CompTIA A+ Vocabulary & Terms

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Administrators

Can perform all management tasks and generally has very high access to all files and objects

MSConfig

Microsoft Configuration

PCI

Peripheral Component Interconnect

PAL

Phase Alternating Line

PGA

Pin Grid Array

PGA2

Pin Grid Array 2

PGP

Pretty Good Protection

PRI

Primary Rate Interface

SSID

Service Set Identifier

SEC

Single Edge Connector

SPGA

Staggered Pin Grid Array

SRAM

Static Random Access Memory

TPM

Trusted Platform Module

dir/p

lists files one screen at a time

NetBIOS Datagram Service (nbdatagram)

-UDP 138 -connection-less version of nbsession

Windows 7 Editions

- Windows 7 Starter - Windows 7 Home Basic - Windows 7 Home Premium - Windows 7 Ultimate - Windows 7 Professional - Windows 7 Enterprise

MM

specifies the month in numerical or text format in cron

Remote Disc

A feature of OS X that gives other computers on the network access to the Mac's optical drive. system preferences -> Sharing

32-bit PCI Parallel Bus

-32 bits sent at the same time

Bash shell script comment

#

PCIe v3.x

- ~1 GB/s of throughput per lane in each direction

PoE Switches

-Power over Ethernet -Commonly marked on the device

Airprint (Sharing from an OS)

-Printing from an iOS device directly to a compatible printer

Micro SD card

-Smaller than Mini-SD Card

+3.3V

-provides power M.2 slots, RAM slots, mobo logic circuits

environment variable

A storage location in the environment of the operating systems command shell.

FAT12

12-bit file allocation table (FAT12) A file allocation table which uses 12 bits for addressing clusters.

WUXG

A Wide Ultra Extended Graphics Array

tasklist

A command-line version of the Task Manager

Spotlight Search

A search tool in the macOS

APM

Advanced Power Management Is an API developed by Intel and Microsoft and released in 1992[1] which enables an operating system running an IBM-compatible personal computer to work with the BIOS (part of the computer's firmware) to achieve power management.

ATA

Advanced Technology Attachment Is the official name that American National Standards Institute group X3T10 uses for what the computer industry calls Integrated Drive Electronics (IDE).

AC

Alternating Current

System Information

An application used to provide detailed diagnostic information about your mac

Power Users

Appears in legacy applications but is deprecated because the rights allocated to this account type can be abused to allow the user Administrative or System privileges

APFS

Apple File System - used in macOS High Sierra or later which supports native file encryption

Activity Monitor

Apple verstion of performance monitor

Disk Utility

App in macOS used to verify or repair a disk or file system

Remote Assistance

Assigns a port dynamically from an ephemoral range

bootrec

Attempts to fix startup problems.

BITS

Background Intelligent Transfer Service - a protocol in which the computer is enabled to browse update.microsoft.com and select updates for download and installation

Control panel

Best place to configure your system in Windows 7

BCD

Boot Configuration Data

CD

Compact Disc

CIA

Confidentiality, Integrity, Availability

Performance Monitor

Configures detailed reports on different system statistics and log performance over time(can be accessed through administrative tools, Computer Management or perfmon.exe command line)

DIN

Deutsche Industrie Norm

chkdsk C: /x

Dismounts volume C:

HTML

Hypertext Markup Language The standard markup language for documents designed to be displayed in a web browser. It can be assisted by technologies such as Cascading Style Sheets (CSS) and scripting languages such as JavaScript.

ICR

Intelligent Character Recognition

IRP

Incident Response Plan

I/O

Input/Output

IEEE

Institute of Electrical and Electronics Engineers

MBR

Master Boot Record

MSDS

Material Safety Data Sheet

MAC

Media Access Control/Mandatory Access Control

MAN

Metropolitan Area Network

MDM

Mobile Device Management

MDM

Mobile Device Management - a class of enterprise software designed to apply security policies to the use of smartphones and tablets in a business network

MFA

Multifactor Authentication

MFD

Multifunction Device

MFP

Multifunction Product

MUI

Multilingual User Interface

MIMO

Multiple Input Multiple Output

MIME

Multipurpose Internet Mail Extension

NTSC

National Transmission Standards Committee

NAC

Network Access Control

Windows key + r

Opens the Run dialog box

OS

Operating System

PVA

Patterned Vertical Alignment

PCI

Payment Card Industry

64 bit application files location

Program Files

32 bit application files location

Program Files(x86)

PHI

Protected Health Information - medical and insurance records, plus hospital lab results

Windows Registry

Provides remotely accessible database for storing, operating system, device, and software application configuration information

PKI

Public Key Infrastructure

PSTN

Public Switched Telephone Network

.py

Python

QoS

Quality of Service

nslookup -Option Host Server

Queries a dns server about a host

RJ-11

Registered Jack Function 11

RJ-45

Registered Jack Function 45

crontab -r

Removes jon from a scheduled list in cron

RIP

Routing Information Protocol

S.M.A.R.T

S.M.A.R.T. Self-Monitoring, Analysis, and Reporing Technology

SLI

Scalable Link Interface or System Level Integration ot Scanline Interleave Mode

SSH

Secure Shell is a network protocol for secure transfer of data between computers on port 22

SSL

Secure Sockets Layer

SATA

Serial Advanced Technology Attachment

SAS

Serial Attached SCSI

SMB

Server Message Block

STP

Shielded Twisted Pair

netstat -b

Shows the process that has opened the port

Three most effective types of physical data destruction?

Shredding, Incineration, Degaussing

SCSI

Small Computer System Interface

Saas

Software as a Service

SSD

Solid State Drive

SPDIF

Sony-Philips Digital Interface Format

ST

Straight Tip

SIM

Subscriber Identity Module

SFC

System File Checker

kernel

The software component that provides the core set of operating system functions

Destination Unreachable

There is no routing information

PCI 133 MB/s Throughput

Throughput for a bus running a 32-bit card at a 33MHz clock rate

TDR

Time Domain Reflectometer

TCP

Transmission Control Protocol

TCP/IP

Transmission Control Protocol/Internet Protocol

TLS

Transport Layer Security

TFTP

Trivial File Transfer Protocol

UTP

Unshielded Twisted Pair

USMT

User State Migration Tool

VoIP

Voice over Internet Protocol

ZIF

Zero-Insertion-Force

JavaScript escape character

\

Mission Control

a feature of macOS that enables a user to set up one more desktops with different sets of apps and backgrounds

ISO file

a file that contains all the contents of an optical disc

vi/vim

a text file editor in linux

workgroup

a windows peer-to-peer network

shutdown -a

aborts command prompt shutdown

hive

binary files that store the registry database

fsck

checks partition errors (partition should be unmounted before running this tool)

cls

clears the command prompt screen

dir *.*

displays all files and directories in the current directory

gpedit.msc

group policy snap in

clean install

installing an new OS that completely replaces the old one

script file

is a text document containing commands for the operating system. The commands are run in the order they are listed

dir/w/p

lists both wide format and one screen at a time

telnet

port 23

control + C

quits a running program in command prompt

rm -r

removes a directory and its contents recursively

tasklist /svc

shows a list of services within each process

kill

stops a process using its Process ID

system protection tab

tab in system properties that provides option for system restore

command

the command or script to run along with the full path to the file

confidential

the information is highly sensative, for viewing only by approved persons within the organization

apt-get upgrade

update all packages with latest versions

linux user commands

useradd, usermod, userdel

jitter

variation in delay

0

---

1

--x

USB 1.1 Full Speed

-12 megabits per second -5 meters

Blu-ray disc

-25 GB for single-layer -50 GB for dual-layer

PCIe v1.x

-250 MB/s of throughput per lane in each direction

Off-Site Email Applications

-A challenge to maintain -Need to purchase your own servers and storage -A support team will need to be trained to manage the servers -Ongoing backup and maintenance required

Zero Insertion Force (ZIF) socket

-A socket full of holes that matches the CPU -Contains a small lever that helps install the CPU without any pressure

Shielded Twisted Pair (STP)

-Additional shielding protects against interference -Shield each pair and/or the overall cable -Also contains a grounding wire / requires the cable to be grounded

Resource Pooling

-All of the computing power in one place -One large resource instead of many small resources -Small servers can be virtualized in the larger server

Safety Tips

-Always disconnect from a power source when working on a device -Never connect your body to any part of an electrical system

Windows BitLocker disk encryption

-BIOS integrated with TPM

Laptop Optical Drives

-Becoming too large for portable devices -Difficult to find -It is often removable and replaced with another component -when available, it can read and write (CD-RW/CD-ROM and DVD-RW/DVD-ROM)

Laptop Volume Settings

-Can be a standalone key to higher or lower sounds -Can be a FN key to higher or lower sounds -Often includes a mute option for both standalone or the FN key -Laptop can also have both option to higher and lower sound with standalone key and FN key

Laptop Smart Card Reader

-Can be integrated (built into the laptop) -Can be external (connected via USB)

Mobile Device Memory

-Can increase storage capacity of smartphone or tablet -Common on Android devices -Not available on iOS devices

Preferred Roaming List (PRL) Updates

-Common to CDMA networks (i.e., Sprint, Verizon) -Allows your phone to connect to the right tower -Can be updated Over-The-Air

F-Connector

-Commonly used for cable tv or cable modems -Threaded connection -RG-6 or RG-59 cable

Computer Power Supply

-Computer uses DC voltage -Most power sources provide AC voltage -Converts 115V AC or 220V AC to 3.3V DC, 5.5V DC, or 12V DC -You'll know when this isn't working

Barcode/QR code reader

-Connected with serial, USB, or 802.11 WiFi -Camera phone can also act as a reader

Managed Switches

-Contains VLAN support -Interconnect with other switches via 802.1Q -Can prioritize certain type of traffic -Redundancy support (Spanning Tree Protocol (STP)) -External management can be done using SNMP -Can configure port mirroring to capture packets

Level 3 Cache (L3 cache)

-Could be shared memory across all cores

BitLocker and EFS

-Data confidentiality is the most important asset • Encrypt important information -Encrypting File System • Protect individual files and folders • Built-in to the NTFS file system -BitLocker • Full Disk Encryption (FDE) • Everything on the drive is encrypted • Even the operating system -Home and business use • Especially on mobile devices

Micro-USB and Mini-USB Connections

-EU standardized on Micro-B USB Plug (now common worldwide) -Older devices may use Mini-B USB Plug (larger than Micro-B)

GPT partition style

-GPT (GUID Partition Table) • Globally Unique Identifier • The latest partition format standard -Requires a UEFI BIOS • Can have up to 128 primary partitions • No need for extended partitions or logical drives

Thermal Paper Replacement

-Get the exact kind and size for your thermal printer (impossible to substitute) -Paper is inexpensive (right specifications is needed) -To small or large paper can cause paper jams -Replacement process is easy (open cover, remove roll, insert new roll, and press a feed button to confirm paper is being fed)

Expansion Cards

-Graphics (Video) cards -Audio cards -Network cards (multiport ethernet for servers) -USB cards -Storage cards (SSD) -eSATA cards

Carriage and Belt

-Holds the ink cartridges in place -May include its own print head -Moves the ink cartridges over the paper

M.2 B key

-If the drive is connecting to a device that supports a B key, then it will use 2 lanes of the PCI Express bus (PCIe x2 at a maximum)

Global Positioning System (GPS)

-In Car navigation system -Requires view of the sky to receive signals from satellites -Periodic updates needed either Over the air or through a memory card

802.11 a/b/g/n/ac printer connectivity (Wireless Device Sharing)

-Many devices using an access point -known as infrastructure mode

Category 3 cable (Cat 3)

-Max Supported Ethernet Standard - 10BASE-T -Max Supported Distance - 100 meters

Windows on a mobile device

-Microsoft Windows 10 • Fully-featured tablets -Many different manufacturers • Touchscreen computer • Keyboards • Pen stylus -Windows Mobile • No longer in active development • No support after December 2019

Step 5 : Transferring

-Moves the toner from the photosensitive drum to the paper

All-In-One (AIO)

-Multifunction (printer, scanner, copier, fax)

Hyper-Threading Technology (HTT)

-One CPU acts like two -Does not work as fast as two (15% to 30% performance improvement) -OS must support it (Windows XP and later) -any modern OS

Non-ephemeral ports

-Permanent port numbers -Ports 0 through 1,023 -Usually on a server or service

Duplexing

-Printing on both sides of the paper. -Included on some printers -additional hardware flips the page to print on the other side.

Repeater

-Receives a signal, regenerates, and resends -No forwarding decisions to make -Common use to extend the length of a network such as fiber or copper network -Can convert from one network media to another -Can extend wireless network reach

Virtualization Workstation

-Requires max RAM (every OS needs its own memory) -Max CPU cores (constant processing, CPU needs to be efficient, most virtualization apps can use multiple cores)

Processor cores

-Separate CPU's -Can be dual, Quad, Octa, Multi or more -Each has its own cache and a shared cache

Signature Pad

-Small digitizer with stylus -Connected via USB -Driver may be required

Laptop DC Jack

-Specific to the power supply type

Syncing Android Mobile devices

-Syncs online with Google -Can use 3rd party apps like doubleTwist to transfer movies and music to and from the android device

Apple Filing Protocol (AFP)

-TCP 548 -File services in MacOS -Work with SLP (service location protocol) -Full feature file management (copy, move, delete, rename files, etc.)

Device Manager Applet

-The OS doesn't know how to talk directly to most hardware • You need drivers -Manage devices • Add, remove, disable -This is the first place to go when hardware isn't working • Instant feedback

Active Directory (AD)

-The centralized directory database that contains user account information and security for the entire group of computers on a network. -Centralized account management

Standard Thick Client

-Traditional computer -Desktop Applications (Executable programs running in local memory and using local CPU) -Meets recommended requirements for running the OS (CPU, Total RAM, disk space) -Local resources (OS, Drivers, Apps) -Ongoing support (security patches, OS updates, App. updates) -Device is added to microsoft domain -authentication needed to gain access

Syncing iOS Mobile devices

-Uses Apple iTunes -Creates full backups on the computer

Replacing InkJet Cartridges

-Usually separate cartridges (some printers have then combined) -easily replaceable (pulls right out)

Users Tab

-Who is connected? What are they doing? -Provides a User list Windows 7 which allows you to: • Disconnect • Logoff • Send message -In Windows 8/8.1/10, Users tab provides: • Separate processes for each user • Performance statistics for each user

SOHO NIC configuration

-Wired NIC -Not many options -Ports are configured for auto speed and duplex -Speed: 10/100/1000 -Duplex can be half or full -Wireless NIC -Enable/disable adapter -Select an SSID -enter password to gain access

+5V

-provides power to some mobo components -Many components have shifted to +3.3V

sector

512 bytes on a disk

diskpart

A Windows command to manage hard drives, partitions, and volumes.

AP

Access point Short for wireless access point (WAP). APs provide access to a wired network to wireless clients. Many APs support isolation mode to segment wireless uses from other wireless users.

AHCI

Advanced Host Controller Interface A technical standard defined by Intel that specifies the operation of Serial ATA (SATA) host bus adapters in a non-implementation-specific manner.

Phishing

An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information(combination of spoofing and social engineering)

ADF

Automatic Document Feeder

Bluetooth printer connectivity (Wireless Device Sharing)

-Limited range for connectivity -can print directly to a printer from a mobile device

Laptop GPS

-Listens to GPS signals on the wireless antennas -Enabling/Disabling airplane mode would also enable/disable the GPS functionality

Applications Tab

-Lists user-interactive applications in use • Apps on the desktop -Administratively control apps • End task, start new task -Combined with the Processes tab in Windows 8/8.1/10

Laptop Batteries

-Lithium Ion (Li-ion) -Common in consumer electronics -No "memory effect" (does not need to be discharged completely) -Charging diminishes the capacity (will not fully charge after time) -Comes in different form factors for each laptop

Other considerations

-Load alternate third party drivers when necessary • Disk controller drivers, etc. -Workgroup vs. Domain setup • Home vs. business -Time/date/region/language settings • Where are you? -Driver installation, software and windows updates • Load video drivers, install apps, update the OS -Factory recovery partition • This can help you later

Application Installation methods

-Local installation • Downloadable executable • CD-ROM / DVD-ROM, Optical media -USB • Very compatible with most devices • Supports large installation programs -Network-based installation • The default in most organizations • Applications are staged and deployed from a central server • Can be centrally managed

User Accounts Applet

-Local user accounts • Located in Control Panel under "User Accounts" • Domains accounts are stored elsewhere -Creating local account requires account name and type • Can change password • Can change picture • Can associate a certificate information for a particular user

Print Management

-Located in Control Panel under Administrative Tools -Can manage printers • Share printers from one central console -Add and manage printer drivers • Central management of 32-bit and 64-bit drivers

services.msc

-Located in Control Panel under Administrative Tools as Services • Can also open through the cmd line or Run cmd -Useful when troubleshooting the startup process -Control background applications -Services can reveal dependencies between applications

Laptop Touchpad

-Located underneath the keyboard -Contains left and right buttons similar to a mouse -Requires a finger slide to move the cursor

Single-mode Fiber

-Long-range communication -Over 80 km without additional processing -Expensive light source (laser beams)

Replacing toner cartridge

-Look for messages (low doesnt mean empty) -Toner can contain the OPC (Organic PhotoConductor) drum; It is sensitive to light, keep in the bag -Power off printer (safety first) -Remove packing strips

nslookup

-Lookup information from DNS servers • Canonical names, IP addresses, cache timers, etc. -Lookup names and IP addresses • Many different options

Clearing Jams

-Lots of turns and twists -Remove paper tray and check for loose paper -Remove paper from the path (firm pressure when removing paper so it doesnt rip) -Open the cover to check for any loose paper

24-pin Motherboard power

-Main mobo power -Provides +3.3V, ±5V, and ±12V -Can still connect to a 20pin mobo connector (some cables are 20-pin + 4-pin)

Microsoft Windows history

-Major market presence -Many different versions • Windows 10, Windows Server 2016 -Advantages • Large industry support • Broad selections of OS options • Wide variety of software support -Disadvantages • Large install base provides a big target for security exploitation • Large hardware support can create challenging integration exercises

Sync Center

-Make files available, even when you're not online • Automatically syncs when back online • Contains built-in sync conflict management -Not available in Home editions • Needs offline file functionality • Only available in Pro and higher -Mark files "Always available offline" to use this capability

TaskList and TaskKill command

-Manage tasks from the command line • No Task Manager required! -tasklist • Displays a list of currently running processes • Local or remote machine -taskkill • Terminate tasks by process id (PID) or image name • TASKKILL /IM notepad.exe - kills the notepad.exe process by image name • TASKKILL /PID 1234 /T - kills the process identifier (PID) by number

System Configuration (msconfig)

-Manages boot processes • Windows startup applications • Windows services -There are 5 tabs in system configuration • General • Boot • Services • Startup • Tools • Located in Control Panel under Administrative Tools • OR type "msconfig.exe" in cmd prompt or in search bar

Disk Management

-Manages disk or volumes in windows • Individual computers and file servers -Computer Management is located in Control Panel under Administrative Tools then Storage and Disk Management -WARNING- Data can be erased and unrecoverable

Startup tab

-Manages which programs start with a Windows login • Easily toggle on and off -Multiple reboots needed before locating the troublesome application during troubleshooting (You'll find it) -This feature has moved to the Task Manager in Windows 8/8.1/10

Pin Grid Array (PGA)

-Many pins that are underneath the CPU -CPU socket matches the pins on the CPU -Plugs into a ZIF socket -Possible damage to the CPU if not inserted correctly

Double Data Rate 4 (DDR4) SDRAM

-Max 64GB per DIMM -Faster Frequencies -Not backwards compatible with DDR3, DDR2, DDR

Category 5 cable (Cat 5)

-Max Supported Ethernet Standard - 100BASE-TX, 1000BASE-T -Max Supported Distance - 100 meters

Category 6 cable (Cat 6)

-Max Supported Ethernet Standard - 10GBASE-T -Max Supported Distance - 37 to 55 meters

Watt (W)

-Measurement of real power use -volts * amps = watts -e.g. 120V * 0.5A = 60W

Laptop Touchscreen

-Merges a laptop and tablet input -No keyboard required (but still available) -Many options for input (choose either)

Component Services

-Microsoft COM+ • Component Object Model -Distributed applications • Designed for the enterprise -Manage COM+ apps • Device COM+ Management • Event Viewer • Services -Located in Control Panel under Administrative Tools

mmc.exe

-Microsoft Management Console • Can build your own management framework • Choose from list of available "snap-ins" -Framework used for many built-in management tools - Located under C:\Windows\System32 • Can also open through the cmd line or Run cmd

mstsc.exe

-Microsoft Terminal Services Client • Remote Desktop Connection • Can also open through the cmd line or Run cmd -Access a desktop on another computer • Or connect to a Terminal Server -Common for management on servers without a keyboard or monitor connected to them • "Headless" servers - Located under C:\Windows\System32 • Can also open through the cmd line or Run cmd

Print to XPS (XML Paper Specification)

-Microsoft virtual output type -Similar use case to Adobe PDF -Available all the way back to Windows XP -Included in Windows -viewable with any system that has an XPS reader

Imaging Drum

-Middle man between the laser and printed image on the page -Image is drawn onto a photosensitive drum ("painted" with a laser) -Picks up toner and transfers it to paper -Can be separate or combined with toner cartridge

Mobile Device Speakers

-Mobile audio (battery powered) -Can connect with a bluetooth connection -More of a stereo sound

Retrieving Email on Mobile devices (Internet Message Access Protocol (IMAP4))

-More flexible protocol -Access mail on a central server -Mail is usually stored on the server -Supports folders and server-side searching -Configuration information needed is the name of the IMAP server and Username+Password *Network Ports* -Defined by your mail provider -IMAP : TCP/143 -SSL (Secure Socket Layer) settings - IMAPS : TCP/993

VM Network requirements

-Most client-side vm managers have their own virtual (internal) networks -Shared Network Address - the VM shares the same IP address as the physical host; The VM uses a private IP address internally, Which NAT is able to convert to the physical host IP. Allows communication between internal IP (VM) to the external IP (physical host) -Bridged Network Address allows the VM to have its own IP and be on the physical network. Either through DHCP or Static. -Private Address does not allow the VM to communicate outside of virtual network. Only communicates to other VM's that are on that private network.

