220-901 & 902 CompTIA A+ Certification Exam Prep

Ace your homework & exams now with Quizwiz!

In which situations should Continuous Aware Mode be configured on Wireless Lan Clients?

"Laptops that plugged in & Desktops that are plugged in."

How can you check your local TCP/IP connection

"PING localhost & PING 127.0.0.1"

Which of the following devices have similar looking connectors?

"SCSI Scanner & Parallel Port"

Which one of the following ports will most often be used to connect a digital camera to a computer?

"USB & Firewire 1392 IEEE"

Which standard is designed to provide voice, video, and data transmission over a digital telephone network.

(ISDN) Integrated Services Digital Network

Which protocol provides strong authentication methods and secure communications over insecure channels to allow users to execute commands and manage files

(Secured Shell)SSH

MAC filtering

(a basic form of network access control), which can filter out which computers can access the wireless network (and wired network). The WAP does this by consulting a list of MAC addresses that have been previously entered. Only the network adapters with those corresponding MAC addresses can connect; everyone else cannot join the wireless network.

What can you do to prevent Electrostatic Discharge?

1. Anti-static Strap 2.Anti-static Mat 3. Anti-static Bag

SODIMM Types (Small outline dual in-line memory module)

1. DDR 200 PIN 2. DDR2 200 PIN 3. DDR3 204 PIN 4. DDR4 260 PIN

1. Standard SD cards 2. High-capacity (SDHC) 3. eXtended Capacity (SDXC)

1. have capacities up to 4 GB 2. cards range up to 32 GB 3. has a maximum capacity of 2 TB, but as of the writing of this book, typical capacities include 64, 128, 256, and 512 GB.

Lap top hard drive types

1. magnetic disk 2. Solid State Drive (SSD) 3. hybrid They have either 2.5-or 1.8 inch form factors

What is the typical maximum download speed for a regular Digital Subscriber Line (DSL) connection?

1.5 Mbps

How many devices can the USB interface support

127

How many pins does a DDR DIMM have?

184 pins

What is the maximun wattage of an 4-pin 12-volt ?

192 Watts

What is the default port for FTP (File Transfer Protocol)

21

How many channels must exist between two 802.11b frequency bands in order to avoid channel overlap?

4

How many disks are required to set up a RAID 10 (1+0( array)?

4

What is the maximum data transfer speed in the Universal Serial Bus (USB) 2.0 standard?

480 Mbps

How many pins does a FireWire 400 connector have?

6-pins

ATA 66

80 Pins

Of the IEEE specifications listed, which ones are capable of operating at 54Mbps

802.11a, 802.11g, & 802.11n

What is capable of reaching transmission speeds of over 1 Gbps

802.11ac

What standard supports speeds up to 11 Mbps in the 2.4 GHz frequency band.

802.11b

Hypertext Transfer Protocol (HTTP)

Hypertext Transfer Protocol transfers web pages and other web-based material from a web server to your web browser. It is normally done in a compressed format but not in a secured format. Web servers have port 80 open by default.

On legacy motherboards the Southbridge chipset controls the communication between the CPU and which of the choices?

I/O PCI and USB IDE Controllers

What is Port 143

IMAP

Each node on the internet must be assigned an unique____ address?

IP

What do you do if a fan fails?

If it has failed, replace it with a working unit. Do not open a power supply!

Which networking device sends data to all connected devices to it and lacks the intelligence to determine the best path for data packets?

A hub

What is meant by an ad-hoc network?

A local network that is formed spontaneously as devices connect

An external USB hard drive would typically have its own power supply and a USB cable described as?

A male to B male

What happens to any files that are open during a Windows Backup that includes those files?

A shadow copy is made and then backed up.

What was designed for Phenom II processors.

AM3

What is a modification of the AM3 socket with an additional pin for AMD Bulldozer processors. It is backwards compatible with AM3 processors.

AM3+

This device creates a cell for a wireless LAN

AP or WAP

Which motherboard allows you to to turn off the computer via software?

ATX

Which of the following form factors is recognized for both cases and motherboards?

ATX

PIN Color Signal Pin Color Signal 1 Orange +3.3V 13 Orange/Brown +3.3 v/3.3v sense 2 Orange +3.3V 14 Blue -12V 3 Black Ground 15 Black Ground 4 Red +5V 16 Green Power On 5 Black Ground 17 Black Ground 6 Red +5V 18 Black Ground 7 Black Ground 19 Black Ground 8 Gray Power Good 20 White -5V (optional) 9 Purple +5V standby 21 Red +5V 10 Yellow +12V 22 Red +5V 11 Yellow +12V 23 Red +5V 12 Orange +3.3V 24 Black Ground

ATX Pin Color and Stats

BIOS S4

All contents inside of the compiter's RAM modules are saved to the hard drive and the computer is powered down. When the computer is restarted, windows will reload its last saved state. (hibernation)

Apple Filing Protocol

Apple Filing Protocol offers file services for Mac computers running OS X allowing for the transfer of files across the network. It uses port 548 (and sometimes 427) for establishing the communication between two systems. Mac computers can also make use of SMB (and other protocols) for making connections to other systems.

TCP/IP Stack

Application: -represents data users -encodes & controls the dialog Transport: -supports the communication btw end devices across diverse network Internet: -provides logical addressing - determines best path through the network Network Access: -controls the hardware that make up the network

The outer jacket wraps and protects the entire cable and is sometimes

Armor

How does the evolution in display device technology relate to energy efficiency and cost?

As technology evolves, display devices tend to use less energy, but cost more.

If you set up your Dynamic Host Configuration Protocol (DHCP) server to resolve Internet Protocol (IP) address conflicts, which of the following problems does this action resolve?

Assignment of duplicate IP addresses

To ensure the highest compatibility and support for time sensitive data transmission, IEEE 1394 supports which of the transmission method

Asynchronous & Isychronous

What Windows feature allows a Dynamic Host Configuration Protocol (DHCP) client computer to configure itself automatically with an IP address in the range of 169.254.0.1 to 169.254.255.254 if no DHCP server is available?

Automatic private IP addressing (APIPA)

Some memory modules, a DIMM for example, normally have an even number of hips on them. If you come across DIMM with an odd number of chips it means the memory is:

Error Correction Code(ECC)

Which will support TCP/IP?

Ethernet, ring, and Modem Dial-up

What is the benefit of enabling Network Address Translation (NAT) on a router?

External hosts won't be able to identify and connect directly to internal clients.

What is the primary reason for using satellite Internet?

Extremely long-range access to remote areas where other options are not viable

Which utility must you use to prepare a disk or filesystem BEFORE you format it?

FDISK

If you install a new disk drive into a computer, but cannot access it, what must you do to make the disk accessible?

FDISK and FORMAT

Software on a non-volatile chip is called _______?

FIRMWARE

Which socket type is designed to work with Athlon's X4 processor?

FM2

What is Port 21?

FTP

Two ways of creating new folders in Windows 7

File. New, Folder & Right Click, New, Folder

SOHO Router Setup

First, the router needs to be physically connected, which is very easy. It requires power from an AC outlet and a connection to the Internet, which is done with a twisted-pair patch cable using RJ45 plugs on each end; one end connects to the Internet (or WAN) port of the router, and the other end connects to the cable modem or other network interface device. But a word of caution: You don't want to use the default settings that the manufacturer gives you; they might be insecure. So the first thing we want to do is to log in to the router so that we can make some changes. (We'll assume that your computers are already cabled to the router.)

You have to replace a computer power supply. Which of the following will you use to determine and select replacement?

Form factor and wattage

What should you do if you get the error message "invalid media type"?

Format HD

Regarding Blu-Ray technology, which statement is most accurate

BD-R has a maximum capacity of 250MB per layer

What is processed first?

BIOS

What's the first thing that runs when you boot a pc?

BIOS-its job is to identify, test, and initialize components of the system. It then points the way to the operating system so that the OS can load up and take over. Collectively, this process is known as bootstrapping. One system readying the computer and leading to another larger system

Which of the following is a boot sector repair tool for Windows computers that have failed to boot properly?

BOOTREC

Capturing pertinent statistical information about the network behavior over a period of time to determine what is normal operational behavior is called?

Baselining

two types of disk Windows support?

Basic & Dynamic

What type of connector is found at the end of an RG-58A cable?

Bayonet Neill-Concelman (BNC)

A page from a laser printer is smeared. What is the most probable fault?

Fuser

What event usually confirms the completion of POST

Beep

What type of connector does a floppy disk controller use?

Berg

There are two methods of burning Blu-ray discs:

Blu-ray Disc Recordable (BD-R), which can write to a disc once, and Blu-ray Disc Recordable Erasable (BD-RE), which can be erased and re-recorded multiple times.

What type of transmission uses analog communication to divide the cable into series of channels?

Broadband

Video Card Ram is AKA?

GDDR or Graphics Double Data Rate

Which Windows program should you run to help diagnose and fix disk-related errors?

CHKDSK

CPU cache

CPU cache is a special high-speed memory that reduces the time the CPU takes to access data. By using high-speed static RAM (SRAM) and because the cache is often located directly on—or even in—the CPU, CPU cache can be faster than accessing information from dynamic RAM (DRAM) modules. However, it will be limited in storage capacity when compared to DRAM.

What Hard Drive specifications do you need to consider before purchasing?

Capacity, Data Transfer Rate (DTR), Cache, Rotational speed, & Latency

What is the minimum cable type specified for 100baseTX

Cat 5

Which UTP category will support Gigabit Ethernet

Cat 6

Which category of twisted pair cable supports a signaling rate of 16 MHz?

Cat-3

Which category of twisted pair cable supports a signaling rate of 100 MHz?

Cat-5

Which category of twisted pair cable supports a signaling rate of 1 Gbps?

Cat-5E

TC (Termination Point)

Central location for wiring equipment and devices within a building

Several users report that they can only see and connect to other workstations, but cannot connect to other network resources or to the Internet. What common failure point do you check?

Check the Dynamic Host Configuration Protocol (DHCP) server

Which component of a fiber optic cable is responsible for reflecting light back in the core?

Cladding

In which networking method are mask bits moved in one-bit increments to provide the exact number of nodes and networks required?

Classless inter-domain routing (CIDR)

The buffer surrounds the core and cladding and is usually made of plastic.

Coating

Coaxial

Coaxial cable is another way to transfer data over a network. This cable has a single conductor surrounded by insulating material, which is then surrounded by a copper screen and, finally, an outer plastic sheath.

Virus

Code that runs on a computer without the users knowledge; it infects the computer when the code is accessed and executed

LCD displays use what as a light source?

Cold Cathode Fluorescent Lamp (CCFL) as the lighting source.

Which one of the following cables produces the lowest quality of video output?

Composite

Why would the back of a page come out dirty on a laser printer?

Contaminated Fuser

What would produce black speckled output on the back of a pager printer on a laser printer?

Contaminated Transfer Corona

What does setting an active partition do?

Creates a primary partition

Network Roles- Dynamic Host Configuration Protocol (DHCP) Protocol

D-discover O-offer R-Request A-Acknowledge Pack

Which of the following Windows command line utilities allows you to manage computer drives, including disks, partitions, volumes, and virtual hard disks?

DISKPART

What is Port 53

DNS

Which type of Digital Visual Interface (DVI) cable supports both digital and analog transmissions?

DVI-I

On the dot-matrix, you only see the bottom half of the characters. What could be a possible cause of this?

Defective print head

The process of moving the toner to the drum is known as ?

Developing

Which processor feature segregates memory areas for storage of code or of data for security purposes?

Disable execute bit

What service enables clients to locate the servers that host the Lightweight Directory Access Protocol (LDAP) directory?

Domain Name System (DNS)

Which database does the nslookup utility query for information about a host?

Domain Name System (DNS)

What 3 things must be specified on a workstation for DNS resolution?

Domain, Host, & IP Address

Which of the following is an example of an impact printer?

Dot Matrix

Which type of Random Access Memory (RAM) eventually replaced Synchronous Dynamic Random Access Memory (SDRAM) by transferring data twice per clock cycle?

Double Data Rate Synchronous Dynamic Random Access Memory (DDR SDRAM)

Double-sided memory module

Double-sided memory modules have their chips divided into two "sides" known as banks. Only one "side" can be seen by the computer at any time. To use the second half of the storage available, the computer must switch to the second bank and can no longer read or write to the first half until it switches back again.

Double-sided DIMMS are also referred to as?

Dual Rank

IP addresses that are assigned to a node each time it connects to the network

Dynamic

What allows any number of internal addresses to share a pool of external addresses.

Dynamic Network Address Translation (DNAT)

What are the two main types of addresses?

Dynamic and Static

What ports have a range of 49152 to 65535

Dynamic and private

What does the Repeat Delay setting in the Keyboard Properties dialog box control?

How long a key needs to be held down before characters repeats on the screen

What utility can you use to find a bottleneck when diagnosing TCP/IP connectivity

Tracert

What is the primary purpose of a Domain Name System (DNS) server?

Translating names into numeric IP addresses

Triple Channel

Triple-channel architecture accesses three memory modules at the same time, in effect a 192-bit bus.

USB Ports

USB 2.0 HighSpeed 480 Mb/s USB 3.0 Superspeed 5.0 Gb/s USB 3.1 Superspeed+ 10.0 Gb/s

Which type of connector is the most common cable used for liquid crystal display (LCD) monitors?

VGA

You find that you have no network connectivity after a thorough physical connectivity check between your computer and the Ethernet jack. What do you check next?

Verify that the operating system recognizes the network interface card (NIC)

What are Thunderbolts versions, speeds, and connection type?

Version 1 10 Gb/s DisplayPort Version 2.0 Version 2 20 Gb/s DisplayPort Version 2.0 Version 3 40 Gb/s USB Type-C Version 3.0

Thunderbolt Connection types

Version 1: 10 GB/s Display Port Version 2.0 Version 2: 20 GB/s Display Port Version 2.0 Version 3: 40 GB/s USB Type-C Version 3.0

Which one of the following devices would yo insert into an Accelerated Graphics Port(AGP) slot?

Video

The Peripheral Component Interface(PCI) Express x16 bus architecture is exclusively designed for_______?

Video Adapter Card

Which type of printer allows you to print text files to an image file format (such as a .JPEG) so that you can email an image of the text to a colleague?

Virtual Printer

A network connects a company branch in the United States to another branch in Germany. What type of network would best describe this?

WAN(Wide Area Network)

Which of the choices below correctly identifies the optional security mechanism that was specified by the 802.11 protocol in order to provide authentication and confidentiality in a wireless LAN environment?

WEP

Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), WPA2

WEP is the weakest type of encryption; WPA is stronger and WPA2 is the strongest of the three.

What is the port range of 0 to 1,023 referred to as?

Well-Known Ports

Public cloud

When a service provider offers applications and storage space to the general public over the Internet. A couple of examples of this include free, web-based e-mail services and pay-as-you-go business class services. The main benefits of this include low (or zero) cost and scalability. Providers of public cloud space include Google, Rackspace, and Amazon.

In which type of situation would a sub-multi-assembly (SMA) fiber optic cable be particularly useful?

When a waterproof connection is needed

Adjusting the Print Spooler service in the Command Prompt

When the Command Prompt is open (in elevated mode), you can start the Print Spooler service by typing net start spooler. Typing net stop spooler stops the service.

Several users complain that a newly repaired printer is not printing for them. What do you suspect is the problem?

Windows does not recognize the printer as being online.

SRAM

You can find SRAM used as cache memory for CPUs, as buffers on the motherboard or within hard drives, and as temporary storage for LCD screens. Normally, SRAM is soldered directly to a printed circuit board (PCB) or integrated directly to a chip. This means that you probably won't be replacing SRAM.

RJ45 crimper

You would have to purchase cable as well as RJ45 plugs. The plugs are attached to the cable ends with an RJ45 crimping tool. This tool can come in especially handy when you need to make a crossover patch cable. There are other types of crimpers for coaxial cable as well.

You install a new hard disk that reportedly has excellent performance benchmarks into your three-year-old computer. After installing the new disk and using it, you find that its performance is disappointing at best. What might be the cause of the poor performance?

Your computer's disk controller is too old.

Single Channel

a 64-bit bus (or data channel) between the memory and the memory controller. One or more sticks of RAM can be installed into the motherboard, but they share the same channel.

