RFID)

uses electronic tags and labels to identify objects wirelessly over short distances

SATA (Serial Advanced Technology Attachment)

uses serial signals to transfer data, instructions, and information

port replicator

usually attaches to a special connector on the back or underside of a portable computer. It provides a full complement of ports for devices such as keyboards, monitors, mice, and network connections. A replicator does not normally add any other functionality to the portable computer. A device used with a laptop. The port replicator remains on the desktop with external devices connected to ports on it. A laptop then needs only one connection to the port replicator to have access to the peripherals.

jitter

variation in the delay, often caused by congestion at routers and other internet work devices or by configuration errors.

PCIe Version 1, 2, 3

version 1 has a data rate of 250 MB/s per lane version 2 is 500 MB/s version 3 is 1 GB/s *each direction

virtualization extensions

virtualization software allows a single computer to run muliple operating systems or Virtual Machines (VM).

ribbon

when a coil is energized, it forms a strong electromagnet that causes the metal firing pin to move sharply forwards, striking the ink-bearing ribbon against the paper. A strong permanent magnet moves the pins back into their resting position immediately after firing.

Received Signal Strength Indicator (RSSI)

when a wireless adapter is configured to drop the connection speed if the RSSI is not at a minimum required level. The RSSI is an index level calculated from the signal strength level.

roaming aggressiveness

when the adapter starts to move out of range of one access point, it might try to connect to another one with a better signal.

virtual application streaming

when virtual application streaming is implemented, a small piece of the application is typically installed on the end user device. This is just enough of the application for the system to recognize that the application is available to the user.

system resources

when you install a new device such as a network card , sound card, or internal modern into a PC, it must be allocated to a set of system resources that enable it to communicate with the CPU and memory without conflicting with other devices. This process is handled by Plug and Play.

U/FTP

with foil shielding for each pair

flatbed scanner

works by shining a bright light, usually from a Cold Cathode Fluorescent Lamp (CCFL), at the object, which is placed on a protective glass surface.

PCIe (PCI Express)

• Serial communication - xl, x2, x4, x8, xl6, x32 lanes -supports up to 5 devices -all use same bandwidth • High performance for devices like high-end graphics adapters • PCI Express throughput per-lane in each direction • Speeds from 250 MB/s to 2 GB/s -133mbps


संबंधित स्टडी सेट्स

functional groups and macromolecules

View Set

Business Communications Chapter 16

View Set

Types of DNS Records and DNS terms

View Set

lifetime physical health and wellness chapter 3 quiz

View Set