Retrieving Email on Mobile devices (Post Office Protocol 3 (POP3))

-Most commonly used protocol -Used for downloading mail to local mail client -Downloads and (optionally) deletes from server -Downloading and deleting from server makes sense if only 1 device is used -Configuration information needed is name of POP3 Server and Username+Password *Network ports* -Defined by your mail provider -POP3 : TCP/110 -SSL (Secure Socket Layer) settings - POP3S : TCP/995

ipconfig

-Most of your troubleshooting starts with your IP address • Ping your local router/gateway -Determine TCP/IP and network adapter information • And some additional IP details such as IP address, subnet mask, default gateway -View additional configuration details with typing "ipconfig /all" • Shows details for DNS servers, DHCP server, etc

Display Devices

-Most popular output device -Many different connections (different standards through the years) -Different sizes and resolutions

CPU Sockets

-Motherboards are matched with CPU's -CPUs have specific socket requirements -Usually the largest thing on the board -Usually central to everything -Not easily upgradable (and often not an option)

Serial Attached SCSI (SAS)

-Move from Parallel to Serial -Increased throughput -Point-to-Point connection (no more daisy chains) -No termination required (bus has 2 devices on it) -Same control and management as SCSI protocol, but on a high speed serial connection

Hub

-Multi-port repeater -Traffic going into one port is repeated to every other port -Everything is half-duplex (2 devices cannot communicate at the same time) -Becomes less efficient more devices begin to communicate -Only operates in 10 megabit/sec or 100 megabit/sec -This technology is difficult to find

NTFS and CDFS

-NTFS - NT File System • Extensive improvements over FAT32 • Quotas, file compression, encryption, symbolic links, large file support, security, recoverability -CDFS - Compact Disk File System • ISO 9660 standard • All operating systems can read the CD

DRAM (Dynamic Random Access Memory)

-Needs constant refreshing (data disappears if its not refreshed) -Random Access (can access any storage location directly)(unlike magnetic tape were you cannot)

Printer Sharing from an OS

-Network connected -common on windows devices -requires the IP address of the printer -Commonly uses TCP 139, TCP 445, UDP 137, and UDP 138

netstat

-Network statistics • Utility available on many different operating systems -netstat -a • Shows all active connections -netstat -b • Shows binaries (Windows) that may be sending/receiving information • Requires elevation -netstat -n • Does not resolve DNS names

USB 3.2

-New SuperSpeed+ modes over USB-C -10 Gbit/sec and 20 Gbit/sec

802.11 Ad hoc mode printer connectivity (Wireless Device Sharing)

-No access point is used -direct link between wireless devices -Additional config. settings will need to be turned on to use without an access point

UTP (Unshielded Twisted Pair)

-No additional shielding -The most common twisted pair cabling

Application Streaming (Laptops/Desktops)

-No apps are deployed to the local machine -No complex deployment process -Apps are only streamed if they are used -New apps are added to the cloud offering as they are available and also updated -Quickly manage and make changes instantly

Fanless/Passive Cooling

-No fans or noise (silent operation) -Specialized functions (TV set top box, video servers, media server) -Functions are very controlled (carefully tested) -Low-power computer (heat sinks)

Thermal Printer Heating Element

-No moving print head -Only parts are heated during printing -Paper is covered by the full length of the component

Cloud-Based Email Hosting

-No need to purchase servers or maintain the software -Flat cost per user per month -Personal email service has no costs involved -Looks and feels the same for the user -common services is MS Office 365 or Google Mail

Virtual Printers

-No physical output -Output is digital -No hardware required (no printer, ink, toner, paper) -Useful for sending electronically (email, save to hard drive, or send through the network)

Internal Cloud (shared resources)

-No resources are shared -Need to build your own cloud (need to purchase hardware and networking structure) -Upfront costs -No ongoing costs once purchased (except cooling and power)

Hard Disk Drive (HDD)

-Non-volatile magnetic storage -Rapidly rotating platters -Random-Access (retrieves data from any part of drive at anytime) -Moving parts (spinning platters, moving actuator arm) -Mechanical components limit access speed -Mechanical components can also break

Solid State Drive (SSD)

-Non-volatile memory -No Moving parts (very fast) -Fast performance -No spinning drive relays -Size for both desktop and laptops - 2.5'' -SATA interface

Wireless Access Point (WAP)

-Not a wireless router -A bridge connection device -Extends the wired network onto the wireless network -Makes forwarding decisions based on MAC address

Flavors of traceroute

-Not all traceroutes are the same • Minor differences in the transmitted payload -Windows commonly sends ICMP echo requests • Receives ICMP time exceeded messages • And an ICMP echo reply from the final/destination device • Unfortunately, outgoing ICMP is commonly filtered -Some operating systems allow you to specify the protocol used • Linux, Unix, Mac OS, etc. -IOS devices send UDP datagrams over port 33434 • The port number can be changed with extended options

Privileges

-Not all users can run all commands • Some tasks are for the administrator only -Standard privileges • Run applications as normal user • This works fine for many commands -Administrative/elevated privileges • You must be a member of the Administrators group • Right-click Command Prompt, choose "Run as Administrator" • OR by searching for cmd.exe, then pressing "Ctrl+Shift+Enter" to run as Administrator

Impact Printer Paper Replacement

-Not easy as a laser printer -Paper must be feed with a tractor feed -forms must be positioned perfectly (text needs to fit predefined space); Run test sheets to align -Paper is continuously fed (one long sheet of paper) -Must flow freely (make sure nothing is in the way)

CMOS Battery

-Not needed for today's flash-based storage -Maintains old BIOS configs -May only be used to maintain Date/Time -Bad battery will require a BIOS config or Date/Time config on ever boot -Can reset BIOS config by removing the battery on older systems (including passwords for supervisor access) -Newer mobo's have a jumper

Synchronizing Data on Mobile Devices

-Not restricted to one device (many different devices) -Access anything from anywhere (complete mobility) -Many different types of data is synced (email, calendar, apps, etc.) -All devices must be synced (invisible to the end-user) -The client and server must authenticate with each other (mutual authentication)

Managing SOHO QoS (Quality of Service)

-Not supported by all routers -Prioritize as needed -Voice is high, WoW is low (or vice versa) -High-end SOHO routers allow you to prioritize applications, ports, or MAC addresses -Be careful when making changes to QoS (you could accidentally cause applications to slow down)

ODBC Data Sources

-ODBC - Open Database Connectivity -Application independence • Database and OS doesn't matter -Configure in Control Panel / Administrative Tools • Users probably won't need this -Located in Control Panel under Administrative Tools

Laptop Video Card

-Often built into the processor -Sometimes part of the system board -Not upgradeable in smaller laptops -Can be upgradeable in larger laptops that require high-end capabilities in a mobile platform

Laptop Keyboard Backlight

-On option on many laptops -Allows you to view keys in dark lit areas -Secondary functions can be intensity (brighness), duration (length of time), or just disable completely

Virtual Application Streaming

-On-Demand applications -No need to install the app locally (globally distributed) -Components are downloaded as needed; it will not download a component if its not needed -Data is stored securely in the cloud -Easy to update from one centralized location; If some data is cached, the app with only update the changes.

Airplane Mode (Mobile Device Connectivity)

-One button to turn off all radios (cellular, WiFi, Bluetooth, NFC, etc.) -Individual features can be re-enabled without enabling cellular features (useful when WiFi is available)

Virtualization

-One computer, many OS's (Mac OS X, Win 7, Linux Ubuntu, all at the same time) -Each VM has its own set of resources (its own CPU, RAM, Storage, network, etc...) working independently of each other -Host-based virtualization runs one OS as your normal desktop and running other OS on top of that desktop -Enterprise-Level virtualization is common to run one server with many VM's running inside of it -Been around since 1967 (IBM Mainframe Virtualization)

Emulation characteristics

-One device running processes designed for a completely different architecture -A device pretending to be another -Original code is still being used from that original system -Code is used to interpret to run on the current hardware -Commonly slower than running natively -Not easy to do

OLED (Organic Light Emitting Diode) on Laptops

-Organic compound that emits light when receiving an electric current -Thinner and lighter -Flexible and mobile (no glass needed) -No backlight (organic compound provides the light) -Good representation of the color black -Not ready for laptops -Organic materials decay over time -Decayed images can remain on the screen -More costly and power hungry than an LCD

20-pin Motherboard connector

-Original ATX standard -24 pin connector was added for PCI Express power

Sound Applet

-Output options • Multiple sound devices may be available -Set input/output levels for speakers and microphone

Augmented Reality (AR)

-Overlays a virtual augmentation with the physical world -The computer provides the additional detail -Can be used in the Medical field, Travel, Gaming.

Windows 8/8.1 processor requirements

-PAE (Physical Address Extension) • 32-bit processors can use more than 4 GB of physical memory -NX (NX Processor Bit) • Allows CPU to protect against malicious software from running -SSE2 (Streaming SIMD Extensions 2) • A standard processor instruction set • Used by third-party applications and drivers

Thermal Paper

-Paper covered with a chemical -Changes color when heated -Common in receipt printers or credit card terminals (used in quiet ares) -Make sure paper is specific for the printer model that is being used (looks like normal paper)

The PATA standard

-Parallel AT Attachment, Parallel ATA, ATA -Originally called Integrated Driver Electronics (IDE) -2nd Gen. called EIDE (Enhanced IDE) -Promised faster speeds (from 16 MB/s through 133 MB/s) -Additional devices were able to connect (cd-rom drives) -Now called PATA

Integrated GPU (Graphics Processing Unit)

-Part of the video adapter, mobo or CPU (built into CPU) -This is good for basic computing -Separate video card is needed if gaming, editing video, rendering graphics.

Mobile Device Credit Card Readers

-Phone or Tablet becomes a point of sale terminal -Connection is made through audio/mic TRRS jack, lightning connector, or Bluetooth -Great for small and mobile businesses -Uses the internet connection for approval (immediate feedback) -Has additional features such as emailing receipts or signing with your finger

Laptop Frames

-Plastic -lightweight and mobile, but durable and difficult to break -inexpensive but cost-effective -Metal -More durable than plastic -Can be more difficult to replace

Riser Card

-Plugs in vertically in the motherboard -cards are plug in vertically to the motherboard -one example where the card is used is in data center servers

Power over Ethernet (PoE)

-Power provided on an ethernet cable -One wire for both network and electricity -Used for IP Phones, Wireless Access Points -Useful in difficult-to-power areas -Power can be provided at the switch -Built-in power provide at the switch (Endspans) -In-line power injector provides the power (Midspans)

Print to Image

-Print to a graphics image (for later image editing or sharing) -Output is a picture and can be viewed with any program that understands that format -Not integrated into the OS (a feature of the application) -3rd party software print drivers are available (application may export graphics formats natively/within the software)

Cloud Printing (device sharing)

-Print to the cloud -Useful for mobile devices -Cloud sends to your printer -Cloud options available from google, brother, hp, etc...

Step 1 : Processing

-Printer is not moving -Build the entire page in memory -Needs to print entire page with one single pass -Cannot print half the page, process more info. and then print the other half

Color and B&W Printers

-Produces paper documents or photos

Windows (Defender) Firewall Applet

-Protect from attacks • Scans for malicious software • Helps prevent access to resources on the local pc -Integrated into the operating system - Located in Control Panel under Windows (Defender) Firewall

Thermal Printer Feed Assembly

-Pull paper through the paper -small paper path -Roller is easily replaced

Case Fans

-Pulls cool air through the front -Warm air exits through the back -Good cable management for good air flow -Different sizes, styles, and volume levels

Quick format vs. full format

-Quick format • Creates a new file table • Looks like data is erased, but it's not • No additional checks -Quick format in Windows 7, 8/8.1, and 10 • Use diskpart for a full format within windows 7, 8/8.1/10 -Full format • Writes zeros to the whole disk • Your data is unrecoverable • Checks the disk for bad sectors - Time consuming

BIOS Component Information

-RAM (view and configure memory settings) -Hard drive / SSD (drive settings, Boot order) -Optical drive (allows you to enable/disable) -CPU information (type and settings)

Before Upgrading BIOS...

-Read the documentation (release notes) -Some updates are bland -Others are full of new features -Check OS prerequisites -Locate a reliable power source (laptop connected to AC power)

CD-ROM (compact disc read-only memory)

-Read-only compact storage disc for audio or video data -CD-ROMs are read by using CD-ROM drives and optical drives with backward compatibility, such as DVD and Blu-ray Disc drives. -700 Megabytes (MB) capacity

Processor Speed

-Real Speed: CPU clock (MHz or GHz) -Actual Speed is a combo of different factors such as clock speed, CPU Architecture, bus speed, bus width, L1 cache size, L2 cache size, operations system capabilities -Use a benchmark that works for you

Windows 7 history

-Released October 22, 2009 • Mainstream support ended January 13, 2005 • Extended support until January 14, 2020 -Very similar to Windows Vista • Maintained the look and feel of Vista • Used the same hardware and software • Increased performance over Windows Vista -Updated features • Libraries • HomeGroup • Pinned taskbar

Windows 10 history

-Released on July 29, 2015 • Windows 9 was skipped -A single platform that works on desktops, laptops, tablets, phones, all-in-one devices -Upgrades were free for the first year • From Windows 7 and Windows 8.1 -Microsoft calls Windows 10 a "service" • Periodic updates to the OS • Instead of completely new versions

Step 7 : Cleaning

-Removes the excess toner from the photosensitive drum

PCI Express (PCIe)

-Replaced PCI, PCI-X and AGP -Communicates serially (Unidirectonal serial "lanes") -Slower devices does not slow down everyone (lanes are not shared) -Size of different lanes: one, two, four, eight, sixteen, or thirty-two full-duplex serial lanes -x1, x2, x4, x8, x16, x32 ("x" is pronounced "by")

Virtual Reality (VR)

-Replaces reality with a computer generated version -Input from the real world interacts with the virtual world -Can be used in different application such as : gaming, industrial design, art, enhanced video and image viewing

Gaming PC

-Requires SSD's -High-end video/specialized GPU -High definition sound card -High-end cooling

Volume sizes

-Resize a volume • Right-click the volume for options • Can shrink or extend -Can split the hard drive space into 2 volumes • e.g. 120GB into 2 60GB volumes • Can Shrink a volume • Can format unallocated space -Can also create mirrored volumes -Configuration done in Disk Management

Display Applet

-Resolution options • Important for LCD monitor native resolutions -Can configure the color depth and refresh rate • Located in Control Panel > Display > Adjust Resolution > Advanced Settings > Adapter "list all modes" -In Windows 10, it is located in Settings > System > then choose the Display option • Different settings available

External Cloud (shared resources)

-Resources are shared with a public cloud -No hardware purchase -No upfront costs -There is a cost to use the cloud

BIOS Supervisor Password

-Restricts BIOS changes -Required to make changes to any BIOS configs

Email Configurations for Mobile Devices

-Retrieving email (uses either POP3 or IMAP protocol) -Sending email (SMTP protocol) -Corporate email (microsoft exchange) -Different process for sending and receiving emails -Integrated Providers (iCloud, Google, Exchange Online, Yahoo) -Additional steps required to configure accounts

Routers

-Routes traffic between IP Subnets -Makes forward decisions based on IP address -Inside of switches called "Layer 3 Switches" -Often connects diverse network types (Can connect a Serial WAN Link, a Ethernet copper connection and an Ethernet Fiber connection on same device)

Virtualization Support

-Run other OS's within a single hardware platform -Multiple OS's share physical hardware components -Limited in software -Added to the processor -Hardware is faster and easier to manage -Intel Virtualization Technology (VT) -AMD Virtualization (AMD-V)

Windows 7 Professional

-Same features as Home Premium -Can connect to a Windows Domain -Supports Remote Desktop Host and EFS -Missing enterprise technologies - no BitLocker is supported -Available as a x64 version and supports 192 GB of RAM

Windows 10 processor requirements

-Same requirements as Windows 8/8.1 -PAE (Physical Address Extension) • 32-bit processors can use more than 4 GB of physical memory -NX (NX Processor Bit) • Protects against malicious software -SSE2 (Streaming SIMD Extensions 2) • A standard processor instruction set • Used by third-party applications and drivers

sfc (System File Checker) command

-Scans the integrity of all protected system files • sfc /scannow

Task Scheduler

-Schedules an application or batch file to run • Plan ahead -Includes predefined schedules - Click and go -Organized - Managed through folders -Located in Control Panel under Administrative Tools

Mobile Device Protective Covers

-Screen protector to avoid scratches (may be difficult to install) --Device protectors -Wraps the entire device -Waterproofing options are available -Can create problems for docking stations and wireless chargers

Level 2 Cache (L2 cache)

-Secondary level/storage of cache memory

Laptop Physical Locks

-Security cable attached to the laptop -Contains metal-reinforced locking slots where you can insert the lock -Other end contains a loop that would gos around a solid object -Prevents laptop theft

Impact Printer Ribbon Replacement

-Self-contained -One long circle (rotates many times in its lifetime) -Replace when ink becomes too light -Designed to be modular (replaceable in less than 1 min.) -Printer specific

Laptop Speakers

-Self-contained into the laptop -Not the highest quality (very small) -Often stereo (L/R) -Larger laptop may include a subwoofer

Sending Email on Mobile devices (Simple Mail Transfer Protocol (SMTP))

-Send mail from a device to a mail server (or between mail servers) -Must be sent from a local or trusted device -Authentication usually required (may be the same or different credentials than the incoming mail) *Port Numbers* -SMTP (no authentication) : TCP/25 -SMTP with authentication : TCP/587

DVI-A (Analog)

-Sends analog signals

DVI-D Dual Link

-Sends digital signals -Dual link ; 7.4 Gbps (HDTV at 85 fps)

Near Field Communication (NFC) Connections

-Sends small amounts of data wirelessly over a limited area -Built into your phone -used in payment systems, transportation, in-person information exchange -Acts as an Access token, Identity "card" -Contains encryption support for safe data transfers

The disk partition

-Separates the physical drive into logical pieces • Useful to keep data separated • Multiple partitions are not always necessary -Useful for maintaining separate operating systems • Windows, Linux, etc. -Formatted partitions are called volumes • Microsoft's nomenclature • Volume and Partition mean the same thing

Network and Sharing Center Applet

-Shows all network adapters • Wired, wireless, etc. -All network configs • Shows the HomeGroup option (n/a in Windows 10) • Can change Adapter settings • Can change network addressing

DVD-R/RW (DVD Read and ReWritable)

-Single Layer writable

Single Data Rate (SDR)

-Single clock cycle pulls 1 bit of data

Double Data Rate (DDR)

-Single clock cycle pulls 2 bits of data

The SCSI Standard

-Small Computer Systems Interface -Designed to connect many different kinds of devices into the standard format (hard drives, optical drivers, scanners, etc.) on the same SCSI bus -Up to 16 devices in a SCSI chain -Many different formats (Fast SCSI, Ultra SCSI, Ultra Wide SCSI, Ultra2 SCSI, Ultra3 SCSI, Ultra-320 SCSI, Ultra-640 SCSI, iSCSI (SCSI over IP)) -Parallel and Serial versions of SCSI available

Laptop Memory

-Small Outline Dual In-line Memory Module (SO-DIMM) -Micro-Dual In-line Memory Module (Micro-DIMM) -Almost exclusively used in laptops and mobile devices -Also available in SFF desktops

Removing Dubris for Thermal Printers

-Small amount of paper or dust -Contains no toner -Blow it out with compressed air (outdoor) -Wipe with a damp cloth (indoor) -Avoid using vacuum cleaner (unless if its designed for computers)

Micro-ATX form factor

-Smaller than Standard ATX -Limited expansion slots -Backward compatibility (similar mounting points and power)

Wearable Technology

-Smart Watch (extension of your phone) -Fitness monitor (tracks heart rate, steps, sleep patterns, and more)

BIOS (Basic Input/Output System)

-Software/Firmware to start the computer -Also known as system BIOS or ROM BIOS -Initializes CPU and Memory -Start the POST process

Windows 7 Enterprise

-Sold only with volume licenses • Designed for very large organizations -Multilingual User Interface packages -Supports full disk encryption with bitlocker drive encryption -Supports DVD playback, Aero, ICS, Windows Domain, EFS, etc...

Print Head Cleaning

-Some printers have an automatic daily cleaning process -cleaning process can be started manually (takes a few minutes) -some components can be removed to be cleaned manually -The clogged component requires cleaning

Troubleshooting Applet

-Some problems can be easily fixed • Have you tried turning it off and on again? -Automate some of the most common fixes • Troubleshooting option are categorized -May require elevated account access to enable/disable hardware and features

Infrastructure as a Service (IaaS)

-Sometimes referred to Hardware as a Service (HaaS) -Cloud model that provides all hardware to run applications -You are responsible for installing the applications and perhaps the OS -You are in charge of managing the software and data -You are responsible for the security and maintenance of all that information -Common implementation is Web Hosting Provider

Audio/Video Editing Workstation

-Specialized audio and video card (high quality audio and powerful video) -Large fast hard drive (Constant disk writes - SSD) -Dual monitors (edit in one monitor, view output in the other)

E-Readers

-Specialized device to read books -Can play some music and apps -Uses a technology called Electronic paper -Uses a black and white screen which performs well in direct light -Exceptionally long battery life (battery is used when changing pages) -WiFi and cellular network access

Print to PDF (Portable Document Format)

-Specific format created by Adobe -One-way path from application to PDF -Cross-platform compatibility -Proprietary Adobe format (many readers available in any OS) -Many browsers have a built in viewer to read the document

Printer Drivers

-Specific to a printer model (Get this EXACTLY right) -Get the correct OS drivers (win7, win8/8.1, win10) -Get the right version, 32 bit OR 64 bit OS -You can't mix and match

Fan Specifications

-Standard Sizes (80mm, 120mm, 200mm) -Different speeds (Variable Speeds) -Different noise levels (not all fans sound the same)

External Storage Device

-Storage outside the computer -Removable -Very portable -Easy to move large files -examples USB flash drive, SSD or Hard Drive -connectivity methods USB, Thunderbolt, eSATA, etc... -Can be a security concern

Cloud-Based File Storage Services

-Store files in the cloud -Access, share, and edit from anywhere -Easy to collaborate (one place for all files) -Synchronization app allows files to store in a folder on your local drive, the app then syncs to the cloud -Common providers are Dropbox, Google Drive, MS OneDrive, Box

Nonvolatile BIOS memory

-Store the BIOS configuration (your settings) -Complementary metal-oxide semiconductor (CMOS)- -A type of memory -May be backed up with a battery -Usually flash memory theses days (easily stored and accessed)

USB 3.0

-SuperSpeed -5 gigabits per second -3 meters

USB 3.1

-SuperSpeed+ -Higher speed communication between Type-A and USB-C connectors -10 Gbit/sec speed (twice the rate of USB 3.0)

System Applet

-System properties • Provides Computer information • Including version and edition -Remote settings can be turned on or off for Remote Assistance and Remote Desktop -System protection • Can enable/disable System Restore • Select drives to allocate additional space for system restore -Performance Options located under Advance System Settings can be set for: • Configuring Virtual Memory • Configuring Visual Effects • Configuring Data Execution Prevention (DEP)

Service Location Protocol (SLP)

-TCP & UDP 427 -Populates the list of available devices

Domain Name System (DNS)

-TCP & UDP 53 -Converts names to IP addresses -These resources are very critical in which there is usually multiple servers in production in case one goes offline

NetBIOS Session Service (nbsession)

-TCP 139 -connection-oriented version of nbdatagram

Internet Message Access Protocol version 4 (IMAP4)

-TCP 143 -Receives emails from an email server (authenticate and transfer) -Includes management of email inbox from multiple clients -Provides enhanced features over POP3

File Transfer Protocol (FTP)

-TCP 20 (active mode data) -TCP 21 (control) -Transfers files between systems -Authenticates with a username and password -Some systems use a generic/anonymous login -Provides full feature functionality (you can list, add, delete, rename, etc.)