Encrypting File System (EFS)

a component of NTFS

Unified Threat Management (UTM) Gateway

a firewall can be a part of UTM which is the evolution of the firewall, incorporating the features of the firewall along with antivirus, antispam, content filtering, and intrusion prevention for the entire network. It might also incorporate data loss prevention (DLP) by way of content inspection. The idea behind UTM is that it can take the place of several units doing separate tasks and consolidate them into one easily administered system. The drawback to this is that it can act as a single point of failure. So many organizations will consider secondary UTM units or fallback firewalls.

Domain

a group of computers and devices on a network that are administered under the same protocol.

Automatic Private IP Addressing (APIPA)

addresses are a feature in Windows DHCP. Class B IP adresses in the 169.254.0.0 range are assigned to clients when a DHCP server is unavailable.

Trojan Horse

appears to perform desired functions but is actually performing malicious functions behind the scenes

Public IP Addresses

are IP addresses that have not been reserved for private use by internet standards groups. They are recognizable on public networks like the internet.

Solid-State Drives (SSD)

are used to store operating systems and files, similar to a magnetic hard disk drive, they write data to nonvolatile microchips or to DRAM. Because of this, they are silent, more resistant to physical shock, and have lower access time and less latency.

Digital subscriber line (DSL)

builds on dial-up by providing full digital data transmissions over phone lines but at high speeds. DSL modems connect to the phone line and to the PC's network adapter or to a SOHO router enabling sharing among multiple computers. One of the benefits of DSL is that you can talk on the phone line and transmit data at the same time.

When installing a USB floppy disk drive the A: drive letter designation is established ________?

by the cable

Zombies

computers that distribute the malware or participate in an attack without the knowledge of the owner. These zombies (or robots) can be grouped together by a central attacker to form a botnet. This is done to perpetuate large-scale attacks against particular servers. The distributed denial-of-service (DDoS) is an example of an attack committed by a botnet; it is designed to bring down a server or website.

What would be the proper storage environment of OPC* Organic PhotoConductive) drums?

cool and dark

Outbound modem converts

digital to analog

Full Duplex

full-duplex means that the adapter can do both simultaneously, thus doubling the maximum data throughput.

Which of the following Windows command line network commands will clear Internet Protocol (IP) address information from a Dynamic Host Configuration Protocol (DHCP) server or from Automatic Private IP Addressing (APIPA)?

ipconfig /release

Thunderbolt

is a high-speed hardware interface, It combines elements of PCI Express and DisplayPort technologies. Versions 1 and 2 use the Mini DisplayPort connector and version 3 uses the USB Type-C connector.

Workgroup

is a low overhead network configuration, geared towards small office use. No one computer has control over another. Each computer in the work-group is capable of sharing resources among-st each other.

Raid 1 mirroring

means that two drives are used in unison and all data is written to both drives, giving you a mirror or extra copy of the data if one drive fails.

Modem

modem is a combination of the words modulate and demodulate. It is a device that allows a computer (or, in rare cases, multiple computers) to access the Internet by changing the digital signals of the computer to analog signals used by a typical land-based phone line.

How do you ping local loopback IPv6?

ping ::1

The process of recharging or reenergizing the memory registers is also referred to as the process of __________.

refreshing

When install a processor fan, how is it attached

spring clamps

Bus Speed

the base clock of the motherboard

Intel Sockets

types include 775, 1155, 1156, 1366, 1150, and 2011

How do you ping local loopback IPv4?

use the ping 127.0.0.1 command

Enhanced Integrated Drive Electronics (EIDE)

uses Molex Connectors have 4 pins and supply +5V and +12V to any attached devices

Print to File

which stores the document as a printable file that can then be transported by flash drive or other means to a computer at the main workplace and then printed from there.

5 GHz frequency

If using the 5 GHz frequency range in the United States, a wireless access point can be set up on any channel between 48 and 165. Other countries may have slightly different ranges. The wireless network shown in the figure is currently configured to run in mixed mode, meaning that it can accept connections from wireless clients running the 802.11a, 802.11n, or 802.11ac protocols. This allows for greater compatibility. However, some organizations will require only a single type of connection for all clients (for example, 802.11ac). This can result in greater WAP efficiency and, of course, greater speed for all clients involved—but at greater expense.

Impact Printers

Impact printers use force to transfer ink to paper. This type of printer is somewhat deprecated although certain environments might still use it: auto repair centers, warehouses, accounting departments, and so on.

Where is a riser card most likely to be installed?

In a compact case, where available space is an issue

You are looking in your spare parts inventory for a Micro-ITX motherboard. Before getting down to numbers, how will you base your first round of choices?

Internal Expansion Slot

What is a characteristic of CAT-3 cabling?

It is currently used for telephone wiring.

What does the hyperthreading (HT) feature of an Intel chip do?

It makes one physical central processing unit (CPU) appear as two logical CPUs.

How does a CAT-5e cable differ from a CAT-5 cable?

It supports Gigabit Ethernet, whereas CAT-5 does not.

What defines how a client can access information and share directory data on a directory server.

Lightweight Directory Access Protocol (LDAP)

Lightweight Directory Access Protocol (LDAP)

Lightweight Directory Access Protocol (LDAP) is an internet protocol that allows client applications to access information from a server or database. A client might use LDAP to search a server for contact details, such as e-mail addresses, or for a list of devices, such as printers.

What connector (sometimes called a Fiber Jack) has a compact snap-to-lock connector, and is used with multimode fiber.

MT-RJ

Which power supply connector contains 24 pins?

Main Power Connector

Spyware

Malicious software either DL'ed unwittingly from a website or installed along with some other 3rd party software

Main Distribution Frame (MDF)

Manages telecommunications wiring between external Telco lines and internal network devices

SATA Revision 1.0

Maximum DTR 1.5 Gb/s 150MB/s

SATA Revision 3.2

Maximum DTR 16 Gb/s 1969MB/s

What allows you to control which wireless clients may join your network.

Media access control (MAC) filtering

When Intel classifies CPUs as M class it signifies that the chip was designed especially for which purpose?

Mobile

The data light on a NIC card will come on when which of the following happens?

NIC starts receiving Data

What is the northbridge in charge of?

Northbridge: In charge of the connection to high data transfer devices, such as PCI Express video cards and the RAM.

While the inkjet print is ideal, what keeps the ink from leaking out of the ink cartridge and onto the paper?

Nozzle gaze

A PC's CMOS information is continuously lost. What should you do after re-entering the correct settings?

Observe the pc for problem occurrence

You are a building a Blade Server. Which bus architecture will you use?

PCI-X

What is the first step when configuring a HD into a system?

Partition

Which AMD processor uses the AM3 socket

Phenom II X6 black

Pin Grid Array (PGA)

Pin Grid Array sockets accept CPUs that have pins covering the majority of their underside. The pins on the CPU are placed in the pinholes of the socket and the CPU is locked into place by a retaining arm. Examples of AMD sockets include the AM and FM series.

Which of the following is the correct syntax for the command to ping another computer until you stop it manually?

Ping -t hostname

When you try to print to a network printer that you know you have access to, you receive an "access denied" message. What do you do to resolve the issue?

Power cycle the printer to refresh all connections

Which of the following hardware components are required for POST to complete?

Power, CPU, POST, BOOT, OS

A laser printer generates a completely black paper. What is the Cause?

Primary Corona

What components are found on a toner cartridge of a laser printer?

Primary Corona Wire Photoconductive Drum Cleaning Blade

When you purchase a "boxed" processor from Intel, which of the choices will be in the kit?

Processor, cooling fan, and Thermal Kit

A power-on self-test (POST) card is used during POST to do what?

Produce diagnostic error codes

What also know as thinnet, is an older type of media used for networking?

RG-58

DDR3 Standards

Read off of printout

Which of the following devices would hold several expansion cards?

Riser

Which components move the paper forward in an inkjet printer?

Rollers and feeders

Your system will not boot. There are no errors displayed. You only see a blinking cursor at the top of the screen. What is your next logical step?

Run the motherboard diagnostic

protocol enables a user or application to log on to another computer over a network, execute commands, and manage files.

Secure Shell (SSH)

When you use your laser printer, the toner is not fused to the paper. What can you do to fix it?

Set the fuser mode for the paper

DVD-5 Capacity

Sides: 1 Total Layers: 1 Capacity: 4.7 GB

DVD-18 Capacity

Sides: 2 Total Layers: 4 Capacity: 17 GB

Simple Network Management Protocol (SNMP)

Simple Network Management Protocol (SNMP) is used as the standard for managing and monitoring devices on your network. It manages routers, switches, and computers and is often incorporated in software known as a network management system (NMS). The NMS is the main software that controls everything SNMP-based; it is installed on a computer known as a manager. The devices to be monitored are known as managed devices. The NMS installs a small piece of software known as an agent that allows the NMS to monitor those managed devices.

Which type of Random Access Memory (RAM) must be installed in matched pairs?

Single in-line memory module (SIMM)

In which type of fiber optic cable does a laser modulated in amplitude transmit the signal through the fiber?

Single-mode fiber

Single mode cable

Single-mode, on the other hand, is only 8 to 10 microns in diameter and is used for longer distance runs, perhaps from one city to the next (as far as thousands of kilometers). At shorter distances, single-mode cable can go beyond 10 Gb/s.

Which of the following is an example of passive cooling?

Slowing down the speed at which internal components are running

What do A/V workstations need?

So from a hardware standpoint, they need a specialized video or audio card, the fastest harddrive available with a lot of storage space (defi nitely SSD and perhaps SATA Express or PCI Express-based), and multiple monitors (to view all of the editing windows) Remember that audio/video workstations need specialized A/V cards; large, fast hard drives; and multiple monitors.

The LGA 1366 is also referred to as

Socket B

The LGA 1156 is also referred to as

Socket H or H1

The LGA 2011 is also referred to as

Socket R

What is the southbridge in charge of?

Southbridge: In charge of the connection to all the secondary controllers, such as USB, SATA, FireWire, and so on.

What advantages do some laser printers have over other printers?

Speed (print pages anywhere from 10-100 pages per minutes) Print Quality: The aser printer prints at 600 dots per inch (DPI) which is considered better letter quality

What are the advantages of USB

Speed, Expansion, Ease of configuration

What type of Random Access Memory (RAM) is used for cache memory and does not need to be refreshed to retain information?

Static Random Access Memory (SRAM)

To disable Autoplay/Autorun in Windows, complete the following steps:

Step 1. Go to the search field (or Run prompt) and type gpedit.msc. This opens the Local Group Policy Editor. (This is not available in some editions of Windows.) Step 2. Navigate to Computer Configuration > Administrative Templates > Windows Components > AutoPlay Policies. Step 3. Double-click the Turn Off Autoplay setting. This displays the Turn Off Autoplay configuration window. Step 4. Click the Enabled radio button, and then click OK. You are actually enabling the policy named Turn Off Autoplay.

What connector is a fiber optic cable that is used to connect multimode fiber

Straight Tip (ST)

RAID 0 Level

Striping. Data striped across multiple disks in an effort to increase performance. Not Fault tolerant, Minimum # of disks: 2

This device forwards frames within a LAN

Switch

What socket type was designed to be used with the Fusion and Athlon II processors.

The FM1

"Internet of Things" (IoT).

The IoT is the global network of physical objects which have embedded processors (of some sort) that can communicate with computers across the Internet

LCD

The LCD is a flat-panel display that consists of two sheets of polarizing material surrounding a layer of liquid crystal solution. Most of today's LCD screens are thin-film transistor (TFT) active-matrix displays, meaning they have multiple transistors for each pixel.

Server Message Block

The Server Message Block (SMB) protocol provides access to shared items such as files and printers. These are actual packets that authenticate remote computers through what are known as interprocess communication (IPC) mechanisms. They can communicate directly over TCP using port 445 or by working with the NetBIOS protocol using a port between 137 and 139. This was also referred to as the Common Internet File System (CIFS) protocol.

Service Location Protocol (SLP)

The Service Location Protocol enables computers and other devices to access network services in the LAN without prior configuration. They do this with the aid of a URL; for example, service:printer:lpr://hostname or service:tftp://hostname. It works on port 427, and often uses UDP as the transport mechanism, but can also use TCP.

Print to XPS

The XPS spooler is meant to replace the standard Enhanced Metafile print spooler that Windows has used for years.

What capability are you providing by installing a network interface controller (NIC)?

The ability to access a wired or wireless network

What capability does a modem card add to a computer?

The ability to communicate over phone or data lines

When you are having a no display issue what is usually the problem

The big 4: 1. video card 2. RAM 3. processor 4. Motherboard

An employee is complaining that when he turns his lights on in the office, he can't connect to the network. With the light off his sytem works fine. What can be the problem?

The cable system is faulty

A user reports that his computer's screen is blank after he powers it on. He hears the power supply fan running and there seems to be no power issues with the computer. What do you tell the user?

The computer has incompatible memory modules or memory modules aren't installed correctly.

When parity is used, what happens when parity bit values of two data strings do no match?

The system discards the data and re-attempts the transmission.

Orientation

This is the method of positioning a printed page and is based on whether the page is going to be viewed vertically (portrait) or horizontally (landscape).

Duplexing

This means printing on both sides of the paper.

ping -l Command

This pings the host but you can specify the number of bytes per packet to be sent. If you look at the previous ping results, you can see that the default number of bytes is 32, but this can be increased to simulate real data. For example, ping -l 1500 192.168.0.1 would send four 1500-byte packets to the other host. This can also be beneficial when testing how a server, router, or other device reacts to larger packet sizes.

ping -a Command

This resolves addresses to hostname. When pinging an IP address with -a, you also see the hostname associated with the IP address.

At what frequency do Bluetooth-connected devices communicate?

2.4 GHz used by IEEE 802.11b, g, and n wireless networks, but it uses a spread-spectrum frequencyhopping signaling method to help minimize interference

How many pins does a DDR2 DIMM have?

240 pins

How many pins does a DDR3 DIMM have?

240 pins

How many pins does a DDR4 DIMM have?

288 pins

What is the maximum bandwidth of graded index multimode fiber?

2GHz

What is the minimum number of disks required for a configuration of RAID level 5?

3

An analog computer monitor connection has how many rows of pins?

3 15pins

What is the difference between 32-bit and 64-bit architectures?

32-bit CPUs can only address a maximum of 4GB of Ram while 64-bit on Visat can run up to 128 GB max depending on the version of windows its running on. Win 7 can go as high as 192 GB, Win 8.1 can prolly handle 512 GB.

The PCI Interface supports which two bus widths?

32/64

What is the maximum wattage of an 8-pin connector that provides 12 volts of power to the central processing unit (CPU)?

336 watt

What is the maximum number of MIMO streams supported by 802.11n wireless standards?

4

What are the basics of the Nano ITX?

4.7 × 4.7 inches (120 × 120 mm). It boasts low power consumption and is used in media centers, automotive PCs, set-top boxes (STBs), and personal video recorders (PVRs).

ATA33

40 Pins

What is the maximum data transfer speed in the Universal Serial Bus (USB) 3.0 standard?

5 Gigabits per second (Gbps)

You are working on a 10-user network that has frequent troubles at night. The network almost never has trouble in the daytime while the lights are off. This problem is most likely?

Incorrect cable routing

You are troubleshooting a throughput problem on an 802.11b wireless network. A user complains that as she moves about the office, her client device loses connections to network resources. The client still shows a signal received from the access point, but cannot access the network. You determine that the client signal cannot reach the access point. How would you resolve this problem?

Increase Client Radio Power

What is the defining quality of an Integrated Services for Digital Network (ISDN) connection?

It carries both voice and data over digital phone lines or public switched telephone network (PSTN) wires.

How does a Redundant Array of Independent Disks (RAID) 10 configuration work?

It combines the striping aspect of RAID 0 with the mirroring aspect of RAID 1 across four drives.

What is a defining quality of step index multimode fiber?

It contains a core surrounded by cladding, and uses total internal reflection to trap light.

What is the benefit of using plenum cable?

It does not give off poisonous gases when it burns.

What is the most defining quality of a face contact (FC) fiber optic connector?

It features a heavy duty ferrule in the center for more mechanical stability.

Print to Image

It is also possible to capture a document, web page, or even a window (or region) of the operating system as an image file. A simple example of this print-to-image technology can be found on any Windows computer simply by using the Print Screen button on the keyboard.

Which of the following is the best description of a standard connector (SC) on a fiber optic cable?

It is box-shaped and is used with single-mode fiber.

