Myers Troubleshooting and managing PCs 2

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

VirtuaL servers and virtual network components can be created in the cloud using Infrastructure as a Service (IaaS) proviers, often at rates measured pennies per hour.

Platform as a Service (PaaS) providers combnine the infrastructure needed to run a modern Web-application with simple administrative controls. PaaS trades some of the flexibility of IaaS in order to drastically cut the time and knowledge needed to build a run a Web application.

PPP

Point to Point protocol. A protocol that provides router to router and host ot network connections over synchronous point to point and asynchronous point to point circuits.

FTPS

Port 20-21

FTP/SSH

Port 22

You are configuring a router for a small marketing company. Some employees of the company frequently make connections with laptops of sales personnel who are outside the network. You want the return connection from outside the network to be automatically routed to the internal computer that initiated the connection. WHat would allow you to do this?

Port triggering

What two terms identify a bootable partition?

Primary Active

RD and RMDIR commands can be used in Windows Command Prompt to delete a directory

Provided that the process ID of NOTEPAD.EXE obtained with the TASKLIST command is 1230, the correct syntax for a Windows Command Prompt TASKKILL command is TASKKILL -IM 1230

You're working with a company that depends on real time data being available to employees, thus performance is an issue. The company is trying to select the best method for handling the situation of a hard drive crashing. Which of the following would you recommend to the company?

RAID 5

DDR4 raises the performance and capacity bar over DDR3, plus offers even lower power consumption. DDR4 uses a 288 pin DIMM that cannot plug into any previous RAM slot. DDR4 SO-DIMMs have 260 pins.

RAM modules are either single-sided or double-sided. Single-sided sticks have chips on only one side, whereas double-sided sticks have chips on both sides. Most RAM is single-sided.

Four most used Registry values: string value binary value DWORD value QWORD value

REG command is a full Registry editing tool. You can view Registry keys and values, import and export some or all of a Registry

Ellen tries to boot into Win7 but the computer crashes at the logon screen. What tool should she use to try to fix the problem?

Reboot the PC, press F8 to open thE Advanced Startup Options menu, and select Safe Mode.

Ellent tries to boot into Win7 but the computer crashes at the logon screen. What tools should you use first to fix the problem?

Reboot the PC, press F8 to open the Advanced Startup Options menu, and select Safe Mode

bootrec /fixmbr

Rebuilds master boot record for system partition

Recovery menu for a boot error - available from the OS installation CD-Rom

Recovery Console

Scott's Windows 8.1 computer isn't performing as well as it once did. What option can he use to reset his system without deleting any personal files or changing any settings?

Refresh your PC

Martha the tech adds a new hard drive to a user's system for extra storage. She's installed the drive and it shows up in the System Setup utility. When she opens File Explorer, naturally the drive does not appear. What's her next step?

Run Disk Management and initialize the drive

What is a computer bus interface for connecting host bus adapter to mass storage devices such as hard disk drives and optical?

SATA

John needs to perform many changes and updates to a Windows 8.1 system. How does he turn UAC off?

Select User Account settings in the User Accounts Control Panel applet, change the slider to the Never modify

Systems automatically detect new RAM by polling the module's __________ chip.

Serial Presence Detect (SPD)

Traces

Small electrical connections embedded in a circuit board.

A special kind of memory stick for laptops is called a(n) __________.

Small-outline DIMM (SO-DIMM)

A Cloud is a virtual machine running on a hypervisor

Snapshot/checkpoint saves the virtual machine's state at that moment

Which Intel CPU socket type is also referred to as LGA 775?

Socket T

SNMP manager

Software and station that communicates with SNMP agents to monitor and manage management information base (MIB) objects.

hypervisor

Software that enables a single computer to run multiple operating systems simultaneously.

device driver

Software that facilitates the communication between a device and the operating system or between a network adapter and a swerver's OS and the OS of the computer in which the adapter is installed.

Network protocol

Software that takes the incoming data received by the network card, keeps it organized, sends it to the application that needs it, and then takes outgoing data from the application and hands it to the NIC to be sent out over the network.

Public cloud

Software, platforms, and infrastructure delivered through networks that the general public can use.

What technology is based on flash memory and is intended to eventually replace convential hard drive disk drives that have moving discs and other mechanisms.

Solid State Drive

Exam said you should understand the basic components of the Registry, know how to edit the registry manually, and know the best way to locate a particular settings

Registry components Registry is organized in a tree structure similar to those on the file system. Once you open the Registry Editor in WIndows, you will see five maingroups or ROOT KEYS HKEY-CLASSES_ROOT HKEY_CURRENT_USER HKEY_USERS HKEY_LOCAL_MACHINE HKEY_CURRENT_CONFIG

New Task enables you to run programs if you know the executable. Click on New Task, type cmd and press Enter to open the command line interface.

Remember that everything is a process so every application is also listed in the Processes tab. Right click on an application and Select Go To Process to open the Processes tab and see which process is running the application.

What feature in Win7 enables you to right click a file or folder and restore previous versions of that file or folder?

System Protection

Which feauture in Win7 enables you to right click a file or folder and restore previous versions of that file or folder?

System Protection

What tool enables you to correct a corrupted Windows operating system by reverting your computer to a previous state?

System Restore

If you have trouble booting up your computer, you should try startup repair first.

System Restore enables you to go back to a time when your computer works properly. Placing this option in WinRE gives those of us who make many restore points - snapshots of a system at a given point of time - a quick and handy way to return our systems to a previous state.

Registry files are called hives

System Root System 32

What is the name of the command line for killing tasks?

Taskkill

Motherboards come with differing features or components such as USB/FireWire ports, audio networking, video and RAID.

Sometimes a motherboard supports several USB/FireWire ports but does not have rear ports for all of them. In this case, the motherboard likely has connections for the additional ports to be used in conjunction with a dongle to create front-mounted ports.

A client calls complaining that his new LCD monitor is flickering. What is most likely the problem? A. The refresh rate is set too high. B. The refresh rate is set too low. C. The CCFL backlight is failing. D. The LED backlight is failing.

The CCFL backlight is failing.

Aero

The Win Vista/7 desktop environment. It added some interesting aesthetic effects such as windows transparency and Flip 3D

The gpupdate command immediately applies group policy updates. The gpupresult command provides an overview of group policies.

The Windows sfc (System File Checker) command scans, detects, and restores important Windows system files, folders and paths.

riser card

Special adapter card, usually inserted into a special slot on a motherboard, that changes the orientation of expansion cards relative to the motherboard. Riser cards are used extensively in slimline computers to keep total depth and height of the system to a minimum. Sometimes called a daughterboard.

LDAP is an example of Directory access protocol

The function of NNTP is posting, distribution, and retrieval of newsgroup messages

LDAP is an example of Directory access protocol

The function of NNTP is the posting, distribution, and retrieval of newsgroup messages

The dd command is used by Linux systems to copy entire block volumes

The passwd command is used in Mac OS X to change a password

transfer rate

The rate at which data moves from the disk to memory or between devices.

Application software

The set of programs on a computer that helps a user carry out tasks such as word processing, sending e-mail, balancing a budget, creating presentations, editing photos, taking an online course, and playing games.

Memory chips are soldered to a small circuit board called a ____ or a ___

Stick Module

Dudley wants to connect his new MacBook Pro to an LCD monitor that has a Digital Visual Interface. What type of adapter should he use? A. BNC to DVI B. DisplayPort to HDMI C. Mini-HDMI to DB-15 D. Thunderbolt to DVI

Thunderbolt to DVI

To point the prompt to another drive in Windows, type the drive letter and a colon. In Mac OS X and Linux, use cd to move among mounted media

To make a directory, use the md or mkdir command. Windows uses both, but you must use mkdir in Mac and Linux. Make sure tha the prompt points to the direcotry in which you want to make the new subdirectory before you execute the md command.

Use the REN (rename) command to rename a file

To move a file from the root directory into a subfolder, use the MOVE COMMAND

tracert/traceroute

Traceroute(MAC and Linux) is a computer network diagnostic tool, displaying the route and measuring transitdelays of packets across the network. The command is available in Unix OS as 'traceroute', while it is available as 'tracert' in Windows NT based OS. For IPv6 it is often known as 'tracert6' tracert (Windows) type followed by a space and IP address or URL

What layer in the OSI model controls the data flow and troubleshoots any problems with transmitting or receiving datagrams?

Transport

The BCDEDIT tool enables you to view and modify the BCD store

Use the System File Checker to check and replace any corrupted critical Windows files, such as DLLs

The BCDEDIT tool enables you to view and modify the BCD store.

Use the System File checker to check and replace any corrupted critical Windows files, such as DLLs

WinVista/7 COMMAND LINE

Used when the graphical interface of Windows doesn't work To get there - Start Button and type cmd in search text boxand press ENTER key. Once at the command prompt, type dir and press Enter. This command displays all the files and folders

What encryption standards is found on older wireless devices and provides minimal security?

WEP

When loading an OS into a virtual machine, that virtual machine must be powered on and have the installation media as the boot device.

WMware tools are installed in a virtual machine for all except enhanced memory utilization

AES is the most secure among the following encyrption alforithms

WPA2 is the most secure protocol used for encryption in a wireless network

What display standard uses the 16:10 aspect ratio?

WUXGA

A bare Metal hypervisor improves the performance of virtualiation by removing the underlying OS.

What are advantages of a virtual machine over a physical machine? Capability to quickly add and remove the hardware consolidation of multiple physical machine

The computer may beep in two situations that are NOT related to POST beep codes. If the computer beeps constantly until you shut it off, it means the RAM is missing or damaged. If the computer beeps after it is booted, it is probably warning you that the system is overheating.

What can cause RAM problems/damage? Power surges can damage most computer components, including RAM. You should plug your computer and other expensive electronics into a surge protector. Make sure you know the difference between a surge protector and a power strip. Before you handle any parts in your computer, make sure you ground yourself by touching a piece of grounded metal to discharge static electricity. Electrostatic discharge can damage your computer. Excessive heat can cause RAM and other parts to wear out over time. Individual components can overheat, or heat from one component can cause damage to adjacent parts. If you have overclocked any part of your computer incorrectly, it may cause damage in the form of excess heat. Your memory module may have some fault that passed through quality control and worsened over time. This is the most likely cause behind a damaged RAM. It is also possible that the memory module is fine, but one or more memory slots on your motherboard are defective, hindering the RAM's performance. The defect may even be so bad that it damages the memory stick.

Unified Internet Accounts

When I log into my Windows 10 desktop computer, I use my Microsoft account, a fully functional e-mail account hosted by Hotmail. There is no configuration from a user's or tech's perspective. Microsoft and CompTIA calls this Live sign in.

The asterisk is a special character called a ______ that you can use in place of part of a filename when executing a command-line command.

Wildcard

system protection

Windows 7 feature that allows user to right-click a file and restore a previous version

Hyper-V is a part of which distribution?

Windows 8 Pro

ICON replaced the start screen by a start screen tile

Windows 8 account displays the same start screen on any WIndows 8 device

Windows Vista OS has a sidebar

Windows 8 introduced the Metro UI

Windows 7 has one service pack: SP1

Windows 8-10 updated have replaced the use of service packs

What short cut opens the Start Menu in 8/8.1?

Windows Logo Key

Current versions of Windows include a set of repair tools known as the

Windows Recovery Environment or Win RE

What program can you use to keep yours systems patched and up to date?

Windows Update

What MS compatibility tools that enable you to scan your current hardware to see if it can handle upgrading to a new version of windows?`

Windows Upgrade Advisor Upgrade Assistant

In the Serves applet in Task Manager you can work with services directly. You can stop or start services and go to the associated processes. You can also open the Services applet from Start/Search bar by typing services.msc and press Enter.

Windows Vista has two service packs: SP1 and SP2.

TCP/IP provides shyaring functions called services. Well known TCP/IP services include HTTP, the language of the World Wide Web, and Telnet.

Windows calling several tools functions for testing and managing TCP/IP, including ping, ipconfig, nslookup and tracert. MC and Linuxuse ifconfig and traceroute.

In an OS, what is a file?

a collection of program instructions or data that is stored and treated as a single unit

hosting a website requires four components

a computer OS web server software a network connection

Print server

a network-connected computer with print sharing enabled takes the role of a print server

application programming interface (API)

a set of software routines that allows one software system to work with another

example of CDR

a subnet mask of 255.255.255.0 translates into binary a such: With CIDR, network techs refers to the subnet mask by the number of ones it contains

Tom is installing a Windows 10 virtual machine onto a copy of VMware Workstation. Which of the following does he need?

a valid Windows 10 installation media

what type of card would you need to install if you wanted to allow a desktop user to be able to connect to two separate monitors

a video card

An administrator wants to prevent people outside of the building from accessing a new wireless router. Which of the following is the LEAST labor intensive method to use while setting up new workstations? A. Turn SSID broadcast off B. Use wireless encryption C. Institute MAC filtering D. Setup static IP addresses

Turn SSID broadcast off

The Advanced tab lists a bundle of advanced options that you can turn off and on with the check of a box. Options include accessibility, browsing, international, and most importantly security settings. From here you can control how internet explorer checks web site certificates, among other settings.

Two big browsers Google chrome and Mozilla Firefox. There is no applet in the Control Panel as with IE.

There are close to 100 different Ethernet fiber optic cabling standards.

Two to five feet is the typical length of patch cables.

What is a well known Linux distribution?

Ubuntu

What term refers to the standard firmware interface personal computers (PCs) that was designed to improve software interoperability and addresses the limitations in the Basic Input/output system (BIOS)

Unified Extensible firmware interface (UEF)

Linux: Unity (Default for Ubuntu Desktop)

Unity has a control application for managing common settings called SYSTEM SETTINGS. To access System Settings, click on the fear icon on the far right of the menu bar and select System Settings. You can find settings and utilities not in the System Settings application with the rest of the applications on the Dash. Click on the Ubuntu button at the top of the Launcher. From there you can search or browse for handy applications such as the System Monitor or the always critical TERMINAL.

A user wants to secure their home wireless network and allow only certain devices access to the network. Which of the following measures would be the MOST effective means of limiting access? A. Turn off DHCP B. Use MAC filtering C. Disable DMZ D. Turn off SSID broadcasting

Use MAC filtering

Hybrid Cloud

connects a combination of public, private and community clouds allowing communication between them.

Registry

contains a huge database that stores everything about our computer

Windows folders: \Program Files

contains all the applications

Jill boots an older Pentium III system that has been the cause of several user complaints at the office. The system powers up and starts to run through POST, but then stops. The screen displays a "CMOS configuration mismatch" error. Of the following list, what is the most likely cause of this error?

dying CMOS battery

What are advantages of solid-state over hard disk drives?

fast startup fast transfer low power consumption

A server on a network contains two network cards. The server is configured in such a way that if a primary network card fails, the standby network card gets activated. Which of the following terms best describes this phenomena?

fault tolerance

Only active primary partitions can boot an OS. Only one primary partition per hard drivce an be marked as active.

hard drives that use the dynamic storage partitioning scheme are called dynamic disks by MS. Dynamic disks use volumes rather than partitions. There are no primary or extended volumes - a volume is simply a volume.

Intel VT-x and AMD AMD-V

hardware virtualization support

Application software

has programs that do the real work for the user. Main reason why people by computers. Talks to the hard drive with assistance with system software.

bridge

have two interfaces, one interface for each of the different media

What custom configuration needs to support media streaming?

home server pc

what are some features offered by FireWire

hot swapping self-config multiple-device support high speed data transfer

EXAM TIP: Memorize the name of the components, connectors and terms.

http://pinoutguide.com/comp.php#ps2kb https://www.jegsworks.com/lessons/computerbasics/lesson10/lesson10-3.htm

IPv6 Address Types

http://support.sas.com/documentation/cdl/en/lrcon/62955/HTML/default/viewer.htm#a003165928.htm

What is a host file?

https://www.thewindowsclub.com/hosts-file-in-windows

System BIOS

hundreds of little programs stored on the system ROM chip on the motherboard.

A more modern name for a virtual machine manager (VMM) is a

hypervisor

What core virtualization software enables multiple virtual computers to run on a single physical host?

hypervisor

The term "bare metal" virtualization software refers to

hypervisors

SSID (Service Set Identifier)

identifier of a wireless network. Disabling SSID broadcast can hide the network from casual users but an attacker can easily discover it with a wireless sniffer.

system restore point

in Windows, a snapshot of your entire system's settings used for restoring your system to a prior point in time

How to access TCP/IP settings

in Windows, you can configure network settings from the appropriate networking applet right click on Network and select Properties or open the Control Panel and select Network and Sharing Center

IP Address

in a TCP/IP network, the IP ADDRESS identifies the node and the network on it resides it is the unique identification number for your system on the network

You are most likely to find an RTOS

in a robotic camera

Problem Reports (called Problem Reports and Solutions in WinVista)

in control applet in WIn lists all WIndows Error Reporting issues. You click on the solution and the problem is fixed.

One reason to create a virtual machine with multiple multi-core vCPUs is:

in some cases, licensing allows OSs to use more resources with the multi-core vCPUs.

input

includes data entered from a keyboard identified by a pointing device such as a mouse or loaded form disk onto a computer

output

includes writing information to a disk, viewing it on a monitor, or printing to a printer

Local area Network (LAN)

is a group of computers located physically close to each other

File Explorer

is the main tool for finding, viewing, and managing the contents of your computer

Classless Inter-Domain Routing (CIDR)

is the more current system. Works easily in binary. Because the subnet mask numbers are binary, you can make a subnet with any number of ones in the subnet mask.

System software

it is firmware, manages and controls the hardware so the applications can perform a task. Talks directly to the hardware

Transmission Control Protocol/Internet Protocol (TCP/IP)

it is the primary protocol of most modern networks including the internet a computing device needs this to be able to access the internet

What is the DVI-I connector used for?

it is used for both digital and analog signal connections. It contains 4 more pins than the DVI-D connector.

any network address must provide two pieces of information:

it must uniquely identify the machine and it must locate that machine within the larger network

Windows Preinstallation Environment (Windows PE)

limited function graphical operating system that contains both troubleshooting and diagnostic tools, and installation options for your OS.

ls -alt

lists all contents, including hidden files and directories, in long format, ordered by the date and time they were last modified

bootrec /scanos

looks for windows installations not currently in the BCD store and shows you the results without doing anything

When a computer is unable to display image on the screen, the most common causes (and the easiest ones to fix) for this problem include

loose cable connections wrong input selection

What are features of the Twisted Nematic (TN) LCD panel technology?

low viewing angles fast response times low color quality

What Linux command will show detailed information about the contents of a folder?

ls -1

What command will show you any line that has the string "fred" in it?

ls -r less fred

NAND flash memory is a type of nonvolatile storage technology that does not require power to retain data. An important goal of NAND flash development has been to reduce the cost per bit and to increase maximum chip capacity so that flash memory can compete with magnetic storage devices, such as hard disks.

mSATA is a SSD form factor you can find on a portable device.

. . [dot,dot]

moving up or back one directory

When a single organization owns a cloud network that is closed to outside use, we call it a private cloud. Private clouds require much space, money and expertise to build and maintain, but can provide greater build and maintain but can provide greater security and customization.

multiple organizations can create a community cloud that is shared among the organizations and this is called a Community Cloud.

the copy command is to move in WIndows as cp is to _______ in Linux

mv

Platform as a Service (PaaS)

netflix

NETBIOS

networked basic input/output system used when a WINS server tries to resolve a host name into an IP address on a windows-based LAN

App not loading

not correctly installed needs to be updated new version may not be compatible with OS

Safe Mode

occurs if the system is failing and will load only the most essential parts of the operating system and will not run many of the background operating utilities

benefits of virtualization

power saving hardware consolidation system management and security research

What are the benefits of virtualization?

power saving, hardware, consolidation, system management and security and research

What are characteristic features of TFTP?

provides no security features a very basic form of file sharing protocol frequently used for exchanging boot and configuration files on private LANs

TCP

provides reliable, ordered and error checked delivery of a stream of packets in the internet. Client will send a hello message, server will send a yes, I got it, and then the client will send the message

What ports on a computer are used to connect a keyboard?

ps/2 USB

Janelle wants to start a new photo-sharing service for real pictures of Bigfoot, but doesn't own any servers. How can she quickly create a new server to run her service? A. Public cloud B. Private cloud C. Community cloud D. Hybrid cloud

public cloud

What Linux command displays the current working directory?

pwd

Which command can you use to determine an exact folder location or path in Terminal

pwd

gpresult

quick overview of all security policies applied to a single user or computer

An administrator sets up a shared folder for a group of users. The New Technology File System (NTFS) permissions are set to read only for the group, but the share permission are Everyone, Full control. Which permissions do the users have to the files in the shared folder?

read-only

bootrec /fixboot

rebuilds the boot sector for the active system partition

How to create recovery disk -

recovery-create recovery drive

Companies use virtualization to do all of the following except:

reduce the amount of applications in corporate datacenters

DNS

refers to a system containing mappings of domain names to various types of data, such as for example numerical IP addresses

User Interface

refers to the software part of the os with which you can interact

In computer graphics, the frequency at which the screen is redrawn is called

refresh rate

How do you open the Registry Editor from the command prompt?

regedit

Tim needs to register an important .DLL file as a command component in the Registry. What command-line tool should he use?

regsvr32

What security treatments should you take VMs

regular updates, firewalls, antimalware, good security hygiene

IPCONFIG

release the IP address, renew the IP address, see the TCP/IP settings and see all info about your PC including MAC address

"rd" command

removes (deletes) a directory

Jim laptop wireless 802.11n runs slow. What

replace the mini-PCIe 802.11n card with an 802.11ac card

Network Topologies

represents a network's physical layout, including the arrangement of computers and cables

Some actions to take to troubleshoot a non-responsive touchscreen of a mobile device:

reseating the device's battery erasing content/settings and restoring the device to factory defaults pressing a specific key combo/button to perform system restart removing screen protector and cleaning the screen

The term that shows the number of horizontal pixels times the number of vertical pixels

resolution

network people call anything that one comp0uter might share with another

resource

Consolidating a system's physical and time resources is known as

resource pooling

What do we call the time it takes for all of the sub pixels on the panel to go from pure black to pure white and back again?

response rate

What do we call the time it takes for all of the sub-pixels on the panel to go from pure black and white and back again.

response rate

What cable is used for 10Base2 Ethernet implementation?

rg-58a/u

What is a board plugged into the system board and provides additional slots for adapter cards?

riser card

The Terminal ______ command enables you to delete a file

rm

What command will delete all of the files in a directory in Terminal?

rm*

Which WIndows command will copy encrypted files?

robocopy

What tool would you use at a Windows 7 command prompt to manage files and folders more quickly and efficiently than with xcopy or copy?

robocopy.exe

What component connects LANs into a WAN?

router

Checkpoint (or Snapshot)

saves the Virtual Machine's state at the moment allowing us to quickly return to this state later. Snapshots are great for doing risky maintenance with a safety net.

what do Snapshots do?

saves the virtual machine's state at that moment, allowing us to quickly return to this state later NOT a long term backup strategy.

gpupdate

sets new policies to work immediately. Setting new group policy using GUI it can take up to 167 hours to update on a local machine

Which key do you hold down to select a group of contiguous files?

shift

tracert (Windows) and traceroute (Mac OSX)

shows a route that a packet takes to get to its destination. from a command line, type tracert or traceroute followed by a space and an IP address or URL the output describes the route from your machine to the destination

if a virtual machine system goes down due to hacks, malware et how do you restore it

shut down the virtualization machine (VM) and install an alternate (clean) copy of it

What tool enables you to reboot a computer from the command line?

shutdown

What is the correct syntax for setting the time out period of 60 seconds before powering off a windows host?

shutdown /t 60

What command will shut down a Linux system immediately without restarting it

shutdown now

complex desktop PCs can be replaced with what

simple but durable Thin Clients

What is used to make a patch cable?

stranded cables

What steps do you need to take to install a core i5 CPU into an FM2 motherboard?

take all the steps you want because it is not going to work

mkdir (make directory)

takes in a directory name as an argument, and then "creates a new directory in the current working directory"

"pwd" command

tells you where you are. Exact folder location

When using Win8, what is the first interaction you have with the OS and the first image you see on your display?

the Start Screen

Path

the exact location of a file

DDN (dotted-decimal notation)

the format used for IP version 4 addresses, in whihc four decimal values are used, separated by periods (dots). Instead of a computer being called SERVER, it gets an address like 202.34.16.11

Mini-ITX

the most common small non-ATX motherboard form factor

What will create the best display on a screen?

the native resolution

What best describes a lit pixel?

the pixel is stuck on white

A customer calls complaining that this TV looks awful when he connects it to his laptop. What could avoid this problem?

the second monitor (the tv) is a PDP

HKEY_CLASSES_ROOT

this is the root key that defines that standard class objects used by Windows. A class object is named group of functions that defines what you can do with the object is represents. Pretty much everything that has to do with files on the system is defined by a class object.

The World Wide Web

this web provides a graphical face for the internet. Web servers (servers running specialized software) provide web sites that you access by using the HTTP protocol on port 80 and thus get more or less useful information

This is the term used to describe the size of an image at a certain distance from the screen?

throw

Multitask

to perform more than one task at a time

The "Run as Administrator" option in MS Windows available after right clicking on the Command Prompt Application icon allows for execution of shell commands reserved for a system admin?

true

educate users

type of best practice consisting of: - training users to recognize and avoid hoaxes, phishing and potential sources of malware - implement antivirus software - block pop ups in web browsers

RJ-11

used for or modern connections

terminal

used to access the command line

Details view

used to display information about files

man

used to format and display user manual pages

recycle bin

used to store deleted files temporarily

Sidebar

user interface feature in WinVista that enables users to place various gadgets such as clocks, calendars and other utilities on the right side of their desktop

command line interface

user interface for an OS devoide of all graphical trappings

Describe an IPv4 address

uses decimal, not hexadecimal numbers uses periods, not colons, as separators uses four octets

FIBER OPTIC CABLE

uses light, instead of electricity, to transmit data

Linux

uses pretty much the same file structure as Windows

client side virtualization

using an hypervisor installed on a client machine to run a virtual machine. The VM maybe created and stored on the client machine or accessed over the network

Value of an SNMP management information base (MIB) object. That value can be read with a Get PDU or changed with a Set PDU.

variable

client server

very secure, clients can't communicate with each other, and major flaw - server controls everything, if it fails then nothing will work.

A virtual NIC may only connect to one virtual switch

virtual machines can communicate only with other virutal machine across an Internet virtual switch

A network administrator can make a new subnet for a group of virtual machines without moving or re-cabling hardware using a__________. A) Virtual NIC B) Virtual switch C) Virtual router D) Virtual firewall

virtual router

virtual machines can be configured to utilize multiple monitors.

virtualizing a sound card is somewhat of a misrepresentation because CONTROL is passed to the sound card on the local device, not the host server.

gpresult

what commands can be used to pull a list of call a user belongs to

Local Host

what is in front of you (ie MAC OS X workstation_)

Swollen battery

when this happens, the battery casing actually swells, heats up, cracks and cause leakage. overcharging the battery can cause swelling using a non OEM charger may cause swelling if you are using a charger not rated for the correct voltage and wattage the computer requires. Overheating can also cause swollen battery

DHCP

when using this, ipconfig is the primary tool for releasing and renewing your IP address

Input

when you start doing something such as clicking th mouse, typing on the keyboard or touching the touch screen

What happens if you add 2 RAM sticks to your PC and one has a bad SPD?

when you try to boot the system, you will get a POST error message and the system will not boot.

Windows folders: \users

where all of your user documents are located

file system

where files are directories on your computer are organized into a tree structure (root directory - parent child directories)

Terminal/Command prompt

where you do CLI

share

which type of permissions apply only to network to work on NTFS, FAT32, and exFAT volumes

Proxy

which type of server can function as a firewall

DHCP

(Dynamic Host Configuration Protocol) A set of rules that allow network client computers to find and use the Internet address that corresponds to a domain name. Creates a pool of temp IP addresses which are given to machines.

Router

(computer science) a device that forwards data packets between computer networks

What switch puts the PING command in a loop (ping the specified host until stopped)?

-t

command line

-text interface for your computer - to copy, move and remove files and directories

What COPY command switches verifies that the new files are written correctly?

/V

Which of the COPY command switches suppresses the confirmation prompt displayed when Windows is about to overwrite the contents of an existing file?

/Y

Jennifer, a network administrator, is implementing disk redundancy in all database servers. She also wants to use minimum number of disks. Which of the following RAID configurations will she use to complete implementation?

1

When configuring a network, what is the rule of thumb on the max number of computers you should have in a peer to peer network?

10

What voltage does does an ATX12V P4 connector provide motherboards?

12 V

examples of IPv6 address?

1200:0000:AB00:1234:0000:2552:7777:1313 Yes 1200::AB00:1234::2552:7777:1313 No [2001:db8:0:1]:80 Yes http://[2001:db8:0:1]:80

What is the resolution of WXGA?

1366 x 768

What is the resolution of SXGA?

1400 x 1050

What is the data transfer rate of the Serial ATA (SATA) interface?

150 to 300 mbps

When Linux partitioned the 20GB allocated for disk storage, how much was actually allocated for user space?

17.96GB

Address Range C

192-223

What is 1080p resolution?

1920 x 1080

What is the resolution of HDTV 1080p?

1920 x 1080

1. Create a new directory in your home directory by using the make directory command (md). At the command prompt from your home directory, make a directory called Jedi. C:\Users\nkersey1>md Jedi

2. A new prompt is presented. Do a dir to see your new directory. Windows creates the new directory wherever it is pointing when you use the command, whether or not that's where you meant to put it. To demonstrate, point the prompt to your new directory by using the cd command. C:\Users\nkersey1>cd jedi

What is the resolution for WQXGA?

2048 x 1152

What is the resolution of QWXGA?

2048 x 1152

What is the resolution of QWXGA?

2048 x 1200

What package does DDR3-SDRAM use for desktop PCs?

240 pin

Which of the following is a valid package size for DDR2 DIMMs

240 pin

How much data can you stick on a single layer Blu-ray disc?

25 gigs

What is the max number of characters in a Windows filename?

255

What is the bit length of an IPv4 address?

32 bits

When Linux partitioned the 20GB allocated for disk storage, how much was actually allocated for user space?

500 MB`

The Super Extended Graphics Array (SXGA) display standard features

5:4 aspect ratio 1280 x 1024

Most fiber Ethernet networks use _______________ multimode fiber optic cable.

62.5/125

What is the resolution of SVGA?

800 x 600

What is an example of an IPv6 loopback address?

::1 127.0.0.1

What is the default path for documents for a specific account in Windows

:\Users\UserName\Documents

ATX Form Factor

A 12 9.6 inch form factor that replaced the AT Form factor - had better air movement, better placement of RAM for enhanced PC performance.

Pico-ITX

A 3.8 by 2.8 inch version of the ITX form factor.

EXAM TIP: Remember that a LAN is a group of networked computers that are closed to each other. Also, remember that a LAN is almost always a broadcast Domain

A Bridge is a device that connects dissimilar network technologies that transmit the same signal

A MAC address is a BINARY number

A Lan is almost always a BROADCAST DOMAIN

The hypervisor handles all of the storage I/0 requests from the guest the network I/0, memory processing and CPU work

A hypervisor is a specialized SOFTWARE device that facilitates virtualization.

drive letter

A letter designating a specific drive or partition.

File Server

A networked host that enables you to access a bunch of files and folders

Common volume letter assignments: Floppy drive

A:

What do backlights need?

AC power

A link light that is off or flickering shows a connection problem

ACTIVITY LIGHT turns on when the card detects network traffic so it makes an intermittent flickering when operating properly. This is a lifesaver for detecting problems

Most CPUs have integrated memory controllers and CPUs, increasing the overall efficiency of modern computers.

All CPUs today support to protect certain sections of memory.

A remote host refers to some other computing device on the network or reachable beyond the network.

Any computer that's running a sharing program is by definition a server

A browser is not considered a utility program

Applet is a generic term for a program in the Windows Control Panel

Windows 8 apps

Applications specifically designed to run in the Win8 interface; these apps are displayed full screen, without borders or controls

What should you do before installing an expansion card?

Attach an anti-static wrist strap Unplug the PC

What process determines the identity of a user?

Authentication

What optical disc type is intended for high density storage of high definition video as well as data storage?

BD RE

A dock station is a device that allows use of monitor and input devices with the laptop.

BDS is global navigation satellite systems and has a max number of satellites

BIOS

BIOS

Common volume letter assignments: primary hard drive

C:

32-bit programs are installed into which folder by default in a 64-bit edition of Windows?

C:\Program Files (x86)

Windows Vista/7 three launch points:

Control Panel System Tools Command-line interface

What hexadecimal value is represented by the binary value 1101?

D

Common volume letter assignments: CD-ROM or DVD-ROM

D:

What Windows Command Prompt commands can be used to list all directory files and subdirectories contained in the current directory?

DIR *.*

What command in WIndows launches a text-based command line partitioning utility?

DISKPART

The traditional D-subminiature connector on a video card is called a VGA connector or

DVI

What is connector is used to enable both analog and display devices to use a single connector?

DVI

DEP

Data Execution Prevention. prevents viruses to take control over applications that are in the loaded memory

Catastrophic failure

Describes a failure in which a component or whole system will not boot; usually related to a manufacturing defect of a component. Could also be caused by overheating and physical damage to computer components especially a motherboard.

Form Factor

Determines the physical size of the motherboard as well as the general location of components and ports.

Bob is concerned that his new PCIe video capture card device driver is causing start up problems. What utility enables him to see if Windows recognizes the driver?

Device manager

You can access frequently used applications in Mac OS X by clicking their icons on the

Dock

How many maximum device(s) can be connected to a SATA 300 port?

Ext USB

A logical drive must be created inside a _________.

Extended partition

What is the processor on a video card called?

GPU

SaaS

Gmail is an example of what type of cloud computing service model?

WAP refers to a suite of protocols used to enable Internet access on mobile devices.

HTTP and Telnet are both examples of special sharing functions called TCP/IP services

Secure versions of the HTTP protocol offering traffic enryption include:

HTTP over SSL HTTP over TLS HTTPS

MICROPROCESSOR

MICROPROCESSOR

When programmers need to use objects across multiple applications, they turn to Component Services.

OBJECTS is not found in the Task Manager

What display sandwiches carbon-=based films between two charged electrodes, one a metallic cathode and one a transparent anode?

OLED

Remote host

Other computer devic on the network or reachable beyond the network

SSD is a solid state drive and has no moving parts thus making it more reliable than mechanical storage.

PATA cable is wide and ribbon like with 40 pin connectors arranged in a 20X matrix.

ATX dominates the PC market

PCIe slot features serial data transfers.

A laser printer uses toner for printing on a paper

PCL, PostScript, WIndows GDI are languages used to communicate with a printer.

POST INSTALLATION TASKS

POST INSTALLATION TASKS

POWER SUPPLIES

POWER SUPPLIES

Which tool in Windows enables an admin to create a log that shows all of the applications a user runs or attempts to run?

Parental controls

Fifth thing to do -

Prepare for trouble: 1. make backup of initial installation 2. make a backup bootable device that you can boot from or repair from if something goes wrong with the initial installation

Setting any single process to Realtime priority will often bring the entire system to a crawl as no other process gets much CPU time, avoid Realtime priority.

Process Explorer shows a tree structure.

List some cloud concepts

Public IaaS PaaS SaaS

Jill wants to add an additional drive to her portable computer. She has a spare 1-TB SATA HDD. Given such scenario, what would enable her to accomplish her goal?

Put the drive into an external enclosure and plug it into an eSATA socket on the back of the portable.

RAID 1 offers the best redundancy by using two disks and two controllers

RAID 0 is the level of disk striping

Striped volumes are similar to spanned volumes, but files are deliberately split across volumes to improve read/write access time. Neither spanned nor striped volumes are fault tolerant.

RAID 1 or mirrored volumes, use exactly two volumes that are exact duplicates of each other. You suffer a slight performance hit but make up for it with fault tolerance.

