Term
Classic Pentium Chip Sockets * |
|
Definition
They are inserted into socket 5 or socket 7, whereas Pentium II processors are inserted into slot 1.
Intel moved away from SEC's when they developed Pentium III and newer processors. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
transfer rate up to 400 Mbps and supports 63 devices in a chain.
The second version of FireWire (IEEE1394b), FireWire 800, had a transfer rate of 800Mbps. |
|
|
Term
*Balanced Technolofy eXtended (BTX) |
|
Definition
motherboard form factor designed to replace ATX form factor and create smaller, low profile, systems. |
|
|
Term
|
Definition
the motherboard is the computer component that interconnects all other components
Serial (COM) ports come in two flavors: DB9-male and DB25-male. Parallel ports come only in DB25-female ports.
two main types of cache memory are L1 and L2 cache. L1 cache memory is integrated into the processor, and L2 cache is contained outside the processor but in the processor casing or on the motherboard.
IDE supports two devices in the IDE chain, whereas EIDE has two channels with two devices in each channel (totaling four devices).
A number of major motherboard form factors are available: Full AT, Baby AT, NLX, and ATX. Motherboard form factors differ in the size of the board and the layout of the components stored on the board.
you may add components, such as a sound card or network card, to the computer by inserting an expansion card into one of the expansions slots in the system.
ISA was the popular bus architecture for years, but because of its limitations (16-bit architecture and speed of 8 MHz), it has been replaced by the PCI bus architecture. PCI is a 32-bit/64-bit architecture with speeds of 33MHz
AGP and PCI express are the common bus architectures used to insert a video card in todays systems.
you may increase the performance of the system by using a faster motherboard or by purchasing better-performing expansion cards. |
|
|
Term
*PCI expansion bus architecture |
|
Definition
Peripheral Component Interconnect
32-bit and 64-bit cards. still utilized today.
32-bit version has speed of 33MHz and transfer rate of 133Mbps. 64-bit version has speed of 66MHz.
Supports bus mastering
Offers Plug and Play architecture, if the operating system, and BIOS offers this feature.
*Identified as small white slots usually located alongside the AGP slot. |
|
|
Term
|
Definition
Advanced Graphics Port
around since Pentium II.
32-bit bus architecture running at 66MHz with multiple transfer rates. AGP 1x = 266 Mbps. AGP 2x = 533Mbps. AGP 4x = 1.07Gbps. AGP 8x = 2.2Gbps |
|
|
Term
|
Definition
Peripheral Component Interconnect Express
not compatible with existing PCI cards.
black slot that is smaller than a normal PCI slot.
utilizes data lanes to transfer information. transfer rate of 250Mbps per lane.
PCIe implements multiple lanes identified by a multiplier. Ex PCIe x1 = 1 lane; PCIe x8 = 8 lanes. upwards of 4Gbps (16 x 250MBps
Most motherboards today have a combo of both PCI and PCI Express slots. |
|
|
Term
*Know terms and differences between processors |
|
Definition
MMX throttling cache memory
what makes pentium 4 better than Celeron?
which AMD processor competes with Celeron? |
|
|
Term
|
Definition
made up of static RAM (SRAM). It is very expensive because it is much quicker than regular system memory.
3 types: L1: memory storage built directly into processor
L2: resides outside the processor and nowadays in each core processor.
L3: a shared block for all cores in the processor |
|
|
Term
*MultiMedia eXtensions (MMX) |
|
Definition
introduced by Intel.
added 57 new instructions that were built into processors and told system how to work with audio, video, and graphics. |
|
|
Term
|
Definition
involves the CPU sensing when it is going to overheat and then reducing its speed to lower the heat.
processors that support throttling have a built-in thermal sensor. |
|
|
Term
|
Definition
processors with the capability of running Virtual Machines (VMs). Each virtual machine runs a seperate operating system with virtual resources assigned to it like CPU, virtual hard drives, and memory.
*you must have a processor that supports it and it must be enabled in the system BIOS |
|
|
Term
|
Definition
graphics processing unit
takes care of video calculations and processing for the system. |
|
|
Term
Processor Socket Type: Celeron |
|
Definition
|
|
Term
Processor Socket Type: Pentium 4 |
|
Definition
|
|
Term
Processor Socket Type: Intel Core i7 |
|
Definition
LGA 1366 (aka socket B), 1366 pins |
|
|
Term
Processor Socket Type: Athlon XP |
|
Definition
|
|
Term
Processor Socket Type: Athlon 64 |
|
Definition
|
|
Term
Processor Socket Type: Phenom |
|
Definition
|
|
Term
Processor Socket Type: Turion |
|
Definition
|
|
Term
|
Definition
BIOS (Basic Input-Output System) which contains Power-on Self-Test (POST) is written on the ROM chip.