What is the 25-pin female port on the back of a PC

LPT( Line Printer)

Hardware differences between Tablets/Smartphones/Laptops

One of the big distinctions between tablets/smartphones and laptops is the lack of field-serviceable parts. Another difference is that tablets and other similar devices are usually not upgradable. Part swaps or repair is usually done in lab.

On legacy motherboards the Northbridge chipset controls the communication between the CPU and which of the choices?

Memory and PCI-E

A customer calls to say that the Windows desktop appears to be distorted. What could you do to try and isolate the problem?

Monitor can be malfunctioning & Boot computer to command prompts

Fiber Optic

Most FTTP services run over a fiber optic line to a network interface device in the home or office (specifically an optical network terminal); from there, it changes over to copper, which then makes the connection to the customer's SOHO router or individual computer. This copper connection could be a twisted-pair patch cable (for example, a Cat 6 cable) or a coaxial cable using the Multimedia over Coax Alliance (MoCA) protocol. Examples of companies that offer FTTP include Verizon (FIOS) and Google (Google Fiber).

You try to back up your DLT tape drive. You receive an error message that the tape drive is not available, this occurs even if you try a new cartridge what do you do?

Put a taper cleaner into the drive.

Quality of Service (QoS)

Quality of service is a feature that attempts to prioritize streaming media, such as VoIP phone calls and audio or video playback, over other types of network traffic.

Which filesystem would you use to support file compression on Windows 7

NTFS (New Technology File System)

802.11n Characteristics

5.0 GHz frequency 2.4 GHz frequency 500 Mbps max Speed Max range of 230ft indoors and 820 outdoors

What is the largest sized Redundant Array of Independent Disks (RAID) 0 partition you could create if you combined a 50 gigabyte (GB) drive with a 250 megabyte (MB) drive?

500 MB

802.11g Characteristics

54 Mbps Max Speed 2.4 GHz frequency Range of 300ft

802.11a Characteristics

54 Mbps max speed 5.0 GHz Frequency Range up to 165ft

What term describes the fixed resolution for liquid crystal display (LCD) or other flat panel display devices?

Native resolution

At the maximum segment length of 10 meters or (100 meters with a cat 5 cable), IEEE 1394b supports which max length?

800 mb/s 9 conductor

What standard supports speeds up to 54 Mbps in the 5 GHz frequency band.

802.11a

Which IEEE wireless LAN standards is not compatible with the standard currently known as Wi-Fi

802.11a

What standard supports speeds up to 54 Mbps in the 2.4 GHz frequency band.

802.11g

Which wireless LAN standard remains backwards compatible with 802.11b, but specifies higher data rates?

802.11g

What standard supports speeds up to 600 Mbps in the 2.4 GHz or 5 GHz frequency ranges.

802.11n

Which wireless standard can transmit at speeds up to 500Mbps

802.11n

How many pins does a FireWire 800 Institute of Electrical and Electronics Engineers (IEEE)1394B connector have?

9

Adjusting the Print Spooler service in Task Manager

Open Task Manager, right-click the taskbar, and then click Start Task Manager (or press Ctrl+Shift+Esc). Under the Services tab, right-click the Print Spooler service and select Start, Stop, or Restart service (the options vary according to your OS version).

Adjusting the Print Spooler service in Computer Management

Open the Computer Management console window, click the + sign to expand Services and Applications, and then click Services. In the right window pane, scroll until you find the Print Spooler service. To start a stopped service, right-click it and click Start.

What is a WAN?

A WAN is a group of one or more LANs over a large geographic area. Let's say a company has two LANs: one in New York and one in Los Angeles. Connecting the two would result in a WAN.

What networking device is software-based and makes decisions about whether to forward a packet based on whether the destination is part of the same LAN or another LAN?

A bridge

When formatting a large capacity drive what situation would cause it to format at a lower capacity when you set it up in an operating system?

Operating system overhead

Advanced Technology Extended (ATX)

Original ATX power supplies connect to the motherboard with a 20-pin connector. Newer ATX 12V 2.x power supplies connect with a 24-pin connector.

Which of the following video interfaces would you use for a PC gamer

PCIE

Three short beeps during POST indicates which of the following?

POST error - error code

Which Acronym best describes an item also known as mini-din(Deutsches Institut fur Normung)

PS/2

Platform as a service (PaaS)

PaaS is a service that provides various software solutions to organizations, especially the ability to develop applications in a virtual environment without the cost or administration of a physical platform. PaaS is used for easy-to-configure operating systems and on-demand computing. Often, this utilizes IaaS as well for an underlying infrastructure to the platform.

Which statement is true concerning how external conditions affect a wireless link range?

Packet error rate increases on the signal's fringe.

Which component on a printer could you check if an error code indicates a paper jam, but there is no paper in the printer?

Paper-feed sensor

Simple Mail Transfer Protocol (SMTP)

Simple Mail Transfer Protocol sends e-mail. When you send e-mail from home, it goes to an SMTP server (which has inbound port 25 open) at your ISP and is then sent off to its destination. A good way to remember this is by using the mnemonic device Send Mail To People. It is worth noting that another port (587) can be used with SMTP in the case that an ISP or other agency blocks port 25.

In which type of network model are file sharing and authentication services centrally managed?

A client-server model

What is the most accurate description of an F-connector?

A coaxial connector used to connect cable TV and FM antenna cables

When TCP/IP communications need to be routed to systems on other networks, the protocol directs the packets to a special address known as what?

A default gateway

Since sound capabilities are typically now built into the motherboard, what additional feature is often built into sound cards to help consumers justify buying them?

A digital output port

What is NOT a cause of vertical lines on a laser printer output?

A dirty fuser roller

When you power on a computer, you hear two beeps during power-on self-test (POST) and the computer never completely boots into the operating system. What is the likely cause?

A failed or failing hardware component.

A PC might instead of booting normally access the BIOS, what is the cause?

A faulty CMOS, change out the battery and the system should boot normally

Hybrid cloud

A mixture of public and private clouds. Dedicated servers located within the organization and cloud servers from a third party are used together to form the collective network. In these hybrid scenarios, confidential data is usually kept in-house.

What would a 3-pin Molex KK connector be used to power?

A motherboard fan

You recently built a computer from components and all of the components are known to be good; however, when you power on the new system, you have power but no Basic Input/Output System (BIOS) beeps and the system won't attempt to boot. All of your connections to the components are verified as good and all the components are installed correctly. What do you check as the mostly likely source of the malfunction?

A motherboard-to-case short

What single component is required for a device to connect to a network?

A network interface card (NIC)

What is used to collect information from network devices for diagnostic and maintenance purposes. This requires both a management system (the SNMP manager) as well as agent software on each device that needs to be managed.

Simple Network Management Protocol (SNMP)

Zero Day Attacks

An attacker will exploit a vulnerability in an operating system or a network security device in such a way that makes it almost impossible to defend against. Because of this, zero-day attacks are a severe threat. Actually, most vulnerabilities are discovered through zero-day attacks, and the first group of systems that are attacked have very little defense. But once the attack is detected, the development of a solution is not far behind (it could be days or even hours); the vulnerability (and attack) becomes known and is no longer zero-day.

Which networking device is hardware-based rather than software-based and forwards packets to only the destination port based on media access control (MAC) addresses?

A switch

What is a Switch?

A switch, like a hub, is a central connecting device that all computers connect to (a design known as a star topology). Like a hub, it regenerates the signal, but that's where the similarity ends. A switch sends the signal (frames of data) to the correct computer instead of broadcasting it out to every port. It does this by identifying the MAC address of each computer. This can effectively make every port an individual entity, and it increases data throughput exponentially. Switches employ a matrix of copper wiring instead of the standard trunk circuit.

Private cloud

As opposed to the public cloud, the private cloud is designed with the needs of the individual organization in mind. The security administrator has more control over the data and infrastructure. There are a limited number of people who have access to the cloud, and they are usually located behind a firewall of some sort in order to gain access to the private cloud. Resources might be provided by a third-party or could come from the security administrator's server room or data center.

What term refers to the reduction in signal strength over the distance of a cable?

Attenuation

An application has installation requirements of 1GB Ram, 2MB video memory and 15GB HD space. When you try to install the program on your laptop, it displays an error message, "Insufficient memory". You know for a fact that your system has exactly 4GB of RAm and your video card is set at 2GB. There is more than 250GB free HD available. What will resolve this error?

Add more RAM

What can you do to be certain that the wattage of a power supply will meet the needs of a computer?

Add up the power requirements of the components that the computer will use.

IP address conflicts can occur on a network when system administrators do what to workstations without performing some preparative work on the Dynamic Host Configuration Protocol (DHCP) server?

Adding static IP Addresses

Latency (magnetic disks only

After a track has been reached by the read head, latency is the delay in time before a particular sector on the platter can be read. It is directly related to rotational speed and is usually half the time it takes for the disk to rotate once. For example, our 7,200 RPM drive has an average latency of 4.2 ms (milliseconds), but a 10,000 RPM drive has an average latency of 3.0 ms.

What printer driver displays specific information about the printer itself, as well as the options that can be modified by the user?

PostScript printer description (PPD)

Which type of networking cable is also referred to as "thinnet"?

RG-58

What is currently the best cabling option for digital TV and cable connectivity?

RG-6

Alsoknown as "thicknet," was once used as a backbone cable in coaxial network installations, but is very rarely seen anymore.

RG-8

Which type of connector is sometimes referred to as "thicknet"?

RG-8

Which of the following is the defining characteristic of component video?

RGB

10BaseT uses _____ connectors?

RJ-45

UTP type cables uses which connector

RJ-45

From which location do the first instructions come from when a microcomputer is powering up?

ROM BIOS

ROM (Read Only Memory)

ROM is nonvolatile, meaning that it retains its contents, even if it is not supplied with power.

If you see streaks on a printed page, which part of the printer needs to be cleaned?

Printer Heads

A machine with one or more printers connected to it. It can manage the print queues of several different devices

Printer Server

What tool is helpful in determining where a print job is faulting?

Printer Spooler

Printer Pooling

Printer pooling takes multiple separate printers and combines them to form a team of printers that works together to complete print jobs as quickly as possible.

Parity vs Nonparity

Ram parity is when memory stores an extra bit used for "error detection" which means that the memory module can store 9 bits instead of 8 bits for every byte of data.

RAM

Random-access memory (RAM) is the main memory that the CPU uses to store or retrieve data, which can be done in any order, regardless of whatever the CPU last accessed.

What socket types are common with Intel and AMD CPUs?

Refer to table 3.1 Chapter 3

A laser printer has come due for service. You check the counter and the printer has printed roughly 20,000 pages. Which of the following steps would you take?

Refer to the Printer's Maintenance kit and follow instructions.

If your laser printer's fuser roller is warped or worn, which output symptom will you observe?

Repeating horizontal lines or white spaces

Which of the following tasks are included as part of maintaining an impact printer?

Replacing the printhead and ribbon when necessary, and removing dust from the wheels in the tractor feed

A user in your company installs a new application that includes a new updated video driver on his Windows 8 professional computer. After the installation, they restart their computer and after logging on they find that when moving windows and dialog boxes that the display is distorted. you need to find the correct video driver for the new application. Meanwhile, you need to ensure that the user can run his other applications without video distortion. What should be your response?

Roll back the driver.

CAD/CAM Workstations

Computer-aided design (CAD) and computer-aided manufacturing (CAM) workstations are common in electrical engineering, architecture, drafting, and many other engineering arenas. They run software such as AutoCAD. Don't forget, CAD/CAM computers need powerful, multicore CPUs, high-end video cards, and as much RAM as possible.

Which type of Internet infrastructure is ideal for use in smaller areas where very high data exchange is a priority?

Fiber

Of the media types listed, which has the highest bandwidth?

Fiber Optics

Fiber Optic

Fiber optic is fast and, when dealing with EMI, it's a better option than copper-based cables. Because fiber optic cables transmit data by way of light instead of electricity, they can send signals much faster and further than copper wires and EMI doesn't even play into the equation.

What would you need to connect two peer-to-peer PCs using RJ-45 connectors?

Crossover cable

A FireWire port can support 63 interconnected devices. Which choice below correctly identifies the process of connecting FireWire devices together?

Daisy Chaining

File Server

File server computers store, transfer, migrate, synchronize, and archive files. Any computer can act as a file server of sorts, but examples of actual server software include Microsoft Server, OS X Server, and the various types of Linux server versions (for example, Ubuntu Server or Red Hat Server), not to mention Unix.

Server Roles

Servers take care of centralizing data, allowing access to the network, making connections to printers, controlling the flow of e-mail, and much more. Whatever the role, the concept of the server is to do this in a centralized fashion, reducing the burden on client computers. Regardless of whether the server is in the organization's LAN or in the cloud, they will have the same purpose. However, it is more common that servers will run in a virtual environment in the cloud.

In which type of Internet access delivery does the speed of the network depend on the collective activity of the users sharing the same node connected to the Internet service provider (ISP)?

Cable

What type of cable use a miniDIN-4 connector?

Seperate S-video

The IEEE 1394 interface is related to which type of bus?

Serial

To which of the available ports does an external modem attach?

Serial

What protocol helps share resources such as files, printers, and serial ports among computers.

Server Message Block (SMB)

Which protocol works on the Application layer and helps share resources such as files, printers, and serial ports among computers?

Server Message Block (SMB)

Which type of socket uses over 2,000 copper pins and was designed to replace Socket B?

Socket R

Which Intel CPU socket type is also referred to as LGA 775?

Socket T

If you attempt to connect to a known wireless network Service Set Identifier (SSID), but receive a message that the SSID is not found, what is the problem?

Someone has changed the access poin'ts SSD

Which statement about Serial Advanced Technology Attachment (SATA) connectors is true?

All SATA cables have seven-pin connectors.

IEEE 1394

Also known as FireWire, this port is used for devices that demand the low-latency serial transfer of data, usually concerning music or video.

What do you need to do when you are removing and reinstalling a heat sink?

Always reapply thermal compound

What type of cable is used to connect a cable modem to a wall jack that provides a signal from a cable provider?

An RG-6 cable with an F-connector

At the maximum segment length of 15 Feet, IEEE 1394a supports which max length?

Standard Firewire 400mbps IEEE 1394a 4 & 6 conductor

Cable Internet how are internet connections made?

Cable Internet is a common option for home use and for SOHO networks that use a router to allow multiple computers access to the Internet via a cable. An RG-6 cable is run into the office and connected to the cable modem by way of a screw-on F-connector. The cable modem also has an RJ45 connection for patching to the router or to an individual computer's network adapter.

Which electrical instrument is used to determine if a signal is present on a network cable?

Cable tester

Which category of twisted pair cable supports a signaling rate of 250 MHz and max 10Gbps?

Cat-6

Which category of twisted pair cable supports a signaling rate of 1 GHz?

Cat-7

Which two hardware components would you suspect if a user reported to you that she frequently, but randomly, experiences shutdowns?

Central processing unit (CPU), power supply

What's the first thing you should do to secure a router?

Change the password

Equation for data transfer rate

Clock speed × bytes × 2 = Data Transfer Rate Example: 100 MHz × 8 × 2 = 1,600 MB/s Now, an easier way to solve the data transfer rate equation for all types of DDR is to simply multiply the megatransfers per second (MT/s) by 8. Why 8? Because DDR sends 8 bytes per transfer. Equation: 200 MT/s × 8 = 1,600 MB/s.

RAID 10 Level

Combines the advantages of RAID 1 and RAID 0. Requires a minimum of two disks but will usually have four or more. The system contain at least two mirrored disks that are then striped. Fault Tolerant: Yes Minimum # of disks 2 (usually 4)

What are T568A, T568B, and T568C?

Commercial cabling standards

Which protocol allows users to open and share files over the Internet in native applications rather than just in web browsers?

Common Internet File System (CIFS)

Which choice below best describes the use of CompactFlash Device

CompactFlash Device is a SSD with no moving parts capable of storing data, images, music and more. They are popular in audio and video recording applications

This device creates network boundaries for security purposes

Firewall

What is Port 80?

HTTP

What is Port 443

HTTPS

Which protocol uses TCP (Transmission Control Protocol) port 443

HTTPS

Which hardware components do power-on self-test (POST) errors in the 17xx range direct you to investigate or troubleshoot?

Hard Drives

If you hear a loud whine or squeal from your computer, which two components should you inspect as the source of the problem?