Self-Monitoring, Analysis, and Reporting Technology (SMART) is an internal drive program that tracks errors and error conditions within a drive.

RAID 10 features both nesting and striping requires at least four drives

RAM

RAM

The boss flies into your office yelling that malware has replaced every icon on his desktop with purple dinosaurs. Given that he uses a thin client to access a virtual desktop, which of the following would be the quickest way to fix the problem?

Reinstall windows load a new copy of the department specific virtual machine

If you upgrade your memory but notice that the RAM count does not reflect the additional memory, what should you do?

Remove the RAM and try to reinstall it.

Steve complains that his aging Windows 7 laptop still isn't snappy enough after upgrading the RAM. What might improve system performance?

Replace the HDD with an SSD

Martha works as a network administrator for uCertify Inc. The company's database is heavily read oriented. She is trying to select the best method for handling situation of a hard drive crashing, which should also a cost effective option that can provide both performance and redundancy. Which of the following RAID levels should Martha use?

Replace the failed drive, use Disk Management, select a new area of free space and then regenerate the volume

Answer from an agent upon receiving a Get protocol data unit (PDU) from an SNMP manager.

Response

What is the function of POP3?

Retrieving email messages from a mail server

If Windows locks up during the installation, how can you determine at what point it locked up?

Review the setuperr.log files to track any errors dicovered.

What path would open administrative tools in Windows 8.1?

Right click on the start menu and select admin tools from the context menu

ST Connector

Round shapped connector on a fiber cable

WAN is a widespread group of computers connected using long distance technologies. You connect LANs into a WAN with a router. The best example of a WAN is the internet

Routers destroy any incoming broadcast frames, by design. No broadcast frame can ever to through a router.

windows7's predecessor, Vista, has a similar to look and feel. The most visible difference in Vista is called the SIDEBAR.

SIDEBAR is enabled by default. The sidebar houses one or more GADGETS, such as the Clock, Calendar and speeds. Windows 7 supports gadgets but does not have a sidebar.

What protocol is used for automated discovery of networked services on Local Area Networks (LANs)?

SLP (Service Location Protocol)

A technician is preparing to install a new wireless printer for use in an environment with several wireless networks installed. Which will be used to determine the wireless network that the printer will be available from? A. DNS B. SSID C. WPA D. VPN

SSID

southbridge

Secondary bridge between the CPU and computer =Chipset

Example of a Set PDU

SetRequest

What Windows app in Win10 combines many utilities into a unified tool?

Settings

Charms

Special shortcuts for performing common tasks, such as searching or sharing information, created for Windows 8.

What program helps coordinate all print jobs currently being sent to printer?

Spooler

nonvolatile memory

Storage that retains data even when powered down (such as flash memory, hard disk, or DVD storage).

The Applications tab shows all the running applications on your system.

SwitchTO enables you to bring any program to the front (handy when running several applications running)

PERFORM BASIC RAM TROUBLESHOOTING

Symptoms of bad RAM include parity errors, system lockups, page faults and other error screens. However, other failing components can cause similar problems. Bad RAM usually results in error screens displaying messages as "Partity error at xxxxxx.xxxxxxx" where xxxxx is a hexadecimal vlaue such as ASF2:004EEAB9. A real parity error shows up in the same place in memory each time - if that hexadecimal code always the same, you probably have bad RAM.

What is the name for the rules for typing a command correctly?

Syntax

Administrative tools enables you to set up hard drives, manage devices, test system performance and much more.

System Preferences tool can be accessed fromthe permanent Apple menu to administer a MAC.

What Windows utility uses points in time that allow you to return your system to a previous date and state>

System Restore

Where are the network hardware and patch panels kept?

Telecommunications room

What feature of the Mac OS X is the equivalent of the command-line interface and windows?

Terminal

A computer uses random access memory to take copies of programs from the hard drive and send them, one line at a time, to the CPU quickly enough to keep up with its demands. The CPU accesses anyone one row of RAM as easily and as quickly as any other row, which explains the "random access" part of RAM. RAM is not only randomly accessible but also fast. By storing programs on RAM, the CPU can access and run them very quickly. RAM also stores any data that the CPU actively uses.

The CPU communicates with RAM on the motherboard via the address bus. The number of wires comprising the address bus dictates the amount of memory the CPU can access.

Each file's ATTRIBUTE determine how programs (such as My Computer or Computer) treat the file in special situations.

The SHUTDOWN COMMAND enables you to restart a computer remotely from the command line.

Forward proxy servers are NOT application specific.

The Server side load balancer is the best device to dole out requests to duplicate servers to ease congestion

Type su or sudo before a Terminal command to get root privileges

The asterisk is a special character called a Wildcard that you can use in place of part of a filename when executing a command-line command.

File Explorer

The main tool for finding, viewing, and managing the contents of your computer by showing the location and contents of every drive, folder, and file; called Windows Explorer prior to Windows 8.

file management

The process by which humans or computer software provide organizational structure to a computer's contents.

The boot process

The process for loading the OS into random access memory (RAM) when the computer is turned on

Plug and Play (PnP)

The technology that enables the operating system, once it is booted up, to recognize automatically any new peripherals and to configure them to work with the system.

A digital image displayed on the graphics monitor screen consists of pixels arranged in rows and columns

The term "screen resolution" refers to the max number of pixels in each dimension (horizontal and vertical) that can be addressed by a digital display device.

SODIMM is a memory package or module is used for DDR memory for laptops

The transfer rate is supported by the 72 pin SODIMM is 32 bit.

bootrec

The ultimate tool for boot problems (including master boot record, boot sector, and BCD store). WHat is the command to access this tool from the command prompt?

EXAM TIPS: Know fiber connector types and the difference between multimode and single mode fiber

There are a number of Ethernet standards that use fiber optic-cable instead of UTP

Web Cam transmits digital images across the internet for video communication

Thick clients are general purpose devices. They do not use the best components or the worst components. Thick clients should be able to handle the majority for home and office tasks.

HKEY_LOCAL_MACHINE

This root key contains all the data for a system's non user specific configurations. This encompasses every device and every program in your computer

In a process known as ________, a CPU can slow itself down and in low-demand times or if it gets too hot.

Throttling

memory blocks are also known as PAGES

Through Moore's Law was originally used to describe the trend in processor performance, it is also application memory.

Internet Tier 2: providers own smaller, regional networks and must pay the Tier 1 providers. Most of the famous companies that provide internet access to the general public are Tier 2 providers.

Tier 3 providers are even more regional and connect to Tier 2 providers. The piece of equipment that makes this tiered internet concept work is called a BACKBONE ROUTER. Backbone routers connect to more than one more backbone router, creating a big, interwoven framework for communication.

Windows 8 Apps Screen replaces the ALL PROGRAMS option from Win7.

Tiles DO NOT need to be left where Windows places them

What is the term for describing a bare-metal hypervisor?

Type 1

What is the default Ubuntu Desktop Environment?

Unity

What type of file system does a DVD drive use?

Universal Disk Format (UDF)

VLAN

Virtual local area network. A VLAN can logically group several different computers together, or logically separate computers, without regard to their physical location. It is possible to create multiple VLANs with a single switch.

What is the difference between virtualization and emulation?

Virtualization takes the hardware of the host system and allocates some portion of its power to individual machines. An emulator is software or hardware that converts the commands to and from the host machine into an entirely different platform.

With virtualization you can easily build what

a single physical server machine and run a number of servers or clients on that one box

GRUB

boot manager for Linux systems

What is another term for snapshot?

checkpoint

Peer to Peer

fast, not secure, not organized, no privacy.

You work as technician for Tech Perfect Inc. You are required to repair a laptop. For this, you need to disassemble the laptop. What should be your first step when you start disassembling your laptop?

refer to the hardware service manual of the laptop

"rmdir" command

removes (deletes a directory)

You work as network administrator for McNeill Inc. The company has a windows based network. All client computers on the network run Vista. You have configured a network projector on the network. You try to connect to the network projector by using the Connect to a Network Projector wizard. You are able to connect to the projector but unable to do anything else. You verify that the projector is turned on. What is the most likely caused?

someone else on the network is using the projector.

charms

special shortcuts included in Win8

NSLOOKUP

specific host name from dns server

You realize after you installed Windows that you created only a single partition and you want two. How do you fix this and create two partitions for a C and a D drive?

split the partition in Disk Manager

/r

switch attempts to locate and repair bad sectors

What does the CPU use to access the systems RAM?

the address bus

vi

the built in text editor for MAC OS and Linux

The exact location of a file is called its PATH

the cipher command works on DIRECTORIES

system files

the main files of an OS

files

used to organize files

notification area

Contains icons representing background processes, the system clock, and volume control. Located by default at the right edge of the Windows taskbar. Most users call this area the system tray.

system tray

Contains icons representing background processes and the system clock. Located by default at the right edge of the Windows taskbar. Accurately called the notification area.

What is not a standard NTFS permission.

Copy

File Explorer

A tool in Win8-10 that enables users to browse files and folders

Josephine discovers an old PATA drive sitting in the closet and wants to view the contents. What does she need to make that possible?

ATA controller ribbon cable molex power connector

What is the minimum PSU required for an ATX system that requires Molex, mini and SATA connectors

ATX12V 2.0

What does NTFS use to provide security for individual files and folders?

Access Control List

Kernel Panic

BSOD equivalent for Linux systems

Which part of an LCD display illuminates the image?

Backlights

In Windows 7, you may select from two default Power Plans with or without customization. What are the two power plans?

Balanced and Power saver.

What type of hypervisor removes the host OS and installs only the hypervisor?

Bare-metal hypervisor

What screen size typically identifies a computer as a tablet?

Between 7 inches and 12 inches

Computers use the _____ numbering system.

Binary

Which tool in certain Windows editions enables you to encrypt the contents of a drive, including folders of users other than you.

BitLocker

What is used by most LCD backlights and provides low power usage, even brightness and has a long life?

CCFL

CLOCK

CLOCK

What's a good guide to use when deciding on hardware for a basic thick client?

Check the recommended requirements for the OS you want to use.

Infrastructure as a Service (IaaS)

providers use virtualization to minimize idle hardware, protect against data loss and downtime, and respond to spikes in demand. Big IaaS providers are like Amazon web service on demand.

This is the term for the amount of time it takes for all of the sub-pixels on the panel to go from black to white and back

response rate

IMAP4

retrieving email messages from a mail server

Super user and root privileges commands

sudo or su

tab

summon a quick application switcher

What two information technology trends helped drive the need for virtualization?

the explosive growth of Microsoft Windows on servers in corporate datacenters The constantly increasing capabilities of corporate servers due to Moore's Law

What happens to the files in a windows folder when you right click a folder on your hard drive and choose delete

they are moved into the Recycle bin

Characteristics of a packet

think of it as a mail, mac of sends, mac of receiver, data stored

file extension

two, three, four, five or more letters that follow a filename and identify the type of file or file format. Common ones include .zip, .exe, .doc., java,

What is the function of a power inverter?

used for supplying voltage to backlights of an LCD panel Converts DC power into AC power

Display devices with aspect ratios of 16:10 and 16:9 are commonly referred to as:

widescreen displays

Windows security policies

windows configuration settings that control the overall security behavior of the system; consists of hierarchical groupings of related policy nodes, containing individual policy entries you can enable, configure or disable

What is the structured cabling name for the end user's office space where network computers are set up?

work area

5 root keys and their definitions

HKEY_CLASSES_ROOT = define the standard of class objects HKEY_CURRENT_USERS and HKEY_USERS = support the use of more than one user HKEY_LOCAL_MACHINE = contains the data of a system's non user specific HKEY_CURRENT_CONFIG = tells which monitor is being used if there is more than one.

What root keys contains the data for a system's non-user specific configurations?

HKEY_LOCAL_MACHINE

An Audio Interface is a box that you hook up to your PC with inputs that enable you to connect professional microphones and instruments.

HTPC cases are used to make your computer blend in with the rest of your home theater equipment.

A protocol used for retrieving contents of an Internet page from a web server is called:

HTTP

Examples of secure network protocols offering traffic encryption include:

HTTPS, IPsec, SSH

A user calls first thing Monday morning saying she has an error message at boot-up that says her case was opened. She's looked at the computer, but it seems normal. What does this tell you about her computer?

Her computer has chassis intrusion detection/notification and the future is enabled in CMOS

MAC address is 48 bits long providing more than 281 trillian MAC addresses

Hexadecimal is shorthand for representing strings of 1s and 0s. One hex character is used to represent four binary characteristics.

Which attribute keeps a file from being displayed when the dir command is performed?

Hidden

Other partition types are hidden and swap partitions.

Hidden partitions are not visible to the OS and are often by PC manuf. to store emergency itsemf and restore images of the system partition.

The domain controller authenticates a user when that user logs into a domain computer. The domain controller is therefore also called an authentication server.

Homegroups are not available in VISTA, MAC or any Linux distro.

The telecommunications room is the heart of the basic star. This room is where all the horizontal runs from all the work areas come together.

Horizontal cabling run is the cabling that goes more or less horizontally from a work area to the telecommunications rooms.

Hypertext Transfer Protocol (HTTP)

How data is transferred through the servers. Port 80, 8080

This type of cloud is a private cloud embedded in a public cloud.

Hybrid Cloud

Windows supports __________________, drives that combine flash memory and spinning platters to provide fast and reliable storage.

Hybrid hard drives (HHDs)

What Windows Command Prompt commands listed below allows to display IP addresses, subnet mask and default gateway for all adapters?

IPCONFIG

Win8 interface

New interface designed for Win8, features large type with clean, readable block images insp0ired by metropolitan service signs such as those found on bus stations and subways

In CMOS, you can configure the voltage and multiplier settings for the CPU, boot options as the boot sequence, virtualization support and security related options can include TPM, LoJack, intrusion detection/notification. All setup programs include options to Save and Exit or Exit without Saving. You should not change CMOS settings unless you know exactly what you are doing.

Newer hardware devices that are not supported by the System BIOS have other way to BYOB. A hardware device many contain its own BIOS chip or ROM chip known as option ROM. Every video card contains its own BIOS for internal functions. A more flexible way to BYOBis to use files and called device drivers that contain instructions to support the hardware device. Device drivers load when the system boots.

A(n) ___________ is an interruption the CPU cannot ignore.

Non-maskable interrupt (NMI)

A TYPE-2 hypervisor runs on top of an OS to provide resources to the virtual machines it supports

Possible changes to virtual CPUs in a virtual machine include only the amount of virtual CPUs.

hardware virtualization support

Processor features that speed up and simplify virtualization. Required for some hypervisors to function

Platform as a Service (PaaS)

Programming tools needed to deploy, administer and maintain a web application

PEAP

Protected Extensible Authentication Protocol. PEAP provides an extra layer of protection for EAP. PEAP-TLS uses TLS to encrypt the authentication process by encapsulating and encrypting the EAP conversation in a Transport Layer Security (TLS) tunnel. Since TLS requires a certificate, PEAP-TLS requires a certification authority (CA) to issue certificates.

Andre wants to install the fastest SATA drive he can into his new system. The clerk at the office store threw a bunch of numbers and letters at him. Given such a scenario, which should he choose?

SATAe

What connectors are used with fiber optic cables?

SC ST

Upgrading which component of a host machine would most likely enable you to run more virtual machines simultaneously?

RAM

Windows Media Center comes with some versions of Windows turn your PC into a home theater PC

RAM is the most important component for building a virtualization workstation.

what cables are BNC connectors?

RG-58 RG-59

LDAP

Lightweight Directory Access Protocol enables OS and applications to access directories. If your Server running Active Directory, for example, Windows uses ADAP to do anything with Active Directory. If you are at a computer and it add it to the Active Directory doman, Windows uses LDAP commands to update the computer's info.

sudo grub-install

Linux command to repair GRUB

What CPU cooling method requires a pump to function?

Liquid cooling

What best describes the function of the Windows gpresult command?

Lists the group policies applied to a user

LAN

Local Area Network; a geographic network that covers a relatively small geographic area such as a building or a small campus - no more than a mile distance between computers

what utility enables you to add users and groups in Win7 Professional>

Local Users and groups

The /R switch of the CHKDSK utility

Locates bad sectors and recovers readable information Fixes errors on the disk

You can use Performance Options to disable certain graphical flourishes such as animations, transparencies and more.

MAC OX uses Launchd to run tasks automatically in the background

What connector is typically used in Ethernet?

RJ-45

What provides additional expansion slots on the motherbaord?

Riser card

Partitions are electronic subdivisions of physical hard drives. After partitioning, each partition must be formatted before it can be used. Every hard drive must have at least one partition.

MBR partitioning scheme uses a master boot record and a partition table to enable the partition with a valid OS to boot.

Click on the Win10 task view button to create and manage multiple Desktops for grouping your open applications.

Mac OSX and Linux each have their own take on this feature.

802.11

The IEEE standard wireless networking

In a WIndows application, an extension or file type, follows the file name and a period or do (.)

The file allocation table IS NOT a list of all the tracks in a table

Tier 3 providers are even more regional and connect to Tier 2 providers.

The piece of equipment that makes this tiered Internet concept work is called a backbone router. Backbone routers connect to more than one other backbone router, creating a big, interwoven framework for communication.

How do you describe a dead pixel?

The pixel doesn't light up

Device drives are NOT displayed within typical system firmware monitoring capabilities

The read-only memory (ROM) chip is where the system BIOS is actually stored

Where do you put the multimeter leads when you text a Molex connector?

The red lead should always touch the red wire; the black lead should touch a black wire.

WIndows Recovery (WinRE)

The repair tools powered by WinPE

What directory is the OS installed on a Windows computer?

The root directory or C:\Windows

A micro-ATX

The smallest common ATX motherboard form

Linked clones cannot operate if their reference virtual machine is not available.

Virtual machines that are not powered on and are used to create new virtual machines are known as TEMPLATES

Cloned virtual machines CANNOT be used for the restoration of a previous machine state

Virtual machines with OSs other than MS windows can be stored.

_____ uses a portion of the HDD or SSD as an extension of your physical RAM

Virtual memory

What company makes ESXi?

WMware

scan code

When a user presses a key, the keyboard controller sends a(n) ________ to the computer.

fixmbr

a Recovery Console command that writes a new master boot record to the hard disk drive that you specify. Generally to fix a No Boot Device error

folder names are separated with

a backslash \

AT

a legacy form factor found in older desktops and towers

Every volume has

a letter (physical and logical drives)

We reference drives by

a letter followed by a colon sign

What is an API?

a library of commands that people who make 3 D games use in their coding

Intranet

a local or restricted communications network, especially a private network created using World Wide Web software.

Charms bar

a location in Win 8 and 8.1 of the charms tools. Accessed by moving the cursor to the upper right corner of the screen

network connection

a method for connecting two or more computers together

directive

another word for command

What kind of memory modules include registers between the system's memory controller and the module's memory chips, registers that communicate in series with the memory controller and in parallel with the memory chips, easing the electrical strain on the memory controller?

buffered

A permanent computer display screen discoloration caused by displaying the same static image for extended periods of time is known as

burn in

start button

button on the Windows taskbar that enables access to the Start Menu

What tool is used to verify that all the individual wires are properly connected and in the correct location in a cable?

cable tester

MAC Filtering

can be implemented on a WAP to ensuyre that only certain client machines can access it

Host

can create environments within unique single files that replicate other computers

The brightness of an LCD display screen is measured in`

cd/m2

A user has just purchased a wireless router for their home. What should be done to BEST secure the router from unauthorized access?

change router default logins set encryption on the router

NETSTAT is a command-line utility which can be used for:

displaying active TCP/IP connections

"compact" command

displays and alters the compression of files on NTFS partitions. You add: /c to compress /u to compress

"cipher" command

displays or alters the encryption of folders and files. You add: /e to encrypt /d to decrypt

"hostname" command

displays the name of the computer also known as the hostname

Missing Boot.ini (or NTLDR in older systems)

error message which means the computer cannot find and therefore cannot boot the OS - means there are files missing.

Jennifer has a laptop that has a PATA controller. She wants to add a SATA hard drive for storage. Which of the following actions will she take to accomplish the task?

esata

Internet Service

every Tier 1 and Tier 2 provider leases connections to the Internet

Webcam

everything but img ssr

Software as a service

examples Google maps Total Sem training hub

Your system knows what program is associated with a particular file by that's file's

extension

hardware virtualization support

extra features on CPUs to support hypervisors

Does a Windows account require a nominal annual fee

false

When a virtual machine is not running, how is it stored?

files

Virtual machines are simply what

files that can be copied

what are the most limiting factors in a host's ability to run virtual machinesw?

hard disk space and RAM

What is an advantage of a virtual machine over a physical machine?

hardware consolidation

What is the min requirement for RAM for Win7?

1 GB

Address Range A

1-26

Ways to access Windows Recovery (WinRE)

1. Boot from Windows installation media and select "Repair" 2. "Repair your Computer" option from Advanced Boot Options (F8) Menu 3. Control Panel -> System and Security -> Backup and Restore -> Create a System repair disk/image

OSI Model

1. Physical 2. Data Link 3. Network 4. Transport 5. Session 6. Presentation 7. Application

The basic process for creating virtual machines is as follows:

1. Verify and set up your system's hardware to support virtual machines 2. Install a hypervisor on your system 3. Create a new virtual machine that has the proper virtualized hardware are requirements for the guest OS. 4. Start the new virtual machine and install the new guest OS exactly you'd install it on a new physical machine

Four core functions of an SNMP system

1. get 2. response 3. set 4. trap

3 steps summed up

1. update drivers, update windows 2. check your security, be ready for trouble 3. store critical media, document everything

When you test voltage with a multimeter, you can assume the outlet or connector is functioning properly if the reading is within a certain percentage of the expected number. What is that maximum percentage by which the reading can vary?

10 percent

How do you represent the hexadecimal value A in binary?

1010

Andrea has a projector with a 16:9 aspect ratio for her upcoming presentation. She came to you and asked what the distance should be between the projector and the screen. What do you tell her?

11-12 feet

What is an example of an IPv4 loopback address?

127.0.0.1

An IPv6 address consists of how many bits?​

128

Address Range B

128-191

What is the resolution of SXGA?

1280 x 1024

What is the resolution of HDTV 720p?

1280 x 720

Typical subnet mask example:

255.255.255.0 - When you compare the subnet mask to the IP address, anyu part that's all 255s is the network ID. - any part that's all zeros is the host ID IP address: 192.168.4.33 Subnet mask: 255.255.255.0 - Because the first 3 octets are 255, the network ID is 192.168.4 and the host ID is 33

Which of the following is a valid package size for DDR4 DIMMs?

288 pin

A server is expected to process 2000 transactions per second during its initial year of deployment. If it is expected to increase transaction growth by 10% annually, how many transactions per second should the server be able to process by the end of its fifth year?

2928

What is the resolution of WQUXGA?

3840 x 2400

IEEE 1394 connectors

4 pin and 6 pin

What are characteristics of the Extended Graphics Array (XGA) display standard?

4:3 aspect ratio 1024 x 768 resolution

A device that goes into 7 inch space is called a

4U

A device that goes into a 7 inch space is called a

4U

169.254.1.221 is a valid IP address assigned through APIPA

802.11b provides a low theoretical throughput

MAC Filtering needs to be configured on a wireless router to allow specific client machines to connect.

802.11n networking standards can operate at two different frequency on the same spectrum simultaneously

early versions of Ethernet ran on coaxial cable instead of UTP. While the Ethernet standards using coax are long gone, coax lives on primarily for cable modems and sateillite connections.

A LAN is group of computers located physicaly clsoe to each other - no more than a few hundred meters apart at most. A group of computers connected by one or more switches is a broadcast domain.

"dd" command

A Linux command that can be used to write image files to a device such as a USB flash memory drive or hard disk.

The Disk Cleanup utility is useful for purging your system of unnecessary temporary files.

A Mirrored Volume requires exactly two volumes and is extremely fault tolerant.

Thunderbolt devices connect to a mini DisplayPort

A THIN CLIENT is a system designed to handle only very basic applications with an absolute minimum amount of hardware required by the OS

Another name for a virtualization service is a HOST

A TYPE-1 hypervisor runs directly on the server hardware to provide resources to the virtual machines it supports

robocopy (robust file copy)

A Windows command that is similar to and more powerful than the xcopy command, used to copy files and folders across a network. The syntax does not resemble xcopy. Here is the basic syntax robocopy: d:\testserver\website \\liveserver\website \mir The /mir switch, for mirror, tells robocopy to copy everything from the source and make the destination MIRROR it. That means robocopy will also delete anything in the destination that doesn't match the source folders and files. The robocopy command can copy encrypted files. It enables an admin to copy files even if the admin account expressly denied access to those files. robocopy /?

Honey net

A collection of honeypots used to present an attacker with an even more realistic attack environment.

protocol stacks

A collection of protocols (operating on different layers) integrated into a common system.

bcedit

A command-line tool that enables you to view the BCD store, which lists the Windows boot options.

If the NIC activitiy light on back of PC is blinking erractically, that means there is network traffic.

A common symptom of a bad network cable is NO link lights

Blue Screen of Death (BSOD)

A common term used to describe an error condition in the operating system that has resulted in a full halt of the operating system due to a critical error. The error screen is usually white text on a blue background, hence the name.

A computer on an Internet Protocol version 4 (IPv4) network gets a 32 bit address.

A computer on an IPv6 network gets a 128 bit address.

Proxy Server

A computer system (or an application program) that intercepts internal user requests and then processes that request on behalf of the user.

What is a logical cpu?

A core is a physical CPU capable of independent processing. A logical core is an abstraction. Some CPU technology is capable of running more than 1 thread on a CPU core. Intel, for example has HT - Hyper Threading which can run 2 threads(sort of) on a single core. Hence, if you have a quad core CPU that can run 2 threads per core, you have 8 logical cores(as you can run 8 threads at a time).

Common monitor problems are often related to cable breaks or bent pins. Monitors also lose brightness over time, especially if you are not using the power management functions.

A cracked LCD monitor must be replaced. If the LCD screen goes dark, starts to hiss or develops bad pixels, it is best to either replace the monitor or find a company specializing in LCD repair.

Windows Recovery Environment (Windows RE)

A diagnostic and recovery tool included with Windows PE.

Recycle Bin

A folder on a Windows desktop in which deleted files from the hard drive are held until permanently purged from the system.

To go beyond a LAN requires a network protocol that can handle routing. That protocol, for the vast majority of networks, is called TCP/IP.

A networked host that enables you to access a bunch of files and folders is called a file server. The networked host you use to access email messages is called a Mail Server. A network-connected computer with printer sharing enabled takes on the rolf of a print server.

IPv6

A new protocol developed to replace IPv4, addressing the issue of IP address exhaustion. The Internet Engineering Task Force (IETF) developed this new IP addressing scheme called IPv6 extends the 32 bit IP address space to 128 bits 16 octets

The least privileged Ring in the x86 Processor architecture is RING 3

A new virtual machine created by copying an existing virtual machine is called a CLONE

Page faults result in error screens such as KRNL.386 caused a page default at 03F2:35A003BC" The process that caused the page default (in this cause KRNL.386) may change, but if the hexadecimal address is the same across numerous error screens, you probably have bad RAM.

A non-maskable interrupt (NMI) results in a proprietary crash screen, such as the BSoD, sad face or pinwheel of death. Although crash screens are blamed on bad RAM, they are more often caused by buggy application code.

Touchscreen is Nonresponsive

A nonresponsive touchscreen can be caused by several things. The first and simplest issue to resolve is a dirty screen. Simple wiping the screen down can fix this issue. Dropping or getting a device wet can cause problems and damaging inside components. Moisture can cause internal shorts.

registry

A portion of the hard drive containing all the different configurations (settings) used by the Windows operating system (OS) as well as by other applications.

Community Cloud

A private cloud paid for and used by more than one organization.

Andrea complains that her monitor is leaving streak marks on the screen. What could be the problem?

A problem with the video card

CMOS cannot reformat a hard drive

A secure boot, a feature of BIOS, enables you ensure the authenticity of the firmware and prevent pre-boot viruses from being launched.

Simple Network Management Protocol (SNMP)

A set of standards for communication with devices connected to a TCP/IP network. Examples of these devices include routers, hubs, and switches. Used for network management.

thin client

A system designed to handle only very basic applications with an abso- lute minimum amount of hardware required by the operating system. Meets minimum requirements for selected OS.

WEP is not a secure encryption type

A technician needs to configure a wireless small home office (SOHO) network to provide IP address to devices on the network. He should enable DHCP.

A smart card reader scans the chip embedded in such devices as ID badges to enhance access and security.

A touch screen is a monitor with some type of sensing device across its face that detects the location and duration of contact usually by a finger or stylus.

Site to site

A type of VPN connection using two Cisco VPN concentrators to connect two separate LANs permanently.

social engineering attack

A type of attack that uses deception and trickery to convince unsuspecting users to provide sensitive data or to violate security guidelines, often a precursor to another type of attack, attacker obtains credentials from user, then uses credential to mount attack.

RG-6

A type of coaxial cable with an impedance of 75 ohms and that contains an 18 AWG core conductor. RG-6 is used for television, satellite, and broadband cable connections.

The ICMP protocol is used by the PING utility

A type of network protocol used for exchanging information concerning the state of the IP network (.eg., testing the reachability of a remote host) is known as ICMP

System Restore

A utility in Windows that restores system settings to a specific previous date when everything was working properly.

System Protection

A utility that automatically backs up system files and stores them in restore points on the hard drive at regular intervals and just before you install software or hardware.

NTFS

New Technology File System, patch=program that fixes a problem on OS.

MS OS command line utility for displaying intermediary points on the packet route is called

TRACERT

What tool enables you to modify which programs start when 8.1 starts?

Task Manager

What utility is useful in identifying a program that is hogging the processor?

Task Manager

Which utility is useful in identifying a program that is hogging the processor?

Task Manager

NAT

Network Address Translation. A service that translates public IP addresses to private and private IP addresses to public. It hides addresses on an internal network.

NAS

Network Attached Storage, headless system that you plug into a network, shares a hard drive

TCP Model

Network Interface Internet Transport Application

A guest is a virual machine running on a hypervisor

Virtual machines perform better on CPUs with hardwqrae virtualization support

Peripheral Component Interconnect (PCI)

a 32 bits running at 33 HMHz expansion bus - could co-exist with other expansion buses

FlexATX

a 9 by 7.5 inch form factor built much smaller than micro ATX motherboards

What is an advantage of HDMI over DVI?

HDMI transmits audio and video

When you install an OS alongside an existing OS, what do you create?

A multiboot installation

What is the default file system in MAC OS X?

HFS +

How do you open an applications in Windows?

Left double-click its icon

What tool enables you to test 3 D video in a modern PC?

NVIDIA

Use the ___ technology enables a processor to protect certain sections of memory.

NX bit

What type of expansion card would be particularly useful for high speed data transfers with audio or video equipment?

a FireWire card

scf (system file checker)

detects and restore important Windows files, folders and paths, for example, sfc/scannow

What is an illegal character in a Windows filename?

* (asterisk)

rm (including -r)

*deletes files and directories permanently

Wildcards*

*to select group of files and directories

wildcards*

*to select groups of files and directories

touch

- creates a new file inside the working directory - takes in a filename as an argument, and then creates an empty file in the current working directory

-r

- removes directories - modifies behavior of command, recursive, deletes a directory and its child directories

Things you can do with command line

- run programs - write scripts to automate tasks - combine simple commands for more complicated tasks

What RFAID level combinations make RAID 10?

0, 1

Virtual desk

A desktop that is virtual

What is a TILE?

An app like IE appears on the Win8 Start Screen

What type of Random Access Memory (RAM) is eventually replaced SDRAM by transferring data twice per clock cycle?

DDR SDRAM

What is the most popular API used by 3 D game developers?

DirectX

Server Message Block (SMB) and Common INternet File System (CIFS) are examples of network protocols used for providing shared access to files, directories and devices

AFP (Apple Filing Protocol) is a file sharing network protocol

DDR is NOT an expansion slot

AGP delivers the best performance for high end graphics

The DHCP server is used to assign dynamic IP addresses to devices on a network

AN IP address in the range of 169.254.0.1 through 169.254.255.254 indicates a problem with the DHCP service

WIN8/8.1 Control Panel:

Access Start screen, type control panel

What improvement have CPU manufactures put into processors to deal with pipeline stalls?

Add multiple pipelines

LCD monitors have a native resolution and a fixed pixel size. LCDs cannot run at a resolution higher than their native resolution, and running a lower resolution results in a degraded image quality

An LCD screen is composed of tiny liquid crystal molecules called sub pixels. Although you may find dual scan passive matrix on some low end LCD panels, most of today's LCD panels use active matrix or thin film transistor (TFT) technology.

To use a doman on a network of Windows machines, for example, you must have a computer running a version of Windows Server. Windows Server is a completely different, much more powerful, and much more expensive version of Windows.

An administrator creates a domain on the Windows Server system, which makes thart system the domain controller (DC) The admin also creates new user accounts on the domain controller. These accounts are called domain accounts. Once a network is setup as a domain, each PC on the network needs to join the domain (which kicks you off the workgroups).

One disadvantage of organizing files is that it stores all files in alpha order

An advantage of Recycle Bin is that you can retrieve files you delete in error

The hundreds of programs in the system ROM chip are collectively called the _____________________.

BIOS

What file does the boot manager check to determine the OSs installed at bootup?

Boot Configuration Data (BCD)

What is the most common boot method for installing Windows 8?

Boot to a Windows DVD

BOOTREC /rebuildbcd (rebuilds bcd file)

Bootrec command that scans all disks for Windows installations

A CPU and northbridge chip may have an integrated GPU built in.

CCDL and LED are two technologies are used for backlights in LCD monitors.

What is the acronym referring to an LCD panel taking advantage of fluorescent lamps?

CCFL

A Codec is a series of instructions telling a computer how to read a compressed files.

CD Rom Disc holds about 650 MB of data

Common volume letter assignments: D

CD or DVD ROM

Examples of commands in Windows changes the current directory to the root directory?

CD\ CHDIR\

CHAPTER 19 DISPLAY TECHNOLOGIES

CHAPTER 19 DISPLAY TECHNOLOGIES

COMMAND LINE INTERFACE STUFF

COMMAND LINE INTERFACE STUFF

What command line can be used to copy one or more files from one location to another

COPY

Modern CPUs are often a package of multiple processors. These individual processors are also known as _________.

CORES

When you turn on your computer, what is accessed first?

CPU

Voice over IP (VoIP)

Can make voice calls over computer network. Works with every type of high speed internet connection, from DSL, to cable to satellite.

EXAM TIP: they make a distinction between the names or the ports on the cards and the cables associated with them, though most techs will refer to the connectors and cables by multiple names, interchangeably.

Common connectors and cables include VGA, DVI, DisplayPort, HDMI and Thunderbolt,. Other less common connectors and cables include BNC (used with coaxial cable), mini DIN (used with S video) and RCA (used with component and composite cables)

Dynamic Host Configuration Protocol (DHCP)

Common setting for which you do not need to enter information and you can use this setting if you network use allows dynamic IP address allocation so users do not have to have a preconfigured IP address to use the network

BigTracks is a successful Bigfoot-tracking company using an internal service to manage all of its automated Bigfoot monitoring stations. A Bigfoot migration has caused a massive increase in the amount of audio and video sent back from their stations. In order to add short-term capacity, they can create new servers in the public cloud. What model of cloud computing does this describe? A. Public cloud B. Private cloud C. Community cloud D. Hybrid cloud

Community cloud

This type of cloud is used by a group of organizations with similar goals or needs.

Community cloud

The term user interface (UI) refers to the software parts of the OS with which you can interact.

Computers work through three basic stages, what's called the computing process.

Connection Concepts

Connecting to an ISP requires two things to work perfectly: hardware for connectivity, such as a modem and a working cable line; and software, such as protocols to govern the connections and the data flow (all configured in the OS) and applications to take advantage of the various TCP/IP services.

resource pooling

Consolidating resources from many systems into a smaller number of more powerful systems, reducing power, maintenance, and hardware costs.