POST contains routines that initiate OS loading as well as routines that make communication between hardware devices possible. |
|
|
Term
|
Definition
electrically erasable programmable ROM, aka Flash ROM.
a ROM chip that can be rewritten with special EEPROM update software from the manufacturer of the chip. |
|
|
Term
|
Definition
Dynamic RAM
information stored on DRAM needs to be constantly refreshed.
It is single-ported: you can read and write to the memory but not at the same time. |
|
|
Term
|
Definition
Static RAM.
information held does not need to be refreshed.
basically used for cache memory.
much faster than DRAM. |
|
|
Term
|
Definition
complementary metal-oxide semiconductor
CMOS is Where the computer stores its configuration information: floppy drive, amount of memory installed, date and time, number and size of hard drives. think of it as an inventory list.
CMOS RAM is volatile memory and has a small battery to make sure it never loses power and its information. |
|
|
Term
|
Definition
the process in which a copy of the BIOS instructions are copied to shadow RAM to help the booting process.
RAM is faster than ROM and speeds up the booting process. |
|
|
Term
|
Definition
Window RAM aka Window accelerator card RAM.
modification of VRAM but performs better than VRAM. |
|
|
Term
*Synchronous DRAM (SDRAM) |
|
Definition
memory synchronized to the system board speed. data in memory is refreshed at the system speed and is also accessed in memory at system speed.
you must match the DRAM speed with the motherboard speed.
you can use faster SDRAM but it will not live up to it's potential. |
|
|
Term
|
Definition
can transfer data twice during each clock cycle, compared with SDRAM which can only transfer data once per clock cycle.
Ships in 184-pin DIMM modules for desktops and 200-pin SODIMMs for laptops
speed labeled in MHz. To read labels take the number (PC'1600') and divide by 8 to get the speed of the memory. ala 1600/8 = 200MHz |
|
|
Term
|
Definition
DDR2 uses 240-pin memory DIMM modules for desktop and 204-pin memory SODIMM for laptops, runs at 400MHz+ and utilizes only 1.8V opposed to 2.5V for DDR.
DDR3 reportedly reduces power consumption by 30% and offers twice the rate of DDR2 memory. |
|
|
Term
|
Definition
has an 8-bit data path (supplies info in 8-bit blocks).
you MUST install enough SIMMs to fill a memory bank (number of SIMMS it takes to fill the data path of the processor) -Ex: 32-bit processor needs info in 32-bit chunks, therefor you need 4 30-pin SIMMs.
must install SIMMs in pairs |
|
|
Term
|
Definition
supplies info in 32 bit chunks.
if processor needs 64-bit chunks of info, must install 2 72-bit SIMMs
must install SIMMs in pairs |
|
|
Term
**Dual inline Memory Modules (DIMMs) |
|
Definition
supply info in 64-bit chunks.
come in 168-pin (older) for SDRAM,184-pins for DDR memory,and 240-pins for DDR2/3
Most popular type of memory today |
|
|
Term
|
Definition
type of memory that verifies the information stored in memory is what is actually read from memory later
it only reports an error, it cannot fix the error. |
|
|
Term
|
Definition
memory that does not perform any kind of error checking to ensure that data written to memory is what is actually read |
|
|
Term
*Parity Memory, even and odd activation |
|
Definition
if it is set to odd, it is enabled when retrieving an odd set of bit and disabled when retrieving an even set of bits.
if it is set to even, vice versa.
When CPU requests data from memory it verifies that the parity bit that was stored with said memory matches with the one it generated. If match, integrity of info is considered OK.
If no match, it's Parity Error: problem with integrity of the data stored in memory. |
|
|
Term
*Parity bit- need to know |
|
Definition
Parity memory has an extra bit (parity bit) for every 8 bits of data. SIMMs with parity come in 9-bit (30-pin SIMM) or 36-bit (72-pin SIMM). Remember that a parity error indicates something wrong with the integrity of the data stored in memory. |
|
|
Term
|
Definition
originally L1 cache was SRAM integrated into the processor whereas L2 cache was SRAM located outside the CPU, on the system board.
Today's systems have L1 and L2 integrated into the CPU
L1 is split into 2 parts: - half the cache stores frequently accessed program 'instructions' - half stores frequently accessed program 'data' |
|
|
Term
|
Definition
Read-only Memory (ROM): memory that can be read from but not written to. Info here is permanent.
Random access memory (RAM): volatile memory that can be written to and read; info stored here is flushed out when power is lost.
Dynamic RAM (DRAM): emory that needs constant refreshing of its memory cells; it is also typically upgraded on systems
Static RAM (SRAM): static memory, does not need refreshing as often as DRAM. SRAM is faster and is used for cache memory.
Cache memory: todays processors have L1 and L2 cache unique to each processor core as well as an L3 pool for all the cores.
memory modules: 72-pin SIMMs used to be popular on Pentium systems. DIMMs are now the main type for desktops and SODIMMS are laptops.