Hard disk and power supply

BIOS S2

Hard drive and monitor are powered off but the processor is also turned off, and all other hardware run normally

BIOS S1

Hardware and Monitor is off and all other hardware runs normally (power saving)

Basic Hardware of Tablets

1. 1.5 GHz ARMv8 CPU 2. 2GB LPDDR3 RAM 3. 16, 64, or 128 GB Flash Memory 4. Multi-touch Screen 5. Lithium-ion polymer battery 6. 9.7 inch display widescreen multi-touch display with in-plane switching (IPS) technology.

Basic Hardware of smartphones

1. 2.1 GHz ARMv8 CPU 2. 3 GB LPDDR4 RAM 3. 32, 64, or 128 GB Flash memory 4. Multi-touch touch screen 5. Lithium-ion polymer battery 6. 5.1 inch display

This device regenerates a signal

Hub/Repeater

If a laser printer pulls multiple paper sheets at one time, what are the possible causes?

Humidity, improper media, worn separation pad.

What is the difference between Hyper-Threading (HT) and Multicore technologies?

Hyper-Threading enables a single-core CPU to calculate two instruction sets simultaneously, whereas multicore CPUs calculate two or more instruction sets simultaneously—one instruction set per core.

Hypertext Transfer Protocol Secure (HTTPS)

Hypertext Transfer Protocol Secure sends and receives information like HTTP but includes the Transport Layer Security protocol (a successor of the Secure Sockets Layer [SSL] protocol) to encrypt the information, most commonly when making purchases/payments online or when logging in to a confidential website. The HTTPS server has port 443 open.

Which of the technologies allows a single processor chip to operate like two separate processors?

Hyperthreading

Which items of information does windows have to configure in order to utilize TCP/IP in a network?

IP / Subnet

Automatic Private IP addressing (APIPA)

IP addresses can also be self assigned by the computer and it occurs when a computer cannot contact a DHCP server to obtain an IP address. When APIPA self-assigns an address, it will be on the 169.254.0.0 network. Addresses on this network are also known as link-local addresses.

Liquid crystal display (LCD) monitors use either Twisted Nematic (TN) or In-Plane Switching (IPS) technology. What advantage does IPS offer over NT?

IPS provides better color reproduction and better viewing angles.

ITX

ITX is a group of form factors in small, low-power motherboards

Infrastructure as a service (IaaS)

IaaS is a service that offers computer networking, storage, load balancing, routing, and VM hosting. More and more organizations are seeing the benefits of offloading some of their networking infrastructure to the cloud.

Which of the following tests checks the transmit and receive functions of a local modem?

Local Digital Loopback

Which type of fiber optic connector uses a latch and can be used to transition installations from twisted pair copper cabling to fiber?

Local connector (LC)

A page from a laser printer has a vertical white streak. What is the most probable fault?

Low Toner

You are installing the Hyper-V Virtual Machine Manager on your Windows 7 System. An error message is displayed and you cannot continue. What could be the Cause?

Machine does not support Virtual Machine & Hardware Virtualization is not setup in BIOS"

Error Correction Code (ECC) vs Non-ECC

ECC in RAM can detect and correct errors.

What are the three ways to configure spooling

1. Adjust the print spooler service in computer management 2. Adjusting the Print Spooler service in Task Manager 3. Adjusting the Print Spooler service in the Command Prompt

What is the key attribute of Internet Message Access Protocol (IMAP) that makes it different from Post Office Protocol 3 (POP3)?

Emails are stored on a remote server until the user deletes them.

Sound Card POrts

1. Light Blue: line input, 2nd microphone input 2. Pink: Microphone input 3. Lime green: Main output for stero speakers or headphones, act as a line out 4. Black: output for surround sound speakers (rear speakers) 5. Silver/Brown: Output for additional two speakers in a 7.1 system (middle speakers)

Name some ways a lap top can communicate with other computers?

1. wired ethernet 2. wireless ethernet 3. bluetooth 4. Infrared (IR) 5. cellular WAN 6. dial up modems

What is the maximum data transfer speed in the Universal Serial Bus (USB) 3.1 standard?

10 Gbps

What is the maximum number of FireWire busses that can be linked together?

1024

802.11b Characteristics

11 Mbps Max Speed 2.4 GHz frequency Range of 300ft (new standards make this standard obsolete)

What is the typical voltage provided by an office or home receptacle

120 VAC

The reserved IP address that is used to refer to yourself is?

127.0.0.1

What is the maximum throughput of the PCI bus?

132 Mb/sec

The 802.11b and 802.11g specifications define 14 channels within the 2.4 GHz Wi-Fi band. Each channel is composed of a range of frequencies transmitting at low power, rather than a single frequency transmitting at high power.

14

How many pins are on a VGA monitor?

15

What is the maximum supported distance of a single FireWire segment?

15 Ft

Which of the following addresses are assigned with Windows Automatic IP addressing?

169.254.1.22

What is the maximum capacity of a double-sided dual layer digital versatile disc (DVD)?

17.1 GB

Select the public IPv4 address space from the choices provided

173.16.0.0 - 173.31.255.255

Which of the following is an example of a network address that is using the classless inter-domain routing (CIDR) addressing method?

192.168.1.100/21

What is a MAN?

There is a smaller version of a WAN known as a metropolitan area network (MAN), also known as a municipal area network. This is when a company has two offices in the same city and wants to make a high-speed connection between them. It's different from a WAN in that it is not a large geographic area, but it is similar to a WAN in that a telecommunications company is needed for the high-speed link.

In what way does Dynamic Network Address Translation (DNAT) differ from static NAT?

There is not a one-to-one ratio of internal to external addresses.

In Device Manager, how can you tell that an expansion card has been installed, but that there is a problem with the hardware or drivers?

There will be a yellow exclamation mark associated with that hardware.

How do light-emitting diode (LED) backlights compare to cold cathode fluorescent lamp (CCFL) backlights?

They are lighter, cheaper, brighter, and have a longer lifespan.

Video Cards

They have a processor, known as a graphics processing unit (GPU), and a substantial amount of RAM

What term is used to describe a computer that performs most or all computing functions on its own and runs applications that are installed locally?

Thick Client

Punchdown tool

This device punches the individual wires down into the 110 IDC clips of an RJ45 jack and the patch panel. This "punching down" of the wires is the actual termination.

ping -4 Command

This forces the use of IPv4 and results in IPv4-based data. For example, in Windows, if you are running both IPv4 and IPv6 and type a command such as ping loopback, your results will by default be IPv6-based and might read Reply from ::1 (that is, if your system is working properly). But by adding the -4 option, you force the use of IPv4, so the command ping -4 loopback can result in Reply from 127.0.0.1.

ping -6 Command

This forces the use of IPv6 and results in IPv6-based data.

Purging

aka Sanitizing this is again the removal of data, but this time, it's done in such a way so that it cannot be reconstructed by any known technique (in this case, the media is released outside the company). Special bit-level erasure software (or other means) is employed to completely destroy all data on the media. This type of software will comply with the U.S. Department of Defense (DoD) 5220.22-M standard, which requires seven full passes of rewrites. It is also possible to degauss the disk, which will render the data unreadable but might also cause physical damage to the drive. Tools such as electromagnetic degaussers and permanent magnet degaussers can be used to permanently purge information from a disk.

Charging

aka conditioning A negative charge is applied to the drum by the primary corona wire, which is powered by a high-voltage power supply within the printer.

Exposing

aka writing The laser is activated and "writes" to the drum as it spins. Where the laser hits the drum, it dissipates the negative charge toward the center of the drum that is grounded. The "exposed" areas of the drum now have a lesser negative charge.

File Transfer Protocol (FTP)

allows computers to transfer files back and forth. When you connect to an FTP server, that FTP server will have port 21 open. Some type of FTP client software is necessary to connect to the FTP server; this could be done in the command line within the FTP shell or by using a GUI-based application (such as FileZilla).

PCI (Peripheral Component Interconnect)

allows for connections to modems and to video, sound, and network adapters; however, PCI connects exclusively to the southbridge, or main chipset. Because of this, other high-speed video alternatives were developed that could connect directly to the northbridge, or directly to the processor.

Which statement about Solid State Hybrid Drives (SSHDs) is accurate?

The disk caches the most frequently accessed bits to high-speed flash memory, which will change over time.

Port forwarding (aka Destination NAT -DNAT)

This forwards an external network port to an internal IP address and port. This enables you to have a web server, FTP server, and other servers, but you need to have only one port for each open on the WAN side of the router. It can be any port you like; of course, you would need to tell people which port they need to connect to if it is not a standard one. Some devices use what are called virtual servers, making the process a lot more user-friendly. So, for example, you might have an FTP server running internally on your LAN; its IP address and port might be 192.168.0.100:21 (notice how the colon separates the IP address from the port), but you would have users on the Internet connect to your router's WAN address (for example, 65.43.18.1) and any port you want. The router takes care of the rest, and the forwarding won't be noticed by the typical user. Port forwarding is also referred to as destination NAT (DNAT).

You hear loud clicking noises that seems to originate from your system's primary hard drive. How do you troubleshoot this problem?

Turn off power management to the drive

What is the defining characteristic of User Datagram Protocol (UDP)?

UDP is a connectionless best-effort delivery protocol in the Transport layer protocol of the Internet protocol suite.

What helps Wi-Fi-enabled devices to be easily discoverable by the router.

Universal Plug and Play (UPnP)

Universal Plug and Play (UPnP)

Universal Plug and Play is a group of networking protocols that allows computers, printers, and other Internet-ready devices to discover each other on the network. It is a consumer-level technology designed to make networking easier for the user.

USB

Universal Serial Bus ports are used by many devices, including keyboards, mice, printers, cameras, and much more. Most of today's motherboards come with at least a couple USB 3.0 ports that have a maximum data transfer rate of 5 Gb/s (or even faster USB ports) but will also come with several USB 2.0 ports that have a maximum data rate of 480 Mb/s.

Which of the following events increase the chances of a motherboard failure?

Updating BIOS & adding serial mouse while the power is on

To keep an AC outlets voltage steady

Use a uninterruptible power supply (UPS) or other line conditioning device between the computer and the AC outlet

Which type of workstation would benefit a user who needs access to a variety of operating system-specific applications on the same machine?

VM

A customer calls and says that her computer will not boot. The customer reports that she can hear the fan and drives running and the lights on the box are lit but the screen is blank. Which components would you take to the site to fix the problem?

Video card & Monitor

You just purchased a widescreen flat panel display. The old monitor was configured at 800x600 resolution. You install the new display and it works properly, but when you try to change the resolution setting to the recommended 1280 x 768 the resolution is not available. What is the problem?

Video memory is too slow

Which computer configuration would benefit most from using multi-core processors and maximum RAM?

Virtualization

VoIP Phones

Voice over Internet Protocol (VoIP) is a collection of technologies, devices, and protocols that allows voice communication over IP-based networks.

Multimode Cable

cables have a larger core diameter—either 50 microns (millionths of a meter) or 62.5 microns in diameter—than single-mode cables. The 50-micron version can handle three times the bandwidth and can support longer cable runs than the 62.5-micron version. It is the more commonly used fiber optic cable in server rooms and when making backbone connections between buildings in a campus. It transmits data approximately 600 meters.

Check Disk (chkdsk command)

can check for bad clusters on the drives and confirm the integrity of the file system. If errors are present it will attempt to repair the bad sectors.

Intrusion Detection System (IDS)

can determine whether an unauthorized person has attempted to access the network and then alert the systems administrator of its findings. In this case, an admin is alerted to the problem but the unauthorized user might actually gain access to the network; the damage might be done before the admin has a chance to rectify the situation.

Disk Defragmenter (defrag command)

can help when clusters on your hard drive become fragmented. Fragmentation occurs when a volume is accessed to save, change, or delete files.

Older SATA drives

can run on a newer SATA controller; however, data transfer will be limited to the speed of the drive, not the controller.

The northbridge is used by the CPU to?

communicate with system memory (RAM). Remember that on newer Intel motherboards, the northbridge functionality is built into the CPU.

BIOS S5

computer has been shut down normally and will boot normally opening any services an applications that were configure to run on startup.

A WMC computer is having display problems. How can you adjust the graphics hardware acceleration so that you can troubleshoot the problem?

control panel > system > advanced > Performance

What storage component contains flash memory and a flash memory controller integrated onto the same silicon die?

eMMC(embedded Multimedia Controller)

What does an External Serial Advanced Technology Attachment (eSATA) interface allow you to do?

eSATA specification, which defines an external connector for the same SATA signalling conventions. This allows external powered hard drives to be attached to a PC's internal SATA controller

Hyper-Threading (HT)

enables a single CPU to accept and calculate two independent sets of instructions simultaneously, thereby simulating two CPUs. Don't confuse Hyper-Threading with HyperTransport used by AMD. HyperTransport is a high-speed, low-latency, point-to-point link that increases communication speeds between various devices (such as the CPU and the northbridge).

gpupdate command

executing the gpupdate command will cause the computer to refresh both its local and Active Directory Group Policy Settings. Only the updated Group Policy settings are updated using this command.

EXE

files that end with a .exe extension are commonly known as executable files. These files are most often found on DOS and Window based platforms. They can also contain other files such as bitmaps and icon files for a GUI

To access the firewall in the run prompt by typing

firewall.cpl

How do you troubleshoot and repair a system infected with spyware?

first disconnect the system from the Internet. Then try uninstalling the program from Control Panel > Programs and Features in Windows. Some of the less malicious spyware programs can be fully uninstalled without any residual damage. Be sure to reboot the computer afterward and verify that the spyware was actually uninstalled! Next, scan your system with the AV software to remove any viruses that might have infested the system and might get in the way of a successful spyware removal. Again, do this in Safe Mode if the AV software offers that option. Next, scan the computer with the antispyware software of your choice in an attempt to quarantine and remove the spyware. You can use other programs, such as HijackThis, in an attempt to remove malware, but be careful with these programs because you will probably need to modify the Registry. Remove only that which is part of the infection. Finally, you need to make sure that the malware will not reemerge on your system. To do this, check your home page setting in your browser, verify that your host's file hasn't been hijacked (located in C:\WINDOWS\system32\drivers\etc), and make sure unwanted websites haven't been added to Trusted Sites within the browser.

Just remember that (chapter 17)

folders automatically inherit from the parent unless you turn inheriting off—and you can propagate permission entries to subfolders at any time by selecting the Replace option.

Switch

is a network device that acts as a common connection point for various nodes or segments. Switches are responsible for forwarding data from the source to only the nodes or segments to which they are addressed. Although a switch may plug into a patch panel, it is not used to terminate Ethernet cable runs

Storage Area Network (SAN)

is a network which provides access to consolidated, block level data storage. SANs are primarily used to enhance storage devices, such as disk arrays, tape libraries, and optical jukeboxes, accessible to servers so that the devices appear to the operating system as locally attached devices.

Patch Panel

is a networking device that is used to terminate Ethernet cable runs.

Windows Firewall

is a piece of software that can be configured to allow or disallow network traffic by filtering packets with Access Control Lists (ACL). You can enable/disable ports and programs from communicating on and through the network

Port triggering

is a process in which one port is automatically opened when communication occurs on another port. This ensures that ports are not open at unnecessary times, reducing the chances This enables you to specify outgoing ports .that your computer uses for special applications, and their corresponding inbound ports will be opened automatically when the sessions are established. This is helpful for things like bit torrents

Port Filtering

is a process that you can use to control whether ports are open or closed. Applications and protocols use specific ports. By filtering ports, you can manage which applications and protocols can be used on a network at any given time.

Serving Routing Protocol (SRP)

is a proprietary protocol used by Blackberry Limited within a Blackberry Enterprise infrastructure to manage blackberry devices such as receiving ypdates, performing remote maintenance, and backing up data remotely to a centralized backup server.

Secure/Multipurpose Internet Mail Extensions (S/MIME)

is a protocol that allows a mail server to encrypt and digitally sign an e-mail. This ensures that the contents of the email and the person who sent the email are unaltered in transit

User Account Control (UAC)

is a security component of Windows that keeps every user (besides the actual Administrator account) in standard user mode instead of as an administrator with full administrative rights—even if the user is a member of the administrators group. It is meant to prevent unauthorized access and avoid user error in the form of accidental changes. With UAC enabled, users perform common tasks as nonadministrators and, when necessary, as administrators, without having to switch users, log off, or use Run As.

Network Controller

is a server that acts as a central repository of user accounts and computer accounts on the network. All users log in to this server. An example of this would be a Windows Server system that has been promoted to a domain controller (meaning it runs Active Directory). These servers are one type of authentication server—they serve to validate the user that is attempting to log on.