Telecommunication Network (Telnet)

-TCP 23 -Used when older equipment does not support SSH -Login to device remotely -Console access -In-the-clear communication (no encryption) -Not the best choice for production systems

Simple Mail Transfer Protocol (SMTP)

-TCP 25 -Server to Server email transfer -Also used to send mail from a device to a mail server (commonly configured on mobile devices and email) -POP3 or IMAP are used when receiving emails

Remote Desktop Protocol (RDP)

-TCP 3389 -Can share a desktop from a remote location -Available on many windows versions -Can connect to an entire desktop or just an application -Many clients for Windows, MacOS, Linux, Unix, iPhone, Android, and others

Lightweight Directory Access Protocol (LDAP)

-TCP 389 -Associated with corporate networks -Store and retrieve in a network directory (commonly used in Microsoft Active Directory) -

Hypertext Transfer Protocol Secure (HTTPS)

-TCP 443 -Communication in the browser and by other applications -Web Server Communication with encryption -Encrypted version -Supported by nearly all web servers and clients

Server Message Block (SMB)

-TCP 445 -Protocol used by Microsoft Windows -Used for file sharing, printer sharing -Also called Common Internet File System (CIFS) -Direct SMB communication over TCP without the NetBIOS transport -Direct over TCP (NetBIOS-less)

Ephemeral ports

-Temporary port numbers -Ports 1,024 through 65,535 -Determined in real-time by the client

AMD (Advanced Micro Devices)

-Tends to be less expensive -CPU is geared towards value

Intel

-Tends to be more expensive -CPU is geared toward performance -Has a large portfolio of laptop options

regedit.exe

-The Windows Registry • The big huge master database • Hierarchical structure • Use to configure different parts in Windows • Use to configure different applications in Windows -Used by almost everything in Windows • Kernel, Device drivers • Services • Security Account Manager (SAM) • User Interface, Applications -Backup your registry! • Also called a hive • Use "export" to backup the registry • Built into regedit - Located under C:\Windows • Can also open through the cmd line or Run cmd

Windows 10 Pro

-The business version of Windows • Additional management features -Remote Desktop host • Remote control each computer -Supports: • Hyper-V • Bitlocker (Full Disk Encryption (FDE)) • Can join a Windows domain (Group Policy management) -Does not support: • AppLocker • BranchCache -Max x86 RAM 4 GB -Max x64 RAM 2048 GB

Windows 7 Home Premium

-The consumer edition • DVD playback, • Windows Aero • Internet Connection Sharing • IIS Web Server -No enterprise technologies • No domain connection, BitLocker, EFS, etc. -Available as a x64 version and supports 16 GB of RAM and 2 processors

Disk partitioning

-The first step when preparing disks • May already be partitioned • Existing partitions may not always be compatible with your new operating system -An MBR-style hard disk can have up to four partitions -GUID partition tables support up to 128 partitions • Requires UEFI BIOS or BIOS-compatibility mode • BIOS-compatibility mode disables UEFI SecureBoot • You'll probably have one partition -BE CAREFUL! • Serious potential for data loss • This is not an everyday occurrence

USB-C

-The newest, and most versatile, type of USB connector. -24-pin double sided USB Connector (used for both hosts and devices)

Even Parity Bit

-The number of bits in the sequence that add up to an even number.

SNMP v1

-The original -Structured tables -In-the-clear (no encryption)

Legacy BIOS

-The original / traditional BIOS (been around for more than 25 yrs) -Limited hardware support (No drivers for modern network, video, and storage devices) -Older OS's talked to hardware through the BIOS (instead of access hardware directly)

Windows 8/8.1 Pro

-The professional version • Similar to Windows 7 Professional / Ultimate -Full support for BitLocker and EFS • Full-disk and file-level encryption -Can join a Windows Domain • Support for IT management • Group Policy support • Centralized management of Windows devices -Does not support AppLocker or Branchcache -Available in 32-bit (Max 4 GB RAM) and 64-bit (Max 512 GB RAM)

Ampere (amp, A)

-The rate of electron flow past a point in one second -e.g. diameter of the hose

WiFi Antennas

-The wires wrap around the laptop screen at the highest point -Contains a main, aux, and bluetooth connection

Security considerations

-There's a reason we are careful when installing applications • Applications have the same rights and permissions as the user • An unknown application can cause significant issues -Impact to device with unknown application • Application upgrade stops working • Slowdowns • Deleted files -Impact to network with unknown application • Access to internal services • Rights and permissions to file shares

Laser Printer Maintenance Kit

-They wear out (all those moving parts; lots of heat and pressure involved) -Standard maintenance kit (replaces feed rollers, new fuser unit, etc..) -Check printers page counter to see when maintenance is required -Power down to replacements components (fuser units are hot) -Reset page counter when done

Laptop

-Thick client that is mobile -Touchpad configuration -sync and backup can be cloud-based or local drive -Wireless connectivity -Additional security (VPN connectivity or local drive encryption)

PCI 533 MB/s Throughput

-Throughput of a bus running a 64-bit card at 66 MHz clock rate

Plenum-rated cable

-Traditional Cable Jacket --Polyvinyl chloride (PVC) -Fire-rated cable jacket --Flourinated ethylene polymer (FEP) or low-smoke polyvinyl chloride (PVC) -Plenum-rated cable may not be as flexible (may not have same bend radius)

Magnetic Disk

-Traditional spinning drive platters -Larger capacity available in this format -Inexpensive compared to SSD

Optical Fiber Communication

-Transmission by light -No RF signal (difficult to monitor or tap) -Signal slow to degrade (can transmit over long distances) -Immune to radio interference

TCP and UDP

-Transported inside of IP (encapsulated by the IP Protocol) -Two ways to move data (different features for different applications) -Referred to OSI Layer 4 (Transport Layer) -Multiplexing allows you to use many different applications at the same time

Identifying the current BIOS version

-Try to catch the version during system boot-up (difficult to catch) -Bring up System Information (msinfo32) -Compare the current to the existing (upgrade might not be available) -Get a copy of the current version to downgrade if needed

Hotspot Connections

-Turns the phone into a WiFi hotspot -Your own personal wireless router -Extends the cellular data network to all of the devices -Dependent on phone type and provider (may require additional charges and data costs)

Hotspot (Mobile Device Connectivity)

-Turns the phone into a WiFi router -Extra charges may apply -Other devices can connect to your phone via WiFi

Double Data Rate 2 (DDR2) SDRAM

-Twice as fast as DDR (Faster speeds) -Not backwards compatible with DDR slots

Double Data Rate 3 (DDR3) SDRAM

-Twice the data rate of DDR2 -Larger chip capacities -Max 16GB per DIMM -Not backwards compatible with DDR2, DDR

Thunderbolt v1

-Two channels -10 Gbit/s per channel -20 Gbit/s total throughput -Mini DisplayPort connector

Coaxial cable (coax)

-Two or more forms share a common axis -RG6 used in TV/Digital Cable (and high-speed Internet over cable) -RG59 used as patch cables (not designed for long distances)

Multiple BIOS versions

-Two separate versions (main and backup) -easily switch between them -easy to upgrade one version without corrupting the other

NetBIOS Name Service (nbname)

-UDP 137 -Use to locate a device on the network by its name

Simple Network Management Protocol (SNMP)

-UDP 161 (queries devices) -UDP 162 (traps/alarms) -Used to gather statistics from network devices

Dynamic Host Configuration Protocol (DHCP)

-UDP 67 & 68 -automated configuration of IP address, subnet mask, and other options -IP addresses are assigned in real-time from a pool -Each system is given a lease and must renew at set intervals -Addresses can be assigned by MAC addresses in the server (reservations) -Quickly manage addresses from one location

Types of installations

-Unattended installation • Answers Windows questions in a file (unattend.xml) • No installation interruptions • No user intervention -In-place upgrade • Maintain existing applications and data -Clean install • Data backup required • Wipe the slate clean and reinstall • Migration tool can help -Image • Deploy a clone on every computer • Quick installation on many computers -Repair installation • Fixes problems with the Windows OS • Does not modify user files • Re-installs the OS • Multiboot • Run two or more operating systems from a single computer • Can you 2 OS's from 1 hard drive -Recovery partition • Creates hidden partition with a copy of Windows installation files • Commonly used with repair installation • Installation media not needed -Refresh / restore • Windows 8/10 feature to clean things up • Requires a recovery partition • No installation media needed

-5V

-Uncommon to find this voltage on mobo -Power supply might not provide this voltage -provided power for ISA adapter cards (most cards didnt use it) -Todays mobo's dont have ISA slots

-12V

-Uncommon to find this voltage on mobo -provides power to Integrated LAN, older serial ports, some PCI cards

Upgrading to Windows 10

-Upgrade from the Windows 10 installation media • Downloadable versions are available from Microsoft • Includes a media creation tool -You cannot upgrade x86 to x64 OR x64 to x86 • Applies to all Windows versions • You'll have to migrate instead

Why upgrade?

-Upgrade vs. Install • Upgrade - Keep files in place • Install - Start over completely fresh -Upgrading allows you to maintain consistency • Upgrades save hours of time • Can keep customized configurations and multiple local user accounts on the PC • Avoids application reinstallations • Keeps user data intact • Get up and running quickly • Seamless and fast • Run from the DVD-ROM or USB flash

Command line troubleshooting

-Use "help" if you're not sure • > help dir • > help chkdsk -Also use: • [command] /? -Close the prompt with exit -Useful when additional information is needed for a certain command

KVM (Keyboard, Video, and Mouse) switch

-Use many computers with a single keyboard, video display, and mouse

Laser Printer Cleaning

-Use water, isopropyl alcohol -Don't use harsh chemicals -Outside of printer use damp cloth -Inside of printer wipe dust away -Don't use vacuum or compressed air -Wash off skin with cold water -Dirty rollers can be clean with isopropyl alcohol

Laptop Keyboard

-Used on laptop computers -More compact -10-key touch available in larger laptops

Bridge

-Used to connect Hub networks in early networking -A switch with 2 to 4 ports -Makes forwarding decisions in software -Can connect different physical networks (different topologies) and network size limitations/collisions. -Distributes traffic based on MAC address -An example of a modern bridge is a wireless access point (bridges wired ethernet to wireless)

User Authentication (Printer Data Privacy)

-User authentication -Everyone can print -you can set rights and permissions -Printing vs managing the printer

Local users and groups

-Users • Administrator - the Windows super-user • Guest -Limited access • Most users are "Regular" Users -Groups • Administrators, Users, Backup Operators, Power Users, etc. • Users can be added to groups • Permissions are easier to manager by groups instead of individual user access.

Virtual Desktop Infrastructure (VDI)

-Users connect to a pre-built desktop -Access from almost any OS (Windows, MacOS, Linux, iOS, Chromebook, Web Browser) -All communication in the desktop stays local to the virtual desktop -No sensitive info. sent from the local device

Synchronization connections for iOS Devices

-Uses a USB standard Type A plug if connecting to a computer -USB - Proprietary (30-pin or 8-pin Lightning) -USB-C -802.11 wireless -Mobile network

Synchronization connections for Android Devices

-Uses a USB standard Type A plug if connecting to a computer -USB Micro-B -USB-C -802.11 wireless -Mobile network

Laptop Digitizer

-Uses a pen-like device as input (Stylus input) -Useful for graphical input -Becoming more common on laptops/tablets or hybrid devices

Fuser Assembly

-Uses heat and pressure to melt plastic toner powder and bond it to the paper.

Step 6 : Fusing

-Uses heat and pressure to melt the toner to the paper permanently -Reason why the paper is warm

Tablets

-Usually runs iOS or Android OS -Larger than ~7in diagonally -Designed for touch input (virtual input, drawing interfaces) -Can support wide range of applications (gaming, specialized productivity/utility apps) -Can take pictures or watch movies

Windows 10 Education and Enterprise

-Very similar features in both • Minor features differences • Both are managed by using Windows Volume licensing -Granular User Experience (UX) control • an administrator can define the user environment • Useful for kiosk and workstation customization -Supports: • Hyper-V • Bitlocker • Can join a domain • AppLocker (an administrator can control what applications can run) • BranchCache (remote site file caching) -Max x86 RAM 4 GB -Max x64 RAM 2048 GB

Webcams

-Video capture -Either external or built-in camera (laptop) -Connected via USB or 802.11 WiFi -Includes both audio and video -Specialized drivers and software required

Media Center

-Video, music, and television portal • Perfect for watching at home • Record shows from a TV tuner • Play music • Watch DVDs -The center of your home entertainment center • Cable companies and other technologies were strong competition -Discontinued by Microsoft • Not officially available in Windows 10

Notepad

-View and edit text files • You'll use a lot of text files -Included with almost any version of Windows

Dual-Voltage input options

-Voltage varies by country -Manually switch between 110V/115 and 220V/230V -Switch is located in back of power supply -Get a meter and measure voltage -Auto-switching power supply are available -Connecting 230V power supply to 115V power source might not cause permanent damage -DO NOT PLUG a 115V power supply into a 230V power source; will cause serious damage.

SOHO IP Adressing

-WAN Interface is assigned through DHCP from ISP -May require authentication -LAN Interface assign internal IP and subnet mask -Provides IP's through DHCP -DNS IP(s) are obtained by the WAN DHCP

Windows 8 and 8.1 history

-Windows 8 • Available October 26, 2012 • New user interface - no traditional "Start" button -Windows 8.1 • Released October 17, 2013 • A free update to Windows 8 - not an upgrade -Mainstream support ended January 9, 2018 • Extended support ends January 10, 2023

Fast Startup

-Windows 8 and 10 does not shut down all the way -Starts up very quickly -Unable to open BIOS config -Disable in Control Panel > Power Options -Most mobo's have a separate process (hold F2 then press power button to enter BIOS)

Explorer

-Windows Explorer / File Explorer (Windows 10) • File management -View, copy, launch files from File Explorer • Granular control -Easy access to network resources • Browse and view

msinfo32.exe

-Windows System Information • A wealth of knowledge -Shows information on Hardware Resources • Memory, DMA, IRQs, conflicts -Shows information on Components • Multimedia, display, input, network -Shows information on the Software Environment • Drivers, print jobs, running tasks - Located under C:\Windows\System32 • Can also open through the cmd line or Run cmd

System Restore

-Windows creates frequent restore points • Goes back-in-time to correct problems • Creates restore points after a windows update or after installing new software -Start by pressing F8 - Advanced Boot Options - Repair -In Windows 7/8/8.1/10 it is located in Control Panel under Recovery -Doesn't guarantee recovery from viruses and spyware/malware • All restore points might be infected

net command

-Windows network commands -Views network resources • net view \\<servername> • net view /workgroup:<workgroupname> -Map a network share to a drive letter • net use h: \\<servername>\<sharename> -View user account information and reset passwords • net user <username> • net user <username> * /domain

Graphics Workstation

-Works with software that allows Computer Aided Design (CAD) / Computer Aided Manufacturing (CAM) -Requires SSD (High speed storage) -High-end video (complex graphics) -Maximum RAM

Step 3 : Exposing

-Writes the image with the laser -Laser neutralizes every negative charge where the image will go

Laptop Touchpad On/Off Setting

-You can enable or disable this function with a FN key -Turning this option off avoids inadvertent mouse clicks and movements

Desktop styles

-Your computer has many different uses • Those change depending on where you are -Work styles • Standard desktop • Common user interface • Customization very limited • You can work at any computer due to Active Directory -Home • Complete flexibility; No restrictions • Background photos, colors, UI sizing

RAID (Redundant Array of Independent Disks)

-a method of storing data on two or more hard drives that work together -Different types of levels -Some redundant, some not

Hypervisor

-a.k.a Virtual Machine Manager -Manages the virtual platform and guest OS's -The CPU can provide better virtualization performance if it is supported -In charge of hardware management (CPU, Networking, Storage, Security, etc...)

Internal USB Connector

-allows connectivity to computer case USB interfaces -located on the motherboard

RJ45 printer connector (wired device sharing)

-allows you to connect the printer to the wired network

Software as a Service (SaaS)

-also referred to as On-Demand software -No local installation -Application and data is maintained by 3rd party provider -Cloud-based provider is responsible for maintenance, security, and everything else associated with the application - No development work required, just log in and it is available -Common implementation is Google Mail

PCI 64-bit expansion card

-card slot is a bit longer -Slot provides power at 3.3V or 5V -device can use either available power -3rd notch signifying that it is a 64-bit card -Card should be able to slide in without much force. -Confirm notches are lined up

The Windows command line

-cmd • The "other" Windows • Can start utilities from the cmd line • Many options available under the hood • Faster to do tasks on the cmd line compared to GUI

RAID 1+0 - A Stripe of Mirrors (a.k.a RAID 10)

-combines striping (RAID 0) with mirroring (RAID 1) -RAID 0 stripes data across the drives, RAID 1 mirrors that data -High disk space utilization -High redundancy -Minimum of 4 drives

Scanner

-connected via USB or 802.11 WiFi -Different form factors (AIO or Flatbed) -May include Automatic Document Feeder (ADF) -Scan scan large amount of papers with ADF

Motherboard Jumpers

-contains jumpers for pwr, hdd, etc... -connects from pc case to the motherboard -allows connection to interfaces at the front of the case, such as Power LED, HDD LED, Reset SW, etc..

File management

-dir • Lists files and directories in cmd prompt -cd • Change working directory in cmd prompt • Use backslash \ to specify volume or folder name -.. • Two dots/periods in cmd prompt • The folder above the current folder

Impact Printer Print Head Replacement

-directly hits ribbon and paper (Takes a lot of abuse) -Need to replace when pins stop working -Gets very hot -Look for a release lever or bar to take out component (Designed to be modular) -Can also replace ribbon for best effect

Other file systems

-ext3 • Third extended file system • Commonly used by the Linux OS -ext4 • Fourth extended file system • An update to ext3 • Commonly seen in Linux and Android OS -NFS • Network File System • Access files across the network as if they were local • NFS clients is available across many operating systems -HFS+ / HFS Plus • Hierarchical File System • Also called Mac OS Extended • Replaced by Apple File System (AFPS) in macOS High Sierra (10.13) -Swap partition • Memory management • Frees memory by moving unused pages onto disk • Copies back to RAM when needed • Usually a fast drive or SSD

TIA/EIA 568A

-green-white, green -orange-white, blue -blue-white, orange -brown-white, brown

Separation Pad

-helps pick up the top sheet of paper from your paper tray, not multiples sheets -Small and inexpensive, easy to clean or replace

PC 64-bit slots

-longer slots -extra notch

TIA/EIA 568B

-orange-white, orange -green-white, blue -blue-white, green -brown-white, brown

+12V

-provides power to large components such as PCIe adapters, hard drive motors, cooling fans, most modern components

Conventional PCI (Peripheral Component Interconnect)

-referred to as PCI bus -Parallel communication -32-bit and 64-bit bus width

Shutdown command

-shutdown • Shutdown a computer • And optionally restart "shutdown /r" -shutdown /s /t nn • Wait nn seconds, then shutdown -shutdown /r /t nn • Shutdown and restart after nn seconds -shutdown /a • Abort the countdown!

FAT16

16-bit File Allocation Table A file allocation table which uses 16 bits for addressing clusters.

DB-25

5 Serial Communications D-Shell Connector, 25 pins

robocopy (robust file copy)

A Windows command that is similar to and more powerful than the xcopy command, used to copy files and folders.

service

A Windows process that does not require any sort of user interaction and so runs in the background

Event Viewer

A management console snap in for viewing and managing system logs (accessed through computer managment, administrative tools, or eventvwr.msc)

Local Users and Groups

A managment console that provides an interface for managing user and group accounts.(not available in Starter or Home editions)

BranchCache

A new feature of Windows 7 that enables users to rapidly access data from remotely located file and web servers. This enables users at a small branch to cache copies of frequently accessed files from head office servers on a local computer.

Factory Recovery Partition

A partition that contains an image of the bootable partition created when the computer was built.(Restores OS to factory settings)

net localgroup Administrators dmartin /add

Add dmartin to the Administrators local group

crontab -1

Add or delete a scheduled job in cron

ARP

Address Resolution Protocol Resolves IP addresses to MAC addresses. ARP poisoning attacks can redirect traffic through an attacker's system by sending false MAC address updates. VLAN segregation helps prevent the scope of ARP poisoning attacks within a network.

net user dmartin Pa$$w0rd /add /fullname: "David Martin" /Logonpasswordchg:yes

Adds a new user account and forces user to change password at first logon (have to enter these commands in administrative command prompt)

bootrec /rebuildbcd

Adds missing Windows installations to the BCD

ACPI

Advanced Configuration Power Interface. Power management specification that far surpasses its predecessor, APM, by providing support for hot- swappable devices and better control of power modes.