Know the type of memory your system needs before you upgrade. not whether your system uses SDRAM or DDR memory as well as it's speed. |
|
|
Term
|
Definition
Basic input-output system
low-level instructions the system uses to communicate with the system devices
actual code that is run to communicate with those devices
It contains POST and CMOS |
|
|
Term
|
Definition
complementary metal-oxide semiconductor, aka BIOS component information
simple inventory list for the system, containing information such as the hard drive space and amount of memory that exists on the system
inventory list |
|
|
Term
*IRQs and I/O addresses for serial ports |
|
Definition
the default interrupt request (IRQ) for COM1 is 4, and the default IRQ for COM2 is 3.
Default I/O address for COM1 is 3F8-3FF Default I/O Address for COM2 is 2F8-2FF |
|
|
Term
|
Definition
-the BIOS is low-level code used by the system to communicate with the system hardware. The BIOS code is stored on an EEPROM chip located on the motherboard of the system
- the BIOS is typically updated by downloading a BIOS update program and "flashing" the BIOS
- you enter a systems CMOS setup program by using a keystroke such as F1 (IBM), F2 (Dell), or F10 (compaq) when the system starts up.
- you can change the boot order of the different bootable devices
- the three parallel port modes are SPP, EPP, and ECP
- You can change the hard drive from autodetect to manual so you can input the drive dimensions
- in order to support virtualization technology, you must have enabled virtualization support in the BIOS
- You can update your BIOS by downloading the BIOS update for your system from the BIOS manufacturer |
|
|
Term
*Logical Block Addressing (LBA) |
|
Definition
perform sector translation
developed by Western Digital
recognizes larger drives up to 2.1 GBs |
|
|
Term
*extended Cylinder/Head/Sector (ECHS) |
|
Definition
performs sector translation
dev'd by Seagate.
recognizes larger drives up to 2.1 GBs |
|
|
Term
|
Definition
hard drive controller lying to the BIOS about the drive geometry
necessary because early BIOS chips would not recognize the larger hard drives |
|
|
Term
*Integrated Drive Electronics (IDE) |
|
Definition
have controllers integrated into the drives. Controllers translate data to/from the CPU to the hard drive.
*limitation: only 2 devices could be connected in a chain. |
|
|
Term
|
Definition
faster transfer rate and allows 4 devices in a chain. gave option to add CD-ROM and Zip drives.
supports drives over 200 GBs |
|
|
Term
*Ultra DMA, *PIO mode, *Ultra DMA transfer rates |
|
Definition
*Ultra Direct Memory Access that uses an 80-wire ribbon
Programmed Input/Output mode. *- protocol that determines the transfer rate of the drive
*transfer rates of Ultra DMA range from 11.1 MBps-133MBps |
|
|
Term
*Small Computer System Interface(SCSI) |
|
Definition
a hard drive with it's own 'brain', SCSI adapter, aka SCSI card/controller.
requires an expansion card to be utilized
*supports a daisy chain of 8 devices. If the exam asks how many devices can be ATTACHED, it is 7. If the exam asks how many devices EXIST, its 8 |
|
|
Term
|
Definition
internal: 50-wire ribbon cable
external: thick Centrionics 50 or Centrionics 68 wires. |
|
|
Term
|
Definition
original version of SCSI with a *transfer rate of 5MBps.
not limited to 2 devices in a chain, up to 8 with the controller as 1 |
|
|
Term
*Types of SCSI: Fast SCSI-2 |
|
Definition
*doubled transfer rate up to 10MBps. supports 8 chain |
|
|
Term
*Types of SCSI: Wide SCSI-2 |
|
Definition
doubled the data path to 16bits. *transfer rate of 10MBps but supported a 16 chain |
|
|
Term
*Types of SCSI: Fast Wide SCSI-2 |
|
Definition
16-bit data path transfer 20MBps 16-devices |
|
|
Term
*Types of SCSI: Ultra SCSI |
|
Definition
8-bit data path Transfer 20MBps 8-devices |
|
|
Term
*Types of SCSI: Ultra Wide SCSI |
|
Definition
16-bit data path transfer 40MBps 16-devices |
|
|
Term
*Types of SCSI: LVD (Ultra2 SCSI) |
|
Definition
Low Voltage Differential 16-bit data path transfer 80MBps 16-devices |
|
|
Term
|
Definition
-EIDE devices are slower than SCSI and SATA and only support 4 devices, with 2 devices per EIDE chain
- EIDE devices must be designated as master/slave
- SCSI need a host adapter and unique IDs with the SCSI bus terminated at both ends
- SATA drives are faster than EIDE and support hot-swapping. Each SATA port on motherboard supports connecting a single SATA drive.