Software Development Kit (SDK)

is a set of tools or sample programming code that can assist developers in the creation of applications. An SDK can contain a ventral programming interface, a compiler for the code, and technical documentation.

Spike

is a short transient in voltage that can be due to a short circuit, tripped circuit breaker, power outage, or lightning strike.

System Refresh

is a tool included in windows to which allows the users to reinstall windows but keep their personal files and store applications intact.

System Reset

is a tool included in windows which allows the user to completely reinstall their current version of windows. Personal files would not remain intact

Active Directory

is a tool used for authentication and directory lookup. In a domain network, all users and other resources can be added to Active Directory on a domain controller. This directory service allows users to log onto a particular station and then have centrally defined and controlled access to all network resources that are made available to them.

Common Internet File System (CIFS)

is a version of Server Message Block (SMB) that helps to provide shared access to components on a network. It enables you to share files and devices, such as printers and scanners, between network nodes. CIFS is not used to access contact details or a list of devices on a server or database.

WiMAX (Worldwide Interoperability for Microwave Access)

is an IEEE 802.16 wireless technology that offers high-speed connections (up to a gigabit) but over much larger distances than a standard Wi-Fi access point reaches—on average, 50 kilometers. So if your organization is within 50 km of an urban area, it might be able to connect its LAN to the Internet at high speed in a completely wireless fashion. There are individual WiMAX modems for laptops and PCs and gateway devices for entire LANs. For an optimal connection, these gateways (or routers) will usually be placed on a window sill facing where the signal is coming from

Demilitarized zone (DMZ)

is an area that is not quite on the Internet and not quite part of your LAN. It's a sort of middle ground that is for the most part protected by a firewall, but particular traffic will be let through. It's a good place for web servers, e-mail servers, and FTP servers because these are services required by users on the Internet. The beauty of this is that the users will not have access to your LAN—if it is configured correctly, of course. Quite often, the DMZ is set up as the third leg of a firewall. The first leg connects to the LAN, the second leg connects to the Internet, and the third connects to the DMZ. You need to know the ports that your servers will use and create rules within the firewall (or an all-in-one device, such as a SOHO router) to allow only the required traffic into the DMZ.

extract Command

is an external command used to extract files located within a cabinet file, stored on external media, to a destination on a hard disk. With the use of the /A switch, the command will first search for the cabinet file specified and then any other cabinet file located will also be extracted

Sag

is an unexpected decrease in the amount of voltage provided which can cause a brown out ( causes lights to dim or computer to shut off)

Apple Filing Protocol (AFP)

is apple's version of Server Message Block (SMB). It is tailored to work specifically with the file system of the MAC OS. It provides file sharing capabilities as well as many other file services to Apple clients. AFP is not used to access contact details or a list of devices on a server or database.

Malware

is software designed to infiltrate a computer system and possibly damage it without the user's knowledge or consent. Malware is a broad term used by computer professionals to include viruses, worms, Trojan horses, spyware, rootkits, adware, and other types of undesirable software.

SDRAM (Synchronous DRAM)

is synchronized to the base clock of the motherboard (also referred to simply as "bus speed").

COPY Command

is the predecessor to the XCOPY command. Like the MOVE command, it is used to copy files between individual directories; however, the difference is the COPY command will leave the original file within the source directory. One of its limitation is it cannot be used to copy data that spans multiple directories

Encryption

is the process of converting information with the use of a cipher (algorithm), making it unreadable by other users unless they have the correct "key" to the information. Cryptography is the practice of hiding information. In a cryptosystem, information is protected by disguising it.

Network address translation (NAT)

is the process of modifying IP addresses as information crosses a router. Generally, this functionality is built into a router. It hides an entire IP address space on the LAN (for example, 192.168.0.1 through 192.168.0.255). Whenever an IP address on the LAN wants to communicate with the Internet, the IP is converted to the public IP of the router (for example, 68.54.127.95) but it will be whatever IP address was assigned to the router by the ISP. This way, it looks like the router is the only device making the connection to remote computers on the Internet, providing safety for the computers on the LAN. It also allows a single IP to do the work for many IP addresses in the LAN.

Graphics Processing Unit (GPU)

is the processor for video, it is part of the chipset and utilizes RAM as shared video memory

Net Command

net command is actually a collection of commands. we used the net stop command to stop the print spooler. In networking, you might use the net view command to see which computers are currently available on the network or the net share command to share folders and for other users to view.

Netstat

netstat shows the network statistics for the local computer. The default command displays sessions to remote computers.

Microsoft Installer (MSI)

now known as "Windows Installer", is used to facilitate the installation, removal, and maintenance of software. A .msi file contains the graphical interface used when installing a program, rollback instructions in case the installation is unsuccessful, and instructions for generating uninstall procedures for removing the program once installed

tracert Commad

short for trace route, builds on ping in that it send packets to destinations beyond the local computer's network. It pings each router along the way between you and the final destination. The output displays the number of hops to reach the destination and the response time for each hop.

Disk Management

shows you the status of every drive in your system. The status can show whether a drive is online, offline, or if it has failed.

Thermal Design Power (TDP)

signifies the amount of heat generated by the CPU, which the cooling system is required to dissipate when operating with a complex workload. This number is nominal; it could be more or it could be less, depending on CPU usage,

Worm

similar to virues expect that it self replicates; whereas a virus does not

What are the basics of Mobile ITX?

smallest of the four ITX form factors, measuring 60 mm × 60 mm. There are no ports and it requires a secondary I/O board. It is intended for military use, surveying, transportation, and medical markets and is used in UMPCs and smartphones.

Rootkit

software designed to gain administrator-level control over a computer system without being detected

Data Loss Prevention (DLP)

software is designed to detect and prevent breach of sensitive data. DLP Software will detect and block data while it is in use, on the network, and in storage. Used to protect sensitive digital documents from being leaked or accessed by unauthorized users.

Uninterruptible Power Supplies (UPS)

takes the functionality of a surge suppressor and combines that with a battery backup. The computer is now protected not only from surges and spike but also from sas, brownouts, and blackouts. DO NOT CONNECT LASER PRINTERS to the UPS or it can be overloaded.

Redundant Array of Independent (or inexpensive) Disks. (RAID)

technologies are designed to increase the speed of reading and writing data, to create one of several types of fault-tolerant volumes, or both. Fault tolerance is the capability of the hard drive system to continue working after there is a problem with one of the drives.

BitLocker software is based on?

the Advanced Encryption Standard (AES) and uses a 128-bit key. Keep in mind that a drive encrypted with BitLocker usually suffers in performance compared to a nonencrypted drive and could have a shorter shelf life as well.By default, BitLocker is used to encrypt the internal drive of a system. However, you can also encrypt USB drives and other removable devices by using BitLocker To Go.

Spam

the abuse of electronic messaging system such as email, broadcast media, and Instant messaging

Clock Speed

the frequency of the CPU

Hard Disk Drives

the most common of magnetic media, they are nonvolatile, which means any info stored on them cannot be lost when the computer is turned off.

msconfig Command

the msconfig utility's startup tab shows all of the items identified to run during setup. To aid in troubleshooting all of the items or any individual selections may be disabled or enabled as the technician sees fit to match the troubleshooting scenario

Web Server

the one that houses the website of an organization. Examples of web servers include Microsoft's Internet Information Services (IIS), Apache HTTP Server (Linux), lighttpd (FreeBSD), and iPlanet Web Server Sun (Oracle).

Rotational Speed (magnetic disks only)

the platters in the example hard drive can rotate at a maximum of 7,200 RPM, which is common; other typical speeds for hard drives include 5,400 RPM (slower access time) and 10,000 RPM (faster access time).

What is Flashing the BIOS mean?

the process of erasing the BIOS firmware and rewriting it with a new version of the BIOS aka Updating the BIOS

Command Line Interface (CLI)

there are many command-line tools that we can use in Windows to help us troubleshoot situations

Secure Digital Cards (SD)

they are solid-state, they use NAND memory, and they have most of the same pros and cons as a USB flash drive.

Telecommunication Network (Telnet)

this provides remote access to other hosts using the command-line interface (CLI). It uses port 23 but is an insecure and somewhat deprecated protocol. However, because some companies might still use it to access routers and other hosts, you might see a question about it on the exam.

802.11 Wireless

this type of wireless connectivity is known as Wi-Fi or wireless LAN (WLAN). The Institute of Electrical and Electronics Engineers (IEEE) developed the 802.11 series of protocols. These define the various speeds, frequencies, and protocols used to transmit data over radio waves in small geographic areas using unlicensed spectrums.

What would installing a cellular card allow a computer to do?

Access 3G or 4G networks

Types of Clouds

1. Public Clouds 2. Private Clouds 3. Hybrid Clouds 4. Community Clouds

During laser printing, what charge is placed on the drum during the conditioning phase?

-600V

Common File Transfer Protocol

-FTP -TFPT -SFTP -SCP -FTPS -SMB (WINDOWS) -NFS (UNIX)

Web Protocols

-HTTP -HTTPS -TLS -SSL

Network Types

1. LAN 2. WAN 3. PAN 4. MAN

Common Media and VoIP Unified Communications

-RTP -RTSP -RTCP -SIP -MGCP -H.323

Common Email Protocols

-SMTP (sending) -POP3 (receiving) -IMAP (receiving)

Common Management Protocols

-Telnet -SSH -SNMP -RDP

4 Pin color Red

...wtf is this

How many devices per channel does a SATA connection support?

1

What is the maximum number of MIMO streams supported by 802.11g wireless standards?

1

When a parallel port communicates information to a device, how is it done?

1 byte at a time

What are the only three channels in the 2.4 GHz Wi-Fi spectrum that do NOT overlap with each other?

1, 6, and 11

What components are necessary for BitLocker Encryption?

1. A Trusted Platform Module (TPM): A chip residing on the motherboard that actually stores the encrypted keys. OR 2. An external USB key to store the encrypted keys. 3. A hard drive with two volumes, preferably created during the installation of Windows. One volume is for the operating system (most likely C:) that will be encrypted; the other is the active volume that remains unencrypted so that the computer can boot. If a second volume needs to be created, the BitLocker Drive Preparation Tool can be of assistance

What is the Laser Printer Imaging Process?

1. Processing 2. Charging 3. Exposing 4. Developing 5. Transferring 6. Fusing 7. Cleaning

What are the PC tools in a technicians workbox?

1. Antistatic strap: protects from electrostatic discharge 2. Demagnetized Phillips head: for (dis)assembling PCs 3. Multimeter: for testing PCs power supply and AC outlets 4. Power Supply Tester: for testing PCs power supply 5. Torx Scredriver: for (dis)assembling computers that use the less common torx screw 6. Hex screwdriver: for cases that do not use phillips 7. Plastic Tweezer: for grabbing screws in difficult to reach areas and removing jumper shunts 8. Compressed Air: cleans dust from the computer (outside only) 9. Penlight: helps illuminate when working inside the computer or dark desk 10: Magnifying glass: helps to read small writing on components and locate damage to circuits or chips

Types of Printers

1. Laser Printers 2. Inkjet Printers 3. Thermal Printers 4. Impact Printers

Printer Maintenance

1. Laser: Replace toner, apply maintenance kit, calibrate, clean. 2. Inkjet: Clean heads, replace cartridges, calibrate, clear jams. 3. Thermal: Replace paper, clean heating element, remove debris. 4. Impact: Replace ribbon, replace print head, replace paper.

1. CD-ROM, 2. CD-R, 3. CD-RW

1. CD-Roms can be read from 2. You can write to CD-Rs 3. You can write/rewrite to CD-RWs

Category UTP

1. Category 3 10Mb/s networks 2. Category 5 100 Mb/s and 1 Gb/s Network (100MHz) 3. Category 5e 100 Mb/s and 1 Gb/s networks (100 MHz/350 MHz) 4. Category 6/6a 1000 Mb/s and 10 Gb/s networks (250 MHz/500 MHz) 5. Category 7/7a 1000Mb/s and 10 Gb/s network (600 MHz/1000 MHz)

Troubleshooting Video Issues 12 Steps

1. Check Connections 2. Power cycle the computer, display, and any power protection equipment. 3. Check for onboard video setting in the UEFI/BIOS 4. Resolution Setting 5. Check the driver 6. Check the version of DirectX 7. Check the temperature threshold of the video card 8. Use software to check and repair stuck or dead pixels 9. Calibrate the monitor 10. Use a filter on the monitor 11. Check for newly installed applications 12. Check inside the computer

Installing video cards

1. Check to see if card is compatible 2. Ready the computer 3. Ready the video card 4. Document 5. Prepare the slot 6. Install the card to the slot 7. Connect cables 8. Test 9. Install the driver 10. Test Again

CompTIA recommended procedure for the removal of malware in general:

1. Identify malware symptoms. 2. Quarantine infected systems. 3. Disable system restore (in Windows). 4. Remediate infected systems. a. Update antimalware software. b. Use scan and removal techniques (for example, Safe Mode and preinstallation environment). 5. Schedule scans and run updates. 6. Enable system restore and create restore point (in Windows). 7. Educate end users.

What are the SIX steps to Troubleshooting?

1. Identify the Problem 2. Establish a theory of probable cause (question the obvi) 3. Test the theory to determine cause 4. Establish a plan of Action to resolve the problem and implement a solution 5. Verify full system functionality and if applicable implement preventative measures 6. Document findings, actions, and outcomes

How do you update (flash) the BIOS?

1. Identify what BIOS is running 2. Download the BIOS from the WEB 3. Select your method of BIOS updating 4. Flash the BIOS

Name the group of form factors for ITX

1. Mini ITX 2. Nano ITX 3. Pico ITX 4. Mobile ITX

Power Connectors Types and Voltages

1. Molex: case fans, IDE hard dirves, & optical drives. Red (5V), black (G), black (G), and yellow (12V) 2. SATA: Serial ATA hard drives and optical drives. 15-pin, 3.3 V, 5V, and 12V. 3. PCIe: PCI Express video cards. 6-pin, 12V (ATX12V Ver 2.1) 8-pin, 12V (ATX12V Ver 2.2 and higher)

Network Fundamentals Open System Interconnection (OSI) Model

1. Physical/Please 2. Data Link/Do 3. Network/Not 4. Transport/Throw 5. Session/Sausage 6. Presentation/Pizza 7. Application/Away

How do you replace a keyboard?

1. Shut down laptop and disconnect battery. Employ ESD measures. 2. Remove the trim or cover 3. Remove the screws 4. Disconnect the keyboard 5. Replace the keyboard 6. Test the keyboard

What are the 3 types of Cloud Computing Services

1. Software as a service (SaaS) 2. Infrastructure as a service (IaaS) 3. Platform as a service (PaaS)

Properties of Fiber Optic Connectors

1. Straight Tip ST- Bayont 2. Ferrule Connector FC- Threaded/Screw In 3. Standard Connector SC & Local Connector LC- push-pull/snap in 4. Mechanical Transfer Registered Jack MT-RJ Jack

Power over Ethernet devices

1. The power sourcing equipment (PSE), which could be a switch or other similar device. 2. The powered device (PD), which as we mentioned could be an IP-based camera (or WAP) and also an IP phone, IPTV device, router, mini network switch, industrial device, lighting controller, and more.

Inkjet Printers

1. Thermal inkjet 2. Piezoelectric inkjet

Two types of LCDs?

1. Twisted nematic (TN): This technology uses liquid crystals that actually twist and untwist at varying angles, letting certain amounts of light through. Less expensive LCD monitors will often use TN technology. In-plane switching 2.(IPS): This technology aligns the liquid crystals on a plane that is parallel to the glass. Because of this, an additional transistor is required for each picture element (pixel). This means that it uses more power than a TN-based LCD. However, it allows for better color reproduction and wider viewing angles. All this comes at a higher cost, of course.2.

If you are connected to the internet through a Hot Spot, what connection speed can you generally anticipate?

2 - 11 Mbps

Computer component to the voltage it uses

5V: PCIe cards, disks, AGP (accelerated graphics port) 3.3V: AGP, Chipsets 12V: PCIe cards, CPUs, Motors

What are the basics of the Mini ITX?

6.7 × 6.7-inch (17 × 17 cm) motherboard is a bit smaller than microATX and is screw-compatible, enabling it to be used in microATX and ATX cases if so desired. The original version used passive cooling to keep it quiet and to conserve power, making it ideal for HTPCs; newer versions use active cooling due to the more powerful processors involved. The first version of these boards came with one expansion slot: PCI. The second version comes with a single PCIe x16 slot. Ram Slot and Expansion slots are perpendicular to each other 90*

What is the maximum data throughput supported by the 802.11n standard?