AES

Advanced Encryption Standard. A symmetric algorithm used to encrypt data and provide confidentiality. AES is quick, highly secure, and used in a wide assortment of cryptography schemes. It includes key sizes of 128 bits, 192 bits, or 256 bits.

ATAPI

Advanced Technology Attachment Packet Interest An interface between your computer and attached CD-ROM drives and tape backup drives. Most of today's PC computers use the standard Integrated Drive Electronics (IDE) interface to address hard disk drives. ATAPI provides the additional commands needed for controlling a CD-ROM player or tape backup so that your computer can use the IDE interface and controllers to control these relatively newer device types.

ATX

Advanced Technology eXtended Is a motherboard configuration specification developed by Intel in 1995 to improve on previous de facto standards like the AT design. -Older versions = 20 pin pwr -Newer version = 24 pin pwr -Ports are integrated -Is not compatible with Baby AT or LPX -12x9.6 inches or 12x10 inches but may vary slightly

Differential backup

All data modified since last full backup(moderate backup time, moderate restore time uses no more than two tape sets)

full backup

All selected data regardless of when it was previously backed up (high backup, time low restore time uses one tape set)

Event Viewer

Allows monitoring of Windows logs. System, security, application, and service events are recorded in these logs

Business client

An OS designed to work as a client in a business network

EULA

End User License Agreement

popular linux GUIs

Gnome, KDE, Cinnamon, Xfce

IDS

Intrusion Detection System

KB

Knowledge Base

MIDI

Musical Instrument Digital Interface

OCR

Optical Character Recognition

POST

Power-On Self-Test

ipconfig /release AdapterName

Release the IP address obtained from a DHCP server so the network adapter will no longer have an IP address

ren

Renames a file or directory

Transmit Power

Sets radio power level, typically set to the highest level by default

Creator Owner Group

The account that created or "owns" an object, usually a user account.

LPL

Windows Logo'd Product List- catalog of tested devices and drivers

Everyone Group

Windows group that includes all users

mkfs

linux command-line program used to format a partition

ext

linux file system

WIndows Memory Diagnostic

tool to test the memory chips for errors

Upgrading from Windows 7

• Keeps Windows settings, personal files, and applications • Must upgrade to a similar Edition

PowerShell Script comment

#

Services tab

- Can enable and disable Windows services • Determine what starts during boot -Easier to manage than the Services applet • Click/unclick -Useful for trial and error • It may take many reboots to find your problem

Task Manager

- Provides Real-time system statistics • CPU, memory, disk access, etc. -Starting the Task Manager: • Ctrl-Alt-Del, select Task manager • Right mouse click the taskbar and select Task Manager • Ctrl-Shift-Esc -Enhancements since Windows 7 • More information and features

Windows 8/8.1 Editions

- Windows 8/8.1 (Core) - Windows 8/8.1 Pro - Windows 8/8.1 Enterprise

PCIe V4.x

- ~2 GB/s of throughput per lane in each direction

PCIe V5.x (expected in 2019)

- ~4 GB/s of throughput per lane in each direction

3D Printers

-"Prints" in three dimensions -Create an item based on an electronic model -Additive manufacturing (start with nothing and melt some filament layer by layer to create an object) -No machining process required -Rapid prototyping (design and create, make changes as needed; relatively quickly and inexpensively) -Designs can be deployed anywhere in the world or in space on the International Space Station

Laptop LCD Switch

-"Refrigerator door" effect means which screen will be used depending whether the laptop screen is open or closed -Can be a physical switch on older systems -Internal magnetic switch on newer systems -Can cause the system to go into suspend mode, functionality can be set in BIOS or a utility to either stay on or to turn off

PowerShell escape character

--%, ', \,

PCI 266 MB/s Throughput

--Bus version running at: -32-bit card running at 66 MHz (clock rate) or -64-bit card running at 33 MHz (clock rate)

PCI Express x1 Lane

-1 lane (1 lane in one direction and another 1 lane in the opposite direction)

SATA Revision 1.0

-1.5 Gbit/s -Max cable size : 1 meter

USB 1.1 Low Speed

-1.5 megabits per second -3 meters

PCI Express x12 Lane

-12 lanes (12 lanes in one direction, another 12 lanes in the opposite direction)

SATA Revision 3.2

-16 Gbit/s -Max cable size : 1 meter

Thunderbolt v2

-20 Gbit/s aggregated channels -Mini DisplayPort connector

USB-C Connections

-24-pin double sided USB connector -Used for both hosts and devices -Acts as a USB 3.1 connection or 2.0 connection -Can also act as an analog audio option with an adapter (headset support through a 3.5mm jack)

SATA Revision 2.0

-3.0 Gbit/s -Max cable size : 1 meter

Operating system technologies

-32-bit vs. 64-bit • Processor specific -32-bit processors can store 2³² = 4,294,967,296 values -64-bit processors can store 2⁶⁴ = 18,446,744,073,709,551,616 values • 4 GB vs. 17 billion GB • The OS has a maximum supported value -Hardware drivers are specific to the OS version (32-bit / 64-bit) • 32-bit (x86), 64-bit (x64) -32-bit OS cannot run 64-bit apps • But 64-bit OS can run 32-bit apps -Apps in a 64-bit Windows OS • 32-bit apps: \Program Files (x86) • 64-bit apps: \Program Files

Molex connector

-4-pin peripheral power connector -Created by Molex Connecter Company -AMP MATE-N-LOK -Provides +12v and +5V -Power for many devices in the computer case (Storage, Optical drives, Fans, Other peripherals)

DVD-ROM (digital versatile disc read-only memory)

-4.7 gigabytes (GB) for single-layer -8.5 gigabytes (GB) for dual-layer

Thunderbolt v3

-40 Gbit/s aggregated channels -USB-C connector

USB 2.0

-480 megabits per second -5 meters

PCIe v2.x

-500 MB/s of throughput per lane in each direction

64-Bit PCI Parallel Bus

-64 bits sent at the same time -wider bus

RJ45 Connector

-8 position, 8 conductor connector (8P8C) -8 wires available, All 8 are used -Associated with wired-ethernet connection -Similar in shape to an RJ48C

Laptop Wireless Cards

-802.11 Wireless connection -WWAN - Cellular based wireless connection -WPAN - Bluetooth wireless network -Comes in Mini-PCI or Mini-PCIe cards -Make sure the antennas are plugged in

BD-RE (Blu-ray disc Recordable Erasable)

-A Blu-ray disc that can be rewritten to multiple times.

CD-RW (Compact Disc-ReWritable)

-A CD that can be written to multiple times

Windows 8/8.1 Core

-A basic version for the home • x86 and x64 versions -Microsoft account integrates into the OS • Login to your computer and all of your services -Includes Windows Defender • Integrated anti-virus and anti-malware -Uses Windows Media Player to Play audio CDs and DVDs -Does not support EFS, Bitlocker, Domain Member, AppLocker, BranchCache -Available in 32-bit (Max 4 GB RAM) and 64-bit (Max 128 GB RAM)

User Datagram Protocol (UDP)

-A connection-less protocol -No formal process when starting or ending the connection -Unreliable for of delivery -No error recovery -No reordering of data or retransmissions -No Flow Control -Sender determines amount of data transmitted -No ACK needed

Transmission Control Protocol (TCP)

-A connection-oriented protocol -There is a formal process when starting and ending the connection -A reliable form of delivery -Can recover from errors and can re-transmit the data -Can manage out-of-order message or retransmissions -There is Flow Control where the receiver can manage how much data is sent (slow or speed things up) -Station A ACKnowledges received data (ACK) from Station B -Data is resent if Station A does not receive an ACK from Station B

Metered Cloud Services

-A cost for almost anything -upload a file, download a file, store a file on that cloud service have costs associated to it -A way to look at costs associated with using that app in the cloud

Burners

-A device that is used to read and create make CD and DVDs -Information is written to the CD/DVD by darkening the photosensitive dye

Software-based RAID

-A feature of the OS -Does not required special hardware -Lower performance than hardware-based

Hardware-based RAID

-A feature of the hard drive controller -Configured outside of the OS (usually invisible to the OS) -Higher performance, designed for speeds

Non-Metered Cloud Services

-A flat costs over certain amount of time -A flat fee to upload and download files

eMMC (embedded MMC)

-A form of embedded flash memory widely seen in mobile devices.

Laptop Rotating/Removable Screens

-A laptop keyboard and tablet screen combined (can be twisted around with keyboard facing us) -Can be used for presentations -May include a stylus for input -Can be detached from keyboard and use the stylus for input

Hybrid Cloud Deployment Model

-A mix of public and private -Part of the cloud-based services running in a private data center; other aspects of the service running in a public provided cloud

Virtualization characteristics

-A native OS -Performs native OS processes -Identical to using a non-virtual system

Computer Management

-A pre-built Microsoft Management Console • A predefined mix of plugins • Control Panel / Administrative Tools - To create your own Microsoft Management Console, you can do the following: • Go to "C:\Windows\System32" and click on "mmc.exe" • Click on Start and search for mmc.exe • cmd prompt and type in mmc.exe • You can add or remove snap-ins as needed -A handy starting point • Events • User accounts • Storage management • Services • And more!

SNMP v3

-A secure standard -Message integrity -Authentication method -Encryption

Duplexing Assembly

-A two step process to print on both sides -a mechanism to flip the page automatically -Can be built-in to the printer or added as an add-on.

Secure Digital (SD) card

-A type of memory card used in digital cameras, tablets, cell phones, MP3 players, digital camcorders, and other portable devices. -The three standards used by SD card -regular SD - Up to 2GB using FAT 12 and 16 file systems -SD High Capacity or SDHC - over 2GB to 32GB using FAT32 file system -SD eXtended Capacity or SDXC - over 32GB-2TB using exFAT file system

xD-Picture Card

-A type of memory card, typically used with digital cameras

HomeGroup Applet

-A way to easily share information • Windows 7 / Windows 8 • No HomeGroup options on Windows 10 • Documents, pictures, music, video -A network for the home • Must be set to "Home" in Windows -Enable HomeGroup • A single password is created for everyone to use

Storage spaces

-A windows feature -Storage primarily designed for data centers, cloud infrastructures to easily add storage space • Multiple tiers of available spaces • Different types of administrative control that can be assigned to those spaces -Storage pool • A group of storage drives • Can combine different storage devices into a single pool • Easy to add or remove space in the pool -Storage space • Virtual disks are allocated from available space in the pool • Can specify if its a standalone, mirrored, or striped virtual disk • Includes options for mirroring and parity • Hot spare available as a replacement drive

SOHO Access Point Settings

-Ability to enable/disable frequencies (2.4 GHz and/or 5 GHz) -Configure SSID (each frequency is different) -Choose the type of security mode -WPA2 (preferable) -Configure a pre-shared key -Configure enterprise mode (Username and password required) -Configure the bandwidth channel(s) for this connectivity

Network Attached Storage (NAS)

-Accessible from anywhere -Central location for media storage -Central location for file storage -Gigabit NIC -RAID Array -High-capacity hard drives

Domain Services

-Active Directory Domain Services • Large database of your network • Contains info. on users, computers, and the systems they connect to. -Distributed architecture • Many servers • Not suitable for home use -Everything documented/managed in one place • User accounts, servers, volumes, printers -Many different uses • Authentication • Centralized management

Motherboard PATA Interface

-Actually has 39 pins (1 pin removed to plug cable one particular way)

hot-swappable drive

-Add or remove drives while the system is running -Connection is "hot" -USB is an example -FireWire is also an example -SATA, eSATA - Part of the standard -Combine with RAID for 100% uptime

Step 4 : Developing

-Adds toner to the charged areas that have been neutralized on the imaging drum -Toner has a negative charge associated to it, so it wont stick to the negatively charged areas from Step 2.

InkJet Printer Calibration

-Aligns the nozzles to the paper -Lines should be crisp and color shouldn't overlap -Menu options are available on the printer itself (does not need to be connected to a system) -Minor adjustments can be made

HDMI (High-Definition Multimedia Interface)

-All digital connection (no analog) -Sends both audio and video -20 meter distance before losing too much signal -19-pin (type A) connector

Private Cloud Deployment Model

-All hardware is self own -Your own virtualized local data center -All cloud-based services will be virtualized in an environment control by you

Replacing Laptop Storage

-All internal (either open a small cover OR remove the whole cover to locate the hard drive) -Can be very modular once the drive is located (remove a few screws and the drive slides out)

SSD (Solid-State Drive)

-All memory, no moving parts -Silent, fast access time, less latency -Better performance

Windows Firewall with Advanced Security

-Allows for a more detailed control of inbound/outbound traffic -Can configure: • Inbound rules • Outbound rules • Connection security rules -Can also configure granular rules to specify: • Program • Port number • Predefined services • Custom Variables -Custom variables can include options for the rule such as: • Program • Protocol/Port • Scope • Action • Profile

SOHO UPnP (Universal Plug and Play)

-Allows network devices to automatically configure and find other network devices -Zero Configuration -Applications on the internal network can open inbound ports using UPnP -No approval needed -Used for many peer-to-peer (P2P) applications -Best practice would be to disable UPnP -Only enable if the application requires it (and maybe not even then)

Laptop Docking Station

-Allows you to use an external kebyoard and mouse -You can extend existing laptop interfaces that are always plugged in (printers, monitors) -Expansion cards can also be connected to this device (if available) -Helps avoid cabling issues when connecting to other devices

Ethernet over Power (EoP)

-Also called Power-Line Communication (PLC) -Operates at 500 Mbps -Uses existing electrical system of the building -One adapter connects to the power outlet and close to the router/modem. Other adapter connects close to the PC that needs network connectivity -Works similarly to DSL technology (electricity and data are carried at different frequencies) -No software/hardware configuration needed -Plug and Play

DSL modem

-Also known as ADSL (Asymmetric Digital Subscriber Line) -uses telephone lines for connectivity -It is Asymmetric due to download speed being faster than upload speed -~10,000 foot limitation from the central office (CO) -52 Mbit/s downstream ; 16Mbit/s upstream are common -Possible faster speeds if closer to the CO

BIOS Important Tips

-Always have a backup of the config -Do not make changes unless you are certain of a setting -Upgrade for a specific reason -Always have a backup of the config (Important!)

Small Office/Home Office (SOTO) Router

-An all-in-one device -It is a modem, router, switch, wireless AP, firewall, etc...

DVI (Digital Visual Interface)

-An interface used with displays. -It includes DVI-A for analog displays, DVI-D for digital, and DVI-I integrated for both analog and digital. -Single link; 3.7 Gbps (HDTV at 60 fps) -Dual link ; 7.4 Gbps (HDTV at 85 fps)

BD-R (Blu-ray Disc-Recordable)

-An optical Blu-ray disc that can be written to once.

Computer Speakers

-Analog output devices -Connected via TRS (Tip/Ring/Sleeve) jacks -option available to connect via speaker output or audio adapter

Tethering (Mobile Device Connectivity)

-Anchored to your mobile device -Connection can be made to the laptop via USB or Bluetooth -Creates a single connection -May require additional services from phone provider

Laptop Trackpoint

-Another method to move the cursor -Requires a push to move the cursor

Apple iOS history

-Apple iPhone and Apple iPad OS • Based on Unix • Closed-source - No access to source code • Exclusive to Apple products -iOS Apps • Apps are developed with iOS SDK on Mac OS X • Apps must be approved by Apple before release • Apps are available to users in the Apple App Store

Lighting Connector

-Apple proprietary -8-pin digital signals -Used for iPhones, iPads, iPod devices --Advantages over Micro-USB -Higher power output for phones and tablets -Can be inserted either way -Simpler design, more durable

Lightning Cable

-Apple proprietary -8-pin digital signals (iPhone, iPad, iPod devices) -Some advantages over Micro-USB --Higher power output for phones and tablets --Can be inserted either way --Simpler design, a bit more durable than traditional USB cable

SOHO Configuring NAT

-Automatic for SOHO devices -also known as Source NAT (Also called PAT - Port Address Translation) -All internal devices are translated to a single external address

Windows 8/8.1 Enterprise

-Available to "Software Assurance" customers • Large volume licenses -Supports enterprise features • AppLocker • Windows To Go • DirectAccess • BranchCache • EFS • Bitlocker • Can join Windows domain -Available in 32-bit (Max 4 GB RAM) and 64-bit (Max 512 GB RAM)

Public Cloud Deployment Model

-Available to everyone over the internet -Example is Amazon Web Services or Microsoft Azure

Services

-Background process • No user interaction • File indexing, anti-virus, network browsing, etc. -Useful when troubleshooting the startup process • Many services startup automatically -Command-line control • net start, net stop -Services is located in Control Panel under Administrative Tools • Type in "services.msc" through search or cmd prompt

LED-backlit LCD display

-Backlight is LEDs instead of florescent -LED's are either placed around the edge of the screen OR in an array (matrix) behind the screen -The latest laptops are LED-backlit -Uses same DC voltage (no voltage conversion is needed) -If display stops working, look closely (use a flashlight) to still see information on the screen -Inverter or whole display will need to be replaced

UEFI BIOS (Unified Exentensible Firmware Interface)

-Based on Intel's EFI (Extensible Firmware Interface) -A defined standard (implemented by mobo Mfr.'s) -Designed to replace legacy BIOS -Provides support for modern hardware -Graphical front-end -Also options for text based front end

Thin Client

-Basic Application Usage (applications run on a remote server) -Very little configuration (all work done on server) -Referred to as Virtual Desktop Infrastructure (VDI) -Local devices is a keyboard, mouse, and screen -Meets minimum requirements for running OS (no huge memory or CPU needs) -Network Connectivity is a must -Inexpensive to buy (easy to replace) -No local permissions required

File systems

-Before data can be written to the partition, it must be formatted -Operating systems expect data to be written in a particular format • FAT32 and NTFS is popular -Many operating systems can read (and perhaps write) multiple file system types • FAT, FAT32, NTFS, exFAT, etc.

Local Security Policy

-Big companies have big security policies • Managed through Active Directory Group Policies • Affects many computers at once -Stand-alone computers aren't managed through AD • Local policies are managed by Local Security Policy -Not available in Home editions • Available in Professional / Pro, Ultimate, Enterprise -Local Security Policy is located at: • C:\Windows\system32 and click on secpol.msc • Click on Start and search for secpol.msc or local security policy • cmd prompt and type in secpol.msc

Choosing a Power Supply

-Bigger isn't necessarily better (More expensive doesn't make your computer faster) -Physical size is relatively standard (older systems may have proprietary sizes) -Calculate the watts required for all components (CPU, Storage devices, Video adapter) -Video cards are usually the largest power draw -50% capacity is a good rule of thumb

UEFI Advantages

-Boot from large (>2.2 TB) that were formatted with GUID partition table (GPT) disks -Can support (boot) from FAT and removable media -Includes a pre-boot environment (not an OS) -Has its own drivers, shell, applications -Can browse the internet, backup a storage drive -Remote diagnostics

SSHD (Solid State Hybrid Drive)

-Both a spinning drive and SSD -SSD caches the slower spinning hard drive data -Increases speed without cost of a SSD-only system -Looks like a normal hard drive or SSD (same form factor and interfaces)

Switches

-Bridging done in hardware -Application-specific integrated circuit (ASIC) -Forwards traffic based on data link address -Contains many ports and features -The core of an enterprise network -May provide Power over Ethernet (POE) -Can include routing functionality (Multilayer or Layer 3)

Cable Modems

-Broadband (transmission across multiple frequencies) -Sends data on the cable network using DOCSIS (Data Over Cable Service Interface Specification) -High-speed networking -4 Mbits/s through 250 Mbits/s are common -Gigabit speeds are possible -Supports multiple services such as data, voice, video

Windows 7 Starter

-Built for netbooks -No DVD playback or Windows Media Center -No Windows Aero -No Internet Connection Sharing (ICS) -No IIS Web Server -No enterprise technologies • No Domain connection, BitLocker, EFS, etc. -Only a 32-bit version, maximum of 2 GB of RAM • Not supported in 64-bit version

LoJack for Laptops

-Built into the BIOS -Software installed into the OS -Reinstalls itself if removed or new storage drive installed -"Phone home" function provides location information -Theft mode remotely locks the laptop and/or delete files and can force a startup password

Computer Microphone

-Built-in (laptop) or external -Analog connectivity - TRS (Tip/Ring/Sleeve) Jack -Digital connectivity - USB

Smart Card Reader

-Built-in or external (USB connectivity) -reads cards with embedded circuitry

Laptop Microphone

-Built-in to the laptop -Useful for video conferencing calls -Not good for non-casual use (not high quality) -Analog or USB options can help gaming or creating content

Virtualization requirements

-CPU Processor Support (Intel VT or AMD-V) -Memory (above and beyond Host OS requirements) -Disk Space (each guest OS will have its own image) -Network (Configurable on each guest OS such as a standalone, provide NAT, Bridged, etc.) -More advanced virtualization systems allow you to create virtual switches to have separate VLAN's configured for the different VM's on the desktop

BranchCache

-Caching for branch offices • Without additional hardware or external services -Conserves bandwidth over slower links • Seamless to the end-user • Same protocols • Same network connection • Same authentication methods -Activates when round-trip latency exceeds 80 milliseconds

Folder Options / File Explorer Options Applet

-Can Manage Windows Explorer • Many options -General Tab • Can change how folders open in each Window • How folders expand • Can set privacy settings -View Tab • Advanced settings for files and folders (can view hidden files, can hide extensions, etc..) -Search Tab • Can configure how the search Index is used when searching for files • Search Options when searching for files • Options when searching non-indexed areas

On-Demand Self-Service

-Can add a new virtual server, network, application when needed -No need to purchase a new server or install it into the rack -Instant resource provisioning provided by the cloud-based services

TPM (Trusted Platform Module)

-Can be added to many motherboards -Built-in to some systems -Adds advanced cryptographic functions -Integrates with BIOS

How Port numbers are used by TCP/UDP

-Can be any number between 0 and 65,535 -Most servers (services) use non-ephemeral (not- temporary) port numbers -Some servers (services) might use a port outside of the non-ephemeral range to indicate where the data needs to be delivered. (perfectly fine) -They are used for communication, not security -Service port numbers need to be "well known" -TCP port numbers are not the same as UDP port numbers (TCP 80 will not communicate with UDP 80)