- CD-ROMs store 700MB, DVDs store 4.7-8.5GBs, Blu-ray stores 25-50GBs
- an 8x DVD can transfer data at 10.80 MBps; 8x Blu-ray transfers 36MBps |
|
|
Term
*Steps to configure a partition |
|
Definition
1. Create primary partition
2. Create extended partition
3. Create a logical drive in the extended partition
4. Format the drives to create a file system. |
|
|
Term
|
Definition
- a cluster is the allocation unit for a file
the cluster size for a partition is based on the file system used and the size of the partition
- the FAT file system is limited to a max partition size of 2GB. FAT32 increased that to 2TB
- Windows has its own file system called NTFS. benefits = security, auditing, compression. Windows offers file and drive encyrption when using the NTFS file system
- to optimize your drive, run the defragmentation tool often
- to verify the integrity of the drive, run Check Disk in Windows often
- a primary partition is the bootable partition for the system and must be set active. An extended partition holds logical drives for storing info.
- you can remove temp files with the Disk Cleanup utility in Windows |
|
|
Term
*Power Supply Tasks: Conversion of Voltage |
|
Definition
converting voltage from the building-supplied AC voltage to various DC voltages required by components inside the computer. |
|
|
Term
*Power Supply Tasks: DC Voltage Regulation |
|
Definition
regulation to provide a very small tolerance of error to the devices receiving the power.
a +/- 5% voltage differential is allowed for 12VDC, 5VDC, and 3.3VDC |
|
|
Term
*Power Supply Tasks: Over-current protection |
|
Definition
power supply should handle some level of abnormally high current to prevent fuses in the power supply from blowing unnecessarily |
|
|
Term
*Power Supply Tasks: Input-under voltage |
|
Definition
if voltage being supplied by the building drops below normal operating level, it shouldn't cause damage to power supply itself.
Causes the power supply to shut off |
|
|
Term
*Power Supply Tasks: Energy Star |
|
Definition
specification that defines how much power the power supply should provide to the computer components during reduced power states, when the comp is asleep or on standby. |
|
|
Term
*Power Supply Tasks: PS-ON# feature |
|
Definition
allows motherboard to control power supply through a soft power switch. |
|
|
Term
*Power Supply Tasks: power supply specification |
|
Definition
either recommends or requires the use of cooling fans depending on the form factor of the power supply |
|
|
Term
*Power Supply Tasks: Input supply voltage (120V or 240V) |
|
Definition
might be static or configured via manual switching or automatic switching. Many laptops have auto while most desktops have manual |
|
|
Term
*Power Supply provides Voltage at |
|
Definition
|
|
Term
|
Definition
-The current specification of power supplies is ATX, and the ATX power supply will be found in one form factor or another on most current computers
- The main power connector has 20 or 24 pins. Four-pin floppy, and peripheral connectors supply 5V and 12V, and a five-pin SATA connectors supply 3.3V, 5V, and 12V.
- Power supplies convert 120VAC or 240VAC power into DC for the comp
- Power supplies come in a variety of power sizes, from 160W up to and beyond 1200W.
0 AC adapters are used in laptops to convert power from AC to DC, and usually automatically switch between 120V and 240V
- Surge suppressors, line conditioners, and UPS deal with various power supply problems, including surges and brownouts. |
|
|
Term
*Universal Serial Bus (USB) |
|
Definition
Transfer Rates: USB 1 = 12 MBps USB 2 = 480 MBps USB 3 = 5 GBps |
|
|
Term
|
Definition
Apple trademark for the IEEE 1394 standard
enabled 63 external daisy chains 50-400MBps transfer speed There is also FireWire 800 (800MBps transfer rate)
replaces SCSI
DO NOT CONFUSE WITH IEEE 1284: deals with bidirectional comm over the parallel port. |
|
|
Term
|
Definition
Twisted pair cabling type
UTP cable designed with data networking in mind. similar in design to all newer categories, but some electrical characteristics are unique to each.
Carries 10MBps ethernet data. |
|
|
Term
|
Definition
Twisted pair cabling type
UTP designed to carry 16MBps token ring data |
|
|
Term
|
Definition
Twisted pair cabling type
designed to carry 100MBps ethernet data.
meets req's for 1000Base-T.
enhanced version of the cable that better meets the standards of 1000Base-T by reducing crosstalk. |
|
|
Term
|
Definition
- know the difference between serial and parallel communication
- know the difference between USB and IEEE 1394 (FireWire)
- General understanding as to why different cables and connectors are used in your system |
|
|
Term
RS-232 is a term associated with which type of port? - Serial - Parallel - SCSI - Game |
|
Definition
|
|
Term
How is serial data moved?
- Across multiple cables at the same time
- As a sequential stream of data
- using a bidirectional information algorithm
- using multi-clock sequencing |
|
Definition
As a sequential stream of data |
|
|
Term
CAT5 cables are defined by which of the following?