On demand

Consumer willingness and ability to buy products. The application adjusts according to the current demands

Performance Information and Tools

Control panel applet that rates your computer's performance compared to other systems using the Windows Experience Index

Each NIC has a unique MAC address that idenfieis a node. A MAC address is 48 bits long.

Frames include the MAC address for both the sender and recipient, some kind of data payload, and a data check. Most frames use a clever mathematical algorithm called a cyclic redundancy check (CRC).

What function does Windows Bitlocker provide for you on a Windows computer?

Full Disk Encryption

A Full Speed USB transfers data at up to 12 Mbps on the universal serial bus

Full Speed USB

You discover a disk drive of unknown age and unknown previous use. Which type of format should you perform on the drive prior to use and why?

Full, to check for bad sectors

A command line in Windows that displays Group Policy information for a machine or user is known as

GPRESULT

GPT includes a protective MBR to keep older utlities from damaging the partition information.

GPT include primary and backup copies of its GPT header and partition array.

What command line command allows for updating multiple Group Policy settings in Windows?

GPUPDATE

The ____ partitioning scheme enables you to create more than four primary partitions without needing use dynamic disks/

GUID partition table (GPT)

graphical user interface (GUI)

GUIs display graphics and use the point and click technology of the mouse and cursor, making them much more user friendly

A query from an SNMP manager sent to the agent of a managed device for the status of a management information base (MIB) object

Get (SNMP)

Examples of a Get request

GetRequest GetNextRequest

a client brought in an old computer that won't boot. He wants to see if any data can be recovered from the hard drive. When the tech opened the case, he noted that two expansion cards were plugged into some kind of circuit board that plugged into the motherboard. The expansion cards were parallel with the motherboard, in other words, rather than perpendicular. Into what kind of circuit board did the expansion cards most likely connect?

Daughter board riser card

Andrea complains that half of her monitor is dim. What could be causing this?

Dead backlight in a multibacklight system.

RAID is a storage technology that deals with how data is spread across multiple disks for both increased availability and improved performance.

Deduplication technology can work with all of the following data entries except File Systems

when securing a new wireless router, which of the following should be changed first?

Default password

Chipset

Defines the type of processor and RAM the motherboard requires and determines to a degree the built-in devices the motherboard supports, including the expansion slots.

If a file is not stored in contiguous clusters, you can improve hard drive performance by using a tool to _____ the drive.

Defragment

DMZ

Demilitarized Zone - a physical or logical subnetwork that contains

What is the most popular API today?

DirectX Open GL

What tool do you use to verify that DirectX is installed and working properly?

DirectX Diagnostic Tool

What is another name for a folder?

Directory

A client called to complain that his computer starts up, but crashes when windows starts to load. After a brief set of questions, you find out his nephew upgraded his RAM for him over the weekend and couldn't get the computer to work right after that. What could be the problem?

Disconnected CPU fan

What graphical program does MS include with Windows to partition and format a drive?

Disk Management console

Only a single __________ may be set t active on one drive.

Disk cleanup

If the LED for your hard drive stays on most of the time, your computer is suffering from __________, a sure sign you need to add more memory.

Disk thrashing

How do you create a new tile group?

Drag the tile to the left or the right of any existing tile group and release the mouse button

Unsigned driver

Driver that has not gone through the Windows Certification Program to ensure compatibility. The Windows Certification Program was formerly known as the Windows Hardware Quality Labs and the Microsoft Windows Logo Program.

A faulty driver cannot be the cause of jams in a laser printer.

Drivers have nothing to do with paper jamming

MS-DOS version 2.1 first supported the file allocation table (FAT). The FAT is a data structure similar to a two volumn spreadsheet that tracks where data is stored on a hard drive.

FAT comes in multiple variations including FAT16, FAT32 and FAT64. The number indicates how many bits are available in the"left side of the FAT spreadsheet". Hard drives can use FAT16 or FAT32, while FAT64 is designed for USB flash drives.

START SCREEN is first seen when logging onto Win8

FILE IMAGE is not shown when you look at your files in Details view

Mac OS X

FINDER holds the keys to files and folders in Mac OS X.

What socket type is designed to work with Athlon's x4 processor?

FM2

Into which socket could you place an AMD A-Series CPU>?

FM2+

For a newly added hard drive, this command allows to configure it with a file system so that Windows can store information on the disk.

FOrmat

System Restore (or System Image Recovery)

Feature that enables users to go back to a previous timepoint (image of HDD)

What command line commands are used in Windows to create a directory or subdirectory?

MD MKDIR

In WIndows, the CIPHER command displays or alters the encryption of directories on NTFS partitions.

MD command is what you use to create a new directory in Windows.

What devices enables a PC to retrieve a specific role of data from system memory and place it on the external data bus?

Memory controller chip

SystemTools

Menu containing tools such as System Information and Disk Defragmenter, accessed by selecting Start, then Programs or All Programs, then Accessories and finally System Tools

MAN

Metropolitan Area Network; a geographic network that covers a larger geographic area such as a city or community; may be used to connect computers in libraries, government agencies, etc. together - no more than 30 miles in size

Windows Hardware Certification Program is a testing program for hardware manuf

MicroATX is part of the ATX form factor

What operating system, when added as a virtual machine, requires a separate licensed copy?

Microsoft Windows

Regsvr32 command can modify the Registry in only one way - adding (or registering) dynamic link library (DLL) files as command components in the Registry

Missing bootmgr caused by when boot sector code is unable to locate bootmgr caused by file system corruption or a botched installation or viruses.

By default, the TCP/IP protocol is configured to receive an IP address automatically from a DHCP server on the network and automatically assign a corresponding subnet mask.

Modern operating systems support a feature called Automatic Private IP addressing (APIPA) that automatically assigns and IP address to the system when the client cannot obtain an IP address automatically.

Mohinder finds that a disgruntled former employee decided to sabotage her computer when she left by putting a password in CMOS that stops the computer from booting. What can Mohinder do to solve this problem?

Mohinder should find the CMOS clear jumper on the motherboard. He can move the shunt on the jumper to clear the CMOS information.

What sort of power connector does a traditional hard drive typically use?

Molex

A terabyte is equivalent to 1024

Moore's Law says that processing power roughly doubles every 18 months

Every computer running IpV6 will always have at least a link local address.

Most Windows machines have three IPv6 addresses: one link local address and two global addys. One global address stays the same, while the second is a temp address used to make it harder for your system to be tracked by your IP address.

IPv6 addresses are expressed with the use of

Hexadecimal numbers

DVD (digital versatile disc) stores from 4.37 GB to 15.9 GB depending on the number of sides and layers used

How many devices can a single USB host controller support? 127

Marked loaded a new video card on his system, but now everything looks very bad. What should he do first?

Go to Device Manager

Current personal computer OS use what type of interface?

Graphical User interface

What group enables someone who does not have an account on the system to log on? Assume the group is enabled.

Guests

What connector can deliver up to eight channels of digital audio in addition to video?

HDMI

Your boss has tasked you to load identical images onto a series of Mac OSX workstations to get the classroom ready for the new group of students. In such a scenario, what is the best tool to use?

NetBoot

NAC

Network Access Control - The compilation of protocols, polices, and hardware that govern access on devices to and from a network.

CONTROL PANEL

Handles most of the maintenance, upgrade, and configuration aspects of Windows. This is the first set of tools to explore. Click on Start Button and choose Control Panel from the Start Menu. Control Panel opens the Control Panel's category view by default which displays the icons in Groups like Hardware and Sound. This view requires an additional click and many tech use Classic view.

What can the the PC boot to?

Hard drive DVD-ROM USB Drive

Sam has installed a new CPU in a client's computer, but nothing happens when he pushes the power button on the case. The LED on the motherboard is lit up, so he knows the system has power. What could the problem be?

He forgot to apply thermal paste between the CPU and the heat sick and fan assembly.

What is the term to describe programs, like VMware, Hyper-V, VirtualBox, and VMware Fusion?

Hypervisors

`What type of unit is used to describe the refresh rate of a computer screen?

Hz

Address Resolution Protocol (ARP) provides what kind of resolution?

ICMP

The Address Resolution Protocol (ARP) providees what kind of resolution?

IP to MAC

This is used in better Thin Film Transistor displays and it creates a wider viewing angle and better color recreation than other panels can provide:

IPS

The IPP protocol used for performing printing-related task on a network.

IPsec refers to a suite or protocols providing authentication and encryption features in order to ensure exchange of IP packets

How can you effectively expand the capacity of an NTFS drive?

Install a second drive and mount it to a folder on the original smaller NTFS drive

All of the machine language commands that the CPU understands make up the CPU's

Instruction Set

A CPU with a(an) ____ can handle RAM directly.

Integrated Memory Controller (IMC)

Internet Tiers: 1, 2 and 3

Internet Tier 1: the main tier. Consists of smaller number of companies called Tier 1 providers. This provides your own long distance, high speed fiber optic networks called BACKBONES. These backbones span the major cities of the earth and interconnect at special locations called network access points (NAPs). Must pay money to connect. Tier 1 providers do not charge each other to connect.

Which of the following PC speed ratings matches up with DDR3-1600 RAM?

PC3-12800

You will sometimes hear the word PACKET used instead of FRAMES and this is WRONG.

Packets are PART of the frame.

what is a virtualization product that works on Mac operating systems?

Parallels Desktop

Which Control Panel applet in Windows enables you to change the Windows theme and settings that determine the colors of boxes and other visual items?

Personalization

The number of running virtual machines on a single host is limited by what factor?

Physical RAM

C:\Users\Mike\Pictures

Pictures is the default location for images imported into the PC.

How does an NMI manifest on a Mac OS X System?

Pinwheel of death

Domain name service (DNS)

Internet directory service that allows devices and services to be named and discoverable servers that keep databases of IP addresses and their corresponding names for example, we set up a machine with the IP address 209.34.420.163 hosts a web site and we want it to be known as www.totalsem.com. When we set up the website, you would pay for a DNS Server to register the DNS name, www.totalsem to the IP addrewss 209.34.420.163

AT Form Factor

Invented by IBM - predominant form factor of the 1990s.

What is the most common cause of LCD display failure?

Inverter

What does BIOS do when a Plug and Play card is installed

It consults the chipset to determine which system resources are available for the card and then configures the new device

What benefit does full-duplex offer?

It enables NICs to send and receive signals at the same time. It doubles the bandwith of the network.

How is IPv6 represented?

It is represented in a hexadecimal

What does the hyerthreading (HT) feature of an INtel chip do?

It makes one physical CPU appear as two logical CPUs

What does a corona wire do?

It removes the charges from the drum in the process of printing through a laser printer

Why is SDRAM faster than regular DRAM?

It runs synchronously with the system clock.

Two-way mirror space is a storage option in Win8 or later offers the best mix or resiliency and performance with two drives

Jaime wishes to check her hard drive for errors should use error checking tool.

Windows does not support RAID 0+1.

John wants to install two drives in a new system, sa small SSD and a large HDD. How should he install the drives to prep the system to use the SSD for Windows and the HDD for other applications and storage. He should connect the SSD to channel 1 and the HDD to channel 2.

What device is useful where there are multiple computers but no need for a dedicated keyboard, monitor, and mouse for each one?

KVM switch

What can device drivers and failing hardware in Mac OS X and Linux cause?

Kernal Panic

Windows Logo key

Key on a keyboard bearing the Windows logo that traditionally brings up the Start menu, but is also used in some keyboard shortcuts.

What are the differences between L2 and L1 cache level?

L2 feeds L1, L2 provides more storage space than L1.

Packets are part of the Frame.

LAN is a group of networked computers that are typically located no more than a few hundred meters apart at most.

Video displays come in two varieties today

LCD and projector

What Mac OS X feature is functionally equivalent to Windows File Explorer?

Finder

Normally you will install the device driver before connecting the USB device to the system. Not all the time. Read the documentation

FireWire devices must connect directly to a root hub but may be daisy chained to support up to 63 devices. You should install the drivers before connecting the FireWire devices but most devices can use the generic Windows driver and thus can be plugged in immediately.

USB hubs extends the number of USB devices you can connect to a single port. Get a high powered Hi Speed USB hub so it will support the fastest speed and not draw power away from other devices.

FireWire has two distinct types of connectors: 1. 6 pin powered connector 2. 4 pin powered connector IEEE 1394a runs at 400 Mbps and IEEE 1394b runs at 800 Mbps

System ROm holds BIOS for multiple programs

Firmware are programs stored on ROM chips

VoIP doesn't use a single protocol, it uses a collection of protocol that make phone calls over the data network possible. Most common VoIP application protocol is Session Initiation Protocol (SIP), but popular VoIP applications such as SKYPE are completely proprietary.

A key to remember when installing and troubleshooting VoIP is that low network latency is more important than high network speed. Latency is the amount of time a packet takes to get to its destination and is measured in milliseconds.

"The print head for an inkjet printer is a part of the ink cartridge."

A laser beam in a laser printer draws the image on the photosensitive drum

switches

A layer 2 device that used to connect two or more network segments and regulate traffic. Filter and forward by MAC

A host is any computing device connected to a network.

A local host refers to what is in front of you.

basic input/output system (BIOS)

A program that manages the data between a computer's operating system and all the input and output devices attached to the computer; also responsible for loading the operating system (OS) from its permanent location on the hard drive to random access memory (RAM).

Since FAT16,a cluster (rather than a sector) is the basic unit of storage. Unlike sectors, a size of a cluster is not fixed but changes with the size of partition. Because FAT16 still supported only a a max of 64 K storage units, the formatting program set the number of sectors in each cluster according to the size of the partition.

After the format program creates the FAT, it tests each sector and places a special status code (FFF7) in the FAT for any bad sectors so they won't be used. Good factors are marked with 0000. When an application saves a file, the OS starts writing the file to the first available cluster marked as good.

Homegroups require the IPv6 protocol. IPv6 is enabled by default.

All Homegroup data is encrypted between systems.

EXAM TIP: assumes a tech knows the correct TCP/IP settings for the network. You need them to understand what those settings do and to know where to enter them so the system works.

All modern operating systems come with handy configure TCP/IP. Those you are likely to use in the field are ping, ipconfig, ifconfig, nslookup, tracert and traceroute. All of these programs are command line utilities. Open a command prompt to run them.

If the file does not fit entirely in a single cluster, the OS searches for the next available cluster. Once found, its location is written to the status area of the preceding cluster holding a piece of the file, and the OS writes the next 512 bytes the file in the available in the available cluster. This continues until the file has been completely written and the final cluster in the chain receives the status code of FFFF in the FAT. After saving the file, the OS list the filename and starting cluster in the file's folder.

As a file is split across multiple noncontiguous clusters, the file becomes fragmented. Fragmentation slows read/write access because the OS has to piece together the many fragments of the file. Every version of windows comes with a defragmentation porgram that reorganizes the clusters of the hard drive data so files are stored wherever possible contiguous clusters. WinVista-7 use Disk Defragmenter, Win8-10 use Optimize Drives.

SUBKEYS and VALUES are organized inside the Registry's Root Keys

BIOS looks for the MBR which finds the boot code that launches bootmgr

What does BIOS provide for the computer

BIOS provides the programming that enables the CPU to communicate with other hardware.

app bars

Bars that float above the screen and that contain applications such as the Tabs bar and the Address bar; a new feature of Internet Explorer 10.

CPU makes name their microprocessors in a fashion like the auto industry. CPUs get a make and model such as Intel Core i7 or AMD FX-8350 Black Edition.

CPU is like the human brain but a CPU functions more like a very powerful calculator than a brain. Today CPU can subtract, multiply, divide and more billions of numbers per second. It's the speed of the CPU, not its intelligence, hat enables computers to perform feats such as accessing the internet, playing games or editing photos.

The Central processing unit performs calculations on binary numbers to make the magic of computers work. The CPU interfaces with the motherboard and other components through the external data bus.

CPUs contain several areas of internal memory, known as registers, in which data and addresses are stored while processing. The commands a CPU knows how to perform are dictated by its instruction set.

Examples of device posing risk to electrical safety due to accumulated high voltage include:

CRTs power supplies inverters laser printers

What feature lets you save a VMs state so you can quickly restore that point?

Checkpoint snapshot

What class of IP address allows the highest number of hosts per network?

Class A

Class C address

Class C address uses three octets. Class C addresses span from 192 to 223, with a default subnet mask of 255.255.255.0.

What command Prompt commands can be used to delete one or more files?

DEL ERASE

A network protocol providing an alternative solution to the manual assignment of an IP addresses is called

DHCP

Which device makes all computers share a given bandwith?

DNS server

DRAM needs to be able to fill the data bus. A 1MX8 DRAM chip is only 8 bits wide and would provide the CPU with only 8 bits of data. You would need eight of the 1MX8 chips to fill a 64 bit data bus.

DRAM chips are soldered to a circuit board called a stick or module, and when these chips are combined, a single stick can fill the data bus. Modern DRAM sticks come in 32 bit and 64 bit data varieties.

What are types of broadband access?

DSL Cable Fiber optic

Form factor

Determines the physical size of the motherboard as well as the general location of components and ports.

What utility enables you to see if Windows recognizes a driver?

Device Manager

OS use a portion of the hard drive as an extension of system RAM through virtual memory. Virtual memory is a portion of an HDD or SSD set aside as a page file or swap file.

Disk threading is excessive hard drive activity symptomatic of insufficient RAM. It occurs when Windows repeatedly uses up all available RAM space and has to move data not immediately needed out of the RAM into the page file, and then swap the data back into the RAM when it is needed by the program.

Unlike regular DRAM, __________ enables error checking and correcting.

ECC RAM

What is an example of a bare-metal hypervisor?

ESXi`

EXAM TIP: be familiar with 4:3, 16:9 and 16:10 aspect ratios

EXAM TIP: know the differences between TN and IPS technologies

A host server has 4 processors, each with 8 cores. If you can allocate 8 vCPUs per pCPU, how many vCPUs can be allocated?

Each processor has eight cores. Each core (pCPU) can support eight vCPUs. 4 processors x 8 cores x 8 vCPUs = 256 vCPUs.

A machine running a hypervisor is an HOST

Each virtual machine is called a guest machine

To make your files unreadable by others, what should you use?

Encryption

Linux

Essential tool for techs is the command line called TERMINAL. You can get there by pressing CTRL-LT-T for a lot of details about essential Linux commands.

Tom notices after his system starts up that a critical service has not started, even though it is configured to do so. Given such a scenario, where should he look first to see why it failed to start?

Event Viewer

System ROm

Every mother board has a flash ROM chip called the ____________.

The commands del, copy/xcopy and robocopy are indispensible for a PC tech.

Exam tip: Check to be sure you can explain how to do the basic tasks in both GUI and at the command line. How do you delete a single directory from the command line? What if there are files in the directory? What advantage do wildcards give the command line over the GUI when you are working with these files. Also, understand chkdsk, format, hostname, gpupdate, gpresult, sfc and shutdown.

What feature included in Win8-10 allows you to regularly back up your important files and folders.

File history

When a virtual machine is not running, how is it stored?

Files

A mission critical virtual machine can be protected from a virtualization host failure by utilizing FAULT TOLERANCE

Files that compose virtual machines can be moved from one place to another without interrupting the virtual machine through the use of STORAGE MIGRATION

A customer states that another technical just removed some viruses and now they are not able to connect to websites such as Windows Updates, but are unable to connect to others. What is the most likely cause of the issue?

Host file has been manipulated

What is hot cloning?

Hot cloning performs the clone operation while the source server is booted and the application is running. A hot clone allows the P2V to complete without disrupting the application

CPUs communicate automatically with the motherboards to set the proper clock speed and other factors. You can deliberately overlock or underclock a CPU with methods depending on the motherboard. Most motherboards enable variation through the CMOS or system Setup Utility.

If your computer is continuously rebooting or won't start up, you may have a CPU cooling problem. Open your case up and make sure the heat sink is properly seated and all the fans are running.

When you enter the CMOS setup utility (as in the previous question) and make changes, where are your settings stored?

In CMOS

In a BIOS based systems, the BIOS uses its boot order to scan a hard drive for a master boot record (MBR). The MBR holds a small bit of file system bnoot code that scans the partition table for the system partition and then loads its boot sector. The boot sector in turn contains code that does nothing but point the boot process toward a file called bootmgr. IN short, the BIOS looks for the MBR, which finds the boot code to launch the OS.

In the UEFI system, on the other hand, neither the MBR/GUID partition table (GPT) nor the file system boot code is run, and UEFI simply loads

The BUS SPEED is at which circuits will carry data simultaneously from one area of the motherboard to another is known as BUS SPEED.

In the majority of modern computers, the CPU is connected to the motherboard which is attached a socket using a pin grid array (PGA)

NOTPAD is what you use for reading text files, configurations, logs and HTML.

In the options on General Tab in MSCONFIG you can alter startup options to help troubleshoot startup problems.

Which of the following problems points to a dying power supply?

Intermittent lockups at bootup

Enabling boot logging creates the log of the boot process as the drivers are loaded into memory. Ntbtlog.txt

Last Known Good configuration loads the configuration of Windows that existed immediately before you installed the most recent device driver.

The time lag between when the memory controller starts to fetch a line of data from RAM and when the RAM actually starts to deliver the data is known as ______

Latency

Accessing the command line on Mac and Ubuntun

Launch "terminal" app from the Utilities folder or activate Spotlight and type "terminal" On Linux go to finder or search and type "terminal"

When sharing a folder on an NTFS drive, you must set the network permissions to give everyone Full Control and then use the NTRFS permissions (on security tab) to exercise more precise control onver who accesses the shared resoures and how they access them.

MS designed Windows netwroks to work in one of three categoriesL workgroups domains homegroups

The Screen Resolution is a Windows utility used for changing the appearance of connected displays. The tool includes a feature that allows to click and drag a graphical representation of connected display device which in turn enables troubleshooting of multiple monitor misalignment/orientation issues.

Many Apple Mac Desktops use the DisplayPort for connecting to a monitor. However, more recent apple systems use a ThunderBolt connector for monitors.

Exam tip: know the differences between public, pirvate, community and hybrid cloud models.

Measured Service - when you pay for how much cloud space you have/can use/get charged

MAC

Media Access Control, physical address, in binary, represented with 12 hexadecimal characters

What three functions does a home server PC provide?

Media streaming file sharing print sharing

What are terms for measures of CPU speed?

Megahertz and gigahertz

Projector brightness is measured in lumens. Larger numbers are brighter and better with 1500 lumens being sufficient for a small, dark room. The size of the projected image at a certain distance from the screen is the projector's THROW. LCD projectors come with internal fans that cool the lamp. Lamps are costly to replace and are considered consumable (meaning you can expect to replace the periodically).

Most monitors for Windows PC use a 15 pin, three row, D type connector and a power plug. The connector has a lot of names, such as D Shell, D Subminiature, DB 15, DE15, VGA or HD15.

An admin needs to retain permissions for a set of files and folders that are currently under D:\TEMP but need to be under D:\Shared to conform to best practices. How can the admin retain the permissions?

Move the files and folders to D:\Shared

A system hosting VMs needs a CPU with hardware virtualization support, enough RAM to meet the needs of the host system and enable every VM it will need to run simultaneously, and enough storage space for all of the VMs on the system. For most purposes, a system hosting VMs should also be connected to a network.

Multiple VMs can share a single network connection through bridge or switch functions built into the hypervisor. You will most commonly see these referred to as virtual switches.

802.11n (Wireless-N) is backwards compatible with 802.11g

N (600 Mbps) wireless network provides fast throughput

Disk Duplexing is a technique that provides redundancy by using two disks and two controllers.

NAND is used by SSDs to retain data integrity when a system loses power or is turned off.

We don't need the Internet to share stuff. A home network with each computer running Windows. One of the computers on the network printer has a printer connected to a USB port. This computer has enabled a printer-sharing program built into Windows so that the other computers on the network can use the printer. That computer, therefore, takes on the role of a PRINT SERVER.

No matter how big the network, we use networks to share and access stuff such as web pages, videos, printers, folders, email messages, music Each type of server gets a label that defines its role. A networked host that enables you to access a bunch of files and folders is called a FILE SERVER. The networked host you use to access your email messages is called a MAIL SERVER.

Unlike RAM, which loses all data when the computer is shut down, a ROM chip is _______, retaining the information even when the power is off.

Nonvolatile

Accessing the command line on Windows

On Win7 Start/Search Bar and on Win8-8.1 from start menu and type 'cmd' and press enter

A device driver is a special program that facilitates communication.

On a Win8 computer, the default setting is to input a password to log into your MS account after your computer has completely booted up.

Buffered Memory often contains Error-correcting Code (ECC) circuitry and it typically used in servers

On double-sided RAM, only one memory bank can be accessed at a time.

Instead of using a FAT, NTFS uses a(n) Master File Table (MFT) with a backup copy placed in the middle of the disk for better security.

On modern versions of Windows, the best file system to choose is New Technology File System (NTFS)

PING command

One of the most commonly used command-line commands. It can check IP connectivity between two network devices. Multiple platforms (for example, routers, switches, and hosts) support the ping command. great way to see if you can talk to another system example: ping www.chivalry.com and then press ENTER key

In Win7 and later, how do the two middle levels or UAC security differ?

One uses a consent prompt that blocks all other actions'; the other uses a consent prompt that does not block other actions.

A logical drive must be created inside a(n) Extended partition

Only a single partition may be set to active on one drive

What is the name of the coding standard that enables programmers to write databases and applications that interact independently of the OS used?

Open Database Connectivity

How do you share a printer in Windows?

Open the Device and Printer the Control Panel, right click on the printer, select Printer properties, and then check the share this printer checkbox on the Sharing tab

Operating system passwords is not held in the CMOS memory while the system power is off.

PCI-X slot is longer than PCIe

What type of expansion slot is preferred today for high-performance graphics adapters? A. AGP B. PCIe C. PCI D. ISA

PCIe

Netboot enables you to boot a bunch of identical MAC OS X machines remotely 0 so they have the look and the feel that you want. Any user generated content on them simply goes away when you reboot the machines. Secondly you can identical images on Muliple Macs. Finally you can use NetBoot to push specific applications to multiple computers.

Post installation: First tasks are updating Windows by applying patch downloaded from MS and updating drivers for hardware to the latest and more stable versions.

A(n) __________ enables a PC to go to an OS stored on the server over the network

Preboot Execution Environment (PXE)

Powering the PC requires a single box - the power supply unit (PSU) that takes electricity from the wall socket and transforms it into electricity to run the motherboard and other internal components. All the wires dangling out of it connect to the motherboard and peripherals.

Problems with the PSU can create system instability, crashes and data loss. Learn how to deal with power issues. EXAM people refer to power supply as PSU. A power supply is also a field replaceable unit (FRU) which refers to the typical parts a tech should carry such as RAM and a hard drive.

With what is every application and service in Windows associated?

Process

How do you run a command at the Windows command prompt with elevated or administrative privileges?

Right click a command-prompt shortcut and them select Run as Administrator

Robert installed a new motherboard, CPU, and RAM into his old case. After he attached the power correctly and pressed the power button, not only did the system not boot up, he also could smell ozone and realized the motherboard had shorted out. What could have been the cause?

Robert left a standoff in the wrong place under the motherboard.

SDRAM comes in sticks called dual in-line memory modules (DIMMs). SDRAM DIMMs come in a variety of pin sizes, with 168 pins being the most common for desktop systems. DIMM are 64 bits wide so that they match the 64 data bus of modern CPUs. DIMMs snap into slots on the motherboard. Each DIMM is 64 bits, so snapping a single DIMM fills the data bus; therefore each slot is called a BANK.

SDRAM is advertised by capacity and speed. The capacity is measured in megabytes or gigbytes. The speed is measured in MHz (the DDR speed rating) or MBps (the PC-speed rating)

Reistered (buffered) RAM features an additional register on the module to act as a buffer between the DIMM and the memory controller. You will only find this feature on high end systems. Buffered RAM does not work in non-buffered RAM motherboards.

SELECT AND INSTALL RAM

SFTP (Secure File Transfer Protocol)

SFTP uses port 22 and is nothing more than FTP running through an SSH tunnel. Can be done a number of ways. You can start an SSH session between

The ITX form factor is newer than ATX and is designed to support small form factor (SFF) systems. While the regular ITX form factor never gained experience, the Mini-ATX, Nano-ATX and Pico-ITX form factors are quite popular.

Several PC manuf. make propriety motherboards, meaning they do not adhere to a standard form factor such as ATX or mini ITX. Servicing a system like this can be frustrating as parts may be difficult to find and are often available only from authorized dealers.

Linux offers two common boot managers: GRUB and LILO. Everyone uses GRUB these days; LILO is older and simpler and doesn't support UEFI BIOS systems.

Several issues can cause Windows to hang during the GUI loading phase such as buggy device drivers, Registry problems and even autoloading programs.

The layers contain a veritable highway of wires, carrying data and commands back and forth between the CPU, RAM and peripherals. The layered approach allows the manuf. to add complexity and additional components to the board without extending the overall length and width of the board.

Shorter traces also allow signals to travel faster than they would if the wires were longer as would be necessary if motherboards did not use lawyers. The multiple layers also add strength to the motherboard itself so that it does not bend easily.

SC Connector

Square connector

Martin bought a new motherboard to replace his older ATX motherboard. As he left the shop, the tech on duty called after him, "Check your standouts!" What could the tech have meant?

Standoffs are the metal connectors that attach the motherboard to the case.

What topology does Ethernet use?

Star bus

A common way to access the command-line interface in Windows Vista/7 is through the _______________.

Start Menu

Second thing to do -

Start Windows Update 2 kinds of updates: 1. Important 2. optional Important updates have security and bug fixes that need to happen now. optional updates have extra things, language options for example

Server Side virtualization can use bare-metal virtualization software that requires no operating system on the VM supporting machine. These hypervisors, such as VMware, ESXi, take up miniuscule space. You manage them remotely through client software, rather at the server box.

Storage can be consolidating and centralization by removing drives from individual hosts and moving them to specialized storage systems that support many hosts. This can improve performance and makes maintaining, administering, and backing up the drives easier.

Most storage best practices translate well from the physical environment to the virtual environment.

Storage virtualization is abstracting of the resources to the virtual machines

A virtual machine that is created expressly for the purpose of being a standardization mold to create new VMs is called a

Template

WEP encryption methods is considered easily broken and should be avoided when configuring wireless security

The "B" standard (802.11) has the MAX throughput of 11 Mbps.

RJ-45

The 8-pin modular connector used with CAT6/5e/5 cable

What feature differentiates an AMD FAX CPU from an AMD A-Series CPU?

The A Series has an integrated graphics controller

Formatting creates a file system and root directory. You can use the Disk Management tool to format a partition or volume. Current versions of Windows support four file systems: Fat16, FAT32, NTFS and exFAT (FAT64).

The base storage area for hard drive is a sector which can store up to 512 bytes of data. If a file is smaller than 512 bytes and does not fill a sector, the rest of the sector remains unused because only one file can reside in any one sector. If a file is more than 512 bytes,the file is split into pieces of a single file are not contiguous the file is said to be fragmented.

Components

The built=in components determine the core functionality of the system

Make sure you focus the prompt's attention on the drive and directory in which you want to work

The command prompt is always focused on the working directory

LINUX: KDE-based distro KDE Plasma Desktop (Default for OpenSUSE, Kumuntu)

The downside to all these choices is that the configuration utilities can vary among the different KDE-based utilities

The format command enables you to format volumes from the command line

The hostname command displays the name of a computer

In projectors, the fan runs after power off util the lamp is cooled down

The most expense part of a projector to replace is the lamp

What describes a stuck pixel?

The pixel id stuck on a certain color

A GPU handles the video processing chores in modern systems

The size of the projected image at a specific distance from the screen is defined as the projector's VIDEO DISPLAY

cluster

The smallest increment in which data is stored on hard disks; hard disks are divided into tracks, then wedges, then sectors, then clusters.

E-mail issues

There are two types of email: outlook and thunderbird

Joey has a motherboard that advertises support for x64 processors. Which CPU will definitely work in that motherboard?

There is not enough information to answer this question

Administrative tools

These are a group of Control Panel applets, including Computer management, event viewer, and Reliability and Performance Monitor

String value

These are the most flexible type of value and are very common. You can put any form of data in these.

In WIndows Vista and Win 7, you can use the System Protection feature to recover previous versions of corrupted or deleted files.

To run a program written for WinXP in a Win7 computer, use WinXP mode if you encounter problems

Now use the make directory command again to create a new directory called Yoda C:\Users\nkersey\Jedi>md Yoda Do a dir again and you should see that your Jedi directory now contains a Yoda directory.

Type cd . . go to up one level and return to your home directory s you can delete your new directories by using the remove directory command (rd) C:\Users\nkersey1>rd /s Jedi Yet again, Windows responds with the following jedi, are you sure? <Y/N>? Press y to eliminate both Jedi and Jedi\Yoda Using a Mac OS X or Linux system, repeat the entire process using the mkdir, cd and rem commands.

Used in modern systems, ________ supports file systems that enable booting to drive larger than 2.2 TB, supports 32 or 64 bit booting and handles all boot-loading duties

UEFI

BIOS used in modern systems

UEFI Unified Extensible Firmware Interface

Permissions set manually override inherited permissions

User accounts can be created using the Control Panel utilities

How are MAC addresses represented?

Using 12 hexadecimal characters

DirextX is an APPLICATION PROGRAMMING INTERFACE, a program that translates for the video device driver

Using an aspect ratio of 16:10, the RESOLUTION refers to the number of horizontal pixel times the number of vertical pixels

Sysprep is a MS specific utility that is used to automate the customization of a Windows server.

Virtual machines can be altered, and if those changes prove to cause problems, the virtual machnine can be reverted to the original state through the use of SNAPSHOTS.

FLOPPY DISKS are normally no longer found on computers, but were once the most popular media for moving data from system to system.

Virtual machines can be configured to utilize multiple monitors.

virtualization hosts can use all of the following except virtual network storage arrays

Virtual machines can bypass the hypervisor and connect directly to a physical device by using raw device mapping RDM.

The USB standard offers a common connection for computer peripherals and provides data transfer and power capabilities for those devices.

Virtual machines can support all USB devices.

What is an example of a web-based OS?

chrome

Rapid Elasticity

expansion of servers, evenly spread out geographically, with just mere clicks of a switch.

PCI express (PCIe)

an 16 lane expansion bus that uses point to point serial connections

Windows

an OS by MS that incorporates a user-friendly, graphical interface

What do you call a file, directory, or program that is passed to a command?

an argument

computer

an electronic device that can perform calucations

DHCP (Dynamic Host Configuration Protocol)

also called dynamic IP addressing. Can use with IPv4`

What is the default file system is most current Linux distros?

ext4

What tool in 8.1 enables you to see various event messages and warnings that might give you a better sense of what is causing problems?

action center

The MBR checks the partition table to find the ________ or bootable partition.

active partition

Managed devices run specialized software called

agents

file system

all the directories on your computer

domain based

all users and passwords are stored in the domain

Dynamic Host Configuration Protocol (DHCP)

allows dynamic IP address allocation so users do not have to have a preconfigured IP address to use the network Port 67, 68

Menu-driven interface

an interface in which you choose commands from menus displayed on the screen

Private Cloud

an internal cloud that a business actually owns, that has the same flexibility of a regular cloud but complete ownership of data belongs to just the company

John's computer has an error that says bootmgr is corrupted. What tool can he use to fix this problem?

bcdedit

The part of a file name following the period (.) is called the

extension

GUI

graphical User Interface

What communication technology is designed network known as PAN?

bluetooth

If a disk contains the OS files necessary to start the computer, it is called a(n) ___________

bootable disk

WHat command will repair a damaged master boot record in Win8.l1 PC?

bootrec /fixmbr

While printing images using a laser printer, light images of previously printed pages are appearing on the current page. Which of the following is the cause of the issue?

broken cleaning blade malfunctioning erasure lamp

A dim display on a laptop LCD screen might indicate a problem related to: (Select 2 answers)

backlight inverter

What provides the illumination for LCD monitors?

backlights

What Terminal command enables you to search through text files or command output to find specific information?

grep

What Basic Input/Output System (BIOS) setting would you need to change if you wanted the central processing unit (CPU) to operate faster than it was designed to run?

clock speed

Which Terminal command enables you to search through text. files or command output to find specific information?

grep

southbridge

handles keyboard controller functions

What is the best way to determine the total capacity and specific type or RAM your system can handle?

check the motherboard book

PING

checks if the machine is in the network

The combination of a specific Northbridge and a specific ________ is collectively referred to as the _______

chipset

What command is used to change file permissions in Linux?

chmod

Definition of commands in CMD

c:\root c:\some\some - folder of users dir - directory cd - change into a different directory md - make a directory rd remove a directory attrib + add a file attrib - remove a file ren - rename del - delete chkdsk (f\r\) detects, scans, repairs problems on hard drive. f\repairs volume related problems r\ repairs bad sectors

The sales department of your organization has been provided with ten laptops. As a security administrator, you are concerned for their safety. What can you do to prevent theft?

cable lock

What optical disc type has the ability to erase the disc and write to it again multiple times?

cd-rw

What command can you type in the Search box to access the command line interface in WIndows?

cmd

A center cable surrounded by insulation and covered with a shield of braided cable is called __________________.

coaxial cable

appendix of all commands

codecademy.com

Program Reports (called Problems Reports and Solutions in WinVista)

control panel applet to see all error reports and issues

Wake on LAN

handy when you want to wake up one or multiple computers that aren't physically near

If a file is not stored in contiguous clusters, you can improve hard drive performance by using a tool to _____ the drive.

defragmentation

What command will delete all the files in a directory?

del .