SOHO End-User Device Configuration

-Can be configured automatically -Auto speed and Duplex -DHCP Addressing -IP Address, Subnet Mask, Default Gateway, DNS Servers are all populated on the devices based on the router configurations

Phone / Tablet

-Can be managed centrally through Mobile Device Management (MDM) -Touchscreen configuration (lock codes or biometric access) -Application installs (set by policy and requirement) -Sync and backup can be cloud-based -Wireless enabled (can include VPN connectivity)

SOHO Port Forwarding

-Can be used to allow 24x7 access to services hosted internally (such as web servers, gaming server, security system, etc) -External IP/Port number maps to an Internal IP/Port -Does not need to be the same port number -Also called Destination NAT or Static NAT -Destination address is translated from a public IP to a private IP -Does not expire or timeout

Example of how TCP/IP works

-Can be viewed as a series of moving trucks -A truck can be used to efficiently move large amounts of data -The network topology is the road (ethernet, DSL, Cable System) -The truck is the TCP/IP -The boxes being carried by the truck are either TCP or UDP data -Inside the boxes are more things such as application information

Mobile Device Game Pads

-Can connect to a mobile phone or tablet over bluetooth connectivity -Gives the gaming console feel on a mobile phone or tablet

Laptop Screen Brightness

-Can control the backlight -Can increase/decrease brightness -More light requires more power (shorter battery life) -Less light requires less power (longer battery life)

Wireless Networks (Mobile Device Connectivity)

-Can enable or disable cellular, WiFi, and Bluetooth independently -Can enable/disable in iOS in the settings or from the Control Center -Can enable/disable in Android under settings/Wireless & network settings

Laptop Screen Orientation

-Can rotate the screen -Useful on rotating tablets/laptops -Landscape or Potrait mode -Can enable with a FN key or a Hotkey (depends on manufacturers)

Rapid Elasticity

-Can scale up or scale down application resources as needed -Done behind the scenes; Invisible to end-users -It is seamless to everyone

Processes Tab

-Can view all running processes • Interactive and system tray apps • View services and processes from other accounts -Manage the view • Can move columns, add metrics -Later versions combine all apps, processes, and services into a single tab • Easy to view and sort

Event Viewer

-Central event consolidation • What happened? -Broken down into different categories • Application • Security • Setup • System -Then each one is broken down into a different priority such as: • Information • Warning • Error • Critical • Successful Audit • Failure Audit -Can obtain detailed information when troubleshooting an application or OS

Wireless LAN Controllers

-Centralized management of WAPs -Its management functions allows you to deploy new access points -Monitor performance and security -Configure and deploy changes to all sites -Report on access point use -Usually a proprietary system (wireless controller is paired with the access points) -Can also be cloud-based (manage the console from anywhere)

Credential Manager Applet

-Centralized management of web and Windows credentials • Each site can have a different username and password -Can add additional Windows credentials • Such as Certificates

Before the installation

-Check minimum OS requirements • Memory, disk space, etc. • And the recommended requirements -Run a hardware compatibility check • Runs when you perform an upgrade • Run manually from the Windows setup screen • Windows 10 Upgrade Checker -Plan for installation questions • Drive/partition configuration, license keys, etc. -Application compatibility - Check with the app developer

Driver Installation

-Check web for latest version -Uninstall existing drivers through Windows Device Manager -Mfr. provide their own driver installation software -Check device manager to confirm device status

Level 1 Cache (L1 cache)

-Closest to the processor -Provides the first storage of data (first check)

Printers

-Color and B&W -All-In-One (AIO) -Connectivity via USB, Ethernet, 802.11 Wifi, or Bluetooth/Infrared

Transfer Belt and Roller

-Color laser printers have 4 different colors that they use (cyan, yellow, magenta, black) -Four separate cartridges -color is transferred from all cartridges to a single belt and then to a single transfer roller

Patch Panels

-Combination of punch-down blocks and RJ-45 connectors -Cable runs from desks are made once -Permanently punched down panel -Connection from panel to switch can be easily changed -No special tools to create new connections -Can use existing cables

Laser Printer

-Combines a laser, high voltage, charged ions, powdered ink, heat and paper -Very high quality output -Very fast printing -Complex (many moving parts) -Requires on-printer memory -Messy on the inside if toner cartridge leaks

Headset

-Combines headphones and microphones (one unit) -Desk and mobile use -Connected via USB, TRS Plug, Wireless/Bluetooth -Allows you to be handsfree while on the phone or communicate to others while gaming

BNC connector (Bayonet Neill-Concelman)

-Common type of coaxial connector typically DS3 WAN links -Plugs in and twists to lock (not easy to disconnect) -Rigid and bulky (difficult to work with)

Print to File

-Commonly done when working at home or away from the office -Located in the print dialog window -Prints to the work printer driver (saves it as a file) -File will be in an output format specific to that printer (wont open in another program) -Must use command line to copy the file to the printer (i.e. copy filename LPT1:)

Parallel Printer connector (wired device sharing)

-Commonly referred to DB-25 -Available in legacy systems -Centronics interface on the printer -DB-25 interface on the computer

Feed Rollers

-Commonly used by inkjet and laser printers to pull paper -Need to be clean, not worn to pull paper properly

Windows 7 Ultimate

-Complete functionality -Domain support, Remote Desktop, EFS -Supports all enterprise technologies • Including BitLocker -Available as a x64 version and supports 192 GB of RAM -Same features as Windows 7 Enterprise • But for the home user

Mobile Device Synchronizing to the Cloud

-Completely hands-off -No physical cables, no local files -May be integrated into your Exchange or Gmail -Sync can be done through the service provider and or WiFi -Apple iOS syncs to the iCloud -Complete backup and recovery -Android syncs to the google account

SOHO Wireless Channels and Encryption

-Configure with highest encryption possible -WPA2-AES (available on most modern routers) -Choose WPA2 over WPA -WEP (older encryption) is not an appropiate option -Check all access points to make sure all are using the highest encryption -Use an open frequency (some access points will automatically find good frequencies)

Keyboard

-Connected via USB or an adapter for PS/2 -Additional features may require additional drivers/software

Mouse

-Connected via USB or an adapter for PS/2 -Few moving parts -Needs the right surface -Glass may cause problem

Syncing Mobile devices to the automobile

-Connection is done either through bluetooth or wired cable (extends the phone functionality into the vehicle) -Can display maps, control phone calls, play music from the mobile device -Can use iOS carplay for apple devices or Android auto for android devices -Syncs contact info., music, and other details -Phone information is shared in real-time -This could be a security issue in a rental car or shared car since information is transferred into the car

IoT (Internet of Things) configurations

-Consists of home automation -mostly wireless -Security can be an issue -Devices such as thermostats, light switches, security cameras, door locks, voice-enabled smart speakers / digital assistants -No special port-mapping/NAT configurations required (almost all devices communication outbound)

Alternating Current (AC; ∿)

-Constantly reversing direction as it flows through electrical lines -Efficiently distributes electricity over long distances -Frequency of cycle is important: •In US/Canada it is common to see 110-120 volts of AC (VAC) with a frequency of change at 60 hertz (Hz) •In Europe it is common to see 220-240 VAC with a frequency of change at 50 hertz (Hz)

Data types that are synced on Mobile devices

-Contacts -Applications -Email -Pictures, Music, Video -Calendar -Bookmarks -Documents -Location Data -Social Media Data -eBooks -Passwords -All the above are shared on different mobile devices

Digital Projectors

-Contains Metal-Halide lamps -Very bright (very hot) light -Brightness measured in lumens -Relatively expensive -Always let bulbs cool (fan will keep running) -Keep it plugged in

Portable LCD (Liquid Crystal Display)

-Contains a backlight that shines through liquid crystals and color filters and other components to show you an image --Advantages -Lightweight -Relatively lower power and inexpensive --Disadvantages -Black levels are a challenge -Requires a separate backlight (Flourescent, LED, etc...) -Difficult to replace

Example of how Internet Protocol (IP)

-Contains an Ethernet header, payload, trailer (in that order) -Inside Ethernet payload contains an IP header and its own IP payload -Inside IP payload contains TCP header and its own TCP payload -Inside of the TCP payload is the application information

Laptop Function Keys

-Contains an FN key -Allows secondary functions of the keyboard -Can allow to toggle between LCD/external monitor/both

Small Office/Home Office (SOHO)

-Contains multi-function devices (printer, scanner, fax, Network connectivity, phone line connection, and prints from the web) -Small number of employees

Laptop Storage

-Contains smaller hard drives compared to desktops -2.5in and 1.8in form factors

Product Release Instructions (PRI) Updates

-Contains specific radio settings such as ID numbers, Network codes, Country codes, etc., so the phone knows how to use the wireless network -Can be updated Over-The-Air

SOHO Whitelist/Blacklist

-Content filtering, IP address ranges (Or a combination) -Whitelisting -Nothing will pass through the firewall unless it is approved -Very restrictive -Blacklisting -Nothing on the "bad list" is allowed -All traffic is allowed except those on the "bad list" -Specific URLS -Domains -IP addresses

Laptop Media Options

-Control audio and video from the keyboard (no mouse clicking) -You can play, stop, rewind, fast forward, Mute, Volume -No FN keys needed

Boot tab

-Controls the boot location • Multiple locations and operating systems -Advanced options • Number of processors, maximum memory, etc. -Boot options • Safe boot, remove the GUI, create a log file, base video, OS boot information (shows drivers as they load), set timeout for booting

Why do you need an OS?

-Controls the interaction between components • Memory, hard drives, keyboard, CPU -A common platform for applications -A way for humans to interact with the machine • The "user interface" (either command line or GUI) • Hardware can't do everything! Software is required

General tab

-Controls the startup process • Normal, Diagnostic, Selective -Normal startup • Nothing to see here, go about your business -Diagnostic startup • Similar to Safe Mode, but not quite the same -Selective startup • You decide what to load

Laptop AC power adapters

-Converts AC to DC -Can be either auto-switching or fixed input -Input voltage can be 110 volts or 220 volts -Replacement needs to be compatible with your system

Liquid Cooling

-Coolant is circulated through a computer -Used in cars and mainframe computers -High-End systems -Gaming/Graphics processing -Used for Overclocking -CPU heatsink is different -Contains radiator and a fan

Copy command

-Copy files from one location to another • copy (/v, /y) -copy /v • Verifies that new files are written correctly -copy /y • Suppresses prompting to confirm you want to overwrite an existing destination file

Community Cloud Deployment Model

-Cost associated with the cloud is shared -Many orgs. create a larger cloud and share those resources within the members of the community

Measured Services

-Costs and utilization are very closely tracked -Resource planning and granular charge-backs -Can measure in and outs of bandwidth -Can measure the storage that is being used -Can measure how many people are using that application -Billing can be done with these metrics

DB-9 serial cable connector

-D-subminiature or D-sub -Different sizes, A through E -Sends serial data over an RS-232 connection -Built for modem or management port communication (Commonly used as a console port or management port on these devices)

VGA (Video Graphics Array)

-DB-15 connector (accurately called DE-15) -Blue color -Analog signal (no digital option) -Image degrades after 5 to 10 meters

DVI to HDMI cable/adapter

-DVI-D and HDMI are electrically compatible -HDMI is backward-compatible with DVI-D -No signal conversion required -No loss of video quality

SNMP v2

-Data type enhancements -Bulk transfers -Still in-the-clear (no encryption)

NAT (Network Address Translation)

-Designed for IP address conservation. It enables private IP networks that use unregistered IP addresses to connect to the Internet. NAT operates on a router, usually connecting two networks together, and translates the private (not globally unique) addresses in the internal network into legal addresses, before packets are forwarded to another network. As part of this capability, NAT can be configured to advertise only one address for the entire network to the outside world. This provides additional security by effectively hiding the entire internal network behind that address. NAT offers the dual functions of security and address conservation and is typically implemented in remote-access environments.

Windows 10 Home

-Designed for home user, retail customer -Integrates with Microsoft account • Microsoft OneDrive is used to backup your files -Windows Defender is included • Anti-virus and anti-malware -Cortana is included • Talk to your operating system -Does not support: • Hyper-V • Bitlocker • Cannot join the domain • AppLocker • BranchCache -Max x86 RAM 4 GB -Max x64 RAM 128 GB

Laptop CPU

-Designed for mobility -Uses less power and creates less heat -Integrates features such as memory controller and video controller to save space -Not very upgradeable -Replaceable but not upgradeable -Often slower than desktops -Size and heat are disadvantages

On-board fans

-Designed to cool and entire adapter card -Can be bulky (may take additional adapter card space) -Usually seen on high-end graphics cards

Error Correcting Code (ECC) Memory

-Detects errors -Corrects on the fly -Ideal for servers

tracert

-Determines the route a packet takes to a destination • Maps the entire path -Takes advantage of ICMP Time to Live Exceeded message • The time in TTL refers to hops, not seconds or minutes • TTL=1 is the first router, TTL=2 is the second router, etc. -Not all devices will reply with ICMP Time Exceeded • Some firewalls filter ICMP • ICMP is low-priority for many devices

VR headset

-Determines what you see -Motion tracking (X, Y, and Z axis) -Interacts with virtual environment -Used in gaming, education, art, travel applications

PATA Cabling (40 Wire)

-Device 0 (master) is closer to the PATA interface -Device 1 (slave) is further away from the PATA interface -Only supports 2 drives -Additional drives requires another PATA interface

PATA Cabling (80 Wire)

-Device 0 (master) is further away from the PATA interface -Device 1 (slave) is closer to the PATA interface -Only supports 2 drives -Additional drives requires another PATA interface -Most recent, added in newer versions of PATA for higher throughput -Additional wires are used for grounding to reduce crosstalk

Baseband Radio Processor (Mobile Device Connectivity)

-Different from WiFi, Bluetooth, NFC radios -Design to communicate with providers of cellular networks -Contains its own firmware and memory (quite proprietary) -We cannot see this part of the phone operating when making phone calls -Uses a real-time OS which allows the phone to set a priority to communicate over that cellular network -Firmware can be updated Over-The-Air (OTA) and it is invisible to the end user

Laptop System Boards

-Different models have different sizes -All proprietary (built to fit that laptop model) -Replacement isn't easy -Any issues with a specific component on the mobo will require the whole component to be replaced

Laser Printer Calibration

-Different toner cartridges print with different densities (some dark, some light) -Density can be adjusted to make it look perfect -Can be automated or manually (check documentation)

Power Supply Output Voltages

-Different voltages for different components -Voltages are references are positive or negative voltage -Voltage is a difference in potential -Electrical ground is a common measuring point (depends where you measure from)

dxdiag.exe

-DirectX Diagnostic Tool • Manage your DirectX installation • It is an application programming interface used by developers to create applications that requires multimedia or graphics within Windows -Multimedia API Overview for: • System • Display (3D graphics) • Audio • Input options -Also makes a very nice generic diagnostic tool when having issues with graphics or sound • Not just for testing DirectX - Located under C:\Windows\System32 • Can also open through the cmd line or Run cmd

Bonjour (Sharing from an OS)

-Discover apple devices on the LAN -Part of MacOS -Can be added to windows (itunes, etc..)

defrag.exe

-Disk defragmentation • Moves file fragments so they are contiguous (so that they can be stored next to each other) • Improves read and write time on spinning hard drives -Not necessary for solid state drives • Windows won't defrag an SSD • Option will not be available -Graphical version in the drive properties -Requires elevated permissions at the command line to run • defrag <volume> • defrag C: - Located under C:\Windows\System32 • Can also open through the cmd line or Run cmd • Graphical version in the drive properties

Heat Sink

-Dissipate heat through thermal conduction (copper or aluminum alloy) -Fins/Grid increase the surface area (heat is then transferred to the air) -Thermal paste creates a good contact between heat sink and chip. -VERY hot. Don't touch. -May find a fan on top of the heat sink in order to dissipate heat even faster.

Windows post-installation

-Does it work? • If it doesn't boot, there are bigger problems • Some testing is useful for unknown hardware configurations -Additional installations • Service packs • Security patches • Security applications • Driver updates • Application updates

Thermal Printer

-Does not have ink or toner -Contains special type of paper -Paper is heated when passing through the printer, the heated spots are then turned black -Common use for receipts -Very quiet (almost silent) -Paper is very sensitive to heat (turns the paper black) or light/clear tape (page will fade over time) -Not used to archive important docs due to sensitivity

Multi-channel Memory

-Dual-channel, triple-channel, quad-channel -Should always match (exact matches are best) -Memory modules slots are often colored differently -Maximizes throughput

Printer Configuration Settings

-Duplex; printing on both sides (not all MFP's can do this) -Collate ; Printing multiple copies in order (useful for many copies of large documents) -Non-collated prints as page 1,1,1,1,2,2,2,2,3,3,3,3 -Collated prints as page 1,2,3,4,1,2,3,4,1,2,3,4 -Orientations ; portrait or landscape -Quality ; Resolution can be changed; can print in color or grayscale; ability to print in color saving mode.

Guest Operating System Security

-Each vm is self-contained OS and needs same controls and security as a physical OS -Use traditional security controls - Host-based firewall, anti-virus, anti-spyware -Watch out for rogue VM's -Downloaded 3rd party self-contained VM's can be dangerous -Make sure you are running trusted VM's on your system

Tools tab

-Easy access to popular administrative tools • UAC settings, System Information, Computer Management, etc. -Faster than searching through menus or typing • A static (but comprehensive) list

DIMM (dual inline memory module)

-Electrical contacts are different on each side -64 bit data width -Found in Desktop computers -Available in DDR2, DDR3, DDR4 SDRAM

Direct Current (DC; ⎓)

-Electrical current moves in one direction with a constant voltage

Bluetooth Pairing Process (Mobile Device Connectivity)

-Enable BT on both devices -Set devices in discoverable mode (may require key sequence on BT device) -Select discovered device (many may appear) -Enter or confirm PIN (numbers should be the same) -Pin may not be required -Test connectivity once paired

Vendor-specific limitations

-End-of-life • Different companies set their own EOL policies -Updating • iOS, Android, and Windows 10 check and prompt for updates • Chrome OS will update automatically -Compatibility between operating systems • Some movies and music can be shared -Almost no direct application compatibility • Fortunately, many apps have been built to run on different OSes • Some data files can be moved across systems • Web-based apps have potential

Microsoft Exchange on Mobile devices

-Enterprise email (not a service at home) -Integrates email, contacts, calendars, reminders -Integrates with mobile device database such as contacts, calendars, etc. -Configuration options needed are email address, server, domain, username, password. -Contains integrated message encryption with S/MIME (Secure/Multipurpose Internet Mail Extensions) -Can both encrypt and digital sign sent and received messages from MS Exchange.

SOHO Firewall and DMZ Ports

-Every SOHO router is also a firewall -No external devices can directly access the internal network -This normally cannot be disabled -Demilitarized Zone ports can be configured to allow unrestricted access (almost always a bad idea) -need to consider creating more specific port forwarding rules OR dont allow any access

Network Interface Card (NIC)

-Every device on the network has one whether its wired or wireless that allows connectivity to the network (such as computers, servers, printers, routers, switches, phones, tablets, cameras, etc.) -Specific to the network type such as wired or wireless -Often built-in to the mobo -Many options such as single port, multi-port, copper, fiber, WAN, etc.

Full Disk Encryption (FDE)

-Everything is encrypted (not just individual files) -Whole OS is encrypted

Devices and Printers Applet

-Everything on the network • Desktops, laptops, printers, multimedia devices, storage -Quick and easy access • Much less complex than Device Manager • Can right mouse click and view Properties and make device configurations

Mounting drives

-Extend available storage space • Mount a separate storage device as a folder -Mount in an empty folder • Instant storage space • Seamless to the user -Configuration done in Disk Management: • Right click on the new drive • Change drive letter and paths • Select "mount" option and browse to the location

Installing applications

-Extend the functionality of your operating system • Specialized applications extend system functionality such as word processing, spreadsheets, graphics capabilities, etc... -Available everywhere • Find the application you need • Install on your operating system -Not every computer can run every application • Some simple checks can help manage your desktop

RAID 1 (Mirroring)

-File blocks are duplicated between physical drives -High disk space utilization (every file is duplicated; required disk space is doubled) -High redundancy (drive failure does not affect data availability) -Minimum of 2 drives

RAID 0 (Striping)

-File blocks are split between physical drives -High performance (data written quickly) -Zero redundancy (drive failure breaks the array) -Minimum of 2 drives

Standard OS features

-File management • You can Add, Delete, Rename files -Application support • Memory management, swap file management -Input and Output support • Printers, keyboards, hard drives, USB drives -Operating system configuration and management tools

Firewalls

-Filters traffic by TCP/UDP port number (OSI Layer 4 filtering) -Some can filter based on the application -Can encrypt traffic in/out of the network (protect traffic between sites) -Can proxy traffic (common security technique) -Can be used as a Layer 3 device (routers) -Usually sits on the ingress/egress of the network to do routing or NAT'ing

Check Disk (chkdsk) command

-Fixes logical file system errors on the disk • chkdsk /f -Locates bad sectors and recovers readable information • chkdsk /r • Implies /f -If volume is locked, run during startup

USB flash drive

-Flash memory -EEPROM (electrically erasable programmable read-only memory) -Limited number of writes - can still read data -Not designed for archival storage -Very small, Easy to lose or damage -Always have a backup

Solid State Hybrid-Drive (SSHD)

-Flash memory and hard drive storage -Contains spinning components from a hard drive and components from SSD -Data is cached to the SSD and then written to the hard drive

Local user permissions for application installs

-Folder/file access will be required • Installation programs will be copying a lot of files -The user needs permission to write application files to the storage drive • This may not be the default in an office -May need to run as Administrator • Some applications will install additional drivers or services • Be careful when allowing this level of access!