- number of pairs of wires
- Length of the cable segment
- Type of shielding that is used
- Number of twists per foot in each pair of wires |
|
Definition
Number of twists per foot in each pair of wires. |
|
|
Term
*Keyboard Connectors: DIN-5 connector |
|
Definition
aka AT connector
used on older systems
DIN connectors are large and round |
|
|
Term
*Keyboard Connectors: PS/2 connector |
|
Definition
aka mini-DIN 6
most popular connector found on computers in the past. now replaced by USB. |
|
|
Term
|
Definition
Connects to the system via USB |
|
|
Term
|
Definition
modem commands that are called by software to perform comm.
only need for troubleshooting why a computer is not dialing up
List: ATDT - Dial a number using touch-tone dialing
ATDP - dial a number using pulse or rotary dialing
ATA - Instruct modem to answer
ATH -Instruct modem to hang up
ATL - Set the speaker loudness
ATZ - Reset the modem to the default settings
Hints to help remember: 1. each command starts with an AT prefix
2. A character for settings, D (dial), A (answer), H (hang up), L (loudness), Z (default settings)
3. two types of dial tones, 'T'ouch-tone and 'P'ulse |
|
|
Term
|
Definition
- Keyboards usually connect to the system with a PS/2 or USB
- Older keyboards use DIN-5 to connect to motherboard
- Most mice connect via PS/2 or USB
- Serial mice aren't common anymore but connect via serial port
- modems convert digital signals to analog and vice versa over an analog line
- Know that when you install hardware in the system that the hardware uses system resources such as an IRQ, I/O address, and possible a DMA channel. Also, know that those resources are assigned through PnP (plug-and-play), which means the OS detects the hardware and assigns these resources automatically |
|
|
Term
Which two formats do serial ports come in?
1. 9-pin 2. 15-pin 3. 20-pin 4. 25-pin |
|
Definition
|
|
Term
Which two types of interfaces are typically used to connect a network card to the system?
1. Parallel 2. USB 3. PCI 4. Serial |
|
Definition
|
|
Term
*Video Standards: Monochrome Display Adapter (MDA) |
|
Definition
displays data in text with a single color.
obsolete, but an old server might still utilize it |
|
|
Term
*Video Standards: Color Graphics Adapter (CGA) |
|
Definition
Step above MDA. supports 4 colors in a 320 x 200 resolution and only 2 colors in 640 x 200 resolution.
First to support color |
|
|
Term
*Video Standards: Enhanced Graphic Adapter (EGA) |
|
Definition
supports 16 colors at 640 x 350 resolution |
|
|
Term
*Video Standards: Video Graphics Array (VGA) |
|
Definition
resolution of 640 x 480 with 16 colors, but also supports 256 colors at lower resolutions |
|
|
Term
*Video Standards: Extended Graphics Array (XGA) |
|
Definition
Resolution 800 x 600; 65,536 colors
Resolution 1024 x 768; 256 colors
spin-offs include: Wide XGA, XGA+, and Wide XGA+ |
|
|
Term
*Video Standards: Super VGA (SVGA) |
|
Definition
resolution 1280 x 1024; 16million colors |
|
|
Term
*Video Standards: Super VGA+ |
|
Definition
Standard for LCD displays on laptop computers
Resolution 1400 x 1050
Widescreen (WSXGA+), 1680 x 1050 |
|
|
Term
*Video Standards: Ultra XGA |
|
Definition
1600 x 1200; 20-in or 21-in LCD display standard |
|
|
Term
*Video Standards: Widescreen Ultra Extended Graphics Array (WUXGA) |
|
Definition
1920 x 1200; standard with widescreen LCD tvs and monitors |
|
|
Term
*Display Features: Refresh Rate |
|
Definition
how frequently a display redraws the screen. increasing the refresh rate can reduce flicker on the screen that strains our eyes |
|
|
Term
|
Definition
way to measure amount of light from display. |
|
|
Term
*Display Features: Contrast Ratio |
|
Definition
value measuring brightness of different colors.
Larger ratios = better picture quality on display |
|
|
Term
*Display Features: Native Resolution |
|
Definition
Actual resolution of the monitor. |
|
|
Term
*Troubleshooting display issues: VGA mode |
|
Definition
if you loaded an inappropriate driver for a display it's possible that the system will crash.
restart the system and choose F8 upon start up. this displays Windows Advanced Startup Menu.