Loaded when the system boots, a(an) ______ is a file that contains instructions to support a hardware device

device driver

File names and File Formats

each file has a name which is stored with the file on the drive. This names are broken down into two: filename and the extension

"above

each machine must have a unique name, an identifier for the network, which is ABOVE the MA address

what is the most popular reason for virtualizing

easy to manage systems

Because system upgrades are not recommended between certain Win versions, MS provided a migration utility for mail, data and settings, what is the name of the utility?

easy transfer

PCI Extended (PCI-X)

echanced version of PCI, 64 bits wide

Which part of a LCD display sends power back to the backlights>

inverters

option

modify the behavior of commands

What projector produces the brightest image?

one with the highest lumen rating

up arrow

open folder containing current folder

a bad boot error usually shows up as a No Boot Device error. If it turns out this isn't the problem, the Recovery console command to fix it won't hurt anything. At the Recovery Console prompt, just type fixmbr which fixes the master boot record.

the second problem the Recovery Console is best at fixing is missing system files, usually indicated by the error NTLDR bad or missing. To fix this, got to the root directory (cd\) and type the following line: copy d:\k386\ntldr. Then type copy d:\i386\ntdetect.com. to rebuild the boot.ini file, tyupe bootcfg /rebuild

How to you sort files by date?

you click the date last modified header in Details View

What does ZIF stand for?

zero insertion force

microATX

A 9.6 by 9.6 inch variation of the ATX form factor which the ATX power sup0ply - smaller than ATX but the parts retain the same functionality and fit inside ATX case.

To select and install a CPU, consult your motherboard documentation to see which CPUs are compatible with your system. Not all CPUs are compatible with all motherboards.

A CPU fits only one way in the ZIF socket. Don't for it. If you find the CPU will not seat properly, take a second look at the orientation makers and verify the CPU is in the correct direction.

Class B address

A Class B address uses two octets. Class B addresses span from 128 to 191, with a default subnet mask of 255.255.0.0. This one left two full octets (16 bits) use for host numbers.

A link-local address is the address that a computer running IPv6 gives itself after first booting

A FIELD or HEXTET is group of hexadecimal numbers between 0000 and FFFF

An emulator translators commands issued by software in order to run it on hardware it wasn't designed to run on

A GUEST is a virtual machine running a hypervisor

multiple desktops

A GUI feature that enables a computer to have more than one Desktop, each with its own icons and background. Mac OS X supports multiple Desktops with Spaces. Most Linux distros use multiple Desktops, often called workspaces. Microsoft introduced the feature with Windows 10.

Kernel Panic

A Linux or OS X error from which it cannot recover, similar to a blue screen of death in Windows. Can fix by going to manuf. website and upgrade and find updated drivers or kernel modules (code that gets inserted directly into the kernel)

Voice VLAN

A VLAN defined for use by IP Phones, with the Cisco switch notifying the phone about the voice VLAN ID so that the phone can use 802.1Q frames to support traffic for the phone and the attached PC (which uses a data VLAN).

What command in Wins Command Prompt writes a new boot sector to the system partition?

BOOTREC /FIXBOOT

What command in WIndows Command Prompt writes a new master boot record to a disk?

BOOTREC /FIXMBR

Windows Recovery Environment (Windows RE) offers a set of tools and utilities to troubleshoot Windows start up issues. What command launches a tool for manual troubleshooting of problems related to master boot record (MBR), boot sector, and Boot Configuration Data (BCD) store in Windows RE Command Prompt?

BOOTREC.EXE

What tool is used in Mac OS X to perform full system backups?

Backups

What problems could likely cause Blue Screen of Death in Win8.1?

Bad RAM Incompatible device driver

WhaT CAN CAUSE a computer to lock up or unexpectedly shut down?

Bad RAM Poorly written application

What can cause a computer to lock up or unexpectedly shut down?

Bad RAM Poorly written application

What could likely cause a BSOD in Win8.1?

Bad RAM or incompatible device driver

bootrec /ScanOs

Bootrec command that scans all disks for Windows installations and displays them to you.

bootrec/fixmbr

Bootrec command to fix the master boot record

bootrec /Fixboot

Bootrec command which writes a boot sector onto the system partition to start Windows

Amanda bought a new system that, right in the middle of an important presentation, gave her a Blue Screen of Death. Now her system won't boot at all, not even to CMOS. After extensive troubleshooting, she determined that the motherboard was at fault and replaced it. Now the system runs fine. What was the most likely cause of the problem?

Burn-in failure

When either you or the man in the box flips a switch on, BOTH light bulbs go on and the switch on the other side is also flipped to the on position. If you or the Man in the Box turns a switch off, the light bulbs on both sides are turned off along with the other switch for that pair.

By creating on/off patterns with the light bulbs that represent difference pieces of data or commands, you can send that information to the Man in the Box and he can send information back in the same way - assuming that you agree ahead of time on what the different patterns of lights mean. To accomplish this, you need some sort of codebok that assigns meanings to the many patterns of lights that the EDB might display.

By understanding the computing process, this applies to every computing device, it provides a basis for how every tech builds, upgrades and repairs such devices.

By understanding both the components involved and how they talk to each other, you can work with every computing device.

Last Known Good Configuration

A Windows feature that starts the computer by using the registry information that was saved during the last shutdown.

Structured cabling standards give professional cable installers detailed standards on every aspect of a cabled network, from the type of cabling to use to standards on running cable in walls, even the position of wall outlets.

Successful implementation of a basic structured cabling network requires three essential ingredients: a telecommunications rooms, horizontal cabling and a work area. A single piece of installed horizontal cabling is called a run.

This handles low level interaction between hardware and software, such as task scheduling, allotment of time and resources, etc.

Supervisor

BitLocker Drive Encryption requires a special Trusted Platform Module (TPM) on the motherboard to verify on boot that the computer has not changed.

The Encryption enablews you to scramble a file or folder and thus hide the contents from anyone, even an admin.

Event Viewer

The Event Viewer is a separate video display that appears next to the main Viewer and is used to play clips in the Browser only. A default tattle tale program telling you things about goings on with the computer. Powerful for security as well.

double colon in an IPv6 address indicates that part of the address containing only zeroes has been compressed to make the address shorter. True

The FTP Protocol is designed for file exchange

VoIP is not configured to your computer. It cane replace your old copper phone line. Two popular ways to set up a VoIP system are to either use dedicated VoIP phones or use a small VoIP phone adapter that can interface with your existing analog phones.

True VoIP has RJ-45 connector that plug directly into the network and offer advanced features such as HD quality audio and video calling. Unfortunately, these phones require a complex and expensive network to function, with puts them out of reach for most users. For home users, it is more common to use a VoIP phone adapter to connect to your old school analog phones.

The PCIe (Express) bus is the most common expansion slot for video cards.

Two common projector technologies are LCD and DLP Digital Light Processing.

What is another name for a bare-metal hypervisor?

Type 1 hypervisor

What is the term for describing applications such as VMware Workstation?

Type 2

A Group is a collection of user accounts that share the same access capabilities.

User Account control (UAC) enables standard users to perform common tasks and provides a permissions dialog box when standard users and administrator do certain things that could potentially harm the computer.

The PERFORMANCE INFORMATION AND TOOLS applet provides a relative feel for how your computer stacks up against other systems using the Win Experience Index

Use the ACTION CENTER in Win8 to see an aggregation of event messages, warnings, maintenance messages and quick access to security and maintenance tools.

The Task Manager, accessed by pressing CTRL SHIFT ESC once, enables you to see all processes and services currently running or to close a process that has stopped working.

Use the Action Center in Windows 8 to see an aggregation of event messages, warnings, maintenance messages, and quick access to security and maintenance tools.

UDP

User Datagram Protocol. Used instead of TCP when guaranteed delivery of each packet is not necessary. UDP uses a best-effort delivery mechanism.

EXAM TIP: be familiar with the OS feature names, tools and terms.

User Interfaces: OS system user interfaces. You need to know the different OS interfaces

Ralph suspects a bad RAM stick is causing Windows to fail to boot. What default Windows tool can he use to check the RAM?

Windows Memory Diagnostic Tool

Ralph suspects a bad RAM stick is causing Windows to fail to boot. What default Windows tool can he use to check the RAM?

Windows Memory Diagnostic tool

HKEY_CURRENT_USER and HKEY_USERS

Windows is designed to support more than one user on the same system, storing personalized information such as desktop colors, screensavers and the contents of the desktop for every user that has an account on the system. HKEY_CURRENT_USER stores the current user settings HKEY_USERS stores all of the personalized information for each user.

pinned app

Windows method of attaching programs to the taskbar. A pinned application gets a permanent icon displayed on the taskbar.

file association

Windows term for the proper program to open a particular file; for example, the file association for opening or .mp3 files might be Winamp.

Windows Memory Diagnostic Tool (mdsched.msc)

Windows tool specifically for checking errors in RAM/memory (generally useless tool according to mike myers)

During the Windows installation, you will need to agree to a legal document called the End of Use License Agreement (EULA).

Windows tracks installation progress with a set of text files called Log Files.

Win Vista/7:

Windows uses a graphical user interface primarily, so you engage with it with the mouse or other pointing devices and click on the elements. The background is called THE DESKTOP. The open applications are Internet Explorer - Windows default browser, and Windows Explorer showing the Win7 default libraries.

Windows Explorer

Windows utility that enables you to manipulate files and folders stored on the drives in your computer. Rebranded as File Explorer in Windows 8, 8.1, and 10.

Windows has 3 partitioning methods: the older master boot record (MBR) partitioning scheme, Windows proprietary dynamic storage partitioning scheme and the GUID partition table (GPT).

Windows' primary dynamic storage partitioning scheme, and the GUID partition table (GPT). MS calls a hard drive that uses either the MBR partitioning scheme or the GPT partitioning scheme a

Every version of Windows fully supports FAT16, which uses only 16 bits to address sector locations. This translates to 64 K locations.

With 64 K locations of 512-byte sectors, 64 K x 512 bytes. hits the ceiling at 32 MB. For this reason, FAT16 partitions were initially limited to 32MB. FAT16 later added a feature called clustering that treats a set of contiguous sectors as a single FAT unit. These clusters (also called the file allocation units) allow a max partition size of 2 GB.

Static IP addressing

With IPv4 addresses come from one of two places and one of the ways is either you type in the IP address yourself which is called STATIC IP ADDRESSING Manually configuring a host with an IP address and information as opposed to obtaining the address dynamically through a DHCP server

Most CPUs support virtualization - running more than one OS at a time. Adding this support directly to the hardware makes virtualization such more efficient than running it only via software.

With parallel execution and multicore processing, modern CPUs can handle many simultaneous applications efficiently. One Intel-only parallel execution technology - Hyper-Threading - makes a single CPU function like two CPUs if the OS and applications support the technology. A multicore CPU, in contrast, functions as multiple CPUs regardless of the OS, through the applications still need optimization.

A small device that enables you to test a NIC's circiutry is called

a loopback plug

Selena wants to install two video cards on a computer for high quality video graphic games. Which of the following does she need for this task?

a motherboard with two PCIe x 16 slots

Internet Assigned Numbers Authority (IANA)

a non-profit corporation responsible for assigning IP addresses and managing root servers, has set aside the range of addresses from 169.254.0.1 to 69.254.255.254

Linux

an open-source OS based on UNIX. Because of this OS, it is often used on web servers.

multiuser OS (network operating system)

an operating system that enables more than one user to access the computer system at one time by efficiently juggling all the requests from multiple users

A monitor filter used to reduced reflection from the surface of a CRT or LCD display is called

antiglare

Host

any computing device connected to a network

Resource

anything that one computer might share with another resource

frozen system

app not written properly network connectivity issue - an app will often seem to freeze when it is trying to find or maintain a network connection and this will consume a lot of resources until it finally gives up faulty hardware can cause your device to lock up. The solution is to reboot it, clearing its RAM and restating it.

shell prompt

appears when the terminal is ready to accept a command

On-demand

application that adjusts capacity according to current demands

How should term paste be applied for purposes of keeping a CPU cool?>

apply it to the top of the CPU before the heat sink is placed on the chip.

Lists all installed programs

apps screen

The relative horizontal and vertical size of a digital image displayed on the graphics monitor screen is referred to as:

aspect ratio

What term refers to the distorted display geometry issue?

aspect ratio

You have a projector in a large room. How many lumens should your projector be measured at?

at least 10,000 lumens

You have a projector in a mid sized room with typical lighting. HOw many lumens should your projector be measured at?

at least 2000 lumens

What is the command to make myfile.txt read-only?

attrib myfile.txt +r

An external program that enables you to inspect and change file attributes is ___________.

attrib.exe

How does Virtualization reduce power use substantially?

by placing multiple servers or clients on a single physical system

Transmission Control Protocol (TCP_)

is a connection-oriented protocol provides reliable, ordered and eror-checked delivery of a stream of packets on the internet. TCP is tightly linked with IP and usually seen as TCP/IP in writing.

Client-side virtualization

is a running virtual machine on your local system (in contrast to VMs run elsewhere) regardless of whether the VM file itself might be stored locally or on a central server accessed via the network.

Emulator

is a software or hardware that converts the commands to and from the host machine into an entirely different platform

If a processor has virtualization support, what is it able to do?

process instructions from multiple OS quick and efficiently.

Flashing the ROM

process where you can change the contents of flash ROM

Utility program

program that performs general housekeeping tasks for the computer, such as system maintenance and file compression

Emulator

this is software or hardware that converts the commands to and from the host machine into an entirely different platform

Dudley wants to connect his new MacBook Pro to an LCD monitor that has a Digital Visual Interface. What type of adapter should he use? A. BNC to DVI B. DisplayPort to HDMI C. Mini-HDMI to DB-15 D. Thunderbolt to DVI

thunderbolt to DVI

Installed apps appear on the Screen screen as

tiles

some apps are known as ________ tiles because they display up to date information inside tile

tiles

What is the Material Safety Data Sheet (MSDS)

to provide procedures for the storage and handling of hazardous substances

During physical install of a video card, be aware of long cards and proximity to other PCIe cards. Long cards simply do not fit in some cases and close proximity

video problems may be divided into two categories: video cards/drivers and monitors.

If you install the VMware Tools on a Linux system, the program that it runs as a system daemon

vmtoolsd

Private Cloud

what a business has - it has ownership of all the data and can build this internal cloud. A security minded company has IaaS. Departments within the company would have a SaaS to meet, collboration, planning and time management tasks

A single memory module playing the role of two separate modules is DOUBLE SIDED.

what are the differences between DDR3 SDRAM and DDR2 SDRAM? DDR3 transfers data at twice the rate of DDR2 DDR3 memory power consumption is 30% less as compared to DDR2

inherited

what type of permissions does a folder received in parent folder

argument

when a file, directory, or program is passed into a command

Resource pooling

when you consolidate systems physical and time resources.

Exam tip: known xcopy and robocopy )page 571 read this and do the exercises

xcopy is like move but has the power to work with multiple directories. For example, I have a directory called Logs in the root of my C: drive. The Logs directory has three subdirectories: Jan, Feb and Mar. All of these directories including the Logs directory contain about 50 files. If I wanted to copy all of these files to my E: drive in one command, I would use xcopy in the following manner: xcopy c:\Logs e:\Logs /s Because xcopy works on directories, you dont have to use filenames and wildcards. The /s switch, the most commonly used of all of the many switches that come with xcopy, tells xcopy to copy all subdirectories except for empty ones. The /e switch tells xcopy to copy empty subdirectories. When you have a lot of copying to do over many directories, xcopy is the tool is.

There are nine steps that apply to most computers and computing devices when you want to get something done

1. Power up. Computers run on electricity 2. Processing parts prepare for action. 3. You provide input 4. Processing parts process your command 5. Processing parts send input information to your output devices. 6. Output will show you the results 7. Repeat steps 3-6 until you are happy with the outcome 8. Save your work. 9. Power down the computer

Common OS Functions: All OSs are not created equal but every PC provides certain functions. Here is a list:

1. The OS communicates/provides a method for other programs to communicate with the hardware of the PC or device. OS run on specific hardware. For example, if you have a 32 bit computer, you need to install a 32 bit version of an OS. 2. The OS creates a user interface (UI), a visual representation of the computer on the monitor that makes sense to the people using the computer. 3. The OS enables users to determine the available installed programs and run, use and shut down the programs of their choice. 4. The OS enables users to add, move and delete the installed programs and data 5. The OS provides a method to secure a system from all sorts of threats, such as data loss or improper access.

Windows 7 doesn't have a sidebar.

Because of the inherent security flaws with both Sidebars and Gadgets. MS recommended disabling them on Vista and Win7 systems. Later versions of the OS do not have either.

Personal Documents

C:\Users\Mike\Desktop

WIN8/8.1: Three tech starting points

Control Panel Administrative Tools Command-line

EXAM: will test you on specific paths to specific tools. Be prepared for several multiple choice and scenario-based questions on the topic

Control enables you to access DEVICE MANAGER which is critically important tool for techs and troubleshooting. With Device Manager, you can see all of the hardware and drivers in a Windows computer.

Modern computing devices have two other stages

Data Storage Network connection

Linux offers a variety of user interfaces called DESKTOP ENVIRONMENTS (DEs) but they offer similar functions to those in Windows or Mac.

Earlier support did not exist for multiple Desktops with Task view. Win10 is the first.

The Win8 interface, code named METRO UI, works great for touch enabled devices. The PC becomes a giant tablet.

Features a STARTUP screen. Techs called this tiled interface as METRO.

At the basic level, computers work through three stages of what is called the Computer process

Input Processing Output

WIN8/8.1 Administrative Tools

MS beefed up Admin Tools starting in Win8. This admin tools enables you to set up hard drives, manage devices, test system performance, etc. Go to tool for all techs. Ways and means of the tool Start Screen, click on down menu to open Apps list. Scroll a little to the right and see the list of Admin tools and select the specific tool you want to open. Right click on the Start Button (or press Windows Logo key + X) and select Control Panel from the context menu. In Control panel, select admin tools to open

WIN8/8.1 Settings

Settings combinations a huge number of otherwise disparate utilities, apps and tools traditional spread out of all over your computer into faily unified, handy Windows app. Since the Settings app was introduced in Win8, it has taken over more and more tasks from the Control Panel. It will probably grow as win10 matures. To access the Setting app, press the Windows Logo Key to access the start menu. Select Settings from the lower left to open the tool.

WIN8/8.1 Command Line

Several ways to access this: 1. tap the down arrow of the Start screen and scroll all the way to the right in the list of Apps. In Window System category, click on Command Prompt or start typing command prompt in the Search field in the Apps list. 2. Right click on the Start button (or press Windows Logo Key +x) and select Command Prompt from the context menu to open the command=line interface. 3. In Start screen, start typing cmd or command prompt and Command Prompt will appear in the Search charm. Click on it to open it.

What Mac OS X feature is essentially Multiple desktops?

Spaces

Which Windows 7 feature - that's not in Win8- did MS bring back in Win10

Start Menu

Windows 8's tile-based interface is called the Metro/Modern UI or

Start Screen

Windows folders:\windows

The OS itself

WIn VIsta/7 SYSTEM TOOLS

The Start menu offers a variety of tech utilities collected in one place: System Tools. In this menu, you will find commonly accessed tools such as SYSTEM INFORMATION and DISK DEFRAGMENTER. Memorize how to find the appropriate Windows tool to diagnose problems.

Win8 placing the cursor in the top or bottom right hand corner of the screen, reveals the charms bar, a local for tools called charms. Charms include a robust Search tool that enables a search of the computer or even the internet in one location.

The final version of Win8.1 uses the Desktop rather than the Start screen as the default interface.

Win 8/8.1 has lots of hidden components that activate when you place the cursor in certain places on the screen. Dropping the cursor to the bottom left corner, for example, activates the Start button to the Start screen.

The first Win8 release had no visible Start button (except in the Charms bar). MS added it to the Desktop in later patches.

Mac OS X has two go to places for system setup and configuration: System Preferences and Utilities. Access the former through the permanent Apple menu; access the latter through Finder

The many Distros of Linux vary in what tools they use and the path to those tools. One essential tool is Terminal, the command-line interface. The most common distro, Ubuntu Linux, has a System Settings application, accessible from the Launcher that is very similar to System Preferences in Mac OS X.

You access the desktop with a visible START button called the WINDOWS LOGO KEY on a standard keyboard.

The scrolling was annoying to those making the jump from Win7. Scrolling with the mouse wheel scrolls right to left rather than up and down. Win7 returned to the traditional Desktop

Mac OS X: System Preferences

To access, click on the Apple (top left corner of screen). Select System Preferences from the Apple Menu to open the app. From System Preferences you have access to almost all settings you will need to administer a Mac OS X system.

Win8 takes advantage of modern widescreen monitors with the SIDE BY SIDE features. Select an open application and press WINDOWS LOGO KEY-LEFT ARROW and the application will pin to the left half

Win 8.1 made it easy to pin apps to the Start Screen. Selecting the arrow at the bottom left brings up the APPS pane where you can sort and select apps and utilities. Right click on an icon to pin it to the start screen.

Windows 10: keeps the Control Panel and command-line interfaces we see in earlier versions of Windows but focuses on an expanded Settings app for day to day administration

Win10: Control Panel: offers two standard ways to get to control panel. Right click on the Start button to open the Tech Essentials menu and Select Control Panel from search results. Adminstration Tools still important in Win10 which is piled together as a single Control Panel applet. You have the same options for accessing Admin Tools in Win10.

If you want to back up all the files you ever created, you can go to this folder and back up everything that's in this folder

\Users

Windows folders: All your OS files are stored in a folder called

\Windows

Mac OS X: Utilities Folder

a second launch point is the UTILITIES folder, located nearly in the Application Folder. With the FINDER in focus, click on Go on the menu bar and select Utilities. You can also use the hot key combo COMMAND-SHIFT-U. This gives you access to the tools to performance services on a Mac beyond what's included in System Preferences including the Activity Monitor and Terminal. The latter is command line interface for Mac OS X is powerful tool for techs.

C:\Program Files (All versions)

by default most programs install some or all their essentials files into a subfolder of the Program Files folder. Companies decide how their install folders will be labeled.

OS

controls the hardware and enables you to tell the computer what to do. The OS system often appears as a collection of windows and little icons you can click or touch. Collectively, these are called the USER INTERFACE (IU) which means the software parts with which you interact. The UI that offers images or icons to select (as opposed to making you type commands) is called a GRAPHICAL USER INTERFACE (GUI).

Mac OS X

has two key launch points for techs: the System Preferences app and the Utilities folder. You can access both quickly.

each volume has its own

hierarchy

In the back of a computer the connection points are called PORTS. Some ports connect to output devices, a couple or exclusively used for input devices. Most (such as the USB) hand either type of device.

https://www.slideshare.net/Dyern/inside-of-computer-ppt https://www.google.com/search?q=inside+computer+case+ppt&rlz=1C1GCEA_enUS793US793&oq=inside+computer+case+&aqs=chrome.1.69i57j0l5.11291j1j1&sourceid=chrome&ie=UTF-8

C:\Users\Mike\Desktop

stores the files on the user's Desktop. If you delete this folder, you delete all the files placed on the Desktop

C:\Program Files (x86)

the 64 bit editions of Windows create two directory structure Files Folders. 64 Bit applications go into the Program Files folders, whereas the 32 bit applications go into the Program Files (x86)

Processing

the parts inside the device or case take over after input as the OS tells the hardware to do that you requested. This is processing.

Hardware

the physical stuff that you can touch or hold in your hand such as the mouse, keyboard or view images on the monitor.

C:\Users\Mike\Music

this is the default location for music you download.

Network connection

when computing device connects to the other devices to access other resources. Network connection is how one computer connects to one or more other computers. This also applies to anything that connects to the internet. A network connection can also mean running a cable between two devices, like connecting an IPad or iPhone to a windows desktop machine using a Lightning to USB cable

miniATX

A 6.7 by 6.7 inch ITX form factor that is the lartest and most popular

What can device drivers and failing hardware in Mac OS X and Linux cause?

Kernel panic

Applications

(or programs) enable you to do specialized tasks on a computer

What wildcard character can be used as a substitute for any string of characters in a file or directory name?

*

The goal of TCP/IP

- is to link any two hosts whether the two computers are on the same LAN or on some other network within the WAN - the LANs within the WAN are linked together with a variety of connections, ranging from basic dial-ups to dedicated high-speed (and expensive) data lines - to move traffic between networks, you use routers. Each host sends traffic to the router only when that data is destined for a remote network cutting down on traffic across the more expensive WAN links -the host makes these decisions based on the destination IP address of each packet.

client-side DNS and client-side DHCP

- the DNS and DHCP protocols and settings on a local machine that access DNS and DHCP servers are called

When to use tracert and traceroute commands

- the tracert/traceroute command can come in handy when you have to troubleshoot bottlenecks when users complain of difficulty teaching a particular destination by using TCP/IP, yo can run this utility to determine whether the problem exists on a machine or connection over which you have control, or if it is a problem on another machine or router. if a destination is completely unreachable, tracert/traceroute can again determine whether the problem is on a machine or router, over which have control

User Datagram Protocol (UDP)

- used by connectionless - super fast a connectionless transport protocol connectionless transport protocols provide unreliable transport, in that if a segment is dropped, the sender is unaware of the drop, and no retransmission occurs.

Entering the IP information

-- IP address/your computer's unique address on the network - subnet mask/identifies your network ID - default gateway/IP address for the LAN side of your router - DNS server/Tracks easy to remember DNS names for IP addresses

When testing an AC outlet, what voltage should the multimeter show between the neutral and ground wires?

0v

What parameter of the CD command in WIndows moves the command line prompt one folder up in the directory tree (sets the prompt at the parent folder of the current folder)?

..

Which parameter of the RD command in WIndows allows for the deletion of an entire directory tree? (the specified directory and all its subdirectories, including all files)

/S

What parameter of the System File Checker utility in MS WIndows combines scanning the integrity of all protected system files with restoration of corrupted files?

/SCANNOW

What SHUTDOWN command switch in Windows Command Prompt forces full system shutdown and restart of the Windows host.

/r

Dynamic disks support a total of five types of volumes: simple, spanned, striped, mirrored and RAID 5.

1. Simple 2. Spanned 3. Striped 4. Mirrored 5. RAID 5

You have a projector in a small, dark room. How many lumens should your projector be measured at?

1000-1500 lumens

How do you represent the hexdecimal value A in binary?

1010

A Terabyte is equivalent to ___________ Gigabytes.

1024

When connecting a cable run onto a patch panel, which tool should you use?

110 punchdown tool

What is the max bandwidth of PCI?

132 MBps

What is the resolution of WSXGA?

1440 x 900

An ethernet frame holds a max of

1500 bytes

What is the the resolution of UXGA?

1600 x 1200

What is the aspect ratio for the standard display format for HDTV?

16:19 aspect ratio

What is the resolution of WUXGA?

1920 x 1200

You're configuring a RAID 5 solution on a server running Windows Server 2012 R2. You're using five 750 GB hard drives in the RAID array. How much free space will you get after configuring the RAID 5 solution?

3,000 gigs

What standard would be used on a wireless router to support speeds up to 150 Mbps?

802.11n

What IEEE 802 standard defines a bus topology using coaxial baseband cable and is able to transmit at 10 Mbps?

802.3

What wildcard character can be used as a substitute for a single character in a file or directory name?

?

Picture is not a valid MS file extension

? is a wildcard character replaces a single character in the command line interface

What wireless networking standard operates at the SHORTEST distance?

A

Nano-ITX

A 4.7 inch by 4.7 inch variation of the ITX form factor.

Part of every IP address identifies the NETWORK (THE NETWORK ID) and another part identifies the LOCAL COMPUTER (THE HOST ID, OR HOST) on the network

A NIC uses a value called the SUBNET MASK to distinguish which part of the IP address identifies the network ID and which part of the address identifies the host.

Windows uses a hierarchical directory tree to organize the contents in drives

A PERIOD separates a filename and its extension

tv tuner card device works as a video capture card

A RISER CARD is a circuit board that is used to extend slots for expansion cards and provides the ability to connect additional expansion cards to the computer

The first use for the address bus is for the CPU to tell the chipset to send or store data in memory and to tell the chipset which section of memory to access or use. Just as with the external data bus, the chipset extends the address bus to all of the devices. that way, the CPU can use the address bus to send commands to devices, just as it sends commands to the chipset.

A ROM (read-only memory) chip is nonvolatile, meaning it retains the information stored on it even when the power is turned off. The ROM chip stores hundreds of little programs that enable the CPU to communicate with basic devices such as optical drives, hard drives, video card and others. These programs, called services, are collectively referred to as the basic input/output services (BIOS). These programs are stored on read-only medium and can;t be changed by the user. , so they are known as FIRMWARE, in contrast with software, which are programs stored on the erasable media. The term "system ROM" refers to the ROM chip on the motherboard.

Traditional hard drives run at a set SPINDLE SPEED measured in RPM

A Solid-State Drive (SSD) offers substantial performance benefits over an HDD.

A simple volume is similar to a primary partition in that it can store files and can receive a drive letter or be mounted to a folder.

A Spanned volumes combine space from several volume and treat them as a single volume. After one volume is full, files are written to the next volume in the span.

A LOOPBACK test sends data out of the NIC and checks to see if it comes back. Some NICs perform onl y an internal loopback, which tests the circuitry that sends and receives , but not the actual connecting pins. A true external loopback requires a loopback plug inserted into the NIC's port.

A TDR measures impendance in network cabling. If the tester measures any impendance, something is wrong with the cable.

Windows uses the Windows Easy Transfer tool for migrating user files and settings.

A Think Client is a system designed to handle only very basic applications with the min hardware required by the OS

A Smart Card reader scans the chip embredded in such devices as ID badges to enhance access and security.

A Touch Screen is a monitor with some type of sensing devices across its face that detects the location and duration of contact, usually by a finger or stylus`

Dock

A bar at the bottom of the Mac OS X desktop where application icons can be placed for easy access.

A host is a computer multiple virtual machines

A bare metal hypervisor improves the performance of virtualization by removing the underlying OS.

If the computer appears dead, with no beeps or screen responses, you can insert a POST card in an expansion slot to diagnose what is wrong by using a LED readout on the card. The documentation that comes with the POST card explains the LED codes for your particular BIOS.

A beep code or error messages does not fix a computer. After you know which device is causing the problem, check the connection for it and replace it if possible. If you cannot remove the part part or cannot interpret the error message, considering replacing the motherboard.

Honey Pot

A computer system that's set up to attract unauthorized users by appearing to be a key part of a network or a system that contains something of great value.

Standard Blu Ray Discs have storage capabilities of up to 25 GB (single layer disc) and 50 GB (dual layer disc) and provide near perfect picture quality.

A clean installation of an OS involves installing it onto an empty hard drive or completely replacing an existing installation. An upgrade installation mean installing an OS on top of an earlier installed version, thus inheriting all previous hardware and software settings. You can combine versions of windows by creating a multiboot installation.

Community Cloud

A cloud that is open only to specific organizations that have common concerns.

Virtual machine (VM)

A complete environment for a guest operating system to function as though that operating system were installed on its own computer.

What is a daughter board?

A daughterboard (or daughter board , daughter card , or daughtercard ) is a circuit board that plugs into and extends the circuitry of another circuit board. ... A mezzanine card is a kind of daughterboard that is installed in the same plane as but on a second level above the motherboard.

Bar code readers read standard Universal Product Code (UPC) bar codes, primarily to track inventory.

A digital camera captures digital images on removeable data

Bar code readers read standard Universal Product Code (UPC) bar codes, primarily to track inventory

A digital camera captures digital images on removeable media

Solid State Hybrid Drive (SSHD)

A drive that is a combination of both a mechanical hard drive and an SSD into a single device. This disk caches the most frequently accessed bits to high speed flash memory, which will change over time.

ITX

A family of motherboard form factors created by VIA technologies.

Along with modern servers, you will find a lot of legacy and embedded systems performing very specific, non-modern tasks.

A few years ago, every NIC came on an expansion card that you added to a motherboard. Most techs called that card a network interface card or NIC. Sometimes it is called the CONTROLLER. On EXAM, you may see the term NIC on exam or network cards.

Stateful firewall

A flrewall that monitors communication paths and data flow on the network. Monitors what is happening and takes action. Based on behavior more than rules.

A text based user interface, in which users type in instructions at a prompt, is also known as a command line interface

A folder inside another folder is a called a subfolder

Software as a Service (SaaS)

A form of cloud computing where a firm subscribes to a third-party software and receives a service that is delivered online. At the top of the layer cake

Diskpart

A fully functioning command-line partitioning tool.

personal computer (PC)

A general computing device that runs Microsoft Windows and can be used for various tasks.

Access Control List (ACL)

A listof rules used to grant access to a resource. In NTFS, a list of ACE's makes up the ACL for a resource. In a firewall, an ACL identifies traffic that is allowed or blocked based on IP addresses, networks, ports and some protocols (using the protocol ID).

Broadcast Domain

A logical area in a computer network where any node connected to the computer network can directly transmit to any other node in the domain without a central routing device.

To overcome the bottlenecks of data throughput speed, access speed and capacity of video RAM, manuf use specialized fast RAM and more and more total RAM. Video memory technologies include DDR SDRAM, DDR2 SDRAM, etc.

A lot of current motherboards have integrated GPUs are ready for a CPU with an integrated GPU. The motherboard GPU, can be a separate chip attached to the motherboard or can be built into the northbridge chip. You might run into AMD and NVIDIA chips powering the GPU. Intel has long integrated the INtel Graphics Media Accelerator (GMA) into its chipsets.

Virtual machines perform better on CPUs with hardware virtualization support.

A machine running a hypervisor is a HOST.

Cyclic Redundancy Check (CRC)

A mathematical algorithm that translates a file into a unique hexadecimal value.

Advanced Startup Options

A menu that can be reached during the boot process that offers advanced OS startup options, such as Safe Mode or boot into Last Known Good Configuration. Ignore after Win7.

Equipment Rack

A metal structure used in equipment rooms to secure network hardware devices and patch panels. Most racks are 19" wide. Devices designed to fit in such a rack use a height measurement called units, or simply U.

EXAM TIP: expects you to know that a punchdown tool isused for secure UTP connections to a punchdown block. It is not until you go for the exam cert. you will need to know how to use these tools.

A patch panel is a box of a row of female connectors (ports) in front and permanent connections in the back, to which you connect the horizontal cables.

The central component of every telecommunications room is one or more equipment racks. An equipment rack provides a safe, stable platform for all the different hardware components. All rack-mounted equipment uses a height measurement known simply as a U, which is 1.75 inches.