Linux history

-Free Unix-compatible software system • Unix-like, but not Unix -Many (many) different distributions • Ubuntu, Debian, Red Hat / Fedora -Advantages • Cost. Free! • Works on wide variety of hardware • Passionate and active user community -Disadvantages • Limited driver support, especially with laptops • Limited support options

BitLocker

-Full Disk Encryption • The operating system and all files -A TPM is recommended on the motherboard • Trusted Platform Module • Use a flash drive or password if there's no TPM -Runs Seamlessly • Works in the background • You never know it's there • Used for laptops or mobile devices

Gaming Input

-Game pad and Joystick -USB connected -Used exclusively for games

Performance Monitor

-Gather long-term statistics • Located in the Control Panel under Administrative Tools -Provides OS metrics - Disk, memory, CPU, etc. -Can set an alert and automated actions -Monitor and act •Counters are added to monitor metrics -Store statistics to analyze any long-term trends -Built-in reports allows you to create detailed reports from the data -To bring up Performance Monitor: • Go to "C:\Windows\system32" and click on perfmon.msc • Click on Start and search for perfmon.msc • cmd prompt and type in perfmon.msc

Internet Options Applet

-General Tab • Basic display • Shows options for browser such as home page, how the browser starts up, and change the display of the tabs -Security Tab • Contains zones where security levels are set (Internet, Local Intranet, Trusted Sites, Restricted Sites) • Different security levels for each zone (Between High and Low) -Privacy Tab • Can control settings for cookies, pop-up blocker, InPrivate browsing -Content Tab • Can view information on encryption and identification certificates • Can view auto-complete information -Connections Tab • Can configure VPN, proxy settings, and LAN settings -Programs Tab • Can manage how the browser opens links • Can set default browser • Manage add-ons, plugins, etc. -Advanced Tab • Detailed configuration options for the browser • Can reset all settings back to default

Cleaning The Heating Element

-Gets dirty over time -Use IPA (Isopropyl alcohol) -Get a cleaning pen/swab and clean gently -Check manufacturers recommendations -Can also use a cleaning card to clean the component and the paper path

Google Android history

-Google Android • Open Handset Alliance • Open-source OS, based on Linux • Supported on many different manufacturer's devices -Android Apps • Apps are developed on Windows, Mac OS X, and Linux with the Android SDK • Apps available from Google Play • Apps also available from third-party sites (i.e., Amazon Appstore)

Commercial Email Providers for Mobile Devices

-Google email allows you to split inbox into multiple tabs. -Can configure using IMAP4 and POP3 -Exchange Online (Hosted email) -Supports IMAP4 and POP3 -iCould Mail (Apple Mail) -IMAP4 support only -Yahoo Mail -Supports IMAP4 and POP3

Chrome OS history

-Google's operating system • Based on the Linux kernel -Centers around Chrome web browser • Most apps are web-based -Many different manufacturers - Relatively less expensive -Relies on the cloud - connect to the Internet

Managing Group Policy

-Group Policy • Manage computers in an Active Directory Domain • Group Policy is usually updated at login -gpupdate • Forces a Group Policy update • gpupdate /target:{computer|user} /force • gpupdate /target:professor /force -gpresult • Verify policy settings for a computer or user • gpresult /r -- generic command • gpresult /user sgc/professor /v -- a more specific comand for gpresult

Mobile Device Headsets

-Hands-free audio -Earphones and microphone --Wired connections -Connects to 3.5mm TRRS connector -Tip-Ring-Ring-Sleeve -Also referred to as analog audio jack -iPhone can use lightning port --Wireless connections -Connects using bluetooth

System requirements for application installs

-Hard Drive space • Initial installation space required • Application use space required • Some applications use a LOT of drive space after installation -RAM • This would be above and beyond the OS requirements • Very dependent on the application • Consider all of the other running applications -OS compatibility • Operating system (Windows, macOS, Linux) • Version of the OS

Disk status

-Healthy • The volume is working normally -Healthy (At Risk) • The volume has experienced I/O errors • Drive may be failing -Initializing • Normal startup message for a new drive -Failed • Cannot be started automatically • The disk is damaged, or the file system is corrupted -Failed redundancy • A drive has failed in a RAID 1 or RAID 5 array -Resynching • Mirrored (RAID 1) volume is synching data between the drives -Regenerating • RAID 5 volume is recreating the data based on the parity data

Thunderbolt Connection

-High Speed Serial Connection -Data and power on the same cable -Based on Mini DisplayPort -Max 3 meters (Copper) -60 meter Optical -Daisy Chain up to 6 devices

Bluetooth Connections

-High speed communication over short distances -also referred as PAN (Personal Area Network) --Connects to our mobile devices -Smartphones -Tethering -Headsets and headphones -Health monitors -Automobile and phone integration -Smartwatches -External speakers

CCFL (Cold Cathode Fluorescent Lamp)

-Higher voltage and power needed -Uses a power inverter for DC to AC -Added thickness to the display -No longer a common backlight -Used in older laptops -If display stops working, look closely (use a flashlight) to still see information on the screen -Inverter or whole display will need to be replaced

M.2 M key

-If the drive is connecting to a device that supports a M key, then it will use 4 lanes of the PCI Express bus (PCIe x4 at a maximum)

Platform as a Service (PaaS)

-In charge of building your own application -Do not need to worry about servers, software, or data center -All applications are in the cloud (no control of the people managing the applications or hardware) -Only responsible for the development process of the application -Develop the app from what is available on the platform -Example is SalesForce.com

Upgrade methods

-In-place upgrade • Upgrades the existing OS • Keeps all applications, documentations, and settings • Start the setup from inside the existing OS -Clean install • Wipes everything and reload • Backup your files • Start the setup by booting from the installation media

Infrared (IR) Connections

-Included in many smartphones, tablets, and smartwatches -Not really used for file transfers and printer -Found mostly on android devices -Mostly controls entertainment centers (almost exclusively)

Overclocking

-Increase the clock speed past the rated value -Requires more power, creates more heat -System become unstable at some point -Base clock (BCLK) needs to be changed -requires unlocked CPU -Run stress test to confirm stability -This will void warranty -Can break other components other than your CPU

POST (Power-On Self-Test)

-Initiated by BIOS at boot-up -Looks for CPU and Memory -Checks to see if there is a display connected and keyboard -If all passes, it then begins to look for a boot loader (to start the OS)

DVI-I Dual Link

-Integrated connector -Sends both analog and digital signals on the same connector -Dual link ; 7.4 Gbps (HDTV at 85 fps)

DVI-I Single Link

-Integrated connector -Sends both analog and digital signals on the same connector -Single link; 3.7 Gbps (HDTV at 60 fps)

Touchpad

-Integrated into keyboard -Connected via USB or Bluetooth for external connectivity -May be standalone device -Replaces a mouse

Print head

-Integrated into the ink cartridges on consumer printers -A new one comes with the cartridge when it is swapped out -Does not come integrated with the ink cartridges with larger commercial printers -Can be swapped out individually

Windows (Defender) Firewall

-Integrated into the operating system -Located in Control Panel / Windows Firewall In Windows 7 & 8 -Located in Control Panel / Windows Defender Firewall in Windows 10 -Windows Firewall with Advanced Security • Click "Advanced settings" -Fundamental firewall rules (basic functionality) • Allows apps to send/receive traffic • Based on applications • No detailed control -No scope can be set • All traffic applies (inbound/outbound) -No connection security rules • Can't encrypt with IPsec tunnels

Virtual Private Network (VPN) - (Mobile Device Connectivity)

-Integrated into the phone OS (No additional software required) -Can use 3rd party party software -Can create a secure channel between the phone and another device -May require additional setup (detailed configuration settings)

Intel Virtualization Technology (VT)

-Intel's version of virtualization

How TCP/UDP is delivered

-Internet Protocol sends data from one IP address to another IP address -Data arrives at the IP address which contains the port number that indicates where the data is headed.

Wireless/Cellular Data Network

-Internet connectivity is available on your phone -This connection/service is provided by mobile carrier service

Memory diagnostics

-Is your memory working? • I don't remember -May be launch automatically • Or launched manually - Will run multiple passes • Will Try to find the bad chip/module -Located in Control Panel under Administrative Tools

Windows Update

-Keeps your OS up to date - Security patches, bug fixes -Can be configured to be installed automatically - Updates are always installed -Can be configured to download but wait for install - You control the time -Can be configured to check but not to download • Saves bandwidth -Can be configured to never check - Don't do this -Windows 10 has the option to schedule a restart after updates are completed.

Prepare the boot drive

-Know your drive • Is there data on the drive? • Has the drive been formatted? • What partitions are on the drive? -Backup any old data - You may need that back someday -Most partitioning and formatting can be completed during the installation • Clear the drive and start fresh

Standard ATX

-Large form factor (ATX Form Factor) -Advanced Technology Extended -Power : Either 20 or 24 pins withn an additional 4/8 pin connector

Windows at work

-Large-scale support • Thousands of devices supported by IT -Security concerns • Mobile devices with important data that needs to stay safe • Local file shares -Wide varieties of purposes such as the Accounting Dept. working on a spreadsheet • Or Marketing Dept. having the need to play videos -Geographical sprawl - Not all systems are in the same building • Need a way to managed cache data between the sites slow WAN connections

BIOS Secret Buttons

-Launches BIOS at system startup: Del, F1, F2, Ctrl-S, Ctrl-Alt-S

Storage types

-Layered on top of the partition and file system • A Windows thing -Basic disk storage • Available in DOS and Windows versions • Primary/extended partitions, logical drives • Basic disk partitions can't span separate physical disks -Dynamic disk storage • Available in all modern Windows versions • Span multiple disks to create a large volume • Split data across physical disks (striping) • Duplicate data across physical disks (mirroring) • Not all Windows versions support all capabilities

Laptop LCD (Liquid Crystal Display)

-Light and High-Resolution -Very fragile (a good case is needed to protect) -Resolutions are fixed (cannot buy a larger screen or change resolutions inside the laptop) -changes to native resolution with look blurry and not crisp -Use native resolution to have best possible viewing on the screen

DVD-RAM

Digital Versatile Disc-Recordable Can be recorded over many times, but will only play back in a DVD-RAM drive. Perceived to be better at long term storage.

DVD-RW

Digital Versatile Disc-Rewritable DVD format that can be erased and recorded over numerous times without damaging the medium

DVI-D Connector

Digital Visual Interface digital only, single link or dual link

DVI Connector

Digital Visual Interface. Integrated, combines digital and analog in the same connector; digital may be single or dual link

DMA

Direct Memory Access Access to memory and devices without the direct control of the processor. This is most often used for hard disk access and screen display. Part of Southbridge communication.

ipconfig /all

Displays DHCP, DNS server, MAC address, and NetBIOS status

ipconfig /displaydns

Displays DNS resolver cache

Reliability Monitor

Displays a log of "system reliability" events

netstat -a

Displays all connections and listening ports.

netstat -n

Displays ports and addresses in numerical format. Skipping name resolution speeds up each query

gpresult

Displays the RSoP for a computer and user account /s - specifies a host name by name or IP address /u - specifies a host name by user account /p - specifies a host name by password

apple menu items

Displays, Storage, Service

DDoS Attack

Distributed denial of service attacks that overwhelm a web server and shut it down

DFS

Distributed file system A set of client and server services that allow an organization using Microsoft Windows servers to organize many distributed SMB file shares into a distributed file system.

Full Control

Do anything with the object, including change its permissions and its owner

Modify

Do most things with an object but not to change its permissions or owner

DDR

Double Data Rate Twice the data rate of SDRAM

ESD

Electrostatic discharge. Release of static electricity. ESD can damage equipment and low humidity causes a higher incidence of electrostatic discharge (ESD). High humidity can cause condensation on the equipment, which causes water damage.

EFS

Encrypting File System - a windows feature that can encrpyt a folder or a file

EFS

Encrypting File System. A feature within NTFS on Windows systems that supports encrypting individual files or folders for confidentiality.

EFS

Encrypting File System. A feature within NTFS on Windows systems that supports encrypting individual files or folders for confidentiality.

EIDE

Enhanced Integrated Drive Electronics Interface used in controllers that can support up to four hard disks at 137 GB per disk, transfer data at speeds up to 66 MBps, and provide connections for CD, DVD, and tape drives.

EPP

Enhanced Parallel Port - A half-duplex bi-directional interface designed to let devices like printers or storage devices to transmit large amounts of data while quickly being able to switch channel direction. EPP is about 15 times faster than normal parallel-port communication with less CPU overhead.

FPM

Fast page-mode A type of Dynamic RAM (DRAM) that allows faster access to data in the same row or page. Page-mode memory works by eliminating the need for a row address if data is located in the row previously accessed. It is sometimes called page mode memory.

ipconfig /renew AdapterName

Forced DHCP client to renew lease it has for an IP address(if AdapterName is omitted it releases or renews ALL adapters on the network)

FSB

Front Side Bus A computer communication interface (bus). It carrys data between the CPU and a memory controller hub, known as the northbridge.

GPT

GUID Partition Table, part of EUFI, successor to MBR. Windows allows up to 128 partitions at 2TB each. It also has a back up copy for parition entries

GUI

Graphical user interface Interface that relies on graphics to communicate with the user. IE windows, menus, icons, etc

GDI

Graphics Device Interface A Microsoft Windows application programming interface and core operating system component responsible for representing graphical objects and transmitting them to output devices such as monitors and printers.

GDDR

Graphics Double Data Rate A type of synchronous dynamic random-access memory (SDRAM) specifically designed for graphics processing units (GPUs).

GPU

Graphics Processing Unit Dedicated graphics processor on a graphics card, used to render images stored in the RAM of the graphics card.

shutdown -h

Halt or power off the system

HDD

Hard disk drive An electro-mechanical data storage device that uses magnetic storage to store and retrieve digital information using one or more rigid rapidly rotating disks (platters) coated with magnetic material.

HCL

Hardware Compatibility List A list of computer hardware (typically including many types of peripheral devices) that is compatible with a particular operating system or device management software.

HDMI Connector

High Definition Media Interface. A standard for connecting high-definition video devices.

HPFS

High Performance File System Is a file system designed especially for the IBM OS/2. It is known for handling large files of up to 2 GB across multiple hard disks, as well as for handling long file names of up to 256 bytes. HPFS was designed to improve on the weaknesses of the file allocation table file system.

HDCP

High-bandwidth Digital Content Protection A form of digital copy protection developed by Intel Corporation to prevent copying of digital audio & video content as it travels across connections.

HTTPS

Hypertext Transfer Protocol Secure. Encrypts HTTP traffic with SSL or TLS using port 443.

IrDA

Infrared Data Association

IaaS

Infrastructure as a Service A form of cloud computing that provides virtualized computing resources over the internet.

IDE

Integrated Development Environment - programming environment that includes features to help you write and edit code as well as debugging tools

IDE

Integrated Drive Electronics

ISDN

Integrated Services Digital Network

IPP

Internet Printing Protocol

IP

Internet Protocol

IPS

Intrusion Prevention System

MT-RJ

JMechanical Transfer Registered Jack

.js

JavaScript

JBOD

Just a Bunch of Disks

KVM

Kernel-based Virtual Machine

KVM

Keyboard-Video-Mouse

LED

Light Emitting Diode

LDAP

Lightweight Directory Access Protocol

LPT

Line Printer Terminal

MAU

Media Access Unit/Media Attachment Unit

MAPI

Messaging Application Programming Interface

mATX

Micro Advanced Technology Extended

MicroDIMM

Micro Dual Inline Memory Module

MBSA

Microsoft Baseline Security Analyzer

workgroup

Microsoft peer to peer network model in which computers are grouped together with access to shared resources

DISM

Microsoft's Deployment Image Servicing and Management - a tool that reads the contents of a drive and writes the output to a .WIM format file.

Sysprep

Microsoft's System Perperation Tool - a utility to be run before imaging a disk to solve possible configuration problems

NLA

Network Level Authentication - Authenticates user before committing any resources to RDP session preventing denial of service attacks

NOS

Network Operating System - an OS designed to run on servers in business networks

NTP

Network Time Protocol

NaaS

Network as a Service

NAS

Network-Attached Storage

NetBIOS

Networked Basic Input/Output System

NLX

New Low-profile Extended

NTFS

New Technology File System

NTLDR

New Technology Loader

Incremental backup

New files and files modified since last backup(low backup time, high restore time uses multiple tape sets)

Control

Not the apple equivalent of the Ctrl button

dir/o:d

Order by date

dir/o:s

Order by size

OLED

Organic Light Emitting Diode

PPM

Pages Per Minute

PS/2

Personal System/2 connector

PII

Personally Identifiable Information

PII

Personally Identifiable Information - data that is used to identify, contact, locate, or impersonate an individual

.ps1

PowerShell

taskkill /pid

Process ID used to specify a process to kill

Windows 7 Minimum Hardware Requirements (x86)

Processor/CPU - 1 GHz processor Memory - 1 GB RAM Free disk space - 16 GB Video - DirectX 9 graphics device with WDDM* 1.0 or higher driver *Windows Display Driver Model

Windows 10 Minimum Hardware Requirements (x64)

Processor/CPU - 1 GHz processor with support for PAE, NX, and SSE2 Memory - 2 GB RAM Free disk space - 20 GB Video - Microsoft DirectX 9 graphics device with WDDM* driver *Windows Display Driver Model

PROM

Programmable read-only memory. A memory chip on which data can be written only once. Once a program has been written onto a PROM, it remains there forever. Unlike main memory, PROMs retain their contents when the computer is turned off.

Inkjet (ink-dispersion) printers

Pros: -Inexpensive technology compared to laser printers -Quiet when printing -Can print in high-resolution; Can print in color for nice looking documents or photographs Cons: -Ink is expensive (proprietary) -Ink eventually fades -printer clogs easily

msinfo32

Provides information about hardware resources, components, and thesoftware environment. Also known as System Information.

RFI

Radio Frequency Interference

RSSI

Received Signal Strength Indicator - an index level calcuated from signal strength. If it the connection speed is below the RSSI minimum the wireless adapter will drop the signal

RAID

Redundant Array of Independent Disks

RDP

Remote Desktop Protocol

RDP

Remote Desktop Protocol - Runs on on TCP port 3389.

SSH

Secure Shell

DB-9

Serial Communications D-Shell Connector, 9 pins

SP

Service Pack

Print Management

Set properties and monitor local printers and manage print sharing on a network

Network reset in Windows 10

Settings->Network&Internet->Status

SMTP

Simple Mail Transfer Protocol

SNMP

Simple Network Management Protocol

sfc

System File Checker - a utility that provides a manual interface for verifying system files and restoring them from cache if they are corrupt or damaged

to adjust settings of an apple track pad

System Preferences -> Trackpad

adding a new account in MacOS

System Preferences ->users and groups

end-of-life system

System for which vendors have dropped all support for security updates due to the system's age.

system partition

The active partition of the hard drive containing the boot record and the specific files required to start the Windows launch.

Active directory

The database that contains the users, groups, and computer accounts in a Windows Server Domain

Security Log

This log holds the audit data for the system

TN

Twisted Nematic

UAC

User Account Control. Informs you when a program makes a change that requires administrator-level permission, also adjusts the permission level of your user accounts

UDF

User Defined Functions or Universal Disk Format

VA

Vertical Alignment

VESA

Video Electronics Standards Association

VGA

Video Graphics Array A computing standard that has a resolution of 640 × 480 pixels with 16 colours or of 320 × 200 pixels with 256 colours.

VRAM

Video Random Access Memory

Read/list/execute

View the contents of a file or folder or start a program

Reliability and Performance Monitoring

View the performance of the local computer

VDI

Virtual Desktop Infrastructure

VDC

Volts DC

Low Level Format

When a new harddisk leaves the manufacturer, creates cylinders, tracks and sectors on the platters

WPS

WiFi Protected Setup

WAN

Wide Area Network

WINS

Windows Internet Name Service

WSUS

Windows Server Update Services - a program on a server that allows the network administrator to approve updates for certain groups

.bat

Windows batch file

Moving files and folders on the same NTFS volume

Write permission is required for the destination folder and Modify for the source folder. NTFS permissions are retained

Copying files and folders on the same NTFS volume or different volumes

Write permission is required for the destination folder and read for the source folder. NTFS permissions are inherited from the destination folder and the user becomes the Creator/Owner

ZIP

Zigzag Inline Package

Linux Bash shell script escape character

\

Python escape character

\

homegroup

a feature to secure access to shared folders and printers. (exists in windows 7 and 8 but not in later versions of windows 10)

Eavesdropping

capturing and reading data packets as they move over a network

chown

change ownership in linux

chgrp

changes the group in linux

format D: /v: E

changes the name of drive D to drive E

dir *.

displays all files without an extension.

ps

displays linux processes that are currently running

ifconfig/iwconfig

displays the current state of network interfaces within linux

crontab -e

enters the editor

Scan engine/components

fixes problems and makes improvements to the scan software itself

FDD

floppy disk drive A personal computer storage device that reads data from and writes data to removable disks made of flexible Mylar plastic covered with a magnetic coating, and enclosed in a stiff, protective, plastic case. It is a legacy technology.

format D: /fs:NTFS /x

forces the volume to dismount

format D: /fs:EXFAT

formats D drive to an exfat file system

linux group commands

groupadd, groupmod, groupdel

taskkill /t /pid processid

halts any child processes

Force Quit

in Apple menu or press command+option+esc

in-place upgrade

installing on top of an existing version of OS

Network resent in Windows 7/8

ipconfig /flushdns netsh int ip reset resetlog.txt netsh winsock reset

mkswap

linux command-line program used to format a swap partition

cron

linux task scheduler

dir/t:c

list by date created

dir/o:e

list by extension

dir/t:w

list by last modified

diskmgmt.msc

opens disk management console from runline

compmgmt.msc

opens the Computer Management console from runline

MAC flooding

overloading a switch's MAC cache preventing genuine devices from connecting and forcing the switch into "hub" or "flooding" mode

PCI DSS

payment card industry data security standard - governs the processing of credit card and other bank payments

format D: /fs:EXFAT /q

performs a quick format that doesn't scan for boot sectors

popular linux distros

redhat/CentOS, SUSE, Debian/Ubuntu, Knoppix

hibernate mode

saves the current session to disk before powering off the computer

chkdsk C: /r

scans and attempts to recover bad sectors on drive C

sfc /scanonce

schedules a scan when the computer is next restarted

sfc /scanboot

schedules scans whenever the PC boots

Activation Lock/Device Protection

services that work in the device firmware that prevents restores or the disabling of location services

weekday

sets the day of the week in cron in either numerical or text format

net user dmartin

shows the properties of the dmartin account

image

template containing the OS and required software

taskkill /f /pid processid

terminates process without any user notification

Windows + Ctrl + Shift + B

tests whether or not a system is responsive

bootrec /fixboot

to attempt repair of the boot sector

bootsect

tool to copy code to make the parition bootable

diskpart

tool to setup partitions on a hard drive. Sets up active partition

network mapping

tools used to gather information about the way a network is built and configured

asymmetric encryption

used in public key encryption, it is scheme in which the key to encrypt data is different from the key to decrypt.(uses an RSA cipher)

Logical controls

user authentication login, firewalls, anti-virus software

xcopy

utility that allows you to copy the contents of more than one directory at a time and retain the directory structure

classified

viewing is restricted to the owner organization or to third parties under a Non-disclosure Agreement

VFAT

virtual file allocation table - file system for linux

VMM

virtual memmory monitor - manages the memmory mappings and assignments

xcopy command

• Copies files and directory trees • xcopy /s Documents m:\backups -- Copies directories and subdirectories except empty ones in the documents folders to drive "M:\backups" folder

FAT

• FAT - File Allocation Table • One of the first PC-based file systems (circa 1980) -FAT32 - File Allocation Table • Larger (2 terabyte) volume sizes • Maximum file size of 4 gigabytes • Most common file type -exFAT - Extended File Allocation Table • Microsoft flash drive file system • Files can be larger than 4 gigabytes

Upgrading from Windows 8.1

• Keeps Windows settings, personal files, and applications • Must upgrade to a similar Edition • You cannot upgrade directly from Windows 8 to Windows 10

MBR partition style

• MBR (Master Boot Record) • The old standby, with all of the old limitations -Primary partition • Bootable partitions • Maximum of four primary partitions per hard disk • One of the primary partitions can be marked as Active -Extended partition • Used for extending the maximum number of partitions • One extended partition per hard disk (optional) • Contains additional logical partitions • Logical partitions inside an extended partition are not bootable

DiskPart command

• Manage disk configurations • "diskpart" - start the DiskPart command interpreter at the cmd prompt

dism (Deployment Image Servicing and Management tool)

• Manages Windows Imaging Format (WIM) files -You can make changes to your image with DISM • Get information about an image • Update applications • Manage drivers • Manage updates • Mount an image -All command-line based • Many different options • Easy to automate

Power options Applet

• Power plans • Power usage can be customized -Sleep (standby) Option • Open apps are stored in memory • Save power, startup quickly • Switches to hibernate if power is low -Hibernate Option • Open docs and apps are saved to disk, allows system to shutdown completely • Common on laptops

Programs and Features Applet

• Shows Installed applications • Can Uninstall applications, view size and version -Can also enable/dislable Windows features that were/were not installed by default

ping

• Test reachability of a device • Determine round-trip time • Uses Internet Control Message Protocol (ICMP) -One of your primary troubleshooting tools • Can you ping the host? -Written by Mike Muuss in 1983 • Named similar to the sound made by sonar • Not an acronym for Packet INternet Groper

ASR

Automated System Recovery A feature of the Windows XP operating system that can be used to simplify recovery of a computer's system or boot volumes.