600 Mbps

What is a LAN?

A LAN is a group of computers and other devices usually located in a small area: a house, a small office, or a single building. The computers all connect to one or more switches, and a router allows the computers access to the Internet.

Firewall

A firewall is any hardware appliance or software application that protects a computer from unwanted intrusion.

Homegroup

A homegroup is a group of PCs on a home network that can share files and printers. Using a homegroup makes sharing easier. You can share pictures, music, videos, documents, and printers with other people in your homegroup.

Repeater/Extender

A repeater or extender is a device used to lengthen the signal farther than it was designed to go originally. For example, a standard wired LAN connection from a switch can transmit data 328 feet (100 meters), but a repeater could increase that distance by as much as two times. There are repeaters for wireless access points as well that can increase the range of your overall wireless network.

Which of the following devices is example of a wireless access point (WAP)?

A router

Router

A router is used to connect two or more networks to form an internetwork. They are used in LANs and WANs and on the Internet. This device routes data from one location to another, usually by way of IP address and IP network numbers.

Cleaning

A rubber blade removes excess toner from the drum as it spins. An erasing lamp removes any leftover charge on the drum, bringing it to zero volts. The printer is now ready for another print job.

What type of printer produces images from melted ink sticks?

A solid ink printer

Thick Client

A standard thick client, or fat client, is effectively a PC. Unlike a thin client, a thick client performs the bulk of data processing operations by itself and uses a drive to store the OS, fi les, user profi le, and so on. With a thick client, a typical local area network of PCs would be known as distributed computing, where the processing load is dispersed more evenly among all the computers. A standard thick client runs desktop applications such as Microsoft Office and meets the manufacturer's recommended requirements for the selected operating system. The majority of processing takes place on the thick clientitself.

Static Addresses

A static IP address is an IP address that was manually configured for a device, versus one that was assigned via a DHCP server. It's called static because it doesn't change. It's the exact opposite of a dynamic IP address, which does change.

In which of the following scenarios is Self-Monitoring, Analysis, and Reporting Technology (S.M.A.R.T.) NOT effective?

A sudden, catastrophic disk failure

Thin Client

A thin client (also known as a slim, lean, or cloud client) is a computer that has few resources compared to a typical PC. Usually, it depends heavily on a server. Some thin clients are also known as diskless workstations because they have no hard drive or optical discs. They do have a CPU, RAM, and ports for the display, keyboard, mouse, and network; they can connect wirelessly as well. They are also known simply as computer terminals which might provide only a basic GUI and possibly a web browser. Example: POS systems. When a typical thin client is turned on, it loads the OS and applications from an image stored (embedded) on fl ash memory or from a server. The OS and apps are loaded into RAM; when the thin client is turned off, all memory is cleared, which makes it hard for viruses to stick around. A thin client runs basic, single-purpose applications, meets the minimum manufacturer's requirements for the selected operating system, and requires network connectivity to reach a server or host system where some, or even the majority, of processing takes place.

What happens during the developing step of the laser printing process?

A thin layer of toner is attracted to the areas of the drum that were hit by the laser light.

What device emits a beeping sound when it detects a signal in a pair of wires?

A tone probe

Wireless Access Point (WAP)

A wireless access point (WAP) enables data communications over the air when your computer is equipped with a wireless networking adapter. The WAP and the wireless networking adapter transmit data over radio waves either on the 2.4 GHz or 5 GHz frequencies.

Virtualization Workstation

A virtualization workstation is a computer that runs one or more virtual operating systems (also known as virtual machines or VMs) if you build a workstation specializing in virtualization, you can run whatever operating systems on it that you need. The virtualization workstation uses what is known as a hypervisor, which allows multiple virtual operating systems (guests) to run at the same time on a single computer. It is also known as a virtual machine manager (VMM). But there are two different kinds: ▶ Type 1: Native: This means that the hypervisorruns directly on the host computer's hardware. Because of this, it is also known as bare metal. Examplesof this include VMware vSphere and Microsoft Hyper-V. ▶ Type 2: Hosted: This meansthat the hypervisor runs within (or "on top of") the operating system. Guest operating systems run within the hypervisor. Compared to Type 1, guests are one level removed from the hardware and therefore run less effi ciently. Examples of this include Microsoft Virtual PC and Oracle VirtualBox. Figure 13.2 shows an example of VirtualBox. You will note that it has a variety of virtual machines inside, such as Windows 7, Windows Server, and Linux Ubuntu. Any computer designed to run a hypervisor often has a powerful CPU (or multiple CPUs) with four cores or more and as much RAM as can fi t in the system. This means a powerful, compatible motherboard as well. So in essence, the guts—the core of the system—need to be robust. Keep in mind that the motherboard BIOS/UEFI and the CPU should have virtualization support.

When troubleshooting drive errors, such as read and write errors, you might find that your hardware checks out as fully functional, but you still experience errors. What do you look at as the probable cause of the errors?

A virus infection

Mobile Device Ports and Connection types?

A whole lot of the tablets and smartphones out there use micro-USB wired connections for charging and synchronization. In the world of Apple and iOS—in which these devices have always used proprietary ports (for example, the Lightning connector) that aren't compatible with micro-USB.

ADSL (Asymmetrical Digital Subscriber Line)

ADSL enables transmission over copper wires that is faster than dial-up. It is generally geared toward the consumer that requires more downstream bandwidth than upstream. Because the downloading and uploading speeds are different, it is known as an asymmetric technology.

Form Factors

ATX, microATX, and ITX

Embedded Multi-Media Card (eMMC)

An internal storage technology for smartphones and tablets using the MultiMedia Card standard. Supporting error correction in hardware (see ECC memory), an eMMC chip contains a controller and flash memory. See embedded flash and MMC.

In an Internet Protocol version 6 (IPv6) address, what does a (double-colon) :: represent?

An unbroken string of zero values

An inbound modem converts

Analog to digital

Patch tester

Before connecting the patch cables, you should test them with a patch tester. This device has two RJ45 jacks; you plug each end of the patch cable into the tester, and then press the button to make sure each wire on each connection makes a proper connection.

If you replace a central processing unit (CPU) and then the computer will not function afterward, which of the following should you look for when troubleshooting?

Bent or broken pins on the CPU

Where would hard disk configuration be stored?

CMOS

Which of the following is firmware?

CMOS/BIOS

If the computer you are working on has an onboard Redundant Array of Independent Disks (RAID) controller that appears in power-on self-test (POST) as functional, but your computer cannot boot from the array nor can it detect the array, what should you check to troubleshoot the problem?

Check the RAID configuration in the controller's Basic Input/Output System (BIOS)

Several users notify you that the network is slow. How do you investigate the problem?

Check the switch or switches for activity

A user tells you that she cannot connect to some network resource while others are readily accessible and no one else has the same problem. What do you check in order to investigate this problem?

Check the user's Active Directory and shared resource permissions

You have a user who complains that, while he can connect to everything on the network, he cannot connect to the Internet, but other users can. Where do you look to solve the problem?

Check the user's default gateway in Transmission Control Protocol/Internet Protocol (TCP/IP) network settings

Configuring IPv4

Configuring IP works the same way in most versions of Windows. First, we navigate to the Internet Protocol (TCP/IP) Properties window, which we refer to as the IP Properties dialog box. To do this, go to Control Panel > Network and Internet > Network and Sharing Center, and then select the Change Adapter Settings link. (In Windows Vista, select the Manage My Network Connections link.) Then right-click the Ethernet icon (or Local Area Connection icon) and select Properties. Finally, highlight Internet Protocol Version 4 and then click the Properties button. (For speed, right-click the network icon in the Notification Area and select Open Network and Sharing Center.)

Punch Block

Connection method for telephone and network wires using insulation and displacement

What do you do if you find an AC outlet is improperly wired?

Contact your supervisor or building management so they can resolve the problem

On a dot matrix printer, which paper type require tractors to feed the paper?

Continuous Forms

Gaming PCs

Custom computing is taken to extremes when it comes to gaming. Gaming PCs require almost all the resources mentioned previously: a powerful, multicore CPU; lots of fast RAM; one or more SSDs (SATA Express or PCI Express); advanced cooling methods (liquid cooling if you want to be serious); a high-end video card and specialized GPU; an above average, high-definition sound card; a big monitor that supports high resolutions and refresh rates; plus a fast network adapter and strong Internet connection (and mad skills).

DDR (Double Data Rate)

DDR is synchronized to the memory clock just like SDRAM, actually SDRAM that has been double-pumped, meaning that twice the data is transferred but at the same clock speed. It does this by transferring data on the rising and falling edges of each clock signal (every cycle). So let's use DDR-200 as an example. A 100 MHz system bus's transfers are doubled, so instead of 100 million transfers, it can now do 200 million transfers per second.

Which utility should you run regularly to optimize your computer's hard disk performance?

DEFRAG

In a Microsoft TCP/IP environment, how is the problem of dynamic addressing tackled?

DHCP

How do you defragment a drive?

Defragmenting the drive can be done with Microsoft's Disk Defragmenter, with the command-line defrag, If using the Disk Defragmenter program, you need 15 percent free space on the volume you want to defrag. If you have less than that, you need to use the command-line option defrag -f. To summarize, the more contiguous the data, the less the hard drive has to work to access that data, thus decreasing the data access time and increasing the lifespan of the drive.

What should you do to protect your computer's components from a failing power supply?

Disconnect all the components before troubleshooting

What technique is employed in a Redundant Array of Independent Disks 1 (RAID 1) configuration to ensure that the controller card is not a single point of failure?

Disk duplexing

there is not a one-to-one ratio of internal to external addresses. This basically means that any number of internal addresses can share a pool of external addresses.

Dynamic Network Address Translation (DNAT)

Dynamic Address

Dynamically assigned addresses are more common for a client computer; this is when the computer seeks out a DHCP server so that it can get its IP information automatically. When you select this, the rest of the information becomes grayed out and the computer attempts to get that IP information from a host (such as a multifunction network device or DHCP server). This is common; in fact, it's the default configuration for Windows.

How can a second SATA device be added to a SATA cable that already contains a device

It can't

What is EEPROM?

Electrically Erasable Programmable ROM and means that not only can you modify settings, you can fully update the BIOS by erasing it and rewriting it in a process known as flashing.

What is the name of the process that laser printers use to produce a printer image?

Electro-photographic

Which of the following is not among the recommended actions for enhancing security when initially setting up a router?

Enable Service Set Identifier (SSID) broadcast

You have a customer that has several USB devices and when they connect them to their PC they are not recognized by windows 8.1. Which of the following will you try first to solve the problem?

Enable USB in Device Manager

What does a Power over Ethernet (PoE) injector allow you to do?

Enable a PoE-compliant device to connect to a non-PoE switch

Remote Desktop Program (RDP)

First, users can be given limited access to a remote computer's applications (such as Word or Excel). Second, administrators can be given full access to a computer so that they can troubleshoot problems from another location. Third, another part of the program known as Remote Assistance allows users to invite a technician to view their desktops in the hopes that the technician can fix any encountered problems. These invitations can be made via e-mail or by Windows Messenger. The RDP port, 3389, is also used by Remote Desktop Services/Microsoft Terminal Services, which is the server-based companion of Remote Desktop.

Looking at a motherboard, you see two rows of pins with labels like HDD, SPKR,RST, PWR. What is their Function?

Front Panel lights and switches

You find that a shared network printer's printouts are faded. You replace the toner cartridge, but the printouts are still faded. What is the source of the problem?

Fuser

Collating

If you print a single job, collating is not an issue. But it's when you print multiple copies of the same job that collating might become necessary. Historically, multiple copies of the same print job would print out all of page 1, then all of page 2, then all of page 3, and so on. It was up to the user to manually arrange, or collate, these pages. However, as printers became more sophisticated, they were equipped with the processing power to collate the jobs, sorting them as page 1, page 2, page 3, and so on, and then moving on to the next copy of the entire job. This, of course, saves a lot of time for the user.

How to turn on and off the UAC

In Windows 8/7, you can turn off UAC by going to Control Panel > User Accounts and Family Safety. Then select User Accounts and click the Change User Account Control settings link. Unlike Windows Vista, where you can only turn UAC on or off, Windows 8/7 displays a slider that enables you to select from four settings: 1. Always notify 2. Default: notify my only when programs try to make changes to my computer 3. notify me when and only when programs try to make changes to my computer 4. Never notify

2.4 GHz Frequency

In the United States, the 2.4 GHz frequency range consists of channel 1 through 11. (Again, other countries may differ slightly.) For noninterference with other wireless devices, choose channel 1, 6, or 11. That's because the 2.4 GHz spectrum is divided into three sections: channels 1-5, channels 6-10, and channel 11. This network is also running in mixed mode; it allows connections from 802.11b, 802.11g, and 802.11n (2.4 GHz) wireless clients.

What material does a line printer require to produce images?

Ink Ribbon

If a motherboard does not support Redundant Array of Independent Disks (RAID) natively, how can you configure a RAID array on that system?

Install and configure a non-system RAID controller

When the video processing is moved onto the main processor, as in the Ivy Bridge, it is referred to as ?

Integrated GPU

Which Internet service technology has Digital Subscriber Line (DSL) largely replaced?

Integrated Services for Digital Network (ISDN)

Which type of processor does the LGA 1366 (Socket B) socket type accommodate?

Intel's Core i7 processor

Internet Message Access Protocol (IMAP)

Internet Message Access Protocol (IMAP) is an e-mail protocol that enables messages to remain on the e-mail server so they can be retrieved from any location. IMAP also supports folders, so users can organize their messages as desired. IMAP e-mail servers use inbound port 143 open.

What does a proxy server do?

It acts as an intermediary between computers requesting information and computers that serve information. You can use a proxy to hide the identities of requesting computers from internet resources for tighter security or to improve the performance of accessing particular websites. You can also use a proxy to control which internet sites can be assessed from computers using the proxy.

What is the purpose of implementing client-side Domain Name System (DNS) configuration?

It allows the client to resolve cached host names without connecting to a server

Cable Types and Connectors

It is referred to as twisted pair because the copper wires inside of the cable are twisted together into pairs throughout the entire length of the cable. Regularly, admins use UTP cable, ( unshielded twisted pair). Regularly, admins use UTP cable.

How is user name and password information sent over the network when using Telnet?

It is sent in plaintext unencrypted format.

What advantage does Synchronous Dynamic Random Access Memory (SDRAM) have over Dynamic Random Access Memory (DRAM)?

It is synchronized with the system bus, reducing the chance of loss of information during transfer.

Loopback plug

It simulates a network connection and has two main functions. First, it can help find what port on a switch an RJ45 jack is wired to. You plug it into an RJ45 jack on the wall and it bounces the signal back down the cable to the switch, lighting up the port that the cable is ultimately connected to. This tells you which port on the switch a particular cable is connected to in case it wasn't labeled previously. You can also accomplish this by connecting it to the end of a patch cable because the device usually has a male and a female RJ45 connection. (to test sending and receiving activity of ports)

Which of the following is a characteristic of the Serial Advanced Technology Attachment (SATA) interface as opposed to the Integrated Drive Electronics (IDE) interface?

It supports hot swapping of drives.

Which of the following is an advantage of UDP( User Datagram Protocol) over TCP (Transmission Control Protocol)?

It transfers packets faster

How can you tell that you are looking at the main power connector to the motherboard?

It will be in the form of a 20-pin or 24-pin Advanced Technology eXtended (ATX) connector.

Quad Channel

It works only when four identical memory modules are placed in the correct slots. Quad-channel is common in computers that use DDR4. Now we have four 64-bit wide buses working together, but for it to work properly, a module of RAM must be installed to each of the four banks. If only three modules are installed (thus only three banks used), the architecture downgrades to triple-channel automatically. Likewise, if only two are used, the motherboard scales back to dual-channel architecture.

What is the best way to keep a system cool with proper airflow?

Keep Slot Back plates in place.

L1 cache

L1 cache is built into the CPU and gives fast access to the most frequently used data. This level of cache is the first one accessed by the CPU and is usually found in small amounts. However, it is the fastest cache to be found, offering the lowest latency of any of the types of cache. One of the reasons for this is that it resides within the CPU core.