A patch panel is a box with a row of female connectors (ports) in the font and permanent connections in the back, to which you connect the horizontal cables. The most common type of patch panel today uses a special type of connector called a 110 block. Once you have installed the patch panel, you need to connect the ports to the switch through patch cables.

You can add features to a system by adding a device to Expansion Slots.

A phenomenon known as DISTENDED CAPACITORS caused great damage to early motherboards as the result of incorrectly formulated electronic components that store and release energy.

Processes tab shows you every process - there are several common features you should recognize

A process is named after its executable file, which usually ends in .exe but can also end wither other extensions All processors have a user name to identify who started the process. A process started by Windows has the user name System. All processes have a Processor Identifier (PID). To identify a process, you use the PID, not the process name. The Task Manager doesn't show the PID by default. Click on View/Select Columns and select the PID checkbox to see the PIDs.

Virtualization is a complete environment for a guest OS to function as though that OS was installed on its on computer.

A program that runs multiple OS simultaneously is called a HOST.

A virtualization is a complete environment for a guest OS system to function a though that OS was installed on its down computer.

A program that runs multiple OS simultaneously is called a HYPEVISOR

A virtualization environment is a complete environment for a guest OS to function as though that OS was installed on its own computer.

A program that runs multiple OS simultanously is called hypervisor

real-time operating system (RTOS)

A program with a specific purpose that must guarantee certain response times for particular computing tasks or else the machine's application is useless. Real-time operating systems are found in many types of robotic equipment.

Multispeed devices usually have a link light that tells you the speed of the connection

A properly functioning link light is STEADY ON when the NIC is connected to another device. No flickering, no on and off, just ON.

Dynamic Host Configuration Protocol (DHCP)

A protocol that allows properly configured client computers to obtain IP addresses automatically from a DHCP server.

SMB (The Server Message Block)

A protocol that works on the Application layer and is used to share files, serial ports, printers, and communications devices, including mail slots and named pipes, between computers. SMB is the protocol of choice for LAN file servers.

Each networked host fulfills a certain role.

A remote computer called a Web Server stores the files that make up a web site. The Web server uses server programs to shore and share the data. So the role of the Web server is to provide access to Web sites.

What is a riser card?

A riser card is a printed circuit board that picks up a multitude of signal lines via a single connector on a motherboard and distributes them via dedicated connectors on the card.

sector

A section of a hard drive

Accelerated Graphics Port (AGP)

A video only version of PCI with a direct connection to the Northbridge

A structured cabling system is useful for more than just computer networks. You will find structured cabling defining telephone networks and video conferencing setups, for example.

A single piece of cable that runs from a work area to a telecommunications room is called a RUN. In most networks, this cable is CAT or better UTP

RG-59

A type of coaxial cable characterized by a 75-ohm impedance and a 20 or 22 AWG core, usually made of braided copper. Less expensive but suffering greater attenuation than the more common RG-6 coax, RG-59 is used for relatively short connections.

Tom in installing a Windows 10 virtual machine onto a VMware Workstation. What does he need?

A valid Windows 10 installation media

The XEN hypervisor is an example of an open-source project

A virtual machine can only see resources allocated by the hypervisor

virtual switch

A virtual switch works the same as a physical switch but enables multiple switches to exist on the same host, saving the implementation of additional hardware.

A punchdown tool is used to wire twisted-pair cabling to a keystone jack. It secures UTP connections to a punchdown block. A cable tech uses a crimper or crimping tool to attach an RJ-45 to the end of a UTP cable. A cable tester is used to verify all the individual wires are properly connected and in the correct location.

A wide area network (WAN) is a widespread group of computers connected using a long distance technologies. You connect LANs into a WAN with a magical box called a ROUTER. Routers destroy any incoming broadcast frames, by design. No broadcast frame can ever go through a router.

1.8 inch., 2.5 inch and 3.5 inch represent common solid state form factors.

A(n) Full-Speed USB device transfers data at up to 12 Mbps on the universal serial bus.

Simon's system can't contact a DHCP server to obtain an IP address automatically, but he can still communicate with other systems on his subnet. What feature of Windows makes this possible?

APIPA

In a NAT network configuration, virtual machines have unique IP addresses but cannot be seen from outside of the host.

AN IPv4 address is represented as 4 octets in the dot and decimel format.

The exam assumes Classic view with Large Icons so switch from Category view to Classic View. In

APPLETS are a large number of programs. They populate the Control Panel. All versions of Windows have applets that enable you to control specific aspects of Windows such as the appearance, installed by applications, and system settings.

The more modern name for a Virtual Machine Manaager (VMM) is a HYPERVISOR

According to Popek and Goldberg, a VMM needs to exhibit three properties in order to be considered an efficient VMM Fidelity Isolation or Safety Performance

You've just installed a software update, rebooted, and now your system experiences random crashes. Which too in Windows 8.1 enables you to see various event messages and warnings that might give you a better sense of what is causing problems?

Action Center

The MBR checks the partition table to find the ________ or bootable partition.

Active partition

What do 64 bit processor's expand beyond what 32 processors have?

Address Bus

What account type can create other user accounts?

Administrator

If your applications crash repeatedly, it could be bad programming. It could also be a hardware or driver problem that causes the application to crash. You will need to check both software and hardware to find out why applications crash to desktop.

Advanced versions of Windows use Volume Shadow Copy Service, which enables OS to make backups of any files, even one that is in use. Windows also uses System Protection, which enables you to access previous versions of any data or file or folder.

Partitioning is the process of electronically subdividing the physical hard drive into smaller units called PARTITIONS. A hard drive must have at least one partition and you can create multiple partitions on a single hard drive if you wish. In Windows, each of these partitions is typically assigned a drive letter.

After partitioning a drive, you must format the drive. Formatting installs a file system onto the drive that organizes such partition in such a way that the operating system can store files and folders on the drive. Several types of file systems are used by Windows

When you first power on the PC, the power supply circuitry tests for proper voltage and then sends a signal down a special wire called the power good wire to awaken the CPU. The moment the power good wire wakes it up, the CPU sends a built-in memory address via its address bus. This address is the first line of the POST program on the system ROM which is how the system starts the POST.

After the POST finishes in older 16 bit BIOS systems, it passes control to the bootstrap loader function on the system BIOS. This program looks for an OS, checking the drives or other bootable devices to find the boot sector that identifies the location of the OS. When the BIOS finds a bootable or system disk or device that has a functional OS, it passes control to that disk or device.

CMOS setup program can be started in many different ways depending on the brand of BIOS. In a functioning system running Win8-8.1, you can access the setup from the Settings charm on the Charms bar. OR you can press DELETE when comp. boots is the most common way to access the CMOS setup program. The screen tells you how go to about it.

All CMOS setup programs have basically the same main options. This is true of both graphical and text-based setup programs. The screen tells you options and how to do. Other screens enable you to control such items as memory management, password and booting options, diagnostic and error handling and power management.

Mac OS and Linux do not use drive letters. Instead, the boot partition is defined as the rot drive, shown as just a slash: /. All other storage - partitions, optical drives, thumb drives, etc. must be mounted to enable the OS to treat them as folders. These folders are most often mounted to a single folder off the root drive called /mount in Linux and /Volumes in Mac OS.

All OSs use a hierarchical directory tree to organize the contents of these drives. All files are put into groups called directories or files. Any file not in a directory within the tree which is to say any file in the directory at the root of the directory tree is said to be the root directory.

EXAM TIP: observes mention that buggy drivers can cause WIndows to go into VGA mode, that is 640 X 480. This was certainly true in earlier versions of the OS but the current versions will go 800 X 600. Be prepared for VGA Mode to be the only correct-rish answer on an exam question.

Almost every computing device today uses a liquid crystal display (LCD) as the primary visual output component.

What is the difference between a virtual machine and an emulator?

An emulator converts commands to and from a host machine to an entirely different platform, whereas a VM creates an environment based on the host machine and does no converting.

Hypervisor

An extra layer of sophisticated programming to manage the vastly more complex interactions required for virtualization.

hypervisor

An extra layer of sophisticated programming to manage the vastly more complex interactions that enables a single computer to run multiple operating systems simultanenously

UNIX

An operating system originally conceived in 1969 by Ken Thompson and Dennis Ritchie of AT&T's Bell Labs. In 1974, the UNIX code was rewritten in the standard programming language C. Today there are various commercial versions of UNIX.

AFP (Apple Filing Protocol)

An outdated file access protocol used by early editions of the Mac operating system by Apple and is one protocol in the suite of AppleTalk networking protocols. Survives to this day as a way for Mac machines to share files with Mac new and old but lacks out of box support.

Virtualization occurs when a SINGLE COMPUTER running a specialized software creates environments within unique single files that REPLICATES other computers.

Another term for a virtual machine is GUEST

Enabling Hyperthreading with usually improve performance by about 30%

Best practice is to configure one vCPU9(s) for a new virtual machine

hardware or CMOS problem

Black screen with an "invalid boot disk" error message indicates what?

What is CMOS?

CMOS is a low energy chip that draws power from the battery while the computer is turned off.

Which Windows 8 feature did MS NOT include in Windows 10?

Charms bar

What user profile directory is displayed at a Windows Vista command prompt by default?

C:\Users\User name

The user, Mike, has downloaded files with his web browser. Where are they stored by default?

C:\\Users\Mike\Downloads

CARE AND FEEDING OF MOBILE DEVICES

CARE AND FEEDING OF MOBILE DEVICES

Which CAT level supports 10-Gbps networks at 100-meter segments and provides shielding for individual wire pairs reducing crosstalk and noise problems?

CAT 7

The New Virtual Machine Wizard of VMware Player allows you to install an operating system from:

CD/DVD drive ISO image on the file system

CHAPTER 20 ESSENTIALS OF NETWORK

CHAPTER 20 ESSENTIALS OF NETWORK

CHAPTER 21 LOCAL AREA NETWORKING

CHAPTER 21 LOCAL AREA NETWORKING

The following command clears the Command Prompt window screen in Windows?

CLS

The low-energy chip that holds configuration information and keeps track of data and time is called the __________ chip

CMOS

Andrew has a personal computer. One morning, he starts his computer and finds the following error message: CMOS checksum failure

CMOS battery failed Chip failed

Virtualized operating systems use the same security features as real operating systems.

COMPTIA: know that emulating another platform, using a PC to run Sony Playstation 4 games, for example, requires hardware several times more powerful than the platform being emulated.

Many virtual machine managers replace the CTRL-ALT-DELETE key sequence with _______________.

CTRL-ALT-INSERT

Divided into L1 and L2, the __________________ consists of a small amount of __________________ that serves as a holding area. This provides data to the CPU faster than getting it from regular memory or when RAM is unavailable because of refreshes.

Cache SRAM

A wireless network is experiencing intermittent connectivity. What would best resolve this issue?

Change broadcast channel

Mac OS and linux do not have any extension but have a property called executable

Changing the file extension does not change the data in the file

Chapter 21 Local Area Networking

Chapter 21 Local Area Networking

Move the cursor to the top or bottom right corner of the screen in Windows 8 to access one of the tools called a(n)

Charms Bar

Third thing to do -

Check security 1. Navigate to action center 2. Make sure firewall is running 3. Check that virus protection is running

Solon has a very buggy computer that keeps locking up at odd moments and rebooting spontaneously. He suspects the motherboard. How should he test it?

Check settings, verify good components, replace components and document all testing.

What key combo allows to stop the execution of the current command run in WIndows Command Prompt?

Crtrl-C

Inside every PSU resides a simple fuse. Do not check this fuse if the PSU starts not working right. Capacitors in most PSU carry high voltage charges that can hurt you. Failure to respect the electricity can result in an electrical fire.

Class A = Ordinary free burning combustible, such as wood or paper Class B = Flammable liquids, such as gasoline, solvents or paint Class C = Live electrical equipment Class D = combustible metals such as titanium or magnesium Class E = cooking oils, trans-fats or fats

What term refers a large number of networked, virtualized servers combined with a powerful front end.

Cloud computing

What commands can you type of the Run dialog box to access the command line interface in Win XP?

Cmd/command

which key do you holod down to select a group of random (non-contiguous) files?

Ctrl

bcdedit

Command-line tool to make changed to BCD stores. What is the command to access this tool?

The consolidation ratio is the measure of how servers are condensed as a result of virtualization.

Companies use virtualization do a lot except to reduce the amount of applications in corporate data centers.

Burn-in failure

Critical failure usually associated with manufacturing defects within the first 30 days

Virtualization was developed and used on computers during the 1960s.

Containment is when companies use virtualization to deploy all new applications as virtual machines

taskbar

Contains the Start button, the notification area, the Quick Launch toolbar, and buttons for running applications. Located by default at the bottom of the desktop.

Virtual methods and virtual switches can be used to transport both user data traffic and storage data traffic.

Converged Network Adapters reduce the number of NICs in a server and by consolidating traffic typews across larger bandwith

printed circuit board (PCB)

Copper etched onto a nonconductive material and then coated with some sort of epoxy for strength.

Most popular Corp email client is Microsoft Outlook

Corporate and ISP email configuration means setting up client software to match the settings of the server software. Next you must add the names of the Post Office Protocol version (POP3) or Internet Message Access Protocol version (IMAP) SEE THE PRINT OUT I DID

Fourth thing to do -

Create a Local Admin account for service and updates. This is the techs primary account. This should exist on every system that the tech will be fixing/updating. From this account, create accounts for users.

The Performance Information and Tools applet provides a relative feel for how your computer stacks up against other systems using the Windows Experience Index.

Current versions of Windows include a set of repair tools known as the WinRE

What memory type uses ground lines and is packaged on a 184-pin DIMM module?

DDR

Double Data Rate SDRAM (DDR SDRAM) is faster than regular SDRAM because it doubles the throughput. Desktop PCs use 184 pin DDR DIMMs whereas laptops use either 200 pin small outline DIMMs (SO-DIMM) or 172 pin micro DIMMs. DDR EAM modules have notches that differ from regular SDRAM, so DDR RAM only snaps into DDR slots on a motherboard.

DDR RAM is advertised one of two ways. One with DDR followed by the speed. For example, DDR400 for a stick of RAM that runs at 400 MHz. Because DDR RAM runs at twice the clock speed. DDR400 is meant for a 200 MHz frontside bus. DDR RAM is also advertised by "PC" followed by the throughput, for example PC3200. The number is determined by multiplying the speed by eight (as all DDR sticks are 64 bits or 8 bytes wide. Thus, DDR400 has a throughput of 3200 bytes per second (400 MHz x 8 bytes). DDR400 and PC3200 are equivalent.

Memory that makes two data exercises during each clock tick is called __________

DDR SDRAM

Dual Channel DDR improves upon DDR by using the DIMMs in pairs For systems to use dual-channel DDR, the motherboard and memory controller must support dual-channel DDR RAM, and the DDR DIMMs must be identical.

DDR2 is an improvement upon DDR. DDR2 runs faster than DDR and uses a 240 pin form factor that is not compatible with DDR. You need a motherboard with DDR2 slots to use DDR2 RAM. DDR2-400 is the same as PC2-3200 and is meant for a 200-MHz frontside bus.

DDR3 boasts higher speeds, more efficient architecture and around 30 percent lower power consumption than DDR2 RAM. DDR3 doubles the buffer of DDR2 from 4 bits to 8 bits, giving a huge boost in bandwidth over older RAM. Some chipsets that support DDR3 also support triple-channel for quad-channel memory, which works a lot like dual-channel but with three or four sticks of RAM instead of two.

DDR3L and DDR3U run on voltages lower than regular DDR3. This enables systems to use less electricity and produce less heat.

Lowest voltage version of DDR3 is

DDR3U (1.25v)

A user on a wireless network has the IP address 169.254.155.2 but cannot connect to the Internet. Which of the following should the user check on the wireless router? A. WPA B. DHCP C. WINS D. DNS

DHCP

In order to be able to connect to a website and display its contents, a URL entered in the web browser address bar needs to be translated into an IP address. Which of the servers listed below is used to handle this type of request?

DNS server

Some types of broadband access?

DSL, cable, fiber optic

A user is trying to setup a small home office (SOHO) wireless network and does not any neighbors to discover the network. What could you configure to accomplishy this?

Disable SSID Broadcast

nslookup command

Displays information about DNS names and their corresponding IP addresses, and it can be used to diagnose DNS servers. every modern OS makes nsloopup command available when you install TCP/IP.

Final thing to do -

Documentation keep CD keys, passwords, etc. for admin somewhere safe

C:\Users\Mike\Documents

Documents folder is for that user. Only Win7 uses My Documents and other others are called Documents

Larger networks that need more control use domains

Domains require a specific serverr to control access to the network's resources. This means tracking eafh user, each resource, and what each user can do to each resource.

Chain of custody is the record of tracking evidence from collection through presentation in court.

Download latest drivers online.

Tom notices after his system starts up that a critical service has not started, even though it is configured to do so. Given such a scenario, where should he book first to see why it failed?

Event viewer

The DNS and DHCP protocols and settings on a local machine - that access DNS and DHCP servers - are called client-side DHCP. The client-side part tells they're local rather than remote.

EXAM TIP: expects you to know about other TCP/IP protocols for accomplishing other goals.

The DNS and DHCP protocols and settings on a local machine - that access DNS and DHCP servers, are called Client-side DNS and client side DHCP. The client side part tells you they're local rather than remote.

EXAM TIP: expects you to know about other TCP/IP protocols for accomplishing other goals.

The most common type of patch panel today uses a special type of connector called a 110 block ro sometimes a 110 punchdown block. UTP cables connect to a 110 block using a PUNCHDOWN TOOL.

EXAM TIP: expects you to know that a cable tech uses a crimper or crimping tool to attach an RJ-45 to the end of a UTP cable.

EXAM TIP: big on acronyms with connector types. Some objectives refer to mini DIN used with S video as a miniDin6, Most techs refer to the port as an S video port.

EXAM TIP: refers to the DIrectX Diagnostics tool only by its Run Command, dxdiag.

If you want to share your resources on your PC with other network uses, you need to enable MS file and printer sharing.

EXAM TIP: will test yoiu on some of the LED meanings. Know that a solid green light means connectivity. A flashing green light means intermittent connectivity no green light means no connectivity flashing amber light means there are collisions on the network.

EXAM TIP: know and understand the refresh rate, resolution and native resolution of a monitor

EXAM TIP: you do not need to memorize all the video modes for the exam. Focus on XGA, SXGA, USGA and WUXGA. Also know the common aspect ratios on today's displays such as 16:9, 16:10 and 4:3

GUID is a globally unique identifier (GUID) provides a reference number for an object or process that has an almost impossibly small chance of duplication. The number is, therefore, unique to a specific object or process.

EXAM tests you on what these processes do to make the drive work and the steps needed to partition and format hard drives in Windows.

What refers to a Windows Command Prompt command used for uncompressing cabinet files?

EXPAND

The Man in the Box provides good insight into the workplace inside a CPU. The EDB gives you a good way to communicate with the Man in the Box so you can give him work to do. But to do this, he needs a worktable. In fact, he needs at least four worktables.

Each of these four worktables has 16 light bulbs. These light bulbs are not in pairs; they're just 16 light bulbs lined up straight across the table. Each light bulb is controlled by a single switch operated only by the Main in the Box. By creating on/off patterns like ones on the EDB, the Main in the Box can use these four sets of light bulbs to work math problems. In a real computer, these worktables are called REGISTERS and store internal commands and data.

The ROM BIOS includes programs that enable the CPU to talk to many basic hardware devices such as the keyboard, but other devices not supported by the ROM BIOS may have their own ROM chips.

Each piece of hardware in the computer needs programs for everything that piece of hardware performs. The CPU must access these programs to get the hardware to do its job. IBM devised other methods to get BIOS to the hardware of the computer. If the hardware is common and does not change, such as the keyboard, the system ROM chip stores the BIOS. If the hardware is common and necessary but may change from time to time (such as when you install a larger hard drive or add more RAM) the BIOS for the general type of device (ie hard drive) can be on the system ROM chip. The information describing specific features unique to that particular device, however, must be stored on a changeable storage medium such as a complementary metal-oxide semiconductor (CMOS) chip.

Edgar replaced the display on his laptop and now his wireless doesn't work. What is he doing wrong?

Edgar filed to reconnect the antenna in the new display

Many CMOS utilities and software programs monitor voltage

Electricity may be either direct current (DC), with electrons flowing in one direction around a continuous circuit or alternating current (AC), with electrons flowing back and forth in a circuit.

The subnet mask BLOCKS OUT (OR MASKS) the network portion of an IP address

Every computer on a single LAN must have the same NETWORK ID and a unique HOST ID

port triggering

Enables you to specify outgoing ports that your computer uses for special applications; their corresponding inbound ports open automatically when the sessions are established. Port triggering is a configuration option on a NAT-enabled router that controls communication between internal and external host machines in an IP network

Data is moved from one device to another to discrete chunks called FRAMES. NICs create and process frames.

Every NIC in the world has a built in identifier, an address unique to that network card, called a MAC. The MAC address is a binary number, meaning it is a string of 1s and 0s. Each 1 or 0 is called a BIT.

AGP was a special slot for video cards with a direct connection to the Northbridge. AGP is now replaced by PCIe.

Enhancements to the PCI bus paved the way for a few modern variations. PCI-X is 64 bits wide, backward compatible with PCI, and available in a variety of speeds up to 533 MHz. Mini-PC is designed for laptops with an emphasis on lower power consumption and a small, flat physical design.

Latency refers to the time lag between when the memory controller starts to fetch data from RAM and when RAM actually sends out the requested data. Another lag occurs when the memory controllers asks for the next line from RAM. RAM with a lower latency - such as CL6 - is faster than RAM with a higher latency - such as CL9 - because it responds more quickly. Check your motherboard documentation and get the lowest-latency RAM your system will support.

Error correct code (ECC) RAM improved upon parity RAM by being to fix single-bit errors on the fly. ECC RAM is always slower than non-ECC RAM due to the overhead of the correcting code. Only high-end motherboards and memory controllers can use ECC RAM.

Component failure appears as a flaky connection between a device and the motherboard or as intermittent problems. In the case of a component failure, replace the failed component with an expansion card or peripheral device. Sometimes a BIOS upgrade can fix component failures.

Etheral failure is the most difficult to diagnose. Symptoms vary from the PC rebooting itself to the BSoD and can be caused by a faulty component, buggy, device driver, buggy application software, OS corruption, or power supply problems.

Recognize modern expansion buses

Every device in the computer connects to the external data bus and the address bus. Expansion slots enable expansion cards to connect to the same buses. In older systems the expansion slots connect either to the Southbridge or to the Northbridge. It is the chipset that extends the address bus and data bus to the expansion slots. Current systems move most functions into the CPU, but the EXAM PEOPLE still refers to separate Northbridge and Southbridge chips.

MBR uses primary and extended partitions. Windows limits each MBR hard drive to a max of four partitions., with no more than one extended partition. Extended partitions do not receive drive letters, house logical drives which can also receive drive letters.

Every partition contains a partition boot sector in its first sector. During boot-up, a hard drive's MBR finds the active partition and uses the partition's boot sector to load the OS.

Internet Service

Every tier 1 and Tier 2 provider leases connections to the internet

EXAM POINT: TECH LAUNCH POINTS

Exam will test on how to access the three tool locations with specific steps. Check each windows version for its three tool locations

The kind of information the SNMP manager can get from managed devices varies a lot, because SNMP is an ___________ protocol, meaning it can be adapter accommodate different needs.

Extensible

Distended Capacitors

Failed capacitors on a motherboard, which tend to bulge out at the top. This was especially a problem during the mid-2000s, when capacitor manufacturers released huge batches of bad capacitors

General Purpose Registers: The 8088 was the first CPU to use the four AX-DX general purpose registers and they still exist in the latest CPUs but they have more lightbulbs! In 32 bit processors, the registers add an E for extended, so EAX, EBX and so on. 64 registers get an R for reasons unknown

External Data Bus Codebook Let's enable communications with the man in the box using the Data Bus Codebook In this codebook, for example, 10000111 means move the number 7 into the AX register. These commands are called the microprocessor's MACHINE LANGUAGE.

The COMPUTER tells you it is ready to receive commands by displaying a specific set of characters called a PROMPT

Extra text you type after a command to modify its operation is called a SWITCH

The Command-line interface tells you it is ready to receive commands by displaying a specific set of characters called a prompt

Extra text you type after a command to modify its operation is called a parameter or switch

FILE STRUCTURES AND PATHS

FILE STRUCTURES AND PATHS

What three things does a video editing workstation benefit from?

Fast, multicore CPU Lots of RAM Professional level GPU

side by side apps

Feature introduced in Windows 8 for quickly pinning an app to the left or right half of a screen

compatibility modes

Feature of Windows to enable software written for previous versions of Windows to operate in newer operating systems. WIndows handles compatibility using the aptly named Compatibility tab in every executable program's Properties dialog box.

Safe Mode

Feature that loads only very basic drivers to troubleshoot boot/driver problems

What is the first stage in a typical for stage CPU pipeline?

Fetch

You work as network architect for Tech Perfect Inc. You're designing a storage area network to connect hosts to storage devices. You want most of the data to be stored using hard disk drives. Which of the following types of interface should you use to connect host bus adapters to the hard disk drives?

Fiber Channel

Network technologies that use LASER light mode fiber optic cabling

HEXADECIMAL format is shorthand for representing strings of ones and zeroes.

Boot Configuration Data (BCD Store)

Files that contain info about the OS. A firmware-independent database for boot-time configuration data. It is used by Microsoft's new Windows Boot Manager and replaces the boot.ini that was used by NTLDR.

both clients and servers need NICs that define or label the machine on the network. A NIC breaks files into smaller data units to send across the network and reassumbles the units it receives into whole files. You also need some medium for delivering the data units between two or more devices - most often this is a wire that can carry electrical pulses, sometimes radio waves or other wireless methods.

Finally, a computer's OS has to be able to communicte with its own networking hardware with other machines on the network.

How many oclets in a Class C IP address are reserved for network ID?

First three

You can reprogram a(n) ___________ chip without removing the chip

Flash BIOS

ROM chips are read only. Cannot be changed.

Flash ROM is a type of ROM where you can update and change the contents through a specific process.

USB devices of any speed can connect to any USB port, though they will run at the speed of the slowest device. An USB 3.0 device connected to a USB 2.0 port will run at 480 Mbps.

Flash memory includes USB thumb drives and memory cards. USB thumb drives contain a standard USB connection and have replaced many other forms or removeable media as the way to transfer files.

motherboard

Flat piece of circuit board that resides inside your computer case and has a number of connectors on it. Every device in a PC connects directly or indirectly to the motherboard, including CPU, RAM, hard drives, optical drives, keyboard, mouse, and video cards.

Web browsers are highly configurable. You can set defaults of your choosing. Websites you access via the HTTP protocol on port 80. To make changes go to Options Control Panel applet or under the tool menu in browser

For IE, the General tab has the most basic features of Internet Explorer: the home page, tab management, your browsing history, searching and other appearance tools.

A HOST is a computer running multiple virtual machines

Ford logs into a site that continually selects and plays music for him based on how he has rated past selections. What is this type of service called? Software as a Service

IPS systems detect then attempt to defend against a threat

Forward proxy servers are connected in-line between the front-end router and the LAN and they do not require hosts to be configured.

How many GPS satellites must a GPS receiver be in contact with to calculate vertical position?

Four

If your screen is black or garbled, or Windows freezes after you install a video card driver, reboot into safe mode and roll back or delete the driver. Check Programs and Features in WIndows first, as many video card drivers show up there. If Safe mode doesn't fix the problem, you may have a bad video card that needs to be replaced.

Ghosting, streaking, or fuzzy images may mean a bad or improperly connected video cable or the video card may be the cause.

What components need to be considered when building a home?

HDMI output for high definition video and audio. Video card and both GPU and HD capabilities. Max RAM supported by the motherboard

A modern computer consists of three major components

Hardware OS Applications

Sam has installed a new CPU in a client's computer, but nothing happens when he pushes the power button on the case. The LED on the motherboard is lit up, so he knows the system has power. What could the problem be?

He forgot to apply thermal paste between the CPU and the heat-sink fan assembly.

Bobby complains his laptop has a dim display. What could be the problem?

He is in power saving mode which can be changed in power management

Alex discovered a bunch of SATA drives in a box at the office and needs to check the contents. What can he do so that Windows automatically recognizes each new drive?

He needs to enable AHCI in CMOS setup.

Silas has an AMD-based motherboard with two sticks of DDR2 RAM installed in two of the three RAM slots, for a total of 2 GB of system memory. When he runs CPU-Z to test the system, he notices that the software claims he's running single-channel memory. What could be the problem?

He needs to move one of the install disks to a different slot to activate dual=channel memory.

Arthur installed a new motherboard in his case and connected the ATX power, but his system would not turn on. He sees an extra 4-wire port on the motherboard. What's he missing?

He needs to plug in the P4 connector to power the processor

To create a new folder, right click on the desktop, select New, and select folder

Hold down the SHIFT key to select a group of files that are together

EXAM TIP: the Single-log on is the big selling point.

Homegroups share libraries, not folders, by default.

Which feature enabled a single-core CPU to function like two CPUs.

Hyper-Threading

A type of network protocol used for exchanging information concerning the state of the IP network (e.g. testing the reachability of a remote host) is known as:

ICMP

What IEEE standard is for Fast Ethernet

IEEE 802.3U

IMPLEMENTING HARD DRIVES

IMPLEMENTING HARD DRIVES

EXAM TIP: Understand the basic differences between subnet masking and CIDR notation principles

IP Address: Your computer's unique address on the network Subnet mask: identifies your network ID Default gateway: IP address on the LAN side of your router DNS server: Tracks easy to remember DNS names for IP address

When you are configuring a computer to connect to a network, you must enter the

IP address subnet mask gateway and at least one DNS server

IPConfig/ifconfig

IP config is to look at networking settings Ipconfig/all the ifconfig command in MAC OS X and linux provides the same thing

IPv6 Address Notation

IPv4 addresses are written something like this: 192.168.1.1, using four octets. They are 32 bit. IPv6 addresses are written something like this: 2001:0000:0000:3210:0800:200C:00CF:1234 IPv6 uses a colon instead of a period and it is a 128 bit address. A-F and 0-9 can go in an address. This writing these addresses may seem like a long process but there are ways to shorten them. First, leading zeros can be dropped out from any group, so 00CF becomes CF and 0000 becomes 0. Now let's rewrite the previous IPv6 address using this shortening method. 2001:0:0:321:800:200C:CF:1234 You can remove any number of consecutive groups of zeros to leave a double colon, but you can only use this trick once in an IPv6 address. For example: FEDC:0000:0000:0000:00CF:0000:BA98:1234 can be written as FEDC::CF:0:BA98:1234 IPv6's loop back address is ::1, without the double-colon nomenclature, this IPv6 address would look like: 0000:0000:0000:0000:0000:0000:0000:0001 IPv6 still uses numbers, but you won't find a place to type in 255s anywhere. IPv6 uses the "/x" CIDR nomenclature, where the /x refers to the number of bits in the subnet mask, just like IPv4. FEDC::CF:0:BA98 /64 An address has eight groups of four hexadecimal character

Which unique address is a 128-bit address written in hexadecimal?

IPv6

IPv4 addresses use 32 bits

IPv6 addresses use 128 bits.

DropBox is considered a Web application

IaaS = Infrastructure as a Service

Directory Service Restore Mode is designed for use with Active Directory domain controllers. Debugging Mode sends a debug of the kernel to a second computer. Both of these tools are used only in very specific circumstances.

If a DLL does not load properly and you get that message. the tool you need is the System File Checker which will replace any corrupt

The sticks of RAM snapped into your motherboard are DRAM. Think of DRAM as a spreadsheet in which each cell holds one or a zero. Each cell represents a single bit. The number of columns and rows is finite.

If a chip contains 1,048,576 rows and 8 columns, it can be described as a 1Mx8 chip. A chip containing 2,097,152 rows and 16 columns can be described as a 2MX16 chip.

Never never should a PC tech work inside the power supply. The power supply has capacitors that hold electrical charges that may harm the tech.

If a computer will not tart and the fan in the power supply will not turn, check the power coming into the power supply.

Red and white round connectors, called composite connectors are used for analog video.

If asked to build a CAD workstation, the CPU and video card would be the most important components.

To change which programs and services start with Win8-10 you would use the Task Manager

If installing a new driver causes problems in your system, Device Manager enables you to roll back the driver to a previously installed version.

When you want to be positive that the data moving between two systems gets there in good order, use a CONNECTION-ORIENTED APPLICATION

If not a big deal for data to miss a bit or two, the use CONNECTIONLESS

In what condition does the BIO need to be updated?

If the BIOS does not support new devices. If users have to use new hardware features or options supported by the motherboard, but not supported by the computer BIOS.

If you suspect you have bad RAM, and you don't have a hardware RAM-testing device, swap one of the sticks in your system, with a known good stick. If the system works, you have found the bad stick.

If the system still has errors, replace the stick you removed and swap a different stick for the known good stick. Another options is to use a software RAM tester such as the Windows Memory Diagnostic tool or MemTest86.

HKEY_CURRENT_CONFIG

If the values in HKEY_LOCAL_MACHINE have more than one option, this root key defines which is currently used.

Every computer on the network must have an IP ADDRESS.

If two computers have the same IP address, they won't be able to talk to each other, and other computers won't know where to send the data. This is called an IP CONFLICT.

Programs that didn't install right could have faced an OS prevents them from installing most notably the lack of some other programs that the application needs so it can operate. If you can get error while trying to uninstall a program. If you get an error while trying to uninstall a program, log back on as an administrator and try again.

If you get an error about a missing DLL file, use the internet to search for the missing file and find the proper solution.

Device drivers can trip up MAC OS and Linux systems too, causing their own form of BSoD called a KERNEL PANIC

If you get errors like "Registry File Failure" or Windows could not start" try restoring a good copy of the Registry. You can do this using the Last Known Good Configuration from Advanced Options. Get into this, restart computer, hit F8 after POST messages. From here you can start in Safe mode and go into Last Known Config.

If you want to share files and printers over your home network, you can set up an Home Server PC

If you have a new hard drive with nothing on it, you will likely choose to do a Clean Installation

Static Random Access Memory (SRAM) is used for cache memory and does not need to be refreshed to retain information.

If you have two sticks of memory installed that run at different speeds,the faster module will slow down to run at the same speed as the slower module

VMware ESVi is NOT a server operator system

If you only had a physical DVD of the Red Hat Linux Installation media, you would choose USE PHYSICAL DRIVE as the connection type for the CD/DVD device in order to boot from the DVD when the virtual machine was powered.

When you share over a network, every OS uses specific network sharing permissions to allow or restrict access to shared resources.These permissions have nothing to do with file or folder level permissions like in Windows.

If you share a folder on an NTFS drive, as you do these days, yuou must set both network permissions to let other access your shared resources.

A Patch is a fix for a single problem with the OIf you wS, while a Service Pack is a combination of fixes.

If you want to only one OS and keep the applications and configuration of the current system, you should choose to do an Upgrade Installation of the new OS.

One of the primary reasons for poor performance in a virtual environment is due to lack of adequate storage IO throughput.

In a bridged network configuration, virtual machines have IP addresses that are unique to the network and can be seen from outside of the host.

where a riser card most likely to be installed?

In a compact case where available space is an issue

Visualize the CPU as a man in a box. He is a clever guy and can perform virtually any mathematical function, manipulate data and give answers very quickly. He lives closed up in a tiny box and before he can work with us, we must come up with a way to exchange information with him.

Imagine we install a set of 16 light bulbs, 8 inside his box and 8 outside of his box. Each of the 8 light bulbs inside the box connects to one of the 8 bulbs outside the box to form a pair. Each pair of bulbs is always either one or off. You control the 8 pair of bulbs by using a set of 8 switches outside the box. The man in the box can also control them by using an identical set of 8 switches inside the box. This light bulb communication device is called THE EXTERNAL DATA BUS (EDB)

A full clone requires the same amount of disk space that the original virtual machine consumes.