APIPA

Automatic Private Internet Protocol Addressing Assigns a class B IP address from 169.254.0.0 to 169.254.255.255 to the client when a DHCP server is either permanently or temporarily unavailable.

Upgrade Windows 8.1 Enterprise to Windows 10

Can upgrade to: • Windows 10 Enterprise Cannot upgrade to (requires clean installation): • Windows 10 Home • Windows 10 Pro

Upgrade Windows 7 Home Basic to Windows 10

Can upgrade to: • Windows 10 Home • Windows 10 Pro Cannot upgrade to (requires clean installation): • Windows 10 Enterprise

Upgrade Windows 7 Home Premium to Windows 10

Can upgrade to: • Windows 10 Home • Windows 10 Pro Cannot upgrade to (requires clean installation): • Windows 10 Enterprise

Upgrade Windows 7 Starter to Windows 10

Can upgrade to: • Windows 10 Home • Windows 10 Pro Cannot upgrade to (requires clean installation): • Windows 10 Enterprise

Upgrade Windows 8.1 Core to Windows 10

Can upgrade to: • Windows 10 Home • Windows 10 Pro Cannot upgrade to (requires clean installation): • Windows 10 Enterprise

Upgrade Windows 7 Ultimate to Windows 10

Can upgrade to: • Windows 10 Pro Cannot upgrade to (requires clean installation): • Windows 10 Home • Windows 10 Enterprise

Upgrade Windows 7 Professional to Windows 10

Can upgrade to: • Windows 10 Pro • Windows 10 Enterprise Cannot upgrade to (requires clean installation): • Windows 10 Home

Upgrade Windows 8.1 Professional to Windows 10

Can upgrade to: • Windows 10 Pro • Windows 10 Enterprise Cannot upgrade to (requires clean installation): • Windows 10 Home

gpupdate /force

Causes all policies(new and old to be reapplied)

CIDR

Classless Inter-Domain Routing -Technique supported by the BGP4 protocol and based on route aggregation. -CIDR enables a router to group routes together to reduce the quantity of routing information carried by the core routers. -With CIDR, a group of IP networks appear to be a single entity to networks outside of the group.

ipconfig /flushdns

Clears the DNS resolver cache

CIFS

Common Internet File System A file-sharing protocol that provides an open and cross-platform mechanism for requesting network server files and services. CIFS is based on the enhanced version of Microsoft's Server Message Block (SMB) protocol for Internet and intranet file sharing.

CNR

Communications networking riser. A slot found on certain PC motherboards and used for specialized networking, audio, and telephony equipment. A motherboard manufacturer can choose to provide audio, networking, or modem functionality in any combination on a CNR card.

CD-RW

Compact Disc - ReWritable A CD that allows data to be erased and written again several times.

CDFS

Compact Disc File System Is a file system for read-only and write-once CD-ROMs

CD-ROM

Compact Disc Read-Only Memory The read-only data format that is stamped onto a CD, usually by the manufacturer.

CMOS

Complementary metal-oxide-semiconductors A technology for constructing integrated circuits.

CAPTCHA

Completely Automated Public Turing test to Tell Computers and Humans

CAD

Computer Aided Design. The use of computers in converting the initial idea for a product into a detailed engineering design.

CERT

Computer Emergency Response Team A group of experts that respond to security incidents. Also known as CIRT, SIRT, or IRT.

CGA

Computer Graphics and Applications

Network Group

Contains user accounts of any users connected to a computer over the network

IPv4 Socket

- Server IP address, protocol, server application port number. -Client IP address, protocol, client port number.

RJ14 Connector

-6 Position, 4 conductor connectors (6P4C) -6 wires available, only 4 are used -Used for dual-line use for 2 telephones -Interchangeable with RJ11

SATA Revision 3.0

-6.0 Gbit/s -Max cable size : 1 meter

International Mobile Station Equipment Identity (IMEI)

-Identifies a physical mobile device -Every phone has a different number -The wireless carrier can use this number to allow or disallow access based on this number -Verify if the phone is unlocked so that it can be used with that wireless carrier

International Mobile Subscriber Line (IMSI)

-Identifies the user of a mobile network -Associated to the user (not the mobile device) -Can be provisioned to the sim card -Sim cards can be swapped to different phones and still maintain access to the wireless provider

SO-DIMM (small outline DIMM)

-About half the width of DIMM -Available in DDR2, DDR3, DDR4 SDRAM -Used in Laptop and Mobile devices

BIOS built-in diagnostics

-Part of the BIOS (always available) -Runs from BIOS menu (no additional media or software required) -Focused on hardware checks -Does not touch the OS -Can gather statistics (CPU/Memory information)

Secure Boot

-Part of the UEFI specification -Digitally sign known-good software -Cryptographically secure -Software won't run without the proper signature -Support in many different OS's (Windows and Linux)

BIOS password / User password

-Password is needed to start the OS -System/OS wont load

Bluetooth (Mobile Device Connectivity)

-Personal Area Network (PAN) -Short range (about 10 meters) -Can connect different devices (mouse, keyboards, headsets, speakers) -Needs to be pair (connections are remembered)

Laptop Wireless Control

-Physical switch or FN Key to enable or disable connectivity -May be a switch that turns off 802.11, Bluetooth and cellular -May have the ability to specify which connection to disable/enable

Tethering Connections

-Physically connect a device to your phone -Can use the internet/data connection -Computer uses USB to connect -Can access the internet from almost anywhere (may require service or configuration from wireless carrier)

Pickup Rollers

-Picks up paper, single page at a time -Picks up the top sheet of the feeder -possibly problems if its not picking up any paper or multiple sheets -Should be periodically cleaned or replaced

ink cartridge

-Places a drop of ink onto the page as needed -4 different colors -Cyan, Magenta, Yellow, Key (black) = CYMK

Magnetic / Chip Reader

-Point of sale terminal -Uses integrated circuit (insert card into reader) -Strip reader (swipe card) -connected via USB if associated to POS terminal

Application Streaming (Mobile phones/Tablets)

-Can run an app (or a portion of an app) in real-time -Apps or components can be used without installing physically on device -Can be cached locally for later use -Common to see with Online Ads that allow you to use the app as if it was installed

The Run line

-Can start an application as a command • Instead of the graphical interface -Can use the run/search or command prompt • Options can be specified as part of the command

Networking Tab

-Can view network performance • Separate tab in Windows 7 • Integrated into the Performance tab in Windows 8/8.1/10 -View utilization, link speeds, and interface connection state

Laptop Webcam

-Captures video with built-in camera and microphone -Usually includes both audio and video -Requires specialized drivers and software

PCI 32-bit expansion card

-Card slot provides power at 3.3V or 5V -device can use either available power -Card should be able to slide in without much force. -confirm notches are lined up to the PCI slot

Smart Card

-Card with embedded circuitry -Used in payment cards, identification cards -Useful form of authentication (username, password, physical card)

DVI-A to VGA connector

-DVI-A includes analog signals -Backward compatible with VGA -Only 640 x 480 is officially supported -Adapter only needed when analog to analog -VGA to DVI digital requires a converter

Land Grid Array (LGA)

-Does not contain any pins -CPU is completely flat -All pins are located on the motherboard CPU socket -Possible damage to the CPU socket if objects are dropped onto it (pins can bend)

Expansion Card installation

-Extends functionality of the computer -Simple to install (Install the hardware then install the software or vice versa) -Check mobo documentation (make sure it supports the type and size of card) -Check adapter card documentation for hardware and software requirements

RAID 5 (Striping with Parity)

-File blocks are striped along with a parity block -Efficient use of disk space (files aren't duplicated but space is still used for parity) -High redundancy (data available after drive failure; parity calculation may affect performance) -Minimum of 3 drives

Format command

-Formats a disk for use with Windows • format c: • BE CAREFUL - YOU CAN LOSE DATA

BYOD

Bring your own device. A policy allowing employees to connect personally owned devices, such as tablets and smartphones, to a company network. Data security is often a concern with BYOD policies and organizations often use VLANs to isolate mobile devices.

CFS

Central File System, Common File System, or Command File system

CPU

Central Processing Unit The key component of a computer system, which contains the circuitry necessary to interpret and execute program instructions

System Log

Contains information about service load failures, hardware conflicts, and driver load failures

Application Log

Contains information regarding the application errors

remote settings location

Control Panel ->System -> Advanced system settings ->System Properties->Remote Settings

DaaS

Data as a Service An information provision and distribution model in which data files (including text, images, sounds, and videos) are made available to customers over a network, typically the Internet.

DLP

Data loss prevention. A strategy for making sure that end users do not send sensitive or critical information outside the corporate network. A network-based DLP system can examine and analyze network traffic. It can detect if confidential company data or any PII data is included in email and reduce the risk of internal users emailing sensitive data outside the organization. End-point DLP systems can prevent users from copying or printing sensitive data.

DBaaS

Database as a Service Offers full database functionality to application developers

SCSI Advantages

-Pre-dates USB -Could connect many devices on a single bus -8 devices on a narrow bus -16 devices on a wide bus -No much configuration needed (just assign ID # to a device), SCSI will then handle the rest -SCSI is still used in data centers such as VM's or drive arrays

Step 2 : Charging

-Prepares the drum with a negative electrostatic charge (negative ions) -Older printers charge with a corona wire, newer printers with a primary charging roller -Entire photosensitive drum will have negative sets of ions associated with the entire printing area

Integrated print server (device sharing)

-Print directly to the printer -Jobs are queued on the printer -Jobs are managed on the printer -Web based front end (access through the browser) or through Client software

Syncing Mobile devices to the Desktop

-Requires an application that will use the OS and disk space -The backup application might require minimal memory usage, but will require much storage space (to store backups, video pictures) -Might be gigabytes in size

Hard Disk Drive Speeds

-Rotational Speed (RPM) 5,400 ; Avg. rotational speed 5.55 ms -Rotational Speed (RPM) 7,200 ; Avg. rotational speed 4.16 ms -Rotational Speed (RPM) 10,000 ; Avg. rotational speed 3 ms -Rotational Speed (RPM) 15,000 ; Avg. rotational speed 2 ms

SOHO Routing and Switching

-Routes to the outside world through DSL/WAN Port -One VLAN (LAN 1, LAN 2, LAN 3, etc..) -Routes and switches by default (not much to configure)

M.2 Interface

-Smaller storage device -As fast (or faster than SATA) -No SATA data or power cables -Interface is directly on the motherboard -Direct access to PCI Express bus -4 GByte/Second throughput or faster -Different types of interface (B key, M key, or B and M key) -Some drives will support both

Mini-ITX form factor

-Smaller than MicroATX -A series of low-power mb's -Screw compatible with ATX and MicroATX -Single use computing (i.e., streaming media)

Mini-SD Card

-Smaller than SD Card

USB to Ethernet

-Some laptops don't have an Ethernet connection -Convert USB to Ethernet

Optical/DVD Drive

-Stores and reads data with light -Small bumps are read with a laser beam -Microscopic binary storage -Read/Write media (store backups and docs) -Read-only media (data cant be deleted; common for video distribution) -Limited storage sizes

CPU Cache

-Super fast memory -Holds data, instructions, and/or results -Temporary holding space for the transactions going thru the processor

Post Office Protocol version 3 (POP3)

-TCP 110 -Receives emails from an email server (authenticate and transfer) -Basic mail transfer functionality

Secure Shell (SSH)

-TCP 22 -Encrypted communication link -Looks and acts the same as Telnet

Hypertext Transfer Protocol (HTTP)

-TCP 80 -Communication in the browser and by other applications -Web Server Communication -In-the-clear non encrypted version -Supported by nearly all web servers and clients

SOHO MAC (Media Access Control) Filtering

-The "hardware" address -access can be limited through the physical hardware address -Additional administration needed -All MAC addresses are viewable by capturing packets going through the networks -MAC addresses can be easily spoofed -Not a security method

Device Manager

-The OS doesn't know how to talk directly to most hardware -Device drivers are hardware specific and operating system specific • Windows 7 device drivers may not necessarily work in Windows 10 -Technical Support FAQ starting point • "Have you updated the drivers?" -Complete control of the hardware • Can update, uninstall, or disable drivers • Can scan for hardware changes OR dive into the driver properties -Computer Management or devmgmt.msc

USB Type B Printer Connector (wired device sharing)

-USB Type B Printer Connector -Printer common connector -This connector connects to the printer -USB Type A connects to the computer

Boot methods

-USB storage • USB drive must be bootable • Computer must support booting from USB drive -CD-ROM and DVD-ROM • A common media -PXE ("Pixie") - Preboot eXecution Environment • Performs a remote network installation • Computer must support booting with PXE -NetBoot • Apple technology to boot macOS from the network • Similar concept to PXE boot -If you need to install many types of OS's • Considered using external media that connects via USB • Solid state drives / hard drives • Store many OS installation files -External / hot swappable drive • Some external drives can mount an ISO (DVD-ROM image) which the PC will see as a DVD-ROM drive • Can boot from USB -Installing on the Internal hard drive • Install and boot from separate drive • Create and boot from new partition

Hypervisor Security

-VM escaping is malware recognizing it's on a virtual machine, compromised the hypervisor and jump from one guest OS to another -Malware on one customer's server can gather info. from another since many hosted services are virtual environments -A sweet spot for the bad guys (No significant vulnerabilities yet)

Unmanaged Switches

-Very few configuration options (Plug & Play) -No VLANs (fixed configuration) -Very little integration with other devices -No management protocols -Low price point (simple is less expensive)

Performance Tab

-What's happening? • Can view CPU, memory, etc. -Statistical views • Historical, real-time -Newer versions include CPU, memory, disk, Bluetooth, and network in the Performance tab

Print and Scan Caching (Printer Data Privacy)

-When you click print, the local system creates a file of the output -The output file is then sent to the print server located in the printer itself, file is then placed inside the print spooler -Print spooler manages which jobs print and which order. It then prints the file. -Spool file is usually deleted when done -Some printers keep that file until space is needed. file is accessible if someone gains access to those files.

Apple macOS history

-macOS • Desktop OS running on Apple hardware -Advantages • Easy to use • Extremely compatible • Relatively fewer security concerns -Disadvantages • Requires Apple hardware • Less industry support than the PC platform • Higher initial hardware cost

Running BIOS upgrade program

-older computers required a boot floppy or optical media -Modern upgrades run as an executable -May run from a flash drive -Most upgrade apps will check for prerequisites (dont rely on this) -Do not reboot/shutdown pc during upgrade -Requires a reboot (save your documents)

Robust Copy

-robocopy • A better xcopy • Has the ability to resume a file transfer if it is interrupted • Looks and acts similar to xcopy • Most syntax is the same as xcopy • Shows results, time taken, and throughput of the copy process -Included with Windows 7, 8.1, and 10

PCI 32-bit slots

-smaller slots

2

-w-

3

-wx

NFC (Near Field Communication) / Tap-to-Pay device

-~10 centimeter wireless range -Built into many phones -Many terminals accept this payment method -Identify key/door key (can be used to unlocked a door)

JavaScript comment

//

HOSTS file location in Linux

/etc/hosts

Windows Batch file comment

::

DDoS

A distributed denial of service An attack that attempts to make an online service, like a website, unavailable by overwhelming it with a flood of traffic from a team of computers.

Replay Attack

A type of network attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.

Boot Camp

A utility on macOS that allows a full windows installation to be made on a Mac. Applications ->Utilities folder

regsvr32

A utility that is used to register component services used by an installed application.

counter logs

Allow you to collect statistics about resources such as memory, disk, and processor

phishing

An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information

gpupdate

Applies a new or changed policy to a computer immediately

chkdsk C: /f

Fixes file system errors on the disk drive C

FQDN

Fully Qualified Domain Name www.hostgator.com. The first part ('www') is the host name. The second part ('hostgator') is the domain name. The last part ('com') is the TLD (top-level domain).

GPT

GUID partition table A newer partition type that is used to create drives larger than 2 TB.

GPO

Group Policy Object - a means of applying security settings and other administrative settings across a range of computers and users

GPO

Group Policy Objects - a windows policy in which a computer remotely installs an application from a network folder without any administrator intervention

Users

Group is able to perform most common tasks such as shutdown, running applications, and using printers. They can also change time zone and install printers

HTTP

HyperText Transfer Protocol The underlying protocol used by the World Wide Web and this protocol defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands.

SCSI

ID Small Computer System Interface Identifier

Local Security Policy(secpol.msc)

In administrative tools. You would use this to configure password and account policies with out going into the registry

.sh

Linex shell script

LCD

Liquid Crystal Display

DHCP

Dynamic Host Configuration Protocol. A service used to dynamically assign TCP/IP configuration information to clients. DHCP is often used to assign IP addresses, subnet masks, default gateways, DNS server addresses, and much more.

DRAM

Dynamic Random Access Memory. Dynamic RAM. The slowest type of RAM, which requires frequent electrical refreshes to keep contents valid.

FAT

File Allocation Table Used by the operating system (OS) to manage files on hard drives and other computer systems.

FTP

File Transfer Protocol Uses a TCP-based network to pass files from host to host.

Fragmentation

Files written in non contiguous clusters reducing read performance

Normal Startup

Load all device drivers and services

MMC

Microsoft Management Console

domain

Microsoft client/server network model that groups computers together for security and to centralize administration

SAM

Security Accounts Manager - where the local accounts are stored

MPEG

Moving Picture Experts Group

MP3

Moving Picture Experts Group Layer 3 Audio

MP4

Moving Picture Experts Group Layer 4

NTFS

New Technology File System - proprietary file system used exclusively with Windows

NiCd

Nickel Cadmium

NiMH

Nickel Metal Hydride

PoS

Point of Sale

PPP

Point-to-Point Protocol

PPTP

Point-to-Point Tunneling Protocol

Windows 8/8.1 7 Minimum Hardware Requirements (x64)

Processor/CPU - 1 GHz processor with support for PAE, NX, and SSE2 Memory - 2 GB RAM Free disk space - 20 GB Video - Microsoft DirectX 9 graphics device with WDDM* driver *Windows Display Driver Model

RF

Radio Frequency

RFID

Radio Frequency Identification

RAM

Random Access Memory

RPO

Recovery Point Objective

RT

Recovery Time Objective

RGB

Red Green Blue

RISC

Reduced Instruction Set Computer

RAS

Remote Access Service

RADIUS

Remote Authentication Dial-In User Server

RADIUS

Remote Authentication Dial-In User Service - a type of authentication suitable for server and domain based networks

RADIUS

Remote Authentication Dial-In User Service - under this protocol Authentication, Authorization, and Accounting are performed by a seperate server

RIS

Remote Installation Service

Services

Start, stop, and pause services

SAN

Storage Area Network

SC

Subscription Channel

SXGA

Super Extended Graphics Array

UXGA

Ultra Extended Graphics Array

TKIP

Temporal Key Integrity Protocol

TACACS

Terminal Access Controller Access-Control System

VLAN

Virtual LAN

VM

Virtual Machine

VNC

Virtual Network Computer

VNC

Virtual Network Computing - freeware that works over TCP port 5900 with similary functionality to RDP. Screen Sharing is based on VNC

VPN

Virtual Private Network

Procedural controls

incident response processes, management oversight, security awareness, and training

WoL

Wake on LAN - Allows you to start up the computer remotely

WoWLAN

Wake on Wireless LAN

ARP poisoning

an attack that convinces the network that the attacker's MAC address is the one associated with an allowed address so that traffic is wrongly sent to the attacker's machine

answer file

an xml text file that contains all the instructions a Windows Setup program would need to install and configure an OS with out any administrator intervention

Option

apple equivalent of Alt

Command

apple equivalent of Ctrl button

Rainbow Table Attack

attempts to discover the password from the hash using databases of precomputed hashes

bootrec /fixmbr

attempts to repair MBR

ext3 vs ext4

both 64 bit file systems that suppor journaling but ext 4 delivers better performance

dock

bottom of screen gives one-click access to favorite apps and files in macOS

dd

can be used to specify that date within the month(0-31) in cron

trace logs

can collect statistics about services, providing detailed reports about about resource behavior

CRT

cathode ray tube A type of display device that uses electron beams within a vacuum tube to create images on a fluorescent screen.

chmod

change permission modifiers in linux

ERD

emergency repair disk A windows XP troubleshooting tood that stores the contents of the \Windows\ Repair folder.