L2 cache

L2 cache is usually built on to the CPU (on-die). It is accessed after L1 cache and it serves the CPU with less frequently used data in comparison to L1 but it is still more frequently used data than the data that comes from typical DRAM. L2 cache feeds the L1 cache, which in turn feeds the CPU. L2 cache is not as fast as L1 cache but is far superior to DRAM. This and L3 cache take up the majority of the CPU's real estate.

L3 cache

L3 cache comes in the largest capacities of the three types of cache and has the most latency; therefore, it is the slowest. If the CPU can't find what it needs in L1, it moves to L2 and finally to L3. Or you could think of it this way: L3 cache feeds L2 cache, which feeds L1 cache, which in turn feeds the CPU with data. If the CPU can't find the data it is seeking within cache, it moves on to the DRAM sticks. L3 cache could be on-die or on-board, but most of today's CPUs have it on-die; however, it is shared among the cores of the CPU.

In order to save space on fiber optic patch panels, Lucent Technologies developed a smaller connector.

LC

What type of device is most likely to be connected to an HD15 cable?

LCD

LED (light emitting diodes)

LED monitors can use two different kinds of technologies: conventional discrete LEDs and surface-mounted device (SMD) technology. SMD is more common for LED monitors; it uses red, green, and blue diodes that are mounted as individual triads as opposed to discrete LED technology, which clusters these triads together into pixels.

Land Grid Array (LGA)

Land Grid Array sockets use lands that protrude out and touch the CPU's contact points. This newer type of socket (also known as Socket T) offers better power distribution and less chance to damage the CPU compared to PGA. LGA has been used since the later versions of Pentium 4 and is commonly used today on Intel motherboards. Examples of Intel sockets include the LGA 1150 and the LGA 2011.

Laser Printers

Laser printers can produce high-quality text and graphics on cut sheets of paper; printers that print to individual pieces of paper are known as page printers.

OSI Model Network Devices- HUB

Level 1 Physical/Please: Operates Hubs -physical connectivity -no intelligence -replaced by switches -Collision domain -doesn't have knowledge of where frames should go

OSI Model Network Devices- Switches

Level 2 Data Link/Do Switches -can associate ports with MAC addresses -each switch is its own collision domain -large frame buffers -mixture of port speeds -fast internal switching -forward, filter, frames

Your modem works fine most of the time but some connections deliver bad characters. What is the cause?

Line Noise

Of all PC cooling methods which one dissipates heat the most efficiently?

Liquid Cooling Systems

Which type of monitor uses cold cathode fluorescent lamps (CCFLs) as the backlight source?

Liquid crystal display (LCD)

SATA Revision 2.0

Maximum DTR 3 Gb/s 300MB/s

SATA Revision 3.0

Maximum DTR 6 Gb/s 600MB/s

Which display connector type is intended for portable devices while still being able to transfer uncompressed video data and compressed or uncompressed digital audio data?

MiniHDMI

RAID 1 Level

Mirroring. Data is copied to two identical disks. If one fails, the other continues to operate. When each disk is connected to a separate controller aka Disk Duplexing. Fault Tolerant: Yes Minimum # of disks 2 (& only 2)

Which of the following connector types would not be present as a modern ATX-compatible power supply?

Molex II

What does the Post Office Protocol 3 (POP3) protocol do?

Most recent version of a standard protocol for receiving e-mail.

This is the process of modifying IP address information in the IP packet headers as they pass through a router.

NAT

Nbstat

Nbtstat displays network protocol statistics that use NetBIOS over TCP/IP connections. Nbtstat can be used to show the services running on the local computer or a remote computer. It calls this the name table.

Which of the following Windows commands do you use to browse all local network computers and their shared resources?

Net view

Netdom

Netdom is a command-line tool that is built into Windows Server. It is designed to manage Active Directory domains from the command line. It is available if you have the Active Directory Domain Services server role installed, meaning if you are running a domain controller. It is also available if you install the Active Directory Domain Services Tools that are part of the Remote Server Administration Tools (RSAT)

Which of the following commands would you use to view active network connections to your computer?

Netstat

What feature is a requirement for port forwarding to work?

Network Address Translation (NAT)

Which networking command allows you to confirm that the computer can connect to a Domain Name System (DNS) server and resolve an IP address for a given computer name?

Nslookup

Nslookup

Nslookup queries DNS servers to discover DNS details, including the IP address of hosts. Nslookup means name server lookup and can aid in finding DNS servers and DNS records in a domain as well. If the command nslookup is typed by itself, it brings the user into the nslookup shell. From here, several commands can be utilized; to find out more about these, type ?. To exit the nslookup shell, type exit, press Ctrl+C, or press Ctrl+Break.

OLED ( organic light emitting diodes)

OLED displays use organic semiconductor material that is usually in the form of polymers. Organic colored molecules are held in place between electrodes. A conductive layer made up of plastic molecules allows the organic-colored molecules to emit light. The main advantage of OLED over LED is expected to be cost; OLEDs can be printed onto just about any substrate using simple printing processes.

Which processors took advantage of hyperthreading technology

Pentium 4 and Intel Xeon

Phishing

Phishing is the attempt at fraudulently obtaining private information. A phisher usually masquerades as someone else, perhaps another entity. Phishing is usually done by electronic communication/phone. Little information about the target is necessary. A phisher may target thousands of individuals without much concern as to their backgrounds. An example of phishing would be an e-mail that requests verification of private information. The e-mail will probably lead to a malicious website that is designed to lure individuals into a false sense of security to fraudulently obtain information. The website will often look like a legitimate website. A common phishing technique is to pose as a vendor (such as an online retailer or domain registrar) and send individuals e-mail confirmations of orders that they supposedly placed.

Ping

Ping tests whether another host is available over the network. It's the easy way to see if another host is "alive." and to test whether or not TCP/IP has been installed properly.

Plasma

Plasma displays use small cells that contain electrically charged ionized gases; effectively, these are fluorescent lamps. Plasma screens are known for brightness and low-luminance black level as compared to LCD screens.

Which of the following is a common cause of low-quality image printing from a laser printer?

Poor-quality paper

In a Transmission Control Protocol/Internet Protocol (TCP/IP) network, what term is used to describe the endpoint of a logical connection?

Port

Ports/Applications

Port # Application 21 FTP 22 SSH 23 TELNET 25 SMTP 53 DNS 67 DHCP 80 HTTP 110 POP3 143 IMAP 443 HTTPS 3389 RDP 137-139, 445 SMB 548 OR 427 AFP

What setting should you enable if you wanted to configure a host to automatically and dynamically forward inbound traffic received on specific ports to other ports?

Port triggering

Post Office Protocol Version 3 (POP3)

Post Office Protocol Version 3 is used by e-mail clients to retrieve incoming e-mail from a mail server. The POP3 mail server uses port 110.

What is POST?

Power On Self Test the first step in bootstrapping. The POST is essentially a piece of code that the BIOS runs to find out which type of processor is on the motherboard and verifies the amount of RAM. It also identifies buses on the motherboard (and other devices) as well as which devices are available for booting.

Power over Ethernet (PoE)

Power over Ethernet (PoE) is an Ethernet standard that allows for the passing of electrical power in addition to data over Ethernet cabling.

You have a customer who calls you to report her computer shuts down and reboots on its own when she tries to start it. What could be the cause?

Power supply is not providing enough power to the system

The purpose of the Windows 7 ____ is to allow you to use tools to repair damaged registry, system files, and the files system on the hard drive.

Recovery Environment(RE)

The customer has a problem with some program applications being displayed with missing lines, details and other graphic problems. Which of the following settings could you change to help this problem?

Reduce the hardware graphics acceleration

What ports have a range of 1024 to 49151

Registered port

Which level permission takes priority?

Remember that NTFS-level permissions take precedence over Share-level permissions.

A/V Workstations

Remember that audio/video workstations need specialized A/V cards; large, fast hard drives; and multiple monitors.

Which service is enabled via a registered port rather than a well-known port?

Remote Desktop Protocol (RDP)

A locally attached Windows 7 printer is printing garbled text and several blank pages with each print request. Which of the following is the easiest way to fix this?

Remove the printer and let windows reinstall it

This device forwards packets between subnets

Router

Which network device is used to allow data packets from your LAN to be delivered to a network with a different network ID?

Router

What connector is a box-shaped connector that snaps into a receptacle, and is used with single-mode fiber.

SC

SDSL (Symmetrical Digital Subscriber Line)

SDSL is installed (usually to companies) as a separate line and is usually more expensive. Unlike ADSL, SDSL upload and download speeds are the same, or symmetrical.

A space-saving fiber optic connector type Mechanical Transfer Register Jack(MTRJ) can be used with which of the following cable types?

SMF & MMF

What is Port 23?

SMTP

Name two kinds of laptop rams

SODIMM microDIMM

_____ router can be set to limit the number of dynamic addresses it hands out

SOHO

NAND is another term for ?

SSD

Which of the following do you need to connect an 802.11 network that uses WEP?

SSID & Password

When setting up a system on dual channel memory, the memory should be?

Same Manufacturer, Same Size, and Same Speed

Satellite

Satellite connectivity uses a parabolic antenna (satellite dish) to connect via line of sight to a satellite; it is used in places where standard landline Internet access is not available. The satellite is in geosynchronous orbit, at 22,000 miles (35,406 km) above the Earth. This is the farthest distance of any Internet technology. The "dish" connects to coax cable that runs to a switching/channeling device for your computers. Today's satellite connections offer speeds close to traditional broadband access (similar to cable Internet access). One of the issues with satellite is electrical and natural interference. Another problem is latency. Due to the distance (44,000 miles total) of the data transfer, there can be a delay of .5 seconds to 5 seconds. That's the highest latency of any Internet technology. Latency goes hand-in-hand with distance. In the past, satellite-based Internet connections offered high-speed downloads, but uploads were slow due to the fact the service would use a dial-up line to upload information.

Secure Shell (SSH)

Secure Shell enables data to be exchanged between computers on a secured channel. This protocol offers a more secure replacement to FTP and Telnet. The Secure Shell server housing the data you want to access would have port 22 open. There are several other protocols that use SSH as a way of making a secure connection. One of these is Secure FTP (SFTP). Regular FTP can be insecure. SFTP combats this by providing file access over a reliable data stream, generated and protected by SSH.

The Hypertext Transfer Protocol Secure (HTTPS) service combines Hypertext Transfer Protocol (HTTP) and what other protocol?

Secure Sockets Layer/ Transport Layer Security (SSL/TLS)

RAID 5 Level

Striping with Parity. Data is striped across multiple disks; fault tolerant parity data is also written to each disk. If one disk fails, the array can reconstruct the data from the parity information. Fault Tolerant: Yes Minimum # of disks: 3

Domain Name System

The Domain Name System is the group of servers on the Internet that translates domain names to IP addresses. A DNS server has inbound port 53 open by default.

Encrypting File System (EFS)

The Encrypting File System (EFS) is a feature of the Windows 2000 operating system that lets any file or folder be stored in encrypted form and decrypted only by an individual user and an authorized recovery agent.

What are the two possible configurations of a Peripheral Component Interconnect Express (PCIe) motherboard connector?

The PCIe connector can be in the form of a 6-pin or an 8-pin configuration. Both connectors provide power at 12 volts, but the maximum wattage is different.

Bridge

The bridge is a device that can either connect two LANs together or separate them into two sections. There are wired bridges and wireless bridges; today they are used to increase the size of networks.

small office/home office (SOHO) network

The core of the SOHO network is the multifunction network device. This device acts as a switch, router, firewall, and wireless access point.

A page comes out of a laser printer and the toner smudges when you touch it. What is the problem?

The fuser is not hot enough.

Heat Sink

The heat sink is a block of metal made to sit right on top of the CPU, with metal fins stretching away from the CPU. It uses conduction to direct heat away from the CPU and out through the fins. With a passive heat sink, that's all there is to it; it dissipates heat and requires no moving parts—it is "fanless." But with an active heat sink, a fan is attached to the top of the heat sink. The fan plugs into the motherboard for power and usually blows air into the heat sink and toward the CPU, helping to dissipate heat through the heat sink fins

What is a HUB?

The hub is the original connecting device for computers on the LAN. It creates a simple shared physical connection that all computers use to send data. It's a basic device that has multiple ports, usually in intervals of four.

What special feature of Wi-Fi Protected Access version 2 (WPA2) improves upon Wi-Fi Protected Access (WPA)?

The inclusion of Advanced Encryption Standard (AES) and Cipher Block Chaining Message Authentication Code Protocol (CCMP)

What is the major difference between single-rail and dual-rail PSUs?

The internal circuits of a dual-rail PSU are separated based on different power output.

If you boot a PC and see a black screen with a white blinking underscore on the top left what does that mean?

The issue could be the boot order

Software as a service (SaaS)

The most commonly used and recognized of the three categories, SaaS is when users access applications over the Internet that are provided by a third party. The applications need not be installed on the local computer. In many cases, these applications are run within a web browser; in other cases, the user connects with screen-sharing programs or remote desktop programs. A common example of this is webmail.

PCIe (Peripheral Component Interconnect Express)

The most powerful PCIe slots with the highest data transfer rates connect directly to the northbridge or directly to the processor; the lesser PCIe slots connect to the southbridge or simply to the main chipset. This expansion bus sends and receives data within lanes. These lanes are full-duplex, meaning they can send and receive data simultaneously. PCIe version 1 has a data rate of 2 Gb/s (250 MB/s) per lane; version 2 is 4 Gb/s (500 MB/s); version 3 is approximately 8 Gb/s (1 GB/s); and version 4 is approximately 16 Gb/s (2 GB/s). Remember, those numbers are for each direction, so PCIe version 4 can send 16 Gb/s and receive 16 Gb/s at the same time. The number of lanes a PCIe bus uses is indicated with an x and a number—for example, x1 (pronounced "by one") or one lane.

What component regulates the level of voltage that the central processing unit (CPU) and Random Access Memory (RAM) receive?

The motherboard

On a wireless access point, what does the Service Set Identifier (SSID) refer to?

The name of the device

What mechanism do impact printers use to move the paper along?

The paper is either tractor-fed or friction-fed, depending on the paper used.

Dual-Rail Power (aka Multi-Rail Power)

The purpose of "dual-rail" PSUs is to separate and limit the current through each wire to avoid overheating.

You find a great deal for a new high definition home theater receiver and decide it's time to upgrade. Before you checkout, you decide to check the connections on your other devices to ensure everything is compatible. On the back of your Blu-ray player you notice several different connectors. There are round connectors, one red, one white, and small connector that appears to have a light emitting from it. What are these connectors used for?

The red and white round connectors called composite connectors are used for analog audio. The connector with the light emitting is called an optical cable and is used for HD digital audio.

What are the requirements for a HTPC (Home Theater PC)

The requirements for an HTPC include a small form factor (micro-ATX or mini-ITX), a quiet desktop case with a silent video card, and an HDMI output for connectivity to big-screen televisions or projectors. To keep the rest of the computer quiet, a liquid-cooled CPU (instead of fan-based) and solid-state hard drive would complete the equation. Know that an HTPC needs a small form factor, quiet equipment, surround sound audio, HDMI output, and possibly a TV tuner.

NTSF Permissions are accessed from

The security tab of the folders properties window

What is the major limitation of the 802.11a standard?

The signal range

Developing

The surface of the drum that was previously exposed to the laser is now applied with negatively charged toner. This toner has a higher charge than the areas of the drum that were written to.

Your PC displays the message "Non System Disk or Disk Error:. Which of the following will produce this result?

The systems files were not transferred over to the hard drive.

Processing

The text or image to be printed is sent to the printer, where a processor recalculates it and stores it in RAM while the printer readies itself for the ordeal of laser printing

Fusing

The toner is fused to the paper. The paper passes through the fusing assembly that includes pressurized rollers and a heating element that can reach approximately 400 degrees F (or about 200 degrees C).

Transferring

The toner, and therefore the text or image, is transferred to paper as the drum rolls over it. The movement of the paper is assisted by pickup rollers (for feeding the paper) and transfer rollers (to move it through the rest of the printer). Separation pads are used to make sure only one page is picked up at a time. On many laser printers, the paper slides between the drum and a positively charged corona wire (known as the transfer corona wire). The transfer corona wire applies the positive charge to the paper. Because the paper now has a positive charge, and the toner particles on the drum have a negative charge, the toner is attracted to the paper. (For voltages, opposites attract.) In many printers the paper passes by a static elimination device (often a strip), which removes excess charge from the paper. Some color laser printers use a transfer belt to apply the various layers of colors to the paper. Some printers use a duplexing assembly that allows the paper to be printed on both sides.