Choose VGA mode - ensures that the video driver is not loaded so you can remove the driver through device manager |
|
|
Term
*Troubleshooting display issues: no image on the screen |
|
Definition
ensure power is connected and is on and connected to comp
if using a projector, use the function keys to toggle screen output to projector |
|
|
Term
*Troubleshooting display issues: Overheat shutdown |
|
Definition
Clean the device, focusing on cleaning the dust away from air vents and fans |
|
|
Term
*Troubleshooting display issues: Dead Pixel |
|
Definition
use diagnostic programs such as UDPixel from udpix.free.fr to help detect and fix problems related to pixel display |
|
|
Term
*Troubleshooting display issues: Artifacts |
|
Definition
Abnormalities in the display of information on the screen.
results from a hardware problem or driver issue |
|
|
Term
*Troubleshooting display issues: Color patterns incorrect |
|
Definition
check your color-correction settings, brightness or contrast.
could also occur if the monitor is not connected properly |
|
|
Term
*Troubleshooting display issues: Dim image |
|
Definition
check brightness settings in either display driver options or power settings.
check that monitor is connected properly |
|
|
Term
*Troubleshooting display issues: Flickering Image |
|
Definition
caused by a weak connection.
Disconnect and reconnect cable |
|
|
Term
*Troubleshooting display issues: Distorted image |
|
Definition
Video driver or bad video card.
try to replace the driver first. If no-go, replace video card |
|
|
Term
*Troubleshooting display issues: discoloration (degaussing) |
|
Definition
old CRT monitors could experience discoloration due to EMF (external magnetic fields).
use a degausser to reduce the magnetic field and remove the discoloration |
|
|
Term
*Troubleshooting display issues: BSOD |
|
Definition
may happen when the wrong video driver has been loaded or driver has gone corrupt.
if experiencing regular BSOD, while restarting the system, choose F8. Select VGA mode from Advanced Startup Menu. Once loaded, remove the corrupt driver through the device manager. |
|
|
Term
|
Definition
Standard serial connection that sends data one bit at a time.
utilizes the serial port on a computer, (mostly modems) |
|
|
Term
|
Definition
- The video card converts digital data from the computer into analog data that is used by older monitors to create the display
- VGA supports 16 colors at a resolution of 640 x 480
- Super VA supports 16 million colors at 1280 x 1024
- AGP cards were once a popular form for video cards
- PCIe cards are the popular form for video cards today, and sound cards are implemented as PCI cards
- CRT monitors use an electron gun to stimulate the phosphor-covered screen to make it glow. |
|
|
Term
Sound cards are connected to the system using which of the following? (choose 2)
1. AGP 2. ISA 3. PCI 4. USB |
|
Definition
|
|
Term
|
Definition
1.Charging the print drum(conditioning) - primary corona wire applies -600V
2. Exposing the drum (writing) - Laser draws image on the drum
3. Developing the image (developing) -Toner fills in -100v areas and is ready for transfer
4. Transferring the image (transfer) - Transfer corona wire applied +600V to the paper
5. Fusing - melts toner onto paper
6. Cleaning Photo drum with cleaning blade - removes excess toner |
|
|
Term
*Dot Matrix printers troubleshoot |
|
Definition
-Faint printing: the print ribbon needs replacing
- No printing: print head cable might be disconnected or torn through the ribbon. Connect print head or replace ribbon.
- Paper jamming: make sure paper is correct size
- Line across page: pin in print head is stuck out. Loosen stuck pin or get new print head |
|
|
Term
*Inkjet Printer troubleshoot |
|
Definition
-Paper jam: feeder wheels might be dirty or you have incorrect paper size
- Poor print quality: ink needs replacing or wrong type of paper.
- Fading/Ghosted print: change ink cartridge |
|
|
Term
*Laser Printer Troubleshoot |
|
Definition
- White stripes: transfer corona wire needs replacing
- Blank page: something is wrong with corona wires or out of toner
- Vertical line: scratch in print drum. replace toner cartridge. If still a line, laser is the problem
- Toner not fused to paper: toner smears off paper. something wrong with fuser rollers. replace fuser rollers.
- Out of memory: add more memory to printer or send smaller print jobs or lower quality images |
|
|
Term
*Preventative maintenance for printers |
|
Definition
1. turn off and unplug
2. clean outside with lint-free cloth and some isopropyl alcohol
3. remove paper tray and paper and clean/dust.
4. remove toner
5. clean inside of printer and rollers
6. put back together and test print |
|
|
Term
|
Definition
- Laser printers use light, electromagnetism, and heat to create a printout
- Inkjet printers use a heating element to vaporize ink and spray it through a pinhole to make characters on a page
- Dot matrix printers use solenoids to strike a ribbon, creating characters from patterns of printed dots
- You may use a parallel connection, USB, or network connection to send print jobs. USB is popular for home and small office.
- 6 phases to the laser printing process are charging (conditioning), writing, developing, transferring, fusing, and cleaning.
- you may install a printer in Windows via Add Printer wizard. you can then configure settings. |
|
|
Term
What two types of feeder mechanisms are used in printers?
1. Continuous tractor feed 2. Continuous form feed 3. Friction feed 4. injected |
|
Definition
|
|
Term
Which 2 devices use friction feeder mechanisms? 1. Laser printer 2. Fax machine 3. Dot matrix printer |
|
Definition
|
|
Term
|
Definition
- a flatbed scanner is most popular and uses technology called charge-coupled device (CCD).