In A VMware environment, a .vmdk file represents a virtual machine's virtual desk

In Windows, you use the Programs and Features applet to uninstall, change or repair programs

In MAC OX, you access updates through the App Store pane in System Preferences

You access the command line in Mac OS X and Ubuntu Linux by running the Terminal program. Its location varies depending on the OS. You will find the Terminal in OS X in the Utilities folder of the Applications folder. Linux distros other than Ubuntu may have different emulators such as console and gnome terminal

In Mac OS X and Linux, the SU and SUDO commands enable you to run the command line with advanced privileges called super user or root privileges

A service pack is a large bundle of updates plus anything else MS might choose to add. Service packs are invariably large (hundreds of megs) are are often packaged with Wins.

In WIn8-10 MS ditched service packs and only uses updates to indicate changes. Big updates get a revision number like Win 8 to Win 8.1

All files are stored on the hard drive in binary format but every program has a unique method of binary organization called a file format. One program cannot read another's program files unless it can convert the other program's file format into its file format.

In Windows, OS assigns a drive letter to each hard drive partition (or volume) and to each mass storage device. Hard drives start with the letter C: and can continue to Z: if necessary. Optical drives usually get the next available drive letter after the last hard drive.

Linux is considered to be an open-source operating system

In a Linux virtual machine, the VMware Tools must be installed as a root user.

Many devices come with device driver files on installation discs. These drivers must be loaded for the PC to recognize and use the devices.

In a database called The Registry, windows keeps a list of what drivers should be loaded. Don't edit the registry unless you know what you are doing. Uninstall programs via Device Manager.

Virtual machines can be configured with multiple processors and multiple cores per processor just like a physical machine

In a mixed environment, the instruction sets of the different microprocessors are not identical, so you cannot live-migrate the virtual machines from an AMD host to an Intel host, or vice versa. In order to move a virtual machine from an AMD host to an Intel host, or the reverse, you need to shut down that virtual machine, and then you can restart it on the second host with the different chipset.

taskbar

In later versions of Windows operating systems, a feature that displays open and favorite applications for easy access.

The smallest unit of a digital image represented on the digital device is known as a pixel

In order to ensure the sharpest text and image displayed by a LCD monitor it is usually recommended to set the monitor to run only at a specific resolution (which is also referred to as the LCD's native resolution)

Internet Tiers

In order to keep organized, the internet is broken down into groups called tiers.

What kind of service lets you post a blog or report UFO sightings without having to be an administrator?

Infrastructure as a Service

When your computer boots and you press the appropriate key to enter the CMOS setup utility, a small program loads, allowing you to specify settings for various hardware devices. Where is this program permanently stored?

In the ROM

USB devices of any speed can connect to any USB port, though they will run at the speed of the slowest device. A USB 3.0 device connected to a USB 2.0 port will run at 480 Mbps

In theory, the USB interface can support up to 127 devices on a single USB port; in reality too many devices on a single USB chain will overtax its power capabilities. USB specs allow for max cable length of 5 meters although you may add a powered USB hub every 5 meters to extend this distance.

exam WILL ask you how to use md, mkdir, rd, rmdir, rm and cd

In working with Directories, do this exercise

During the clean installation process you will have the opportunity to partition and format the primary hard drive. You will choose a user name and password and activate the OS.

Installing windows over a network requires you to boot to the Preboot Execution Environment (PXE) which you might need to enable in your system setup.

What feature of a central processing unit would provide an alternative to installing a dedicated video card?

Integrated graphics processing unit (GPUI)

What type of processor does the LGA 1366 (Socket B) socket type accommodate?

Intel Core i7 processor.

This is the term for describing when every VM running on a hypervisor act as though it is connected to its own switch. This is useful for connecting VMs without internet access.

Internal Networking

ICMP

Internet Control Message Protocol. Used for diagnostics such as ping. Many DoS attacks use ICMP. It is common to block ICMP at firewalls and routers. If ping fails, but other connectivity to a server succeeds, it indicates that ICMP is blocked.

What is true about a double-sided DIMM?

It has memory chips on the front and back.

What does it mean if a processor is describe as dual-core?

It is a single chip that contains two different central processing unit (CPU) cores that each process instructions simultaneously.

There are not really light bulbs and switches on the CPU - you will see little wires sticking out of the many CPUs. If you apply voltage to one of these wires you, in essence, flip the switch. So if that if a tiny bulb were attached to the wire, that bulb would glow. If the wire had no power, the bulb would not glow. That is why the switch and light bulb analogy may help you picture these little wires being constantly flashing on and off.

It's a hassle to keep saying on-off-on-on-off when talking about which wires have voltage. Rather than saying one of the EDB wires is on or off, use the number 1 to rep on and the number 0 to rep off. That way, instead of describing the state of the lights as on-off-on-off-on-on-off-off I can instead describe them by writing 10101100 In computers wires repeatedly turn on and off. Using the 1 and 0 is the BINARY SYSTEM to describe the state of these wires at any given moment.

What are some fiber connector types?

LC MT-RJ ST

What display types are commonly find on a portable PC today?

LCD and LED

Most common TFT displays use a technology called twisted nematic (TN). Better TFT displays viewing angle and far better color re-creation than TN panels can provide.

LCD monitor brightness is determined by its backlights and is measured in nits. An average LCD measures around 300 nits, with higher numbers being brighter and better.

Projectors come in two main varieties: rearview and font view. Rearview projectors shoot an image onto the screen from the back and are almost always self enclosed. They are a popular choice for televisions but not for PCs. Front view projectors shoot an image from the front and are widely used during computer presentations.

LCD projectors, like LCD monitors, have a native resolution and are lightweight. DLP Projectors offer slightly less crisp display than LCD but better contrast with pure blacks possible. DLP are projectors are lighter than LCD projectors but they also use more electricity.

What type of display directly illuminates pixels from behind and floods the panel with light from the edges of the bezel

LED

A Pentium D processor can be installed on which of the following sockets or slot types?

LGA 775

Mac OS because the first commercially available OS to incorporate operating system to incorporate a graphical user interface

LINUX is an open source OS designed to use on personal computers and as a network operating system

To add a tile to a group, left click it and drag into that group

LIVE TILE displays up to date information inside the tile

Which of the following is not a PSU form factor?

LPX12V

NCI TEAMING groups network adapters together for higher throughput and availability if one adapter in the group fails

Live Migration is a large component of increased availability in a virtual deployment.

What is an advantage that TN displays have over IPS displays?

Lower power and cost

What is the unit of measurement for visible light being emitted froma light source?

Lumen

What unit is used for measuring the brightness of an image rendered by an image projector?

Lumen

MBR drives has a maximum partition size of 2.2TB

MBR drive cannot span partitions across multiple drives

Webcam transmits digital images across the internet for video communication

MIDI (musical instrument digital interface), unlike recorded sounds, uses specialized text files that tell the sound card which sounds to play.

mary wants to create a custom tool for maintaining her Windows clients. What tool enables you do do this?

MMC

MOTHERBOARDS

MOTHERBOARDS

The Weather app appears as a LIVE tile on the Win8 start screen

MS Windows 8 account settings are stored in the CLOUD so Windows displays the same on any Win8 compouter

Win8/8.1

MS made significant changes to the Win interface with the introduction of Win8. Created a graphical set of TILES for full screen programs called APPS. PINNED APPS are the default programs and programs selected by the user and not all the applications installed on the computer.

C:\Users\Mike\Downloads

MS preferred download folder for applications to use. Most applications use this folder but some do not.

You must know what type of RAM (such as DDR, DDR3 or DDR4) your motherboard accepts before you before you purchase a RAM upgrade. You also need to know the max amount of RAM your motherboard supports and he max per slot.

MS recommends a min system requirement of 1 GB of RAM for 32 bit versions of Windows and 2GB of RAM for 64 bit versions. This applies to Vista-10

WinPE powers WinRE. Don't get conufsed.

MS refers to the WinRE as the System Recovery Options menu.

Win updates checks your system, grabs the updates and patches your system automatically.

MS updates generically called Patches. The process of keeping software updates in a safe and timely fashion is known as patch management. Updates in Vista and 7

What command opens the System Information Tool?

MSINFO32

spaces

Mac OS X feature enabling multiple desktops

Utilities

Mac OS X folder that contains tools for performing services on a Mac beyond what's included in System Preferences, including Activity Monitor and Terminal.

System Preferences

Mac OS X tool containing many administrative functions

Force Quit

Mac tool for application problems, accessed by pressing option + command + esc to access it

PPTP (Point-to-Point Tunneling Protocol) VPs

Makes IP addresses MS got the ball rolling with point to point tunneling protocol (PPTP), and advanced version of PPP that handles all of this right out of the box. The only trick is the end points. In MS view, a VPN is intended for individual clients (employees on the road) to connect back to the office network so MS places the PPTP endpoints on the client and a special remote access server program called Routing and Remote Access Service (RRAS) available on Service version of WIndows. When your computer connects to the RRAS server on the private network, PPTP creates a secure tunnel through the internet back to the private LAN. Your client takes on an IP address of that network, as if your computer were plugged into the LAN back at the office.

Instead of using a FAT, NTFS uses a _________ with a backup copy placed in the middle of the disk for better security.

Master file table (MFT)

Most CPUs in modern PCs are manuf by Intel or AMD. Both companies use code names to differentiate among different models within a CPU family name. That way techs can tell the difference between, for example, a Sandy Bridge-based Core i7 and Haswell Corei7. Both companies offer low power mobile versions of their desktop CPU architectures.

Modern CPUs are a lot more efficient. 8 architectural changes define modern CPUs. All are clock multipliers, running at some multiple of the system bus speed. Most current CPUs support 64 bit processing and can handle much more RAM than the 4GB that the 32 bit processors supported.

Swap partitions are used by Linux and BSD system for virtual memory and function much the same as Windows page files.

Most operating systems enable you to create partitions during the installation process. To create partitions at other times, you use a dedicated partitioning tool. Older versions of Windows shipped with the command-line program FDISK for this purpose. Windows now ships with a graphical tool called Disk Management to manage partitions, covert basic disks to dynamic disks, and managing volumes. Linux uses several partitioning tools, such as FDISK (same name, but different from the Windows version) and Gparted.

Windows has a number of important folders that help organize programs and documents. They sit in the ROOT DIRECTORY - where the OS is installed - and they have variations depending on the version of Windows being used.

Most people access files and folders in Windows via WINDOWS EXPLORER in WinVista/7 and FILE EXPLORER in Win8-10. The name of the Window that opens when you run Win Explorer or File Explorer reflects the current focus of the exploration. The tool, regardless of the title of where you go, is File Explorer

Both containment and consolidation strategies reduce the number of physical servers in a data center

Most virtual servers are often configured with less memory and processor resources

In addition to the BIOS routines and the CMOS setup program, the system ROM also includes a special program called the power-on self test (POST) that is executed every time the computer boots. POST first sends a command to basic devices, up and including video, instructing them to run self diagnostics. If a device detects an error, the computer always alerts you with a series of beeps.

Motherboard documentation will tell you what beep codes from your specific computer mean.

Every piece of hardware connects either directly or indirectly to the motherboard. Wires called TRACES make up the buses on the system, enabling hardware to communicate. Motherboards are several layers thick with traces running across each layer, creating a veritable highway of wires.

Motherboards are defined by their form factor, chipset and components. The form factor defines the physical size and airflow; the chipset definds the type of CPU, the type and amount of RAM, and the components a motherboard will support.

Current systems use 32 or 64 bit Unified Extensible Firmware Interface (UEFI) rather than the older 16 bit BIOS as the system firmware. UEFI offers several advantages over traditional BIOS, including support for large-capacity storage drives, 32 or 64 bit booting and no dependence on x86 firmware. Additionally, UEFI takes over the boot process, enabling direct loading of OS boot loaders.

Motherboards include a changeable chip, capable of storing about 64 KB of data, called the complementary metal oxide semiconductor (CMOS) chip. CMOS does not store programs. It stores the data that is read by BIOS, and that data is used by the programs residing in BIOS.

What does it mean to mount a disk?

Mounting a hard disk makes it accessible by the computer. This is a software process that enables the operating system to read and write data to the disk. Most disks are automatically mounted by the operating system when they are connected. While disk images are not physical disks, they must also be mounted in order for the computer to recognize them. Disk images may be mounted by either the operating system or a disk utility program, such as Nero for Windows or Apple Disk Utility for the Mac. Once the disk image has been mounted, its contents will appear as a physical disk in the computer. However, unlike a physical disk, most disk images are read-only, meaning new data cannot be written to the disk. Unmounting a disk is, not surprisingly, the opposite of mounting a disk. It takes a mounted disk and makes it inaccessible by the computer. External storage devices should typically be unmounted before being disconnected to avoid corrupting files. Disk images can also be unmounted, which may free up some RAM used by the system to mount the image. To unmount a disk image in Windows, open "My Computer," select the disk image, and click "Eject this disk." In Mac OS X, select the disk image on the desktop and drag the disk image to the trash, which will change to an Eject icon.

UTP is very popular, but Ethernet can use alterative cabling such as fiber optic cable and coaxial cable. Most fiber Ethernet networks use 62.5/125 multimode fiber optic cable with light emitting diodes (LED) to send light signals.

Multimode fiber transmits multiple light signals at the same time over shorter distances than single mode fiber optic cables that use laser light for phenomenally high transfer rates over long distances. Fiber optic cables use a variety of connectors, such as ST, SC and LC.

When single organization owns a cloud network, that is closed to outside use, we call it a private cloud. Private clouds require much space, money and expertise to build and maintain but can provide greater security and customaization.

Multiple organizations - usually with shared goals - can create a community cloud that is shared among the organizations. This community cloud can be tailored to the group's special needs and lets them share the burden of meeting those needs.

What command line utility is designed to be of help in troubleshooting NetBIOS name resolution problems

NBTSTAT

What Win command line can be used to display a list of domains, computers or shared resources available on a specific computer?

NET VIEW

A windows command line command for managing Active Directory domains is called

NETDOM

What serves an interface between the device and the network?

NIC

Used without any parameters, the HELP command in Windows displays a list of system commands with a brief description of each command.

NSLOOKUP is a network admin command line tool that can be used for DNS queries

What is the default file system in Windows?

NTFS

What type of permissions can be applied to individual files?

NTFS

The protocol that helps multiple servers keep their system time synchronized is

NTP

FAT32 was introduced with Win95 OS2 which uses 32 bits to describe each cluser, supports up to 2 TB. FAT32 creatres smaller clusters and therefor stores files more efficiently than FAT16.

NTS offers major improvements over FAT, including redundancy, security, compression, encryption, disk quotas and cluster sizing. A backup copy of the most critical parts of the MFT is stored in the middle of the disk, where it has less likely to become damaged.

Component Failure

Occurs when a system device fails due to a manufacturing or some other type of defect such as ESD on mogtherboard.

Managed Network

Network that is monitored by the SNMP protocol consisting of SNMP managed devices, management information base (MIB) items, and SNMP manager(s).

Managed devices

Networking devices, such as routers and advanced switches, that must be configured to use.

Wireless Networks

Networks that transmit signals through the atmosphere via infrared or radiofrequency (RF) waves are known as ____.

On modern versions of Windows, the best file system to choose is _______ .

New Technology File System (NTFS)

You have just taken over network support for a small company. They are currently using MAC filtering to secure their wireless network. Is this adequate or not and why or why not?

No, you should have WEP or WPA encryption as well.

Is Android an example of a network OS?

No.

In class systems, which chip does the CPU use to communicate with high-speed devices such video cards or RAM?

Northbridge

What is an example of a problem with virtualization?

Not enough hardware not enough disk space

Exam objectives focuses specifically on motherboards you find in classical Windows and Linux based desktop PCs. This style of motherboard enables techs to do things such as update components.

Note that every personal computing device has a main circuit board to which connects CPU, RAM, storage and more. Some device makers call this PCB a motherboard. Others, like Apple, call it a logic board. Regardless of the title, the primary function is the same - it is the foundational component of the computer.

what is the acronym that refers to a new type of thin and lightweight display devices offering higher contrast ratio and color quality in comparison to LCD without the need for a special light source to produce a visible image?

OLED

Purpose of OS

OS translates between user applications

Free software

OSS - open source software

NFS, fibre channel, and iSCSI are all examples of STORAGE connection types.

OVF OPEN VIRTUALIZATION FORMAT is a standard that provides a platform and vendor-neutral format to bundle and deploy virtual machines

What are link lights?

On computer ethernet ports there are usually two leds (on some machines there are no leds) One represents the connection state (fixed light) and the other represents activity. Connection state goes on when an active device is sensed at the other end of the cable (usually a switch). Usually the connection state is green or yellow/orange where green means higher speed and yellow/orange means lower speed. (Available speeds are 10/100/1000 megabits/sec). Speed is negotiated at connection, then is fixed. The activity led is usually green and blinks when data is sensed thru the port (either inbound or outbound). On cheap switches there is usually a single green led per port indicating connection, which blinks when data is seen passing. Advanced switches can have different meanings for lights depending on user action or configuration.

Output

Once computer has processed your request, it shows you the result by changing what you see on the display or playing a sound through the speakers. This is output.

To replace a motherboard, first remove all of the expansion cards from the old motherboard. Unscrew the motherboard and remove it from the case.

Once you install a new motherboard, boot the system and make sure there are not POST errors and the BIOS information appears on the screen. Then install any expansion cards.

Trivial File Transfer Protocol (TFTP)

Port 69

WinVista 7

Other visible items include: The open applications demonstrate TRANSPARENCY where the edges of the applications show blurred background images. This feature is called AERO or AERO GLASS. Click on the START BUTTON to get access to applications, tools, files and folders. The PINNED PROGRAMS enable you to launch a program with a single left-click. The TASKBAR shows the running programs The NOTIFICATION AREA shows programs running in the background. TECHS called this the SYSTEM TRAY

The combination of a specific resolution and color depth is referred to as a MODE. The VGA mode is defined by a resolution fo 640 x 480 and 4 bit color depth (16 colors). Modern video cards and monitors are capable of supporting many modes.

PCI Express video cards currently dominate the market for all systems. PCIe was a natural fit for video because it is incredibly fast. PCIe video cards use the PCIe X 16 connector.

Expansion buses run at a standardized speed, depending on the type of expansion bus. This speed, which is much slower than the frontside bus, is dictated by the expansion bus crystal. The chipset uses wait states and buffers to compensate for the difference in speed between the expansion and frontside buses.

PCI is 32 bits, runs at 33 MHz and is self configuring no more manual configuration of expansion card jumpers). Additionally, it coexists with other expansion buses.

ExpressCards connect to which buses?

PCIe and USB

WinPE can assist unattended installations, network installations, and even booting diskless workstations on a network.

PERFORMANCE INFORMATION AND TOOLS applet doesn't fix anything. It just provides a relative feel for how your computer stacks up against other systems using the Windows Experience Index. Windows bases this on five components: - Processor: Calculations per second - Memory (RAM): memory operations per second - graphics : desktop performance for Windows Aero - gaming graphics - 3D business and gaming graphics performance - primary hard disk: data transfer rate Each component generates a subscore.

If the computer appears dead, with no beeps or screen responses, you can insert a(n) ________ in an expansion slot to diagnose what is wrong.

POST card

NTP is a network protocol for synchronizing clocks over a computer network

PPP is a protocol used for establishing a dedicated point to point link between two networked devices.

What type of service only provides the physical servers?

PaaS

What is the most popular for displaying movies but weighs more and uses more electricity.

Plasma

After the unforeseen failure of her Bigfoot-picture-sharing service, bgFootr—which got hacked when she failed to stay on top of her security updates—Janelle has a great new idea for a new service to report Loch Ness Monster sightings. What service would help keep her from having to play system administrator? A. Software as a Service B. Infrastructure as a Service C. Platform as a Service D. Network as a Service

Platform as a Service

Virtual servers and virtual network components can be created in the cloud using Infrastructure as a Service (IaaS) providers, often at rates measured in pennies for hour.

Platform as a Service (PaaS) providers combine the infrastructure needed to runa modern Web application with simple administrative controls. PaaS trades some of the flexibility of IaaS in order to drastically cut the time and knowledge needed to build and run a Web application.

What most typically enables you to upgrade a flash ROM chip?

Plug in a USB drive containing a new BIOS file and run the updating utility in CMOS

SNMP (Simple Network Management Protocol)

Port 161, 162

SSH

Port 22

SSH File Transfer Protocol (SFTP)

Port 22

Secure Copy (SCP)

Port 22

Telnet

Port 23

Mail SMTP

Port 25

You're configuring a router for a small marketing company. Some employees of the company frequently make connections with laptops of sales personnel who are outside the network. You want the return connection from outside the network to be automatically routed to the internal computer that initiated the connection. What would allow you to do this?

Port triggering

which type of user group providers backward compatibility with Windows XP?

Power Users

The host controller includes a root hub that provides the physical connection for devices. Host controllers support many ports, but the number of USB ports a system has is usually dependent on what the motherboard manuf. decided to supply. The host controller is shared by every device plugged into it so speed and power are reduced with each new device.

Powered USB devices require their own power cord in which they do not pull power from the USB bus itself. Bus-powered devices draw their power directly from the USB bus and do not require a separate power cord. Too many bus-powered devices may result in system lockups, device lockups, or devices that just do not work. To solve the power problem, unplugging a device or two will lower the demand for bus power. You can also purchase and install a USB expansion card which will provide another USB host controller with its own set of connection ports.

Mac OS X system interface offers similar functions to those found on windows. The background of the main screen is called the DESKTOP. You can access frequenly used applications by clicking on their icons on the DOCK. You can add/remove apps from the Dock with a right click.

Pressing the MIssion Control button on Apple keyboard brings up a utility called MISSION CONTROL that enables you to switch between open apps, windows and more. MS OS X supports SPACES, essentially multiple Desktops that can have different backgrounds and programs, but keep the same dock. You can optimize your workflow.

A business can build this type of cloud to have flexibility and complete ownership of its data.

Private Cloud

This term describes software, platforms, and infrastructure delivered through networks that the general public can use?

Private Cloud

When using a domain, you don't log onto your computer. Instead you log directly to the domain. All user accounts are stored on the domain controller.

Problem with workgroups is that they provide almost no security and require lots of signing on to access resources. Domains provide single sign on and lots of security buyt require special servers and lots of adminstration. To access this, (Starting with Win7) called HomeGroup.

SNMP's version of a server. See Simple Network Management Protocol (SNMP). Specialized type of command and control packet found in SNMP management systems and others.

Protocol Date Unit (PDU)

Which network card property allows NICs to prioritize and manage data traffic to fully support the networking needs for all devices connected?

QoS

what network card property allows NICs to prioritize and manage data traffic to fully support he networking needs for all devices connected?

QofS

Martha works as a network administrator for uCertify Inc. The company's database is heavily read oriented. She is trying to select the best method for handling situation of a hard drive crashing, which should also a cost effective option that can provide both performance and redundancy. Which of the following RAID levels should Martha use?

RAID 5

A Microsoft-proprietary protocol providing a user with a graphical interface for connecting to another computer over a network is known as:

RDP

What Windows utility uses points in time that allow you to return your system to a previous date and state.

REFRESH YOUR PC if your computer is not performing as well as it once did. This way, you can reset your system without deleting any personal files or changing any settings.

what command allows for editing WIndows registry from the Command Prompt?

REG

REGISTERS

REGISTERS

A command line utility in MS windows OS for registering and unregistering DLLs and ActiveX controls in the Windows registry is called

REGSVR32

to MOVE a single file within the same device, select the file and drat it to the appropriate folder

RENAME is the command on the shortcut menu to change the name of a selected folder

x86 processor architecture provides four different levels of command execution to provide security. These levels are often referred to as ____________.

RINGS

PPTP network protocol allows for creating encrypted links over unsecure public networks such as the Internet and sending regular traffic through those secure links.

RIP is a routing protocol

You work as network admin for Dreams Unlimited Inc. The company has a TCP/IP based network. You are configuring a cable moderm on the network to connect to the internet. What types of connectors can be supported by the cable modem?

RJ-45 F-type

RAM speed must match or exceed that of the system. For example, DDR-400 runs at 200 MHz (the double data rate speeds it up to DDR-400 instead of DDR-200), so that the motherboard must run at 200 MHz, too.

Rambus DRAM (RDRAM) was created by Rambus, Inc. and came in sticks called RIMMs. Now obsolete

As a member of the accounting group, John has Write permission to the Database folder; as a member of the technicians group, John has Read permission to the Database folder. What permission or permissions does John have to the Database folder?

Read and write

While physical floppy disks had a write-protect tab to guard against accidental data alteration or erasure, to achieve the same effect for a virtual floppy disk the ____________ option would need to be selected.

Read only

bootcfg

Recovery console command used to rebuild a missing or corrupt boot.ini file (/rebuild), a hidden file that is use to identify in what folder, on which partition, and on which hard drive Windows is located.

This term describes how often a screen can change or update completely.

Refresh rate

On Win8 computer, the default settings is to input a password to log into your MS account after your computer has completely booted up.

Refresh your PC is a new utility program in Win8 that attempts to diagnose and fix errors in your Win system files

RJ

Registered Jack A type of modular jack that is similar to those used with telephones. Examples: RJ-11 = 4 or 6 wire module, RJ-45 = 8-wire module.

Micosoft Account

Registered user profile with specific user id and password to log into Windows account from any machine and access familiar desktop applications

Areas inside the CPU where it temporarily stores internal commands and data while it is processing them are called _____.

Registers

To open up any of these root keys, click on the plus sign to its left, note that more subkeys are listed underneath. A subkey also can have other subkeys or values. Values define the aspects of the subkey.

Registry Editor shows only rootkeys and subkeys on the left and values on the right. Each of the root keys has a specific function.

When migrate data to a new computer it is important to follow three principles: migrate in a secure environment, remove data remnants when disposing of hard drives and recycle old equipment.

Registry is a huge database that stores everything about a PC, including information on all of the hardware, network information, user preferences, file types and virtually anything else you might find in Windows. Almost any form of configuration you do to a Windows system involves editing the Registry

What is the number of pixels that make up the dimension of a display, represented in a ratio value as the number of horizontal pixels by vertical pixels?

Resolution

How do you run a command at the Windows 7 command prompt with elevated or administrative privileges?

Right click a command prompt shortcut and then Run as administrator

Left-clicking selects an item; double left clicking opens and item.

Right clicking opens a CONTEXT MENU from which you can select various operations.

Any network address must provide two pieces of information: it must uniquely identify the machine and it must locate that machine the within the larger network. Most systems tgoday rely on the IPv4 addressing scheme. In a TCP/IP networ, the IPv4 address identifies the PC and the network on which it resides.

Routers connect networks. A default gateway is the port on your router that connects to your LAN. Special computers, called domain name service (DNS) servers, keep databases of IP addresses and their corresponding names. This enables people3 to use names rather than IP addresses to access remote resoures.

Once a copy is created from a virtual machine's files, the guest OS only needs some customization in the form of a unique system information, such as a system name and IP address, before it can be initiated, Without those changes, two VMs with the same identity would be running the network and application space and that would wreak havoc on many levels.

SNAPSHOTS allow a user to return a virtual machine to prior state in time.

A protocol used in network management systems for monitoring network-attached devices is known as:

SNMP

What 3 components are SNMP systems consisted of?

SNMP manager Managed devices management information bases (MIB)

If a PC can't access a network, always check the link lights first.

SWITCHES also have link lights, enabling you to check the connectivity at both ends of the cable

What type of service with an OS and applications?

SaaS

In the Internet Service tabs -

Security tab enables you to set how Internet Explorer safeguards your web browsing. Each setting can be adjusted for a zone, local intranet, trusted and restricted zones.

WHat is the function of SMTP?

Sending email messages between mail servers

The function of the NetBT protocol is to allow NetBIOS services to be used over TCP/IP networks.

Server Message Block (SMB) and Common Internet File System (CIFS) are examples of network protocols used for providing shared access to files, directories, and devices.

Forward Proxy Server

Server that acts as middleman between clients and servers, making requests to network servers on behalf of clients. Results are sent to the proxy server, which then passes them to the original client. The network servers are isolated from the clients by the forward proxy server. See also Reverse Proxy Server.

On Windows 8-10 system "installing" a hypervisor is as simple as enabling the Hyper-V Windows feature. You can also download and install hypervisors such as Oracle VM VirtualBox or VMware Workstation.

Server-side virtualization can use bare-metal virtualization software that requires no operating system on the VM supporting machine. These hypervisors such as VMware, ESXI. You can manage these remotely.

In Windows Vista and 7, MS occasionally packaged several updates for Windows together into a ___________

Service pack

What term describes a combination of many updates and fixes in WinVista/7?

Service pack

Clara's laptop has a DVI connector to which she has connected a projector. As she prepares to make her presentation, however, nothing comes on the projector screen. The laptop shows the presentation, and the projector appears to be functional, with a bright white bulb making a blank image on the screen. What's most likely the problem?

She needs to press the function key combination on her keyboard to cycle through monitor modes.

Software as a Service (SaaS)

Show up in number of ways, but the best examples of it are Wen applications such as Total Seminars Training Hub.

What command will shut down a linux system immediately without restarting it?

Shutdown now

what is an example of passive cooling?

Slowing down the speed at which internet components are running

Standoffs

Small mechanical separators that screw into a computer case. A motherboard is then placed on top of the standoffs, and small screws are used to secure it to the standoffs.

In UEFI systems, the POST control of the boot process to the boot manager, which checks the boot configuration and then loads the operating system boot loader directly.

Some BIOS include a feature enabling your PC to use a preboot execution environment (PXE). PE enables you to boot yoru PC from a network location.

The Northbridge acts as the primary bridge between the CPU and the rest of the computer. The northbridge deals with high speed interaces such as the connection to your video card and RAM.

Southbridge is the second chip that is the delegate to assist with the interconnectivity. works mainly with lower speed devices such as the USB controller and hard drive controllers.

STP

Spanning Tree Protocol. Protocol enabled on most switches that protects against switching loops. A switching loop can be caused if two ports of a switch are connected together, such as those caused when two ports of a switch are connected together.

How do you access System Tools in WIn Vista?

Start, then Programs or All Programs, then Accessories and finally System Tools

Best practice for batteries?

Store them in cool, dry place

A set of standards established by the TIA/EIA regarding networking cabling is called

Structured cabling

What purpose does the Super I/0 chip serve?

The Super I/0 chip handles the communication with the legacy devices.

The varieties of RAM - Explain them

Synchronous dynamic random access memory, or SDRAM, is tied to the system clock. The CPU, memory controller, and RAM all work in tandem with the clock pulse. This results in little wasted time when the CPU requests data from RAM.

cable name, colors, and pairs

T568A - green, orange, blue, orange, brown - 32124 T568B - orange, green, blue, green, brown - 23134

Newly installed DLLs must be entered into the Registry via a process cleverly recalled REGISTRATION. In most cases, DLLs will register themselves but on rare occasions you might need to manually register a DLL using the command line tool regsvr32.

TASK MANAGER lets you shut down errant processes that won't otherwise close properly.

What Windows command line utilities allows to terminate tasks by process id or image name?

TASKKILL

What commands exists the command interpreter in WIndows?

TASKKILL /IM CMD.EXE EXIT

What is the correct syntax for a Windows Command Prompt TASKKILL command that would allow to close NOTPAD.EXE by providing its imagine name?

TASKKILL /IM NOTEPAD.EXE

what command line command in WIndows displays a list of currently running processes on the local computer or on a remote computer?

TASKLIST

Transport Protocols

TCP, UDP, ICMP

TCP/IP (Transmission Control Protocol/Internet Protocol) the Common language of the Internet

TCP/IP is the framework and language of the internet

TCP/IP is the common language of the internet

TCP/IP is the framework and language of the internet

`To trace a cable, connect the toner generator to the known end of the cable in question, and then position the tone probe next to the other end of each of the cables that might be the right one. The tone probe make a sound when it is placed next tothe right cable. Each generator emits a separate frequency, and the probe sounds a different tone for each one.

TCP/IP is the primary protocol of most modern networks, including the INternet. For a PC to access the internet, it must have TCP/IP loaded and configured properly.

A network admin should configure the TCP/IP settings. These settings include your IP address, default gateway, DNS settings and DHCP settings.

TCP/IP provides sharing functions called SERVICES. Well known TCP/IP services include HTTP, the language of the World Wide Web and Telnet.

when going through the installation of Windows in a virtual machine, the allocation and formatting of disk storage is identical to the process in a physical server.

TEMPLATES are virtual machines that already contain an OS, are sometimes preloaded with application software, and are used to create new virtual machines.

Memory (or RAM) is another name for Random Access Memory

THICK PROVISIONING is when a file system consumes the entire allocated amount of space, whether or not it is ever used.

The most common Thin Film Transistor display technology and has 6 bits for each color

TN

TROUBLESHOOTING OPERATING SYSTEMS CHAP 17

TROUBLESHOOTING OPERATING SYSTEMS CHAP 17

What backup feature does Win7 not support?

Tape backup Setting incremental vs. incremental backups

Chuck wants to run Disk Defragmenter on his Win7 machine once every week. What tool enables him to set Windows to do this automatically?

Task Scheduler

SSH was designed as a secure replacement for Telnet

Telnet does not offer encryption and sends passwords in cleartext

Telnet and SSH

Telnet is a terminal emulation program for TCP/IP networks that uses port 23 and enables you to connect to a server or fancy router and run commands on that machine as if you were sitting in front of it. This way, you can remotely admin a server and communicate with other servers on your network. Telnet does not allow just anyone to connect to your computer, so they would need to enter a user name and password to run Telnet. Telnet is just like FTP and all the user names and passwords are in clear text. So be cautious on what you pick. (Telnet works over LAN). If you need a remote terminal that works securely across the Internet, you need Secure Shell (SSH). If fact, today SSH has replaced Telnet is almost all places Telnet used to be popular. To the user, SSH works just like Telnet. Behind the scenes, SSH uses port 22, and the entire connection is encrypted, preventing any eavesdropping from reading your data. SSH has another cool trick, it can move files or any type of TCP/IP network traffic through its secure connection. In networking, this is called tunneling, and is the core of most secure versions of the Internet technologies such as SFTP and VPN.

The Advanced Technology (AT) form factor, though now obsolete, was the predominant form factor for motherboards through the mid 90s. It's identifying features included a large keyboard plug and a split power socket called P8/P9

The Advanced Technology Extended (ATX) form factor replaced AT as the form factor of choice by the late 90s. It was an improvement over AT including the repositioning of the power supply for better airflow, easier access to CPU and RAM slots and better performance by moving RAM closer to the Northbridge and CPU. The microATX (uATX) and FlexATX form factors are subtypes of ATX and are considerably smaller.

A client calls complaining that his new LCD monitor is flickering. What is most likely the problem? A. The refresh rate is set too high. B. The refresh rate is set too low. C. The CCFL backlight is failing. D. The LED backlight is failing.

The CCFL backlight is failing

Chip makers design matched sets of particular models of Northbridge and Southbridge to work together. You don't buy Northbridge from one company and soutbridge chip from another. They are sold as a set. We call this set of Northbridge and Soutbridge the CHIPSET.

The CHIPSET extends the data bus to every device on the PC. The CPU uses the data bus to move data to and from all of the devices of the PC. Data constantly flows on the external data bus among the CPU, chipset, RAM and other devices on the PC.

By default, any file you drop into a folder on an NTFS drive gets the same permissions as those assigned to the folder, a feature called Inheritance

The CHOWN command enables you to change the owner and the group with which a file or folder is associated in Linux and MAC OS X.

What is a charms bar?

The Charms bar is simply a menu, one of a million in Windows 8. But the Microsoft marketing department, eager to impart a little humanity to your computer, calls it a Charms bar.

The privacy tab works a lot like Security Tab, except it controls privacy matters such as cookies, location, tracking, popups and whether browser extensions will run in private browsing mode. This is the place to keep the internet from tracking you.

The Content Tab controls that your bwoser will and will not display. Enables you to gate access to insecure or objectionable content, and a parental tool called Family Security which lets admins restrict Web, game and app usage and even controlling when an account can log on.