Host Firewall

firewall implemented as software on the individual host computer

VFAT

Virtual File Allocation Table

mstsc

opens a Remote Desktop connection from command line

devmgmt.msc

opens device manager from runline

4

r--

5

r-x

shutdown now, +10

reboot 10 minutes from now

apt-get update

refresh the local database with information about the packages available from the repository

mm

specifies minutes past the hour in cron(0-59)

hh

specifies the hour in cron(0-23)

format D: /a:512

specifies the size of allocation units

taskkill /im

specify image name to kill

shutdown 17:30

shutdown at 5:30

shutdown -t 30

shuts the computer down in 30 seconds

Windows Settings

Interface for managing a Windows 10 computer

IMEI

International Mobile Equipment Identity

IMSI

International Mobile Subscriber Identity

ISO

International Organization for Standardization

ICMP

Internet Control Message Protocol

IIS

Internet Information Services

IMAP

Internet Mail Access Protocol

IPConfig

Internet Protocol Configuration

IPSec

Internet Protocol Security

ISP

Internet Service Provider

IRQ

Interrupt Request

SSO

Single Sign-on

Authenticated Users Group

All user accounts that have been authenticated to access the system

dir/t:a

list by last time accessed

help netsat

lists all switches for the netstat command

netstat /?

lists all switches for the netstat command

WOW64

acts as the emulator for allowing 32-bit applications to run seamlessly on a Windows 64-bit OS

dir/w

lists files using a wide format with no file details

WWAN

(Wireless Wide Area Network) A computer network that enables users to wirelessly connect to their offices or the Internet via a cellular network. Sometimes referred to as wireless broadband.

Laptop Port Replicator

-Does have similar interfaces compared to a docking station -Smaller in size compared to a docking station -Do not have an expansion card option

python comment

#

windows batch file escape character

%%

HOSTS file location in Windows

%SYSTEMROOT%\System32\drivers\etc\hosts

Where are the log files stored?

%SystemRoot%\System32\Winevt\Logs folder

VBScript comment

'

AMD Virtualization (AMD-V)

-AMD's version of virtualization

DVD-R DL, DVD+R DL

-Dual Layer writable

Voltage (Volt, V)

-Electrical "pressure" pushing the electrons -e.g. how open the faucet is

SmartPhone

-Most popular mobile device -Can make calls, text, emails, instant message -Can take pictures, see movies, hear music -From ~3.5in to 6in diagonally -Can view maps and travel information -Can support specialized, productivity, gaming apps.

malware removal process

1. Identify and research malware symptoms 2. Quarantine infected systems 3. Disable system restore 4. Remediate infected systems: -update anti-malware software -scan and use removal techniques 5. Schedule scans and run updates 6. Enable system restore 7. Educate end user

IPv4 Loopback Address

127.0.0.1

FAT32

32-bit File Allocation Table A file allocation table which uses 32 bits for addressing clusters.

exFAT

64 bit Extended File Allocation Table used for large capacity removable hard drives and flash media.

security group

A collection of user accounts that can be assigned permissionsin the same way as a single user object

set command

A command used to view all variables in the shell, except special variables.

Power Supply

A component that provides power to a computer

swap partition

A disk partition disignated for swap space in linux

LocalService

A limited account used to run services that cannot make system wide changes. Also it can access the network anonymously

hash

A number generated by an algorithm from a text string.

zero-day exploit

A vulnerability that is exploited before the software creator/vendor is even aware of its existence.

Default Programs

An applet to set the programs you wish to use, or choosing which application is used to open files of a particular extension

AUP

Acceptable Use Policy Rules or guidelines for the proper use of technology or digital devices within an organization.

ACL

Access control list. A list of rules used to grant access to a resource. In NTFS, a list of ACEs makes up the ACL for a resource. In a firewall, an ACL identifies traffic that is allowed or blocked based on IP addresses, networks, ports, and some protocols (using the protocol ID).

ACL

Access control list. Rules applied by packet filter firewalls that filter data by IP address, Protocol ID, and Port Numbers

Local Security Policy

Allows you to view and edit currenty security policy

Credential Manager

Allows you to view cached passwords for websites and Windows/network accounts

Home Client

An OS designed to work on standalone or workgroup PCs in a home or small office

LocalSystem account

An account in which if a process is executed it is unrestricted in terms of making changes to the system configuration and file system (better than administrator account)

NetworkService

An account that has the same privileges as LocalService but can access the network using the computer's machine account's credentials

shell

An interface between the user and computer and software

Finder

Apple equivalent of file explorer in Windows

Time Machine

Apple equivalent of system restore

ADSL

Asymmetrical Digital Subscriber Line A type of digital subscriber line (DSL) technology, a data communications technology that enables faster data transmission over copper telephone lines than a conventional voiceband modem can provide.

ATM

Asynchronous Transfer Mode A cell-switching-based physical layer protocol. It supports high-bandwidth data needs and works well for time-sensitive applications. Because the switching process occurs in hardware, delays are minimized. ATM uses a fixed cell size of 53-bytes. ATM can be implemented on LANs or WANs.

A/V

Audio Video

AAA

Authentication, Authorization, and Accounting

BIOS

Basic Input/ Output System. A computer's firmware used to manipulate different settings such as the date and time, boot drive, and access password.

BNC

Bayonet Neill-Concelman A connector

BD-RE

Blu-ray Disc Recordable Erasable Similar to the BD-R Blu-ray format, however the user can record and reuse and erase data from the disc multiple times.

BD-R

Blu-ray disc recordable A Blu-ray disc that can be recorded on one time.

BSOD

Blue Screen of Death An error screen which appears on a Windows PC after a fatal system error.

Upgrade Windows 7 Enterprise to Windows 10

Can upgrade to: • Windows 10 Enterprise Cannot upgrade to (requires clean installation): • Windows 10 Home • Windows 10 Pro

CA

Certificate Authority - a third party that vouches for certificates

chkdsk

Check Disk - checks the integrity of disks and can repair any problems detected

COMx

Communication Port (x=port number). See serial port.

DMZ

Demilitarized Zone (Sometimes referred to as a perimeter network or screened subnet) A physical or logical subnetwork that contains and exposes an organization's external-facing services to an untrusted network, usually a larger network such as the Internet.

DoS

Denial of Service An interruption in an authorized user's access to a computer network, typically one caused with malicious intent.

DoS attack

Denial of Service Attack - causes a service at a given host to fail or become unavailable to legitimate users

DLT

Digital Linear Tape Previously called Compac Tape. A magnetic tape data storage technology developed by Digital Equipment Corporation (DEC) from 1984 onwards.

DSL

Digital Subscriber Line. A method of connecting to the Internet via a phone line. A DSL connection uses copper telephone lines but is able to relay data at much higher speeds than modems and does not interfere with telephone use.

DVD

Digital Versatile Disc

DVD-ROM

Digital Versatile Disc - Read Only Memory DVD format in which data can only be read

-

Digital Versatile Disc-Random Access Memory

DC

Direct Current

net user dmartin /active:no

Disables dmartin account

DAC

Discretionary Access Control. An access control model where all objects have owners and owners can modify permissions for the objects (files and folders). Microsoft's NTFS uses the DAC model. Other access control models are MAC and RBAC.

DNS

Domain Name System The Internet's system for converting alphabetic names into numeric IP addresses.

DDR RAM

Double Data-Rate Random Access Memory A class of memory integrated circuits used in computers. RAM that transfers data on both 0-1 and 1-0 clock transitions, theoretically yielding twice the data transfer rate of normal RAM or SDRAM.

DIMM

Dual Inline Memory Module These are available in 168-pin, 184-pin, and 240-pin versions. Dual refers to each side of the module having a different pinout.

NetBEUI

EUI Networked Basic Input/Output System Extended User Interface

man/ --help

Either parameter will generate a detailed explanation of the command in Linux

EEPROM

Electrically Erasable Programmable Read Only Memory A type of non-volatile memory used in computers, integrated in microcontrollers for smart cards and remote keyless systems, and other electronic devices to store relatively small amounts of data but allowing individual bytes to be erased and reprogrammed with an electrical charge.

EMP

Electromagnetic Pulse An electromagnetic pulse (EMP), also sometimes called a transient electromagnetic disturbance, is a short burst of electromagnetic energy.

EMI

Electromagnetic interference. Interference caused by motors, power lines, and fluorescent lights. Cables can be shielded to protect signals from EMI. Additionally, EMI shielding prevents signal emanation, so it can prevent someone from capturing network traffic.

format D: /fs:NTFS /x

Enables file compression using NTFS

Drive wiping

Ensures old data on a hard drive is destroyed by writing zereos or a random patter to each location on the drive. Makes disk suitable for re-use

EPROM

Erasable programmable read-only memory. A special type of PROM that can be erased by exposing it to ultraviolet light

ECC

Error Correcting Code Used for controlling errors in data over unreliable or noisy communication channels.

Local Group Policy(gpedit.msc)

Exposes the whole registry configuration using a dialog-based interface(Offers a wider range of settings than Local Security Policy)

ECP

Extended Capabilities Port A parallel port for personal computers (PCs) that supports bi-directional communication between a computer and a peripheral device such as a printer.

exFAT

Extended File Allocation Table. Microsoft flash drive file system. Files can be larger than 4 gigabytes.

XGA

Extended Graphics Array A high-resolution video display mode that provides screen pixel resolution of 1,024 by 768 in 256 colors or 640 by 480 in high (16-bit) color.

HFS Plus

Extended Hierarchical File System - the file system older macOS uses

EVGA

Extended Video Graphics Array - A display standard introduced by VESA in 1991 that offers a max resolution of 1024 x 768 pixels. EVGA should not be confused with the older EGA (Enhanced Graphics Array) or XGA (eXtended Graphics Array).

eSATA

External Serial advanced technology attachment An external interface for SATA. Transfer rate of 3Gbps

GPS

Global Positioning System Uses a system of satellites, tracking stations, and receivers to determine precise absolute locations on earth.

GSM

Global System for Mobile Communications A standard developed by the European Telecommunications Standards Institute (ETSI) to describe the protocols for second-generation (2G) digital cellular networks used by mobile devices such as mobile phones and tablets.

GUID

Globally Unique Identifier A 128-bit number used to identify information in computer systems

HAV

Hardware Assisted Virtualization Is a platform virtualization approach that enables efficient full virtualization using help from hardware capabilities, primarily from the host processors. Full virtualization is used to simulate a complete hardware environment, or virtual machine, in which an unmodified guest operating system (using the same instruction set as the host machine) executes in complete isolation.

HAL

Hardware abstraction layer A layer in the Windows operating systems in which assembly language code is isolated. It is used to write device-independent applications.

HTPC

Home Theater PC Designed to attach to a TV or projector for movie and TV viewing.

HIPS

Host intrusion prevention system A system or a program employed to protect critical computer systems containing crucial data against viruses and other Internet malware. Starting from the network layer all the way up to the application layer, HIPS protects from known and unknown malicious attacks.

Screen Sharing

In OS X, a utility to remotely view and control a Mac and is similar to Remote Assistance in Windows.

ISA

Industry Standard Architecture

Event types

Information Warning Error Critical Successful Audit Failure Audit

ICM

Information Content Management - the process of managing information over its life cycle

footprinting

Information gathering threat in which the attacker attempts to learn about the configuration of the network and security systems

Footprinting

Information gathering threat in which the attacker attempts to learn about the configuration of the network and security systems.

IR

Infrared

Guests

Limited rights such as browsing network and shutdown, but they cannot save changes made to the desktop

LPD/LPR

Line Printer Daemon/Line Printer Remote

Diagnostic start up

Load basic devices and services only

LAN

Local Area Network

secpol.msc

Local Security Policy snap in

Administrative Tools

Located in Control Panel in Windows 7, is a collection of predefined Microsoft Management Consoles

LBA

Logical Block Addressing

LVD

Low Voltage Differential

screen sharing

MacOS version of remote desktop functionality

Computer Management

Management console with multiple snap-ins to configure local users and groups, disks, services, and devices

Moving files and folders to a FAT or FAT32 partition

Modify permission is required for the destination folder. All permissions and NTFS attributes(such as encryption) are lost, FAT does not support permissions or special attributes

NFC

Near Field Communication

NAC

Network Access Control - allows administrators to devise policies or profiles defining the minimum security configuration required of devices for network access

NAT

Network Address Translation

NFS

Network File System

NFS

Network File System - used to mount storage devices into a local file system in linux

NIC

Network Interface Card

NNTP

Network News Transfer Protocol

NVMe

Non-volatile Memory Express

chkdsk C: /i /c

On NTFS volumes only skips part of the checking process

OU

Organizational Unit - Provide a way of dividing up a domain into different administrative realms

OEM

Original Equipment Manufacturer

PnP

Plug and Play

PCIe

Peripheral Component Interconnect Express

PCIX

Peripheral Component Interconnect Extended

PVC

Permanent Virtual Circuit

PAN

Personal Area Network

PC

Personal Computer

PCMCIA

Personal Computer Memory International Association

PHI

Personal Health Information

PIN

Personal Identification Number

POTS

Plain Old Telephone Service

PaaS

Platform as a Service

PAT

Port Address Translation

PNAC

Port-based network access control - means that the switch or router performs authentification of the attached device before activating the port

POP3

Post Office Protocol 3

PSU

Power Supply Unit

PoE

Power over Ethernet

PSK

Pre-Shared Key - 256 bit cryptographic hash generated from a passphrase. This authentication method is suitable for SOHO networks

PXE

Preboot Execution Environment

PE

Preinstallation Environment

PCL

Printer Control Language

Windows 7 Minimum Hardware Requirements (x64)

Processor/CPU - 1 GHz processor Memory - 2 GB RAM Free disk space - 20 GB Video - DirectX 9 graphics device with WDDM* 1.0 or higher driver *Windows Display Driver Model

Windows 10 Minimum Hardware Requirements (x86)

Processor/CPU - 1 GHz processor with support for PAE, NX, and SSE2 Memory - 1 GB RAM Free disk space - 16 GB Video - Microsoft DirectX 9 graphics device with WDDM* driver *Windows Display Driver Model

Windows 8/8.1 7 Minimum Hardware Requirements (x86)

Processor/CPU - 1 GHz processor with support for PAE, NX, and SSE2 Memory - 1 GB RAM Free disk space - 16 GB Video - Microsoft DirectX 9 graphics device with WDDM* driver *Windows Display Driver Model

file attributes

R - read only H - hidden S - system, can not be deleted A - archive, modified since last backup

Write

Read a file and change it, or create a file within a folder, but not to delete it

ROM

Read-Only Memory

RTC

Real-Time Clock

shutdown -r

Reboot after shutdown

Setup

Records events generated during installation

Pharming

Reroutes requests for legitimate websites to false websites

pharming

Reroutes requests for legitimate websites to false websites

ping -a IPaddress

Resolves address to hostnames

RSoP

Resultant Set of Policies

RMA

Returned Materials Authorization

SCP

Secure Copy Protection

SD Card

Secure Digital Card

SFTP

Secure File Transfer Protocol

SIMM

Single In-Line Memory Module

SFF

Small Form Factor

SOHO

Small Office/Home Office

SoDIMM

Small Outline Dual Inline Memory Module

boot partition

The hard drive partition where the Windows OS is stored. The system partition and the boot partition may be different partitions.

Top Secret

The highest level of classification

No reply (request timed out)

The host cannot route a reply back to your computer

Secret

The info is too valuable to permit any risk of its capture. Viewing is severely restricted

Ext2

The second extended file system Supports Access Control Lists to control individual permissions, but it does not support journaling.

latency

The time it takes for a signal to reach the recipient

boot sector virus

These attack the boot sector, partition table, and file system

Interactive Group

This group contains the user account of the person currently working at the computer

UEFI

Unified Extensible Firmware Interface

UTM

Unified Threat Management

URL

Uniform Resource Locator

UPS

Uninterruptible Power Supply

UDF

Universal Disk Format - updated file system for optical media with support for multi-session writing

UNC

Universal Naming Convention

UPnP

Universal Plug and Play

UPnP

Universal Plug and Play: Enables network-ready devices to discover each other automatically. Also allows configurations for devices to work with firewalls

USB

Universal Serial Bus

System Configuration Utility(msconfig)

Used to modify settings and files that effect the affect the way the computer boots in windows

UAC

User Account Control

UDP

User Datagram Protocol

.vbs

VBScript

Macro viruses

Virus that takes advantage of the macro programming languages built into some software.(affect an Office Document)

WPA2

WiFi Protected Access 2

WEP

Wired Equivalent Privacy

WAP

Wireless Access Protocol/Wireless Access Point

WIFI

Wireless Fidelity

WLAN

Wireless Local Area Network

WMN

Wireless Mesh Network

WPA

Wireless Protected Access

WWAN

Wireless Wide Area Network

Moving files and folders to a different NTFS volume

Write permission is required for the destination folder and Modify for the source folder. NTFS permissions are inherited from the destination folder and the user becomes the Creator/Owner

cluster

a group of sectors

Bitlocker

a microsoft utility to encrypt a drive

Trojan Horse

a program that appears desirable but actually contains something harmful

Rootkits

a set of software tools that enable an unauthorized user to gain control of a computer system without being detected.

Rootkit

a set of tools designed to gain control of a computer without revealing its prescence

symmetric encryption

a single key is used to encrypt and decrypt data

Worm

a software program capable of reproducing itself that can spread from one computer to the next over a network

df and du

check free space and report usage by directories and files

Adapter properties

clients - Provide connections to types of file servers such as Linux, Unix, or Windows Protocols - Provide the format for addressing and delivering data messages between systems Services - Allow your machine to provide network functionality to other machines

CDFS

compact disc file system - legacy file system used for optical disc media

Data Sources

control connection to databases set up on the local computer

Remote Settings location

control panel -> system properties -> remote settings

DRM

digital rights management The term for any one of several technologies designed to limit the number of digital copies can be made of a file.

dir *.doc

displays all files with the DOC extension in the current directory

dir let *.doc

displays all files with the DOC extension that start with the letters LET

dir let *.doc /s

displays all files with the DOC extension that start with the letters LET and searches for subdirectories

apt-get install (package name)

install new application

Component Services

located in Administrative Tools, enables you to register new server applications or reconfigure security permissions for existing services

dd

linux command that makes a copy of an input file to an output file

route

linux command that shows the default gateway because ifconfig does not

swapon

linux command used to activate the partition swap space

grep

linux command used to search and filter contents of files displaying the lines that match the search string

fdisk

linux command-line program used to create and manage partitions on a hard disk

Resource Monitor

shows an enhanced version of the sort of snapshot monitoring provided by task manager

privacy screen

prevents anyone but the user from viewing the screen

legal and regulatory or compliance controls

privacy laws, policies, and clauses

virtual memory

process of optimizing RAM storage by borrowing hard drive space

secure boot

restricts OS installation to trusted software

rstrui

runline command for system restore

sfc /scannow

runs a scan immediately

6

rw-

7

rwx

Standby/Sleep Mode

saves current session to memory and put the computer into a minimal power state

multiboot

the capability for choosing between two or more operating systems to boot from when a computer is turned on. A separate partition is required for each operating system.

802.1x

the standard that defines a Port-based Network Access Control mechanism

LC

ucent Connector

ugo

user group others

printenv or env command

view and change environment variables

Multi-mode fiber

-Short-range communication -Up to 2 km for 100 Mbit/s -550 meters for 10 Gbit/s -Inexpensive light source (i.e. LED)

SDRAM (Synchronous DRAM)

-Synchronous with common system clock -Queues up one process while waiting for another

DisplayPort

-VESA standard -Royalty-free standard -Data is sent in packetized form (like ethernet and pci express) -Compatible with HDMI and DVI

Mini DisplayPort

-VESA standard -Royalty-free standard -Data is sent in packetized form (like ethernet and pci express) -Compatible with HDMI and DVI -Smaller compared to DisplayPort

RJ11 Connector

-6 position, 2 conductor connectors (6P2C) -6 wires available, only 2 are used -used for modems or telephones -Interchangeable with RJ14

RJ48C Connector

-8 position, 4 conductor connector (8P4C) -8 wires availabe, only 4 are used -Similar to RJ45 -Used with T1 or WAN data lines

Parity Memory

-Additional parity bit -Can't correct an error -Wont always detect an error

miniHDMI

-All digital connection (no analog) -Sends both audio and video -20 meter distance before losing too much signal -19-pin (type A) connector -Type C connector -Designed for smaller devices

Category 5e (enhanced)

-Max Supported Ethernet Standard - 100BASE-TX, 1000BASE-T -Max Supported Distance - 100 meters

Category 6A (augmented)

-Max Supported Ethernet Standard - 10GBASE-T -Max Supported Distance - 100 meters

DVI-D Single Link

-Sends digital signals -Single link; 3.7 Gbps (HDTV at 60 fps)

SATA

-Serial Advanced Technology Attachment; interface that uses serial signals to transfer data, instructions, and information. -Power connector (15 pins)(A) -Data connector (7 pins)(B)

RS-232 (Recommended Standard 232)

-Serial communications standard -The USB of its time -Used to connect modems, printers, mice, networking, or devices. -Commonly used as a configuration port on a switch, firewall, router (serial console interface) -25 pin version is referred to as DB-25 -9 pin version is a modern version. It is referred to as DB-9 or DE-9 (same connection)


Set pelajaran terkait

Parts of the brain and their functions

View Set

Macro Homework 5: Loanable Funds Model

View Set

Chapter 24: Nursing Care of the Child With an Alteration in Cellular Regulation/Hematologic or Neoplastic Disorder XXX

View Set