- popular connectors for scanners and cameras are USB
- Digital cameras quality is measured in megapixels.
- Codecs compress videos so they don't take up too much space. Computer must have same codec installed to watch video
- Make sure microphone is set as a recording device so it can pick up sound |
|
|
Term
Best battery for laptop computers |
|
Definition
Li-Ion battery. - provides the most durability and performance. - more expensive though |
|
|
Term
'Standby mode,' 'sleep,' and 'suspend' are interchangeable terms on the test |
|
Definition
'Standby mode,' 'sleep,' and 'suspend' are interchangeable terms on the test |
|
|
Term
*Most popular keyboard found on desktops and laptop computers today |
|
Definition
|
|
Term
|
Definition
sends data over radio frequencies at approx 1MBps and a max distance of 10 meters or approx 11 yards (10.93) |
|
|
Term
*Personal Computer Memory cary Industry Association (PCMCIA): Type I card |
|
Definition
3.3mm thick, single row of sockets. - used to add memory original reason for the expansion architecture |
|
|
Term
*Personal Computer Memory cary Industry Association (PCMCIA): Type II card |
|
Definition
5.5mm thick. 2 rows of sockets. - usually network cards and modems |
|
|
Term
*Personal Computer Memory cary Industry Association (PCMCIA): Type III card |
|
Definition
10.5mm thick. 3 rows of sockets - hard disk drives |
|
|
Term
|
Definition
- Battery in laptops are charged by AC adapter
- 2 types of LCDs in laptops are 'active matrix' and 'passive matrix'
- laptops use SODIMM cards for memory
- PCMCIA are used to expand laptops capabilities: = Type 1 cards: add memory in past = Type 2 cards: network cards = Type 3 cards: removable storage
- not all devices have field-serviceable components |
|
|
Term
Which video display solution is not used on laptops? 1. LED 2. LCD 3. Plasma 4. OLED |
|
Definition
Plasma - due to size and weight |
|
|
Term
|
Definition
|
|
Term
|
Definition
- Each pixel is supported by its own transistor
- Images are easy to view from angles |
|
|
Term
Preventative maintenance tasks |
|
Definition
1. scanning for file system errors
2. scanning for virus and malware
3. updating virus and spam definitions and emergency boot disks
4. backing up data and CMOS settings
5. defragmenting hard drives
6. removing unnecessary hard drive files
7. cleaning screens, mice, keyboards, floppy and tape drives, and internal and external surfaces
8. ensure external system fans and venters, internal fans, and heat sinks are functioning and free of dirt and debris.
9. Check power protection devices and all cable connections internal and external |
|
|
Term
Hardware tools for maintenance |
|
Definition
- Compressed air
- Computer vacuum
- cleaning cloths
- cleaners and chemicals
- cleaning pads
- manufacturer-approved cleaning kit |
|
|
Term
Software tools for maintenance |
|
Definition
- Auto-update tools
- Firmware updates
- Driver updates
- OS-level tools
- 3rd-party maintenance tools
- Recovery or rescue boot CD |
|
|
Term
|
Definition
is more problematic in a higher humidity area |
|
|
Term
|
Definition
-Perform preventative maintenance to increase productivity
- Conduct preventative maintenance tasks at scheduled intervals
- standard tools for preventative maintenance include cleaning materials, vacuums, compressed air, and software tools like defrag.exe, chkdsk.exe
- Factors that affect computer lifespan are heat and humidity, ESD, dirty and dust, and incoming power issues |
|
|
Term
What 2 factors affect the storage life of computer media? 1. Media length 2. Age of facility 3. Temperature 4. Humidity |
|
Definition
|
|
Term
|
Definition
Tool that measures: - Voltage (V) - Resistance (ohms; Ω) - Continuity and current (milliamps[mA] and amps [A]) |
|
|
Term
|
Definition
used for testing parallel and serial ports. makes the computer think it is connected to a network and helps prevent error messages |
|
|
Term
|
Definition
helps you manage hard disk issues by booting from a CD |
|
|
Term
Why would you use an extension magnet? |
|
Definition
to retrieve dropped metal objects |
|
|
Term
What is the purpose of a security bit? |
|
Definition
to reduce the chance of users opening system cases |
|
|
Term
Recent Windows OSes are based off of... |
|
Definition
Windows NT, not Windows 3.0 or Windows 9x |
|
|
Term
Hardware requirements for Different Windows Requirements |
|
Definition
|
|
Term
|
Definition
first 9 revisions of the Mac OS were proprietary, built entirely by Apple.
Mac OS X and later are based on BSD Unix core with Apple proprietary enhancements |
|
|
Term
|
Definition
- Major operating systems are Windows, Linux, Mac
- Windows and Linux hardware is compatible, but applications are not.