You can use File Explorer in Win8.1 to access files and folders

The Control Panel enables a tech to perform most of the maintenance, upgrade and configuration aspects of Windows

The first universal file format was called ASCII (American Standard Code for Information Interchange)

The DIR COMMAND shows you the contents of the directory that currently has focus.

Video cards use a RAMDAC, which takes the digital signal from the video card and turns it into an analog signal for the CRT. LCD monitors require a digital signal. Analog LCD monitors reverse the effects of the RAMDAC so you can plug your LCD monitor into the 15 pin VGA connector on the video card.

The DVI standard allows the digital signal from the PC to be used by the LCD monitor without any digital to analog and back to digital conversion. The DVI standard includes DVI-D, DVI-A, and DVI-I. Both DVI-D and DVI-I come in single-link and dual link varieties with dual link offering significantly higher resolutions.

Check disk (chkdsk) is the Windows tool that attempts to fix invalid filenames, erases lost clusters and seals off bad clusters is called Check disk.

The GUID partition table (GPT)

RAID 5 requires at least three same-size volumes, enjoy the speed boost of striping and is fault tolerant.

The GUID partition table (GPT) scheme fixes several of MBR's limitations, GPT drives can have as many partitions as needed, although Windows imposes a limit of 128. GPT partitions can be larger than MBR's max of 2.2 TB

In using the Remote Desktop, the client computer can be running any version of Windows

The Home Server/PC custom configuration is most likely to include a RAID array

The port on your router that connects to your LAN is given an IP address that's part of your NETWORK ID.

The IP address of the LAN side of your router (the port connected to your LAN) is the address your computer uses to send data to anything outside your network ID. This is called the DEFAULT ADDRESS.

Hyper-threading

The Intel technology that allows each logical processor within the processor package to handle an individual thread in parallel with other threads being handled by other processors within the package.

The one thing that is the same KDE-based distros is that everything you need to work on the system is accessible from the KICKOFF menu on the far left of the Panel.

The KICKOFF menu looks and works like the Start Menu in Win7. Once in this menu, you can search for a utility or select the APPlICATIONS tab at the bottom. From here, most distros have a utilities or System Menu that holds all the key system configuration and maintenance applications.

The Window DIR command shows you the contents of the working directory. The DIR command lists the filename, extension, file size in bytes a creation date/time. The dir /p command pauses after displaying a screen's worth of the directory contents, press the spacebar to display the next screen. The dir /w command shows you filenames only, arranged in columns with directory names in square brackets.

The MAC OX and Linux ls command shows you the contents of the directory on which the prompt is focused. Like most UNIX commands, it is very powerful and contains over 50 different switches.

By placing machine language commands called LINES OF CODE into the EDB one at a time, you can instruct the Man in the Bus to do specific tasks. All the machine language commands that the CPUS understands make up the CPU's Instruction Set.

The Man in the Box can communicate with the outside world via the EDB; he has four registers he can use to work on the problems you can give him and he has a codebook - the instruction set - so that he can understand the different patterns (machine language commands) on the EDB.

Move the cursor to the top or bottom right corner of the screen in Win8 to access one of the tools called a Charms Bar

The Mission Control utility in Mac OS X enables you to switch easily among applications, windows and Spaces.

Early OS such as MS-DOS used a command-driven interface.

The OS can optimize RAM storage by using virtual memory

TASKLIST is a command line version of the Task Manager

The PERFORMANCE tab in task manager displays overall CPU and memory usage

northbridge

The Primary Bridge between the CPU and the rest of the computer.

The Connection tab lets you set up a VPN or Proxy. Many corps use a proxy server to filter employee internet access.

The Programs tab in internet options contains settings you default browser, any adds on you have and how other programs deal with HTML files and email messages.

The copy command is to move in WIndows as cp is to Copy in Linux

The Shutdown command enables you to restart a computer remotely from the command line

Modern processors include the functions of the Northbridge directly on the CPU.

The Southbridge is called the input/output Controller Hub (ICH) in the Intel systems and the Fusion Controller Hub (FCH) in the AMD systems. Current systems move the Soutbridge feature to the Platform Controller Hub (PCH), connected directly to the CPU.

When rebuilding your Windows installation, you should swap the C: drive for a blank hard drive and installing a clean version of Windows. Restore to factory settings. Modern versions of Windows do not use the Recovery Console. Instead, you boot to the Windows Preinstallation Environment (Windows PE). Here you can boot directly to the Windows installation disc or access a set of repair tools known as the Windows REecovery Environment. Windows RE is also called the SYstem Recovery Options menu.

The Startup Repair utility enables you to repair a corrupted Registry restore critical system files, roll back nonfunctioning drivers, uninstall incompatible service packs and patches and more. IN Win7 and later, Startup Repair runs automatically if the system detects a boot problem.

A thin client is designed with the most limited of hardware. These devices usually have a single purpose such as Point of Sale device.`

The Startup tab in Task Manager shows applications that will run on boot

When you insert an optical disc into your PC, Windows uses the AutoPlay and AutoRun features to start the disc.

The System Restore tool enables you to create a Restore Point, a snapshot of your computer's configuration at a specific point in time.

When you have to trace cables, network techs turn to a device called a toner for help. TONER is tghe generic term for two separate devices that are used together: a tone generator and a tone probe.

The TONE GENERATOR connects to the cable using alligator clips, tiny hooks or a network jack and it sends an electrical signal alon the wire at a certain frequency. The TONE PROBE emits a sound when it is placed near a cable connected to the tone generator. These two devices are often referred to by the brand name Fox and Hound, a popular model of toner.

An IEEE 1394b FireWire device transfers data at up to 800 Mbps.

The Thunderbolt standard connects computing devices with a Mini DisplayPort connector

An IEEE 1394b FireWire device transfer data at up to 800 Mbps.

The Thunderbolt standard connects computing devices with a mini DIsplayPort connector

The USB host controller is an integrated circuit that is usually built into the chipset, controls every USB device that connects to it. Inside the host controller is a USB ROOT HUB.

The USB root hub is the part of the host controller that makes the physical connection to the USB ports. Every USB root hub is really just a bus - similar to an expansion bus.

Examples of services that would be disabled in a virtual machine would be Wireless connectivity and Power Management

The Windows 7 installation type for a new installation of Windows is CUSTOM

Seen in RAID 5, Disk Striping with Parity uses at least three drives and combines the best features of disk mirroring and disk striping.

The Windows Disk Management enables you to implement RAID

Live DVD

The Windows installation media, which loads the Windows Preinstallation Environment (WinPE) directly from disc into memory and doesn't access or modify a hard drive or solid-state drive.

amount of electrons moving past a point in some amount of time is called the CURRENT (or amerage) which is measured in units called amperes (amps or A).

The amount of amps and volts needed so that a particular device will function is expressed as how much WATTAGE (watts or w) that device needs. The correlation between the three is very simple math: V X A = W.

One of the simplest kinds of virtualization, client side virtualization, is running a virtual machine on your local system.

The basic process for setting up a virtual machine involves verifying your system's hardware is sufficient and properly configured to support VMs, installing a hypervisor, creating a new VM with the proper virtualization hardware to meet any requirements the guest OS has, starting the new VM and installing the guest OS as you would on a new physical machine.

What does a non-maskable interrupt cause the CPU to produce?

The blue screen of death

tiles

The building blocks of Windows 8's Modern UI, as potentially "smart" app shortcuts, capable of displaying dynamic and changing information without even open- ing the app.

Storage can be consolidated and centralized by removing drives from individual hosts and moving them to specialized storage systems that support many hosts. This can improve performance and makes maintaining, administering, and backing up the drives easier.

The cloud is the vast array of on-demand computing resources sold by Amazon, MS and many other companies over the open internet.

Mac OS and Linux also use paths. Folder names are separated by a forward slash (/), however, instead of the backslash used by Windows. Use the pwd command at the prompt to display the working directory

The command line will do what you say, not what you mean. Always double what you have typed before hitting enter. One careless keystroke can result in the loss of crucial data with no warning or going back.

A solution designed to strengthen existing WEP implementations without the requirement for replacement of legacy hardware is called TKIP

The common term for a group of protocols used to carry voice data over a packet-switched network is VoIP.

What are the system requirements for thin clients?

The computer must have a last network connection to access the server hosting the applications. The computer must meet the minimum requirements to run the selected OS.

If you do complete the activation process for Win7, what will happen to your computer?

The computer will work for 30 days and then Windows will be disabled.

When you copy a file from one folder on the C: drive to another folder on the C: drive, by default what permissions will the copy of that file have if the C drive is formatted with NTFS?

The copy will inherit the permissions of the new location

Originally, the subnets fell into "classes" such as A, B or C determined by the corresponding octet in the subnet marsk. A Class C addresses had a subnet mask of 255.255.255.0. A class B address, in contrast, had a subnet mask of 255.255.0.0. The latter class left two full octets (16 bits) just for host numbers. A class A address had a subnet mask of 255.0.0.0.

The current system is called Classless Inter-Domain Routing (CIDR). With CIDR, network techs refer to the subnet mask by the number of ones it contains such as /24 or /26.

Henry bought a new card for capturing television on his computer. When he finished going through the packaging, though, he found no driver disc, only an application disc for setting up the TV capture software. After installing the card and software, it all works flawlessly. What's the most likely explanation?

The device has an option ROM that loads BIOS, so there is no need for driver disk

Brian bought a new motherboard that advertised support for eight USB ports. When he pulled the motherboard out of the box, though, he found that it only had four USB ports. What's likely the issue here? .

The extra four USB ports will connect to the front of the case or via a dongle to a expansion slot.

The host controller includes a root hub that provides the physical connection for devices. Host controllers support many ports but the number of USB ports a system depends on what the motherboard manuf. specifies.

The host controller is shared by every device plugged into it, so speed and power are reduced with each new device.

To delete a file or folder, right click on a file or folder select delete and confirms the deletion

To select random (non-contiguous) files in a group, hold down the CTRL key

Monitors have adjustment controls for brightness, contrast, image size and position and color adjustment. These controls are usually accessed via an onboard menu system rather than with hardware knobs or dials.

The display adapter, or video card, handles the video chores within computing devices, processing information from the CPU and sending it to the display. The display adapter is a complex set of devices. The video card has two major pieces: the video RAM and the video processing circuitry. The video RAM stores the video image, and the processing, circuitry is similar to that of your computer's CPU.

You receive an "Invalid media" error when trying to access a hard drive. What is the most likely cause of the error?

The drive has not been formatted.

One way that virtual servers are sized differently than physical servers is that they do not need to be sized for long term growth whe they are first deployed.

The elapsed time for a P2V process to complete is directly related to the number and size of disks that need to be processed.

File path

The exact location of a file, starting with the drive in which the file is located, and including all folders and subfolders.

What does it mean if the expansion card, the BIOS and OS are all PnP comptabile?

The expansion card will be automatically configured when the system

OS manifest each program and piece of data as an individual file on the drive. Names are broken down into two parts: the filename and the extension. The filename describes the contents of the file and the extension, which is optional

The file name extension tells the computer the function of the file.

Operating systems manifest each program and piece of data as an individual file. Each file has a name, which is stored with the file on the drive. Names are broken down into two parts: the filename and the extension. The filename describes the contents of the file, and the extension, which is optional, is usually three or four characters. The filename and extension are separated by a period or dot.

The filename extension tells the computer the type or function of the file.

Virtual machines that run on Type 1 hypervisors are considered to be more secure and better performing than those running Type - 2 hypervisors

The first commercial x86 hypervisor was released by VMware

MAC OS

The first commercially available operating system to incorporate a graphical user interface (GUI) with user-friendly point-and-click technology.

power-on self-test (POST)

The first job the basic input/output system (BIOS) performs, ensuring that essential peripheral devices are attached and operational. This process consists of a test on the video card and video memory, a BIOS identification process (during which the BIOS version, manufacturer, and data are displayed on the monitor), and a memory test to ensure memory chips are working properly.

file name

The first part of the label applied to a file; it is generally the name a user assigns to the file when saving it.

MAC addresses are binary and represented by using 12 hexadecimal characters. The MAC addresses are burned into every NIC and some NIC makers print the MAC addresses on the card.

The frame must contain some type of data check to verify that the data was received in good order. Most frames use a clever mathematical altogithm called a CYCLIC REDUNDANCY CHECK (CRC)

Just like a physical system, each virtual machine needs an operating system.

The hypervisor handles communication between the operating systems installed and the hardware of the host machine. The hypervisor can easily add and remove hard drives, memory space, networking capabilities, and more.

A hypervisor is a layer of software that resides below the virtual machines and above the hardware.

The hypervisor manages the interactions between each virtual machine and the hardware that the guests all share.

Julie installed a new TV tuner in a client's computer. The card fit perfectly in a PCIe x1 slot and clipped down to the case properly. Sarah then discover that everything works except the hard drive and power LEDs. What could be the problem?

The intern forgot to connect the LED leads to the motherboard. The intern reversed the LED leads to the motherboard.

Contention is when multiple entities are all simultaneously trying to use the same resource causing performance to suffer.

The max number of vCPUs that can be configured in a single virtual machine varies by the hypervisor vendor

The CPU does most of the calculations on your computer. The CPU is also known as a microprocessor.

The microprocessor hides on the motherboard below a large heart sink and often a fan assembly as well.

PCI Express (PCIe)

The most popular expansion bus in use today, with speeds up to 16 GBps

PERFORMANCE METRICS should be collected from both physical and virtual servers in order to understand and monitor the resources being consumed by the workload.

The most time-consuming step during the Windows installation process is usually copying and unpacking files from the installation media to the disk storage

Motherboard book is your primary source for all of the critical information about the motherboard.

The motherboard mounts to the case via small connectors called STANDOFFS that slide into keyed slots or screwed into the bottom of the case.

A M.2 form factor drive installs into a special slot on motherboards.

The older PATA drives send data in parallel; current Serial ATA (SATA) drive send data in serial.

Plasma display has high power consumption

The optimal components for a home theater is surround sound speakers stereo receiver home theater pc

EXAM uses slightly older terms to describe View Options, such as VIEW HIDDEN FILES and HIDE FILE EXTENSIONS. You can also right click a file or folder, select Properties, General tab, and you can change several aspects of the folder - read-only, hidden and unlock many other features.

The pairing of a file with a file extension is called File Association.

Centralized applications accessed over a network are known as Software as a Service (SaaS). They are often buiolt on top of IaaS or PaaS offering and are usually available a a subscription or for Free.

The public cloud is a number of large corporate-owned cloud networks that are open to the public for use and billed by usage.

A hybrid cloud is a combination of multiple private, public or community clouds.

The primary advantages of cloud computing are the rapid elasticity gained when you can start and stop new servers on demand, the efficiency that comes with pooling resources from massive server farms, and the ability to pay for measured service based only on what you see.

A hybrid cloud is a combination of multiple private, public or community clouds.

The primary advantages of cloud computing are the rapid elastricity gained when you can start and stop new servers on demand, the efficiency that comes with pooling resources from massive server farms, and the ability to pay for meausured service based only on when you use.

authentication

The process of identifying a computer user, based on a login or username and password. The computer system determines whether the computer user is authorized and what level of access is to be granted on the network.

Linux uses cron to run tasks automatically in the background

The process of keeping software updated in a safe and timely fashion is known as patch management

paging

The process of swapping data or instructions that have been placed in the swap file for later use back into active random access memory (RAM). The contents of the hard drive's swap file then become less active data or instructions.

A command driven interface is one in which you enter commands to communicate with the computer system.

The process of the OS swapping files to and from RAM is called paging.

pinning

The process through which you choose which applications are visible on the Windows Start screen.

A quartz crystal soldered to the motherboard and known as the system crystal provides a constant pulse known as the CLOCK. The frequency of this pulse or clock speed, dictates the max speed at which a processor can run, measured in Megahertz or gigabertz.

The processor typically runs at some multiple of this clock pulse known as the internal clock speed. You can set the internal clock speed by adjusting the multiplier (which multiples the clock speed by some number) or making a change to a CMOS setting, or it is set automatically via CPU circuitry. Setting the clock speed higher to force the CPU to run faster than its rating is known as OVERCLOCKING

If a user shuts down a system improperly, files can be corrupted.

The proper lifting technique is to bend at the hips and knees, keep the back straight and lift it with the legs.

Centralized applications accessed for a network are known as Software as a Service (SaaS). They are often built on top of IaaS or PaaS offerings and are usually available as a subscription or for free.

The public cloud is what we really mean when talking about the cloud. The public cloud is a number of large corporate owned cloud networks that are open to the public for use and billed by used.

The shutdown command enables you to shut down (or reboot) a computer whether it is local or remote.

The standard cp and mv commands are used in Mac OS and Linux for pruning and grafting

On an Intel computer, what does the Northbridge chip control?

The system memory and the Accelerated Graphics Port (AGP) video ports

What is the effect of exceeding the wattage capabilities of a power supply by inserting too many devices.

The system will not boot or turn on at all.

IPP is a protocol used for performing printing-related task on a network

The term Internet Protocol Security (IPsec) refers to a suite of protocols providing authentication and encryption features in order to ensure secure of IP packets

Command Line interpreter also known as Shell. On Linux, this is called Bash

The tool that interprets input and sends it to the OS in a form that the OS understands.

For those who don't play with Hex regularly, one hex character (for example, F) reps 4 bits, so four hex characters make a 16 bit group.

The unspecified address (all zeros) can never be used and neither can an address that contains all ones (in binary) or all Fs in hex rotation

The operating system is a group of programs that controls how your computer functions

The user interface is what you use to interact with your OS?

What would most likely result in a POST beep code message?

The video card is not seated properly is one example

The term VIDEO encompasses a complex interaction among numerous parts of personal computing devices, all designed to put a picture on the screen.

The video monitor is the primary output device and shows you what is going on with your programs and OS. The video card or display adapter handles all of the communication between the CPU and the monitor.

What are the print out differences between T568A and T568B standards?

The wire color attached to pin 1, pin 2, pin 3 and pin 6

Cooling is critical. Make sure you have a heat sink and fan assembly rated to work with your CPU. Of go top shelf and install a liquid-cooling solution.

There should be a small amount of thermal paste between the CPU and heat=sink and fan assembly. If your fan came with the paste already applied, be sure to remove the protective tape covering the paste before attaching the fan to the CPU. If you are using your own thermal paste from a tube, spread it thinly and evenly.

DWORD value

These values are like Binary vbalues but are limited to exactly 32 bits

Binary value

These values store nothing more than long strings of ones and zeros.

Older or low end LCDs cause ghosting during video games or movies? WHy?

They have a response rate between 20 and 24 seconds

Bootrec

This command is a Win Recovery Environment troubleshooting and repair tool that repairs the master boot record, boot sector or BCD store. It replaced the old fixboot and fixmbr Recovery Console commands and adds two more repair features.

The PASSWD command is used in Mac OX to change a password

This command ls -r | grep fred will show you any line that has the string "fred" in it

Video cards are identified by their manuf. model number, graphics processor, amount of video RAM and the slot to which they connect.

Three major manu of graphics processors are: NVIDIA AMD Intel The most important decision when buying a video card is the graphics processor, especially if you play 3 D games.

Windows Vista and later versions offer a feature called ReadyBoost that enables you to use flash media devices - removeable USB thumb drives or memory cards - as super-fast, dedicated virtual memory.

Through not required, it is good to make sure all sticks of RAM in any system are as identical as possible. Matching your RAM modules in technology, capacity, speed and manuf lessens the chance of problems and incompatibility

How can access the system setup utility from within Windows 8.1?

Through the settings charm in the Charms bar.

The main tier is called Tier 1, consists of a small number of companies called Tier 1 providers. Tier 1 providers own long-distance, high speed, fiber optic networks called backbones. These backbones span the major citieis of the earth (not all Tier backbones go to all cities) and interconnect a special locations called network access points (NAPs). Anyone wishing to connect to any of the Tier 1 providers must be pay money. The Tier 1 providers do not charge each other to connect.

Tier 2 provides own smaller, regional networks and must pay the Tier providers. Most of the famous companies that provide internet access to the general public are Tier 2 providers

To display the apps screen, click the down pointing arrow that appears towards the bottom left corner of the start screen

To add a tile of an app on the apps screen to the start screen, right click the tile and click pin to start from the menu.

Computers using IPv6 need a global address to access the internet

To have network connectivity, you need to have three things in place: 1. connected NIC: the physical hardware that connects the computer system to the network media 2. Properly configured TCP/IP: Your device needs correct TCP/IP settings for your network 3. network client: the interface that allows the computer system to speak to the protocol

The serial presence detect (SPD) chip on modern DIMMs automatically supplies all the information about the RAM to the system, such as the size, speed, ECC or non-ECC, registered or unregistered and other details.

To install So-DIMMs in a laptop, you must remove a panel o the underside of the laptop or remove a keyboard to find the RAM slots. The SO-DIMM slides into the slot and snaps down into position. Unplug the laptop and remove the battery for attempting a RAM upgrade, and protect the components from ESD by wearing in anti-static wristband.

PCIe, with its point to point serial connection, touts speeds as high as 16 GBps, PCIe x 16 slots are commonly used for video cards. Other internal slots you will find are x 1 and x 4. PCI Express for mobile computers is called PCI Express Mini Card or Mini-PCIe.

To install an expansion card successfully: Requires 4 steps: First, you need to know that the card works with your system and your OS. Second, you have to insert the card in an expansion slot properly and without damaging the card or the motherboard. Third, you need to provide drivers for the OS, the proper drivers for the specific OS Fourth, you should always verify that the card functions properly before you walk away from the PC

The User Accounts applet enables you to manage user accounts in Windows.

To log into a standalone Windows PC, you need a local user account

The goal of TCP/IP is to link any two hosts whether the two computers are on the same LAN or on some otgher network within the WAN. The LANs within the WAN are linked together with a variety of connections, ranging from basic dial ups to dedicated high speed data lines.

To move traffic between the networks, you use routers. Each host sends traffic to the router only when that data is destined for a remote network, cutting down on traffic across the more expensive WAN links. The host makes these decisions based on the destination IP address of each packet.

Catastrophic failure is typically caused by manuf defects (burn in failure) or ESD. Burn in failures are uncommon and usually manifest within the first 30 days. Replace the motherboard

To replace a motherboard, first remove all of the expansion cards from the old motherboard. Unscrew the motherboard and remove it from the case.

If you make changes to the CMOS settings, make only as many changes at one time as you can remember. Document the original settings and the changes on a piece of paper or take photo so you can reverse any changes that have the wrong effect.

To reset CMOS settings back to their default, power off and unplug the system. Move the shunt to the clear position on the CMOS clear wires. Wait then put the shunt back in the default position. Or, locate the flat, lithium battery on the motherboard and carefully remove it. Wait five minutes then reseat it. Power on the system.

Network people call anything that one computer might share with another a RESOURCE. The goal of networking, therefore, is to connect computers so that they can share resources or access other shared resources.

To share and access resources, a network must have the following: 1. Something that defines and standardizes the design and operation of cabling, network cards, and the interconnection of multiple computers. 2. An addressing method that enables clients to find servers and enables servers to send data to clients, no matter the size of the network. 3. Some method of sharing resources and accessing those shared resources.

If Win7 fails to boot, but you have not logged on, you can select LAST KNOWN GOOD CONFIGURATION to restore the computer to the way it was the last time a user logged on

To start Windows using only the most basic and essential drivers and services, use SAFE MODE

If Win 7 fails to boot but you have not logged on, you can select the Last Known Configuration to restore the computer to the way it was the last time a user logged in

To start windows using only the most basic and essential drivers and services, use Safe Mode

To test a possibily broken Ethernet port, plug in a LOOPBACK PLUG.

Today, no one can connect to the server since yesterday. The server seems to be in good running order. Check to see if a switch is malfunctioning.

The shutdown command enables you to restart a computer remotely from the command line

Type SU or SUDO before a Terminal Command to get root privileges

TCP comes with communication rules that require both the sending and receiving machines to acknowledge the other's presence and readiness to send and receive data.

UDP works best when you have a lot of data to send that doesn't need to be perfect or when the systems are so close to each other that the chances of a problem occurring are too small to worry about. Example: a few dropped frames on a Voice over IP call won't make a difference in the communication between two people

UEFI drives support file systems that enable booting of drives larger than 2.2TB

UEFI handles ALL boot-=loading duties.

BIOS looks for the MBR which finds the boot code to launch the OS

UEFI simply loads bootmgr directly

What is the most common way to sync data from a mobile device to a PC?

USB

Every USB device connected to a single host adapter/root hub shares that USB bus with every other device connected to it. The more devices you place on a single host adapter, the more the entire USB bus slow down and the more power they use.

USB devices need power to run but not all take care of their own power needs. A powered USB device comes with its own electrical cord that usually connected in turn to an AC adapter. Bus powered USB devices take power from the USB bus itself - no AC or DC power. When too many bus powered devices take too much power from the USB bus, bad things start to happen, some devices won't work, others will lock up.

How can you identify the USB header on a motherboard?

USB headers will have one pin missing from the second row on the end.

Powerful hypervisors like ESXi are often booted from

USB thumb drives

Linux: GNOME (Default Fedora Workstation, Red Hat Enterprise Linux)

Unity is based on Gnome 3. Because of this connection, the same applications are used to admin GNOME 3 based desktops although some of the names are different. First Launch point is the ALL SETTINGS application which is practically the same as SYSTEM SETTINGS in unity. To access ALL SYSTEMS, click on the down arrow icon on the far right of the menu bar and select the WRENCH AND SCREWDRIVER icon. For other system utilities such as System Monitor or Terminal, slick on the Activities button on the far left of the menu bar. From here you can search on the utility from the box at the top or select the Show Applications grid icon from the bottom on the Dash on the left side of the screen. This will open a menu showing all installed applications, and within this list is a folder of UTILITIES.

What cable type do Ethernet networks typically use?

Unshielded twisted pair (UTP)

File Transfer Protocol (FTP)

Uses port 20 and 21 and shares files between systems. FTP server software exists for most OS, so you can use FTP to transfer data between any two systems regardless of OS. All FTP sites require you to log on.

Device Manager

Utility that enables techs to examine and configure all the hardware and drivers in a Windows PC.

Startup Repair

Utility which can repair a corrupted registry, critical boot files, rollback drivers, run chkdsk, run memory test, etc. - nearly any boot problem. This tool should be run first in case of any boot issues

A VIRTUAL APPLIANCE is a specialized VM that contain an OS and is preloaded and preconfigured with an application

VM to VM commuications can occur across a virtual switch and never leave the physical host

Guest or VM is another term for virtual machine

VMM stands for the term Virtual Machine Manager

What company is the oldest and put virtualization on the map

VMware

Which company was one of the earliest to make hypervisors , and arguably the one that put PC virtualization on the map?

VMware

What is a popular hypervisor on Mac OSx.

VMware Fusion

The practice is to start smaller with an initial VM and add resources if necessary, rather than start with a larger VM and subtract them

VMware Player is an example of a TYPE 2 hypervisor

Which tool requires an underlying operating system in order to create and manage virtual machines?

VMware Workstation

Which of these virtualization products is a commercial product?

VMware fusion

The pressure of electrons in a wire is called _______________.

VOLTAGE and is measured in units called volts (V)

What do you need to install a legal copy of Win8.1 into a virtual machine using VMware Workstation?

Valid WIndows 8.1 installation media

Motherboard book

Valuable resource when installing a new motherboard. Normally lists all the specifications about a motherboard, including the type of memory and type of CPU usable with the motherboard.

The TIA/EIA has two standards for connecting the RJ-45 connector to the UTP cable: the TIA/EIA 568A (T568A) and the TIA/EIA 568B (T568B). A crossover cable is a standard UTP cable with one RJ-45 connector using the T568A standard and the other using the T568A standard and the other using the T568B standard.

Varieities of UTP include CAT 3, CAT5, CAT 5e, CAT6, CAT 6a, CAT6e, and CAT7. Each can be plenum-grade or use a PVC standard.

What enables you to access the Add Hardware Wizard in Windows 7 or Windows 8.1>

hdwwiz.exe

A virtual machine connects from virtual NIC to a

Virtual switch

Which CPU feature enables the microprocessor to support running multiple OSs at the same time?

Virtualization support

When installing an expansion card, what should you do if WIndows states the device is not recognized and you do not have the media that contains the device's drivers?

Visit the website of the manuf of the expansion card and download the driver

user interface (UI)

Visual representation of the computer on the monitor that makes sense to the people using the computer, through which the user can interact with the computer. This can be a graphical user interface (GUI) like Windows 7 or a command line interface like the Windows PowerShell or the Recovery Console.

which network connectivity consist of point to point or point to multipoint connections between two or more LANs?

WAN MAN

Guests

What group would you assign a user to if you wanted the user to have a temporary profile that is deleted when the user logs of?

B (11 Mbps) wireless standard provides low max theoretical throughput

What technology has the shortest wireless range for printing - Infrared

invitation file

What type of file can a user send a technician in order to get help remotely, when using Remote Assistance?

Directories inside a directory are called subdirectories. any directory can have multiple subdirectories. Two are more files or subdirectories with the same name can exist in different directories on a PC but two files or subdirectories in the same directory cannot

When describing a drive in Windows, you use its assigned letter, such as C: for the hard drive. To describe the root directory, add a backslash (\), as in C:\. To describe a particular directory, add the name of the directory after the blackslash. To add a subdirectory after the directory, add another backslash and then the subdirectory's name. This naming convention provides for a complete description of the locaion and name of any file. The exact location of a file is called its PATH

In order to power on the virtual hardware to begin the installation, choose the PLAY VIRTUAL MACHINE option from the virtual machine menu. (Three words separated by a space.)

When loading an OS into a virtual machine, that virtual machine must be powered on and have the installation media as the boot device.

The client-side party tells you they're LOCAL rather than remote

When moving data from one system to another, the TCP/IP protocol suite needs to know if the communication connection-oriented or connectionless

Use Memtest86 to do Windows Memory Diagnostic (Tool) for bad RAM

When reset your PC option reinstalls WIndows and wipes all non Windows content.

preemptive multitasking

When the operating system processes the task assigned a higher priority before processing a task that has been assigned a lower priority.

You can use a BRIDGE to connect two different types of network media, such as coaxial and UTP.

When troubleshooting a NIC, you will needto crawl behind your computer and look for the LINK Lights, which should on or blinking.

The process that defines what resources an authenticated user may access and what he or she may do with those resources is called authorization

When you create a new file or folder on a NTFS partition, you become the Owner of that file or folder.

You don't choose TCP or UDP. The people who developed the application decide which protocol to use.

When you fire up your browser, you are using TCP because web browsers use a protocol called HTTP. It is built on TCP

The Performance Monitor requires a COUNTER and OBJECT to create logs about resource usage.

When you open the Registry Editor, you will see the five ROOT KEYS on the left side of the Window.

Win10 blends the traditional Win7 Desktop with the more progressive features of the 8.x Metro/Modern UI. They retained the and refined the Start Menu and removed the Charms bar. MS incorporated essential tool -Search being a favorite go-to feature into the desktop in the lower left corner of the taskbar.

When you press WINDOWS LOGO KEY on the board. Win10 brings up START MENU with useful tools and your most used apps on the left and the pinned apps on the right. You can click the ALL apps on bottom left to open a list of installed applications. Right click to pin any app to the Start screen.

TCP/IP requires that several settings are properly configured before you can connect to a network. A network administrator should configure these for you. These settings include your IP address, default gateway, DNS settings, and DHCP settings.

When you want to be sure that the data is moving between two systems and gets there in good order, use a connection-orientation application. If it is not a big deal for data to miss a bit or two, then connectionless is the way to go. The connection-oriented protocol used in TCP/IP is called the Transmission Control Protocol (TCP). The connectionless one is called the User Datagram Protocol (UDP)

PaaS

Which cloud computing service model gives software developers access to multiple operating systems for testing?

Remote Desktop Protocol (RDP)

While some OS include a remote desktop client, many third party remote desktop applications are also available. Most of these make use of either the Remote Desktop Protocol (RDP) or Virtual Network Computing (VNC) Remote Desktop connection, provides control over a remote server with a graphical interface. In Windows, you can turn Remote Desktop and Remote Assistance on and off via Control Pane.

A client wants a roaming and portable mobile wireless broadbrand connection without the need of direct line or sight with a base station. Which technology will he prefer?

WiMax

WAN

Wide Area Network. A network that connects computers and other resources over great distances.

To remove a directory, first point the prompt at the directory that contains the subdirectory you want to delete, and then execute the rd or rmdir command. Windows uses both but you muse use rmdir in Mac and Linux. If you get no response, you probably did it right.

Wildcards are special characters such as the asterisk (*) and question mark (?) that you can use in place of all or part of a filename to make a command act on more than one file at a time. Wildcards work with all command line commands that take filenames. The * wildcard replaces any part of a filename before and/or after the period. Virtually every command that deals with files will take wildcards.

What isthe only version of Windows that used Sidebar?

Win Vista

MS Management Console (MMCP) is simply a shell program in WIndows that holds individual snap-ins. The apps in Admin Tools are preconfigured MMCs.

Win supports AutoRun or AutoPlay, a feature that enables it to look for and read a special file called autorun.inf immedid after a removable media device is inserted and then run whatever program is listed in autorun.inf

What OS support multiple desktops?

Win10, Mac OS X and Linux

Plug and Play is a software and hardware standard designed to facilitate the installation of new hardware in PCs.

Win8 includes special shortcuts called CHARMS used for performing common tasks, such as searching for sharing information

You can access frequently used applications in Mac OS X by clicking their icons on the DOCK

Win8's tile-based interface is called the metro./modern UI or Start Screen

What does MS call the 32 or 64 bit installation environment in Win 7?q

WinPE

What does Microsoft call the 32 or 64 bit installation environment in WIndows 7?

WinPE

Settings app

Wind10 tool that combines a huge number of otherwise disparate utilities, apps and tools traditionally spread out all over your computer into one fairly unified, handy Windows app

You can right click on a user in the Users tab on the Task Manager to disconnect them

Windows 8.1 uses Bootmgr to boot the OS.

The CMOS chip also keeps track of the date and time. To maintain its date, CMOS requires a constant trickle of electricity supplied by a small battery on the motherboard. If the data you have stored in CMOS continues to disappear of it the date/time resets itself, it may be time to change the motherboard battery.

Within the system ROM is a CMOS setup program that lets you access and update on the CMOS chip. The terms CMOS setup program, CMOS and system setup utility are functionality interchangeable today. Most techs just call it CMOS. Two main manuf. of BIOS: American Megatrends (AMI_) and Phoenix Technologies (which includes Award Software)

EXAM TIP: You need to understand the difference between share permissions and NTFS permissions. Share permissions only apply to network sharing NTFS permissions affect both network and local access shared resources.

Workgroups are the most basic and simplistic of the three network organization. They are the default for almost efvery fresh installation of Windows. Workgroups lack centralized control over the netweork; all systems connected to the network are equals. This works well for smaller networks becaus there are fewer users, connections, etc

What Windows command line commands allow(s) for copying multiple files or entire directory trees from one directory to another and for copying files across a network?

XCOPY ROBOCOPY

Two popular web server programs are Apache HTTP Server and Internet Information Services (IIS). When you access a Web Site, your Web Browser asks the Web server to share the Web page files and then displays them. As your computer askis for the web page, we call it the CLIENT. That's the role of the host in this example, of the local host. THe remote computer that uses the website is a SERVER.

YOUTUBE, for example, use Web Servers that connect to massive video databases. Like normal Servers, these remote computers share the video with your client device, but they use special software capable of sending video fast enough that you can watch it without waiting.

The registry tracks everything about your computer, from file types to user preferences.

You an open the Task Manager directly by pressing CTRL-Shift-ESC

To add a tile to a group, LEFT CLICK it and drag it into that group

You can PIN a tile on the Start Screen

The command line interface functions as a basic installation and troubleshooting tool for techs in all operating systems. When you use a command line interface, the computer tells you it is ready to receive commands by displaying a specific set of characters called a prompt. You type a command and press enter to send it. The OS executes the command when it is finished,it displays a new prompt, often along with some information about what it just did. The new prompt means the computer is ready for your next instruction.