Transmission Control Protocol/ Internet Protocol (TCP/IP)

The two versions of IP you need to know for the exam are IPv4 and the newer IPv6. Let's start with Internet Protocol version 4.

You need to support several Peripheral Component Interconnect Express (PCIe) and DisplayPort peripherals on a computer. Which expansion card is the best choice?

Thunderbolt card

The link light on a NIC will light when which of the following happens?

The wire connecting it to the network is plugged in

How many bits make up an Internet Protocol version 4 (IPv4) address and Internet Protocol version 6 (IPv6) address, respectively?

There are 32 bits in an IPv4 address and 128 bits in an IPv6 address.

Audio Cluster

There are six ports in this audio cluster, including an optical digital output, microphone in, line in, and speaker outs.

External drives present support personnel with their own support issues. Identify the probable cause of a user's external Universal Serial Bus (USB) drive not being recognized by the computer.

There is a damaged or malfunctioning USB port

Print Quality

This is the print resolution, as measured in DPI. 600 DPI or higher is considered to be letter quality and acceptable as a professional document. But you might want an even better quality (1200 or 2400 DPI), especially if your document includes graphics.

Clearing

This is the removal of data with a certain amount of assurance that it cannot be reconstructed. The data is actually recoverable with special techniques. In this case, the media is recycled and used within the company again. The data-wiping technique (also known as shredding) is used to clear data from media by overwriting new data to that media or by performing low-level formats.

RJ 45 LAN port

This is the wired network connection. On this particular motherboard, it is a Gigabit Ethernet LAN controller and is rated for 10/100/1000 Mb/s. This means that it can connect to any of those speed networks and function properly.

Destruction

This is when the storage media is physically destroyed through pulverizing (with a hammer or other similar tool), drilling holes through the platters, electromagnetic degaussing, shredding, incineration, and so on. At this point—if there is anything left of the drive—the media can be disposed of in accordance with municipal guidelines. Some organizations require a certificate of destruction to show that a drive has indeed been destroyed.

ping -t Command

This pings the host until the command is stopped. Remember, a host is any device or computer with an IP address. An example of this would be ping -t 192.168.0.1; the switch can go before or after the IP address. You will keep getting replies (or timeouts) until you stop the command by pressing Ctrl+C or by closing the Command Prompt. This is a great way to test cable connections.

Which type of hardware interface supports connecting a wide variety of peripheral devices to personal computers (PCs) and has cabling available in both optical fiber and copper wire?

Thunderbolt

How do you configure media streaming in Windows?

To configure media streaming in Windows, go to Control Panel > HomeGroup, and then click the Change advanced sharing settings link. Open the appropriate network type and then click the Choose media streaming options link. Turn on media streaming and then click Customize for any particular device. From these last two locations, you can choose what is to be streamed, and you can select parental ratings if you want. Remember that a home server PC should have a fast network adapter and a RAID array, and needs to be part of a network (such as a HomeGroup) so that file and print sharing and media streaming can be configured.

Print to PDF

To make a document universally readable, you have several options. One of the most common is to convert it into a Portable Document Format (PDF)

In which of the following circumstances would you use the nslookup utility?

To verify a computer's name from its Internet Protocol (IP) address

how do you configure the system to show protected system files?

To view files such as bootmgr, pagefile.sys, and hiberfil.sys, deselect the Hide protected operating system files checkbox.

Which device sends an electrical signal through one pair of unshielded twisted pair (UTP) wires for the purpose of tracing it?

Tone Generator

Your laser printer is producing pages of solid blank line running the length of the paper. What is the likely cause of this?

Toner is low

Which networking command can help you determine the points along the route the computer uses to send a packet to a destination?

Tracert

What is the paper transport technology most commonly associated with dot matrix printers?

Tractor Feed

The paper transport systems of a dot matrix printer is primarily

Tractor Rollers

What is the native protocol of the Internet, which is required for Internet connectivity?

Transmission Control Protocol/Internet Protocol (TCP/IP)

What is breadboarding?

When you remove all of the components from the case and reassemble them on an antistatic mat

Which form of wireless encryption introduced the Temporal Key Integrity Protocol (TKIP) security protocol?

Wi-Fi Protected Access (WPA)

What is a PAN?

a personal area network (PAN) is a smaller computer network used for communication by small computing devices. Take this to the next level by adding wireless standards such as Bluetooth and you get a wireless PAN (WPAN). These networks are ad hoc, meaning there is no single controlling device, server, or access point.

System Restore

a tool inscluded in windows which allows the user to revert their computer to a previous point in time.

Intrusion Prevention System (IPS)

an intrusion prevention system (IPS) will not only detect unauthorized access to the network, it will attempt to thwart it, making the admin's job somewhat easier. IDS and IPS solutions are available as security appliances for the entire network and, in this case, are also referred to as network-based IDS (NIDS) and network-based IPS (NIPS), respectively. They are often incorporated into UTM devices, most commonly NIPS. However, IDS and IPS solutions are also available for individual hosts. In this case, they are referred to as host-based IDS (HIDS) and host-based IPS (HIPS).

Print Servers

are basic servers that take control of multiple printers on the network. All caching of information, spooling, printer pooling, sharing, and permissions is controlled centrally by the print server.

Private IP Addresses

are blocks of IP addresses, assigned for use on private networks. The ranges assigned for private IPs are 10.0.0.0 through 10.255.255.255, 172.16.0.0 through 172.31.25.255 and 192.168.0.0 through 192.168.255.255

Computer-aided design (CAD) and computer-aided manufacturing (CAM) workstations

are common in electrical engineering, architecture, drafting, and many other engineering arenas. Don't forget, CAD/CAM computers need powerful, multicore CPUs, high-end video cards, and as much RAM as possible.

E-mail Servers

are part of the message server family. When we make reference to a message server, we mean any server that deals with e-mail, faxing, texting, chatting, and so on. An Exchange Server might run POP3, SMTP, and IMAP, and allow for Outlook Web App (OWA) connections via a web browser. That's a lot of protocols running. So it's not surprising to hear some Exchange admins confess that running an e-mail server can be difficult at times.

Device Drivers (aka software drivers)

are programs that enable the operating system to communicate with the actual device.

Google Cloud Messaging (GCM)

is a messaging service that can be used on Android devices to send data and send to sync messages from a corporate server to android powered devices.

Network Multi meter

is a multipurpose device used to test network components, such as cables, ports, and network cards. A network multimeter can report the status of various network conditions, such as the speed of a cable, length of the cable, duplex status, and Power over Ethernet (POE) voltage levels.

Single mode fiber

for the most part, single-mode fiber is used over longer distances, but both types are easily capable of supporting 1000 Mb/s and 10 Gb/s networks and can be run farther than twisted-pair cable. A couple types of connectors used with fiber include ST and SC

Thunderbolt 2

gives you access to the latest 4K monitors and because Thunderbolt is based on DisplayPort technology, it provides native support for the Apple Thunderbolt Display and Mini DisplayPort displays. DVI, HDMI, and VGA displays connect through the use of adapters.

Shielded Twisted Pair (STP)

google image has two conductors or pairs of copper wires that are twisted around each other and clad in a color coded protective insulating plastic sheath or jacket to form a pair. STP cables have an extra layer of protection in the form of a metallic foil around the wires which lowers the effects of EMI interference

What are the basics of Pico ITX?

half the area of Nano-ITX, measuring 3.9 × 2.8 inches (10 × 7.2 cm). It uses powerful processors and RAM, thus requiring active cooling. It is used in extremely small PCs and ultra-mobile PCs (UMPCs).

Memory Latency aka Column Address Strobe (CAS) Latency

happens when a memory controller tries to access data from a memory module. It is given a rating of CAS (or more commonly referred to as CL). The higher the CL number, the longer the delay.

Cellular

has grown to encompass several different technologies, such as GSM, CDMA, GPRS, EDGE, 4G, LTE, and more. Cellular data connections are also referred to as wireless WAN or WWAN connections. Use of cellular on a smartphone, tablet, or with a WAN card requires a subscription with a cellular provider.

Server Message Block (SMB)

helps to provide shared access to components on a network. It enables you to share files and devices, such as printers and scanners, between network nodes. SMB is not used to access contact details or a list of devices on a server or database.

ping -n Command

his pings a host a specific number of times. For example, the syntax ping -n 20 192.168.0.1 would ping that host 20 times and then display the results. This can be a good baselining tool if you run it every day against a router or server and compare the results. (You would probably want to do a higher quantity than 20.)

Registered memory (aka buffered memory)

improves the integrity of the signal between RAM and the memory controller by electrically buffering the signals using an extra register. This is done for stability, especially when using multiple memory modules; however, this could cause additional latency.

Surge

in electrical power means that there is an unexpected increase in the amount of voltage provided.

AMD socket types

include AM3, AM3+, FM1, FM2, and FM2+

Inkjet Components

ink cartridge, print head, roller, feeder, duplexing assembly, carriage, and belt.

Thermal Printers

ink cartridge, print head, roller, feeder, duplexing assembly, carriage, and belt.

Wi-Fi Protected Setup (WPS)

intended to make connecting to wireless easier but failed due to its vulnerability to brute force attacks.

User State Migration Tool (USMT)

is a command line tool that is used to transfer files and settings from one computer to another. Used on large scale deployments and domain environment.

Dual-Channel

is a common technology that essentially doubles the data throughput. Two separate 64-bit channels are employed together, resulting in a 128-bit bus. To incorporate this, the proper motherboard will have color-coded matching banks.

Integrated Services Digital Network (ISDN)

is a digital technology developed to combat the limitations of PSTN. Users can send data, talk on the phone, fax—and all from one line. 1. BRI: Basic Rate ISDN: 128 Kb/s. Two equal B channels at 64 Kb/s each for data and one separate 16 Kb/s D channel for timing. 2. PRI: Primary Rate ISDN: 1.536 Mb/s, runs on a T-1 circuit; 23 equal 64 Kb/s B channels for data and one 64 Kb/s D channel for timing.

Network Attached Storage (NAS)

is a file-level computer data storage server connected to a computer network providing data access to a heterogeneous group of clients. NAS is specialized for serving files either by its hardware, software, or configuration.

Dynamic Host Configuration Protocol (DHCP)

is used to automatically assign IP addresses to hosts. These hosts could be computers, printers, servers, routers, and so on. In most SOHO networks, a router will use DHCP to assign IP addresses to the client computers. However, your ISP will also use DHCP to assign an IP address to you; usually your router gets this. The DHCP service makes life easier for the network administrator by automatically assigning IP addresses, subnet masks, gateway addresses, DNS servers, and so on, from a central location. If you get your address from a DHCP server, you are getting your address assigned dynamically, and it could change periodically. Computers that do obtain IP addresses from a DHCP server have the advantage of automatically getting new addressing when they are moved to a different network segment. However, some computers require a static address, one that is assigned by the network administrator manually. It is better in many situations for servers and printers to use static addresses so you know exactly what the address is and so it won't change.

net use Command

is used to connect or disconnect from a shared network resource. There are multiple switches available for this command to add to its functionality.

Access Control List (ACL)

is used to control which users or groups have access to specific shared resources on a server.

Subnet Mask

is used to indicate the length of the network portion and the host portion of an IP address. It is necessary information for determining which subnet a particular host is in and must be entered when configuring an alternate IP address.

Multimeter

is used to measure voltage, current, resistance, and continuity.

Service Set Identifier (SSID)

is used to name a wireless network. When the SSID is disabled, wireless clients won't be able to scan for it. If you need to connect additional wireless clients, you will either have to enable the SSID broadcast or enter the wireless SSID manually when connecting. To connect manually, open the Network and Sharing Center and select the Connect to a network link. Then select Manually connect to a wireless network. (The wireless adapter must be installed with correct drivers to see this link.) You will have to type the SSID, the type of wireless, and the security key to get in the network.

Android application Package (APK)

is used when programs are compiled to be run on an Android based device. These programs when compiled, are similar to .msi file in that it contains all assets. resources, and the program code.

Blackout

is when a total loss of power for a prolonged period occurs.

Spoofing Attack

is when an attacker masquerades as another person by falsifying information. This can be done as a social engineering attack, such as in the previously mentioned phishing method, or it can be performed as a more technical attack, such as the man-in-the-middle (MITM) attack. This is when an attacker intercepts all data between a client and a server. It is a type of active interception. If successful, all communications are diverted to the MITM computer. The attacking computer can at this point modify the data, insert code, and send it to the receiving computer. This type of eavesdropping is only successful when the attacker can properly impersonate each endpoint.

Brute Force Attack

is when every possible password instance is attempted. This is often a last resort because of the amount of CPU resources it might require. It works best on shorter passwords but can theoretically break any password, if given enough time and CPU power.

Network Attached Storage

is when one or more hard drives are installed into a device known as a NAS box or NAS server that connects directly to the network. The device can then be accessed via browsing or as a mapped network drive from any computer on the network.

The most common are Type A and Type B, which are 4-pin connectors, but there are also mini- and micro-connectors, which are 5-pin. Type A connectors are the type you see on the back of a computer or on the side of a laptop

look it up on google images

Bad Block Management

maintains a table of the faulty blocks within the USB flash device, making sure not to save data to those blocks. Blocks are divided into pages, which can be between 512 bytes and 4 KB. Each page has error detection and correction information associated with it. All this is done to prolong the lifespan of devices that use NAND memory.

Half Duplex

means that your network adapter can send or receive data but not at the same time

Optical Storage Media

most magnetic media is known as "disk" and optical media is known as "disc."

microATX

motherboards can be a maximum size of 9.6 inches × 9.6 inches (244 mm × 244 mm) but can be as small as 6.75 inches × 6.75 inches (171.45 mm × 171.45 mm). In comparison, microATX boards are usually square, whereas full-size ATX boards are rectangular. microATX is backward compatible with ATX, meaning that most microATX boards can be installed within an ATX form-factor case and they use the same power connectors as ATX. Same chipsets used as well

Surge Protectors

or surge suppressor is a power strip that also incorporates a metal-oxide varistor (varible+resistor) (MOV) to protect against surges and spikes.

LCD (liquid crystal display)

ost of today's LCD screens are thin-film transistor (TFT) active-matrix displays, meaning they have one or more powered transistors for each pixel; the transistors are contained within a flexible material. The transistors store the electrical state of each pixel, while all the other pixels are updated

nslookup Command

provides information typically used for troubleshooting the DNS infrastructure.

XCOPY Command

recommended for use when copying data that spans across multiple directories. XCOPY progress information can be redirected to a log file within a script; however its doesn't display progress information during copy windows.

ROBOCOPY Command

recommended for use when copying large amounts of data. ROBOCOPY is the successor to XCOPY, it is equipped with an extensive amount of switches, and it will display progress information during copy operations.

Single-sided memory module

refers to a memory module with a single "bank" of chips. The computer's memory controller can access all the chips at once.

Ransomware

restricts access to a computer system or locks the system until a ransom is paid often propagated by a trojan

Dictionary Attack

uses a prearranged list of likely words, trying each of them one at a time. It can be used for cracking passwords, passphrases, and keys. It works best with weak passwords and when targeting multiple systems. The power of the dictionary attack depends on the strength of the dictionary used by the password-cracking program.

When replacing a power supply which of the following would you use to determine a replacement unit?

wattage

Cache

which is also known as a buffer. The cache on most hard drives is on-board DRAM.

Default Gateway

would be the address of a device that is used either directly or indirectly, to access an external subnet or network. Typically the address would point to a router.

Transport Layer Security (TLS)

would provide a secure connection between client and server. This protocol is the successor to Secure Socket Layer (SSL). It is not a method that encrypts and digitally signs individual emails.

Secure Socket Layer (SSL)

would provide a secure connection between the client computer and the email server. This would ensure that data is sent and received from client o server in a secure manner. It would not provide encryption or digital signing of individual emails.


Related study sets

Energy & Weight Balance Nutrition Ch 10

View Set

Exam 3 Terms menstrual cycle to parturition

View Set

SOC 101 ch 9 Constructing Gender and Sexuality

View Set

EMTB-Chest and Abdominal Injuries

View Set

Market Structure and Market Power

View Set

Kinesiology Exam 1 Book Questions

View Set

1.4 Retained earnings, balance sheet

View Set

RN Targeted Medical Surgical Cardiovascular Online Practice 2019

View Set