- Linux comes in subvarieties called distributions
- all 3 OSes have similar GUI environments |
|
|
Term
|
Definition
Always choose NTFS.
Choose FAT, FAT32, or exFAT only if you need to dual-boot a computer with another OS. |
|
|
Term
|
Definition
Stores all settings in either - HKEY_LOCAL_MACHINE or - HKEY_CURRENT_USER |
|
|
Term
Remote Assistance requests are always initiated by... |
|
Definition
the person requesting help |
|
|
Term
|
Definition
- The OS is responsible for managing the interface between all hardware components that make up the computer
- General Protection Faults (GPFs) and Stop errors are often a result of applications trying to cross memory boundaries
- Virtual memory is composed of physical memory or RAM and space on your hard drive, in the form of a paging file.
- NTFS is the most robust and stable of the available file systems but is compatible with the fewest other OSes
- System and application settings are stored in the Registry or in INI files
- explorer.exe makes up most graphical navigation of your computer and is represented as both my computer and the desktop
- Control Panel applets offer interfaces to many system settings
- Remote access to computers is available through Remote Desktop Connections and Remote Assistance, both rely on Remote Desktop Protocol (RDP) |
|
|
Term
What's the first step to open a Remote Assistance connection on Windows XP? 1. Open the Remote Desktop Connection program 2. Ask customer to choose 'Help and Support' from the Start menu 3. Ask customer to run geninvite.exe from Start -> Run 4. Open the Remote Assistance program from your computer, File -> Connect to computer, and choose customer's computer. |
|
Definition
2. Ask customer to choose 'Help and Support' from the Start menu |
|
|
Term
If a customer wishes to set up a computer that will boot into several different operating systems, and he would like to have one partition used for sharing data, which file system should he use? 1. FAT 2. FAT32 3. NTFS 4. Reiser FS |
|
Definition
1. FAT - it is compatible with most OSes |
|
|
Term
|
Definition
|
|
Term
winnt32.exe Setup Switches |
|
Definition
|
|
Term
|
Definition
Windows program used to create answer files.
can pass the answer file to Windows setup via winnt.exe: /u: or winnt32.exe: /unattend: |
|
|
Term
Log files during installation: Setupact.log |
|
Definition
records info about the files that are copied during installation |
|
|
Term
Log files during installation: Setuperr.log |
|
Definition
records info about errors that occur during installation |
|
|
Term
Log files during installation: Setupapi.log |
|
Definition
records info about device drive files that are copied during installation |
|
|
Term
Log files during installation: Setuplog.txt |
|
Definition
records additional info about device drivers |
|
|
Term
|
Definition
term used when you update your windows source files with Service Pack files.
benefit is any new installation of Windows from the updated source files will already have the Service Pack installed. |
|
|
Term
|
Definition
-When planning your installation, be sure to plan the partition size, file system, and the computer name that you will use when installing Windows.
- You can boot off the Windows CD-ROM/DVD-ROM to invoke installation
- Launch the winnt.ece setup program from a DOS system; launch winnt32.exe from an existing 32-bit Windows interface
- to dual-boot multiple OSes, make sure that you are using a file system common to each OS, and then install each OS to separate partition
- Slipstream your distribution folder so that new installations will deploy with the current Service Packs already installed
- the user state migration tools are used to copy a user's settings and files from one comp to another. A great feature to make your life easier if you need to do this someday |
|
|
Term
Minimum RAM requirements for Windows XP? |
|
Definition
|
|
Term
After installing Windows XP, what will you need to do to prove you have a valid copy of XP? 1. Register it 2. Restart it 3. Activate it 4. Shut it down |
|
Definition
|
|
Term
Minimum RAM req's for Windows Vista? |
|
Definition
|
|
Term
File Allocation Table (FAT) |
|
Definition
an index on your file system that holds a pointer to where each file is stored on your hard drive |
|
|
Term
|
Definition
an index called, Master File Table, that holds a pointer to where each file is stored on your hard drive. |
|
|
Term
Moving files in FAT or NTFS |
|
Definition
you only need to change its reference in the table, not its location in the file system |
|
|
Term
Executable File extensions |
|
Definition
- .bat, Batch file; a series of commands sequentially typed into a text file
- .cmd, OS/2 command file; usually execute with only a command shell interface
- .com, MS-DOS command file; like OS/2 command files; usually execute with only a command shell interface
- .exe, Command line or graphical program; most common extension for executable files
- .ps1 PowerShell script file; not executable themselves but require 'powershell.exe' to be executed, they should be considered super batch files
- .vbs, Visual Basic Script; not exe themsevles but req either 'wscript.exe' or 'cscript.exe' to execute; a cross between Visual Basic applications and batch files |
|
|
Term
Major Office Applications extensions |
|
Definition
- .wks and .wk4, Lotus 1-2-3 worksheet files; the number at the end denotes that a specific version of Lotus 1-2-3 was used.
- .wpd