You can access the command line interface in Windows by entering CMD in the start menu search bar. To close the command line interface window, either click the Close box in the upper right hand corner of the window or type EXIT at the prompt and press Enter.

John's hypervisor enables all five of the virtual machines on his system to communicate with each other through the Network as a Service (NaaS) without going outside the host system.

You can create a Snapshot/Checkpoint as restore point for virtual machine.

Another hardware consolidation is a THIN CLIENT. May have fewer moving parts and produce less heat so its designers may remove unnecessary hardware such as optical drives and fans. Thin clients rely on high end servers, often by just functioning as a terminal for accessing one of many virtual desktops hosted by a powerful server.

You can make a snapshot or checkpoint of most VMs, saving their state so you can quickly return to it later, this can be great for performing risky maintenance with safety net.

Homegroup uses the idea tha people want to share their data, not folders. So homegroup skip folders completely and share your Windows libraries. A homegroup connects a groujp of computers using a common password - no special user names required. Each computer can be a member of only one homegroup at a time.

You can manage a domain from the command line with the netdom command

The Terminal rm command enables you to delete a file

Your system knows what program is associated with a particular file by that file's Extension

By lifting the arm on the _______ you can easily remove a PGA CPU.

ZIF Socket

If you have CMOS settings that keep reverting to defaults or if the clock in Windows resets itself to January 1st every time you reboot the system, the battery on the motherboard is losing its charge and needs to be replaced.

You can update the firmware in ROM by flashing the BIOS. Some motherboards enable you to update the BIOS through Windows programs, others come with drivers for USB devices and have a flashing utility built in.

John's hypervisor enables all five of the virtual machines on his system to communicate with each other through the Network as a Service (NaaS) without going outside the host system

You can use basic CLIENT SIDE VIRTUALIZATION to create and run virtual machines on a local system.

John's hypervisor enables all five of the virtual machines on his system to communicate with each other through the NETWORK as a SERVICE (NaaS) without going outside the host system.

You can use basic client side virtualization to create and run virtual machines on a local system

1280 x 1024 best quality on a monitor

You cannot repair a broken LCD panel on an LCD monitor

What is one of the advantages of Software as a Service?

You do not have to install the software

IPv6 extends the 32 bit IP address space to 128 bits. A complete IPv6 address always has eight groups of four hexadecimal characters

You may have up to three IPv6 addresses on your PC at one time: a link local addresss and two globral addresses.

How do you keep a group of associated files together?

You put them in a folder

You find that after installing WIn7, you cannot discern executable programs from others when looking at files in Explorer. Make sure you have hide extensions unchecked.

You should configure you system to automatically check for and install recommended updates.

Because power companies supply high voltage AC, the computer's power supply converts AC to low voltage DC that is then portioned out to the internal devices. Heat is a byproduct of electricity and must be controlled in the computer.

You use a Class C fire extinguisher for a computer equipment fire

What happens if you mix RAM sticks of different speeds?

Your computer may lock up every few seconds or provide corrupted data

folder

a collection of files stored on a computer

hybrid cloud

a combination of cloud resources from more than one other cloud type, such as community, private, or public

track

a concentric circle that serves as a storage area on a hard drive platter

Nodes

a connection point that can receive, create, store or send data along distributed network routes

SSH

a cryptographic network protocol for operating network services securely over an unsecured network

router

a device that has at least 2 IP addresses. One that connects to your LAN's switch and one that connects to the "next network." a device that transfers data from one network to another in an intelligent way

command

a directive to the computer to perform a specific task

measured device

a downside to using a public cloud, in some cases you are charged based on traffic and in other cases based on time.

Mission Control

a feature of MAC OS X that enables switching between open applications, windows and more.

root directory

a file that is not within a subfolder

Application Based Firewall

a firewall that is designed to protect an application, usually in front of a web server

Stateless firewall

a firewall that manages and maintains the connection state of a session using the filter en ensures that only authorized packets are permitted in sequence. Based on ACL and defined rules.

miniPCI

a form of PCI designed for use in laptops

Full virtualization requires an extra layer of sophisticated programming called a ___ to manage the vastly more complex interactions.

a hypervisor

what is a hypervisor and what does it do?

a hypervisor is an extra lawyer of sophisticated programming and it manages the vastly more complex interactions

app

a program for a tablet or smartphone. Also, a program written for the win 8-10 metro interface

application

a program that enables you to perform a specific task on a computer, such as write a document or play a game

spooler

a program that helps coordinate all print jobs being sent to the printer at the same time

file compression utility

a program that takes out redundancies in a file in order to reduce the file size

What should you configure in INternet Explorer if you want another computer to intercept web browser requests and pass those requests along using its own IP address?

a proxy server

What is used to take a photo identical copy of a physical hard copy of any kind of document?

a scanner

Virtual environments are stored as

a set of files

interrupt

a signal that tells the OS that is in need of immediate attention

utility program

a small program that performs many of the general housekeeping tasks for the computer, such as system maintenance and file compression

distribution or distro

a specific variant of Linux

a normal operating system uses programming called what to handle very low level interaction among hardware and software, such as task scheduling, allotment of time and resources

a supervisor

(FAT)

a table to keep track of which sectors hold which files

Swap file (page file)

a temporary storage area on the hard drive where the OS "swaps out" or moves the data or instructions from RAM that haven't recently been used. This process takes place when more RAM space is needed

Public cloud

a term used to describe software, platforms, and infrastructure delivered through networks that the general public can use. This is the cloud most people use. The public cloud sees examples of XaaS varieties: 1. Public IaaS 2. Public PaaS 3. Public SaaS

virtual desktop

a traditional desktop OS installed in a VM. A local system could run its own VM containing a one of these, or just connect to one of these running on a remote server.

Distributed Denial of Service (DDoS)

a type of denial of service attack that uses multiple devices on disparate networks to launch the coordinated attack from many simultaneously sources; zombies/drones used to direct attack on device.

Worm

a type of malware. A piece of code that spreads from one device to other WITHOUT attaching itself to another file. Often they pave the way for other attacks, send data to the attacker or corrupt or destroy data.

menu driven interface

a user interface in which the user chooses a command from menus displayed on the screen

system restore

a utility in Windows that restores system settings to a specific previous date when everything was working properly

Refresh your PC

a utility program in Win8 that attempts to diagnose and fix errors in your Windows system files that are causing your computer to behave improperly

The Start Up Repair

a utility serves as a one stop, do it all option. When run, it performs a number of repairs, including: repairs a corrupted Registry by accessing the backup copy on your hard drive restores critical boot files restores critical system and driver files rolls back any non working drivers uninstalls any incompatiible service packs and patches runs chkdsk runs a memory test to check your RAM

File history

a windows utility that automatically creates a duplicate of your libraries, desktop, contacts and favorites and copies it to another storage device such as an external hard drive

Task Manager

a windows utility that shows programs currently running and permits you to exit nonresponsive programs when you click End Task

VMWare's ESXi is an example of a(n) _____________.

bare-metal hypervisor

John's computer is an error that says bootmgr is corrupted. What tool can fix this problem?

bcdedit

Rapid Elasticity

because cloud servers are powered by virtual machines customers can add or remove capacity quickly by starting or shutting down new instances of the VM or moving the VMs to more powerful hardware.

You're connecting AT power supply to a motherboard. Which color wires of the power connector will be set adjacent to each other on the motherboard?

black to black

What command will repair a damaged boot record in a Win 8.1 PC?

bootrec /fixmbr

This is a term for describing when a VMs virtual NIC needs to piggyback the real NIC to get out to the network.

bridged network

Configuring TCP/IP

by default, this is configured to receive an IP address automatically from a DHCP serer on the network (and automatically assign a corresponding subnet mask). EXAM people believe admins give you the IP address, subnet mask and default gateway information and you plug them into the PC.

What are advantages of a virtual machine over a physical machine?

capability to quickly add and remove hardware consolidation of multiple physical machines

Slow performance

caused by storage space being almost full making it unable to save can have too many apps running at the same time, eating up RAM reboot the device

Which command do you use to change the focus of the command prompt to a different directory?

cddir

cd ../feb

change directories to the parent's parent and beyond (just specify the folder by name)

cd ..

change directories to the parent. Go up in the filesystem

When a system will not boot to the first hard drive, how does an administrator set the system to boot to an alternative disk, such as an USB drive?

change the Basic input - output (BIOS) Boot settings to use the USB drive.

A wireless network is experiencing intermittent connectivity. What would be a best resolution?

change the broadcast channel

what should you do if you want to change the rights first assigned to a user

change the groups to which the account belongs

The Windows tool that attempts to fix invalid filenames, erases lost clusters, and seals off bad clusters is called __________ (or chkdsk).

check disk (chkdsk)

After replacing a motherboard on a customer's laptop for a no sound issue, a technician realizes that there is intermittent wireless connectivity on the laptop. Which of the following should the technician perform FIRST? A. Reinstall the driver of the WiFi card. B. Check to see if there is a wireless switch on the laptop and its current position. C. Replace the wireless card because it is not fully compatible with the new motherboard. D. Check if the WiFi antenna is connected properly to the wireless card.

check if the WiFi antenna is connected properly to the wireless card

EXAM TIP: covers a lot of software, those mostly OS tools rather than specific application, Five MS OS make up the bulk of the coverage: Vista, Win7, Win8, 8.1 and Windows Phone/mobile. Win10 not so much but know it anyway. Apple get coverage of two OSs: OS X and iOS. Linux gets a generic nod and Good Android gets some discussion.

check out motherboard matching at totalsem/90x sim.

First thing to do -

check that correct drivers are installed If there is anything under other devices called "base System Driver" use optical driver disk to install correct drivers Download latest drivers online for video card, etc..

A customer says they cannot access the network printer. The technician cannot PING the printer from their location. Which of the following should be the NEXT step in troubleshooting this issue? A. Check the toner cartridge B. Reboot client PC C. Check the link lights on printer NIC D. Reboot the printer

check the link lights on printer NIC

Intel and AMD

chipsets are the two big boys. Any good tech should be able to make a recommendation to a client about a particular motherboard by perusing the specs.

Control Panel

collection of Windows applets or small programs that can be used to configure various pieces of hardware and software in a system

Hybrid cloud

combinations of public, private and community clouds and allowing connections between them.

cd

command = change directories changes to the directory you specify

pwd

command = print working directory outputs the name of the directory you are currently in

The ___________ tells you it is ready to ready to receive commands by displaying a specific set of character called a(n) ___________

command line interface prompt

chkdsk (/f /r)

command scans, detects, and repairs file system issues and errors. You can run this utility from a command prompt

touch

command to create a new empty file inside rthe current working directory syntax: $ touch filename.txt

4 functions of an OS

communicate with the hard drive organizing and manipulating programs and data accessing and supporting programs creating an user interface

Computers work through three basic stages called

computing process

What would the built-in firmware diagnostics of a system Basic Input/Output System (BIOS) allow you to do?

confirm the functionality of system components such as memory

The time it takes for sub pixels to go from pure black to pure white and back again is the LCDs response rate. Response rate is measured in milliseconds, with lower numbers being faster and better. An excellent LCD monitor has a response rate somewhere between 2 and 4 ms.

contrast ratio is the difference between the darkest and lightest spots a monitor can display. Monitor manuf. may market a dynamic contrast ratio measuring the difference between a full on and full off screen, but focus on the standard contrast instead.

How to create system image for backup

control panel-system and security-system-advanced system settings-system protection-configure or create restore point

Table PCs come in which form factors?

convertible and state

cp

copies files or directories

.[dot]

current working directory

Bridge

device that connects dissimilar network technologies that transmit the same signal

Which Windows command is functionality equivalent to the Linux is command?

dir

Which command pauses after displaying a screen's worth of directory contents?

dir /p ls /more

Which command pauses after displaying a screen's worth of directory contents?

dir p

hidden files

directories with a dot

root directory

directory that contains all the other directories and where the operating system is installed

impedance

effective resistance to the flow of alternation current electrical signal through cable

Software or hardware that converts the commands to and from the host machine into an entirely different platform is known as an

emulator

What does mirroring accomplish?

enables in/outbound traffic from switch ports to be duplicated at the mirrored port

SNMP (Simple Network Management Protocol)

enables remote inquiry and remote configuration of just about anything on a network. If you all computers, switches, routers, etc. are SNMP-Capable, you can use programs to query the network for an unimaginable amount of data. SNMP is a popular protocol for checking up on your network but you won't use unless you are a network tech.

nslookup

enables you to determine exactly what information the DNS server is giving you about a specific host name.

"format" command

enables you to format volumes (hard drive) from the command line

Today, a single virtualization host

enables you to support a huge number of OSs with one machine

ifconfig

enables you to view and change settings for your network connections

Guests (virtual machines)

environments on virtual machines.

You can never have an IP address that ends with a 0 or a 255.

example you can have an address starting at 192.168.41 and ending at 192.168.4.254: a total of 254 addresses.

What does virtualization help you to avoid purchasing?

expensive hardware that is rarely if ever run at full capacity during its lifetime

root directory

first directory in the file system, the present of all other directories and files in the filesystem and create "child" directories

A user wants to track his movements and heart rate. Which of the following devices should he choose?

fitness monitor

The /F switch of the CHKDSK utility

fixes errors on the disk

Powerful hypervisors like ESXi are often booted from

flash memory

common volume letter assignments: A

floppy drive

Virtualized Operating Systems use the same security features as real Operating Systems

for each Virtual machine user account, you will need to keep track of user names, passwords, permissions and so on

Three variable and interrelated characteristics define modern motherboards:

form factor chipset Components

Small Form factors

form factors that with lower power usage

If a traditional physical system goes down due to hacks, malware, etc. how to do you restore it

from a backup or the OS installation media

Martha the tech gets a frantic call from a junior engineer who says he seems to be losing files and thinks maybe his hard drive is bad. After some discussion, it turns out the engineer's system runs Ubuntu Linux. In such a scenario, which tool should Martha run (or have the engineer run) to scan his hard drive for errors?

fsck

Which VMware product is used on Mac systems?

fusion

Library

gathers categories of files from different locations and displays them as if they were all saved in a single folder, regardless of where they are physically stored.

Function of software

gives instructions to the computer, tells it what to do and when to do it.

iwconfig

gives you all the wireless details about your wireless NICs

which program is not built in executable file in Linux?

gnome-calculator

tilda (~)

go back to home directly

In virtual computing, software called a hypervisor creates one or more environments on a single machine, called a HOST. Each of these environments is called a virtual machine (VM) or guest.

going virtual enables companies to combine multiple systems onto fewer machines than in traditional computing. This saves on hardware, etc. A common use its replacing multiple physical servers with a virtual machine running on a more powerful server made for hosting VMs.

public cloud examples

google drive icloud

What is the command to open the Group Policy console?

gpedit.msc

What commands in Windows can be used to display help information related to a specific command line utility?

help [command name] [command name]/?

What are the characteristic features of the In-Plan Switching (IPS) LCD panel technology?

high color quality wide viewing angles slow response times

shift key

hold down to select a group of contiguous files

CTRL key

hold down to select a group of random (non-contiguous) files

What custom configuration do not benefit from enhanced graphics?

home server PC, thin client

A physical system that runs specialized virtualization software is called a

host

What command, identical in both Windows and Linux, will tell you the name of the computer?

hostname

What command, identical in both Windows and Linux, will tell you the name of the computer? A. hosts | grep B. whoami C. hostname D. net name

hostname

Dynamic addition of memory (hot-add) into a virtual machine depends on:

if the guest OS supports dynamic addition

WHat Terminal command will display a workstation's IP address?

ifconfig

What Terminal command will display a workstation's IP address?

ifconfig

What is the primary benefit to adding more RAM to a laptop that uses that uses shared memory?

improved system performance

Action Center

in Win7-8.1 provides an aggregation of event messages, warnings and maintenance messages that might replace Event Viewer as the first place to look for messages. Only compiles the information taken from Event viewer, Windows Update, Firewall and UAC.

charms

in Win8 and 8.1 tools located in the hidden Charms bar, such as a search function, a sharing tool, a settings tool and more

form factor

industry standard for the physical organization of motherboard components and motherboard size

command drive interface

interface between user and computer in which the user enters the commands to communicate with the computer system

Graphical User Interface (GUI)

interface that enables user to interact with computer graphically, by using a mouse or other pointing device to manipulate icons that represent [program or documents, instead of using only text as in early interfaces

A flashing green light means

intermittent activity

Providers

internet to companies called internet service providers (ISPs). ISPs essentially sit along the edges of the Tier 1 and Tier 2 internet and tap into the flow. In turn, you can lease connections from an ISP to get on the internet.

library

introduced with Win7, a folder that's used to display files from a different location as if they were all saved in a single folder, regardless of where they are actually stored in a file hierarchy

To discover the MAC address in Windows

ipconfig /all

The benefit of MAC filtering in wireless networking is that the network: A. is encrypted. B. is not visible. C. uses static IP addresses. D. is more secure.

is more secure

Desktop

is the utility that is the main screen/user interface used in all versions of windows

Containment

is when companies use virtualization to deploy all new applications as virtual machines

If a device connection supports Digital Rights Management (DRM) capabilities, what benefit does it offer?

it can control access to copyrighted content that is presented in digital format

What does a Supervisor do?

it handles very low level interaction among hardware and software

IPv6 rewritten with dropped 0s

leading zeros can be dropped from any group, so 00CF becomes CD and 0000 becomes 0. so we write it like this now: 2001:0;0;3210;800;200C:CF:1234 you can remove one or more consecutive groups of all zeros, leaving the two colons together using the :: rule. Rewrite the top like: 2001::3210:800:200C:CF:1234

Community cloud

like a private cloud paid for and then used by more than one organization. Cloud network serves a community or group with shared needs and interests such as hospitals or defense contractors

ls

lists file and folders into working directory

bootrec /rebuildmbr

looks for windows installations not currently in the BCD store and gives you the choice to add them to the BCD store

What is the measurement for the brightness of a projector?

lumens

Traditional hard drives with spinning metal disks are known as

magnetic hard drives

mkdir media

make directory command that makes a new directory with the name specified

What can you type before a Terminal command to access help for that command?

man

What command enables you to make a new directory in a Win7 Professional system?

md

Solid Green link light

means connectivity

Data Storage

means saving a permanent copy of your work so you can come back to it later. It works like this: first, you tell the computer to save something. Second, the CPU processes that command and stores the data. Third, the computer shows you something, such as a message saying that the data is stored. Any work that you dont save is lost when you turn the computer off or exit the application

What configurations would be most appropriate for thin client system?

meeting the min requirements to run the selected OS

Hypervisors manage the virtual machine's memory use of physical memory through the implementation of ____________.

memory mapping tables

The ability to allocate more virtual memory than physically exists on a host server is called _______________.

memory overcommit

When using snapshots, you can incorporate changes made into the base virtual machine by ______________.

merging snapshots

The installation of virtual machine tools, while very beneficial, is not a mandatory step in the creation of a virtual machine.

mice, keyboards and graphical displays are all examples of Human Interface Devices (HIDs)

A(n) ___________ requires exactly two volumes and is extremely fault tolerant.

mirrored volume

What Linux command is used to create a new directory?

mkdir

AIPIPA

modern OS supported feature that automatically assigns an IP address to the system when the client cannot obtain an IP address automatically The system can communicate only with other comnputers on the same subnet It is enabled by default if your system is configured to obtain an IP address automatically

Layers of the PCB (Printed Circuit Boards)

modern motherboards are layered PCBs, copper etched onto a nondconductive material and then coated with some sort epoxy for strength. The layers mask some of their complexity. You can see some of the traces on the board, but every motherboard has four or more layers thick.

To discover ther MAC address in Windows, type ipconfig/all at a command prompt and press ENTER. You will find the MAC address listed as the Physical Address under the Ethernet adapter Local Area Connection category.

most networks today employ some form of Ethernet to define things like frame type and cabling. The vast majority of 10/100/1000BaseT networks run on unshielded twisted pair (UTP) cabling. Switches provide the central connection point in the Ethernet star but topology. Most network cables connect with RJ-45 connectors.

To move a file from the root directory into a subfolder, use the

move command

mv

moves files renames files -to move a file into a directory, use mv with the as the first argument and the destination direct and second argument - to move multiple files into a directory, use mv source files as the first arguments, and the destination directory as the last argument - to rename a file use mv with the old file as the first argument and the new file as the second argument

desktop environment (DE)

name for the various user interfaces found in Linux distributions

To provide the optimal display for an LCD monitor, always set it to its _________.

native resolution

What command line utility would you run to show a list of network computers?

net view

The correct syntax for discovering which network shares on a particular server are mapped on your computer?

netview \\fileserver

NOS

network OS, communicates with hard drive, contains 3 groups = client server, peer to peer, domain based

protocols

network protocol software, takes new data received by the network card and sends it to the correct applications, it keeps things organized

battery usage affected by

network usage constant use of GPS or location services screen display brightness

Win8

newest release of MS OS that provides, a new interface optimized for touch-screen devices

How is the brightness of a monitor measured?

nits

No green light means

no connectivity

You have just taken over network support for a small company. They are currently using MAC filtering to secure their wireless network. Is this adequate or not and why or why not?

no, you should have WEP or WPA encryption as well.

WindowXP

nothing more than a premade Win XP SP3 virtual machine that runs under MS popular virtualization program, Windows Virtual PAC.

down arrow

open selected item

-t

order files and directories by the time they were last modified

pwd (print working directory)

outputs the name of the directory you are currently in with ls you can find where are you in file system

user interface

part of the OS that enables individuals to interact with the computer

You connect a workstation to the wall outlet with a _______________.

patch cable

chkdsk /f

perform logical check of file system for errors (does not look for physical sectors)

chkdsk /r

perform logical check of file system for errors AND perform physical check of hard drive sectors

The number of running virtual machines on a single host is limited by what factor?

physical RAM

hardware

physical computer equipment such as electrical, electronic, magnetic and mechanical devices. Anything in the computer world that you can hold in your hand such as a hard drive.

What are the handy TCP/IP tools to use to configure TCP/IP

ping, ipconfig, ifconfig, nsloopup, tracers and traceroute

Reverse Proxy Server

placed in front of web servers, reverse proxy servers protect, hide, offload, and distribute access to web servers

The combination of an OS and a specific processor is referred to as a computer's ___________

platform

Secure hypertext transfer protocol (SHTTP or HTTPS)

port 443

Domain Name SYstem (DNS)

port 53

what important benefit of virtualization provides significant cost savings in utility usage

power savings

command line interface

powerful and quick tool for working with a PC. Creates an instant messaging conversations with the computer.

Powershell

powerful command line interface. Brings cmdlets that are powerful tools

Common volume letter assignments C:

primary drive

What does QoS provide?

priortized throughput of different traffic types

What countermeasures prevents should surfing?

privacy filters

SSL

protocol to manage the security of the website by encrypting the data exchanged in that site

Infrastructure as a Service (IaaS)

providers that use virtualization to minimize idle hardware, protect against date loss and downtime, and respond to spikes in demand. Anything with configuring software and hardware.

Recovery Console

provides a command line interface for working with Windows before the GUI starts. Press R to start the Recovery Console. You will see a message about ntdetect, another message that the Recovery Console is starting up.

"/?" command in Windows

provides a list of help commands and all possible switches for the dir command.

System Information

provides a wide variety of information about a computer

"ps" command

provides detailed and customizable information about the processes running on your system

Joey wants to change the name of a file from start.bat to hammer.bat. Which of the following commands would accomplish this feat?

ren start.bat hammer.bat

The time it takes to redraw the entire screen is called the

response rate

What do you wassign to a user account to give the user certain privileges on the system such as the ability to change the system date and time?

rights

client-side virtualization

running a virtual machine on your local (as opposed to running them off a server or somewhere else)

virtualization

running multiple systems simultaneously on one physical computer

data storage

saving a permanent copy of your work so that you can come back to it later.

The SFC utility in WIndows

scans for and restores corrupted system files

operating system (OS)

series of programs and code that create an interface so users can interact with a system's hardware and peripherals. Examples - Windows, MacOX, Linux

The PDU with which a network management station (NMS) commands an agent to make a change to a management information base (MIB) object.

set

In a SOHO wireless network, which of the following prevents unauthorized users from accessing confidential data?

set encryption

expansion bus

set of wires going to the CPU directly connected to expansion slots governed by the expansion bus cystal

What should you do to attain optimal image quality with an LCD monitor?

set the resolution to native

What type of cabling is rarely seen in networking implementations?

shielded twisted pair

TRACERT

shows the route of a packet to its destination

"shutdown" command

shuts down a remote or local computer

Thin Client

simple but durable, may not need hard drives, fans or optical drives, because they access servers

context menu

small menu brought up by right clicking on objects in Windows

Gadget

small tools, such as clocks or calendars, in WinVista and 7 that are placed on the Sidebar.

A point in the time backup of a virtual machine is called a

snapshot

Most virtual machines (VM) allow you to make what

snapshots and checkpoints

One hexadecimal character represents 4 bits

so four hexadecimal characters make a 16 bit group

emulator

software or hardware that converts commands to and from the host machine into an entirely different platform

virtualization eliminates the need to keep several machines on hand with various OSs for

software testing support or similar purposes

Rapid Elasticity

storage, network bandwidth, and computing capacity can be increased or decreased immediately, allowing for optimal scalability

ROM

stores programs called services

Platform as a Service (PaaS)

supports the deployment of entire systems including hardware, networking, and applications using a pay-per-use revenue model

Extra text that you type after a command to modify its operation is called a

switch

what network device works at the Data Link layer of the OSI model?

switch bridge

cd (change directory)

switches you into the directory you specify changes the work directory

What is one important reason to implement virtualization?

system management

The Task Manager accessed by pressing ctrl-shift-esc once, enables you to see all processes and services currently running or to close a process that has stopped working

task manager

you forgot the BIOS password of your computer. What are the ways you can reset the password?

temporarily remove the CMOS battery, clear the CMOS by shorting the jumper

directories

terminology that means folders

CLI

text based, text interface for computer operating system using terminal as access

ls -a

the -a modifies the behavior of ls command to also list the files and directories starting with a dot (.)

A good patch cable should include a boot

the 10BaseT and 100BaseT standards require TWO pairs of wires.

FE80:

the 1st 64 bits of a link-local addresses which means every address begins with FE80:0000:0000:0000

Multitask

the ability of an OS to perform more than one process at a time

What capability does a modem card add to a computer?

the ability to communicate over the phone and computer lines

Desktop

the background of the Windows graphical user interface where you typically see icons. User's primary interface to the Win OS.

path separator

the backlash mark (\) used by MS and DOS in file names. MAC files use a colon (:) and UNIX and Linux use the forward slash (/) as the path separator.

platform

the combination of a computer's OS and processor. The two most common platform types are the PC and Apple.

what component of the motherboard saves information such as the system data and time while the computer turned off?

the complementary metal-oxide seminconductor (CMOS)

Resource pooling

the consolidation of system's physical and time resources

If an admin applies a deny permission to a folder or file, what does that deny permission to do allow any permissions that might have been granted to users?

the deny permissions overrides any allow permissions

working directory

the directory you are current in

kernel (supervisor program)

the essential component of the OS that's responsible for managing the processor and all other components of the computer system. Because is stays in random access memory (RAM) the entire time the computer is powered on, the kernel is called Memory Resident.

start screen

the first interaction you have with the Windows OS and the pace where you begin your computer activities

source code

the instructions programmers write in a higher level language

Guy has a new laptop and complains about getting headaches when using it. What could be wrong?

the laptop uses an LED display in power saving mode.

Mail Server

the networked host you use to access email messages

Metro UI

the original name for the Windows 8 user interface. Due to legal concerns, it was rebanded the "Modern UI"

root directory

the parent of all the directories and files in the filesystem each directory has a parent/child relationship

After a sudden power outage, Morgan's PC rebooted, but nothing appeared on the screen. The PC just beeps at him, over and over and over. What's most likely the problem?

the power outage toasted his RAM.

When multiple output devices are connected to a computer, what is the result of selecting the Extend display option on a Windows machine?

the primary monitor will show the typical desktop and the second monitor will provide extra space for separate applications

A customer purchases a new 802.11n router for their home. They connect it to their current 801.11g devices, as well as their new laptop. Even though the laptop has a built-in 802.11n antenna, they are not noticing any speed increase. Which of the following is the MOST likely cause? A. The laptop is not close enough to the router. B. The router should be set to "G-Only". C. The router is broadcasting in Mixed Mode. D. The laptop needs a dedicated access point.

the router is broadcasting in Mixed Mode

What are Networked VMs exposed to

the same risks and present the same risks to other networked devices

processing

the second step of the computing process, where the CPU completes the tasks that the user's input has given it.

system software

the set of programs that enables a computer's hard ware devices and applications software to work together; it includes the OS and utility programs

virtual memory

the space on the hard drive where the operating system stores data if there isn't enough random access memory to hold all of the programs you are currently trying to run

host

the system running a virtual machine

OS system (OS)

the system software that controls the way in which a computer system functions, including the management of hardware, peripherals and software

Super IO Chip

the third chip in the chipset special specially designed for low speed, legacy devices such as the keyboard, serial and parallel ports

root directory

the top level of the filing structure in a computer system. In Windows computers, the root directory of the hard drive is represented as C:\

Infrastructure as a Service (Iaas)

the use of virtualization to minimize idle hardware, protect against data loss an downtime, and respond to spikes in demand

authentication

the verification of your login name and password

virtual switches

the virtual version of a physical network switch. Hypervisors use these to connect machines between visual networks

If a stock heat-sink and fan assembly can't handle an overclocked CPU, a solution based on __________________ might do the trick.

thermal paste

guest

these environments are also known as virtual machines (VMs), this is an operating system running inside a virtual machine

QWORD value

these values are like Binary values but are limited to exactly 64 bits

Virtual Private Network (VPN)

they are private and secure. An encrypted tunnel requires endpoints - the end of the tunnel where the data is encrypted and decrypted. VPNs require a protocol that itself uses one of the many tunneling protocols available and adds the capability to ask for an IP address from a local DHCP server to give the tunnel and IP address that matches the subnet of the local LAN. The connection keeps the IP address to connect to the internet, but the tunnel end poinds must act like NICs.

What is the main difference between the Rambus Inline Memory Module (RIMM) and Dual In-line Memory Module (DIMM) form factors?

they have different pin settings

IPv4

this addressing scheme consists of 4 sets of eight binary numbers (octets), each set separated by a period it is a 32 bit that only offers 4 billion addresses

ifconfig

this command in Mac OS X and Linux provides that same level of detail with NO SWITCHES applied

ping

this command provides a great way to see if you can talk to another system. Go to the command prompt and type ping followed by an IP address or DNS name, such as ping www.chivalry.com. Press ENTER and see what what happens.

In WinVista and 7, you can use the SYSTEM PROTECTION feature to recover previous versions of corrupted or deleted files

to run a program written for XP in Win7 computer, you use Win XP Mode if you encounter problems

magic packet

to wake up PC with Wake on LAN, you will need to use a second PC to send either a special pattern or a MAGIC PACKET which is a broadcast packet that essentially repeats the destination MAC address many times a powered down or sleeping PC knows to look for this special pattern or packet, at least after configured to do so

You are trying to locate which patch cable in the main switch traces back to a particular computer. Which tool should you use?

tone probe

ipconfig`

tool that takes a quick glance at your network settings

You're working with a laser printer that has a failed transfer corona. What is a function of transfer corona in the laser printer?

transferring toner from the drums to the paper

Emulator

translates commands issued by software in order to run it on hardware it wasn't designed to run on

What layer of the OSI model signals "all clear" by making sure the data segments are error free?

transport

Out of tolerance condition in an SNMP managed device

trap

The address bus enables the CPU to communicate with the MCC

true

You can upgrade your CPU you if you make sure that a new CPU will fit into the socket on your motherboard

true

IF the connection light says the connection is good, the next step is

try to copy a file or do something else to create network traffic. If the activity light does not flicker, there is a problem

What do you need to be able to decode NTSC transmissions for viewing on a computer?

tv tuner card

What LCD technology offer the fastest response time?

twisted nematic (TN)

zero day attack

type of attack, exploits a previously unknown vulnerability in an application or OS

Dictionary attack

type of attack. Automates password guessing by comparing encrypted passwords against a list of possible values.

brute force attack

type of attack. Uses password-cracking software to try every possible alphanumeric combination

man in the middle attack

type of attack; a form of eavesdropping where the attacker makes an independent connection between two victims and relays information between the victims as if they are directly communication over a close connection, when in reality the attacker is controlling the information that travels between the victims

eavesdropping/sniffing attack

type of attack; uses special monitoring software to intercept private network communications, either to steal the content or the communication itself or to obtain user names and passwords for future software attacks

Manage user authentication

type of best picture consisting of: - change the default user account name and password on each device - require all users to create strong passwords and to protect those passwords - when necessary, implement multifactor authentication, including smart cards or biometric authentication systems

install updates and patches

type of best practice consisting of - install the latest OS service packs and security updates - install the latest application patches for OS utilities and web browsers, not just third party applications

Apply device security measures

type of best practice consisting of: - install and configure firewalls - use warning messages and banners at user login - disable the autorun feature for external storage devices - enable screen locks for idle systems - enable automatic OS updates - limit the shared resources available on a system

Manager user accounts

type of best practice consisting of: - use policy settings to disable guest and other unneeded accounts - restrict user permissions

Logic Bomb

type of malware. A piece of code that sits dormant on a target device until it is triggered by a specific event such as a date. Then, the logic bomb "detonates" and performs the actions it was programmed to do, such as erasing and corrupting data on the target system.

virus

type of malware. A piece of code that spreads from one device to another by attaching itself to other files is opened. Often they pave the way for other attacks, send data to the attacker or corrupt or destroy data.

Trojan

type of malware. A software attack that paves the way for other attacks. Social engineering is involved, since the user must be tricked into running the Trojan horse software

Rootkit

type of malware. Code that takes control fo a system at the lowest levels. Rootkits often attempt to hide themselves from monitoring or detection, and modify low-level system files when integrating themselves into a system.

Ransomware

type of malware. Malicious code that restricts access to a user's device or the data stored on it until the victim pays the attacker to remove the restriction. Ransomeware if often implemented as a Trojan horse and can use file encryption to restrict access to data.

Adware

type of malware. SOftware that is automatically displays or downloads advertisements when it is used. While not all adware is malicious, many adware programs have been associated with spyware and other types of malicious software.

Spam

type of malware. Spam is an email based threat that presents advertising materials, promotional content or get rich quick schemes to users. THe messages can quickly fill a user's inbox and cause storage issues. Spam can also carry malicious code and other types of malware.

Spyware

type of malware. Surreptitiously installed malicious software that tracks and reports the usage of a target system, or to collect other data the author wants to obtain such as web browsing history, personal information, banking and other financial information and user names and passwords

ipconfig/renew

type this command if your using DHCP and to get a new IP address

ipconfig/release

type this command if your using DHCP and to give up the IP address you currently have

ipconfig/all

type this with the switch to see all of your TCP/IP settings

Switch

typically connects broadcast domains

If a system goes down due to hacking, malware, etc. Virtualization, the Host machine, Hypervisor, and any other VMs it runs are generally what

unaffected and uninfected

What I/0 ports has the slowest data transfer rate?

usb 1.1

What ports are able to transfer data at the rate of 400 Mbps and more?

usb 2.0, firewire, usb 3.0

System File Checker

use it to check and replace a number of critical files, including the ever important DLL cache1

How to back up -

use the file history to back up to external drive


संबंधित स्टडी सेट्स

Skin Integrity and Wound Care Prep U

View Set

Achieve 3000: Notes from the Emoji Graveyard

View Set

MAR4156 Int'l Marketing Ch. 3 Midterm Bank

View Set

Rivieren,watervallen en woestijnen.

View Set

Algebra 2 Solving Logarithmic Equations

View Set

Quiz Set 3, Quiz Set 2, Quiz Set 1 (qef)

View Set

GEB module 2 quiz (chapter 4 and 7)

View Set

Study Guide: Economic Sectors and Factors of Production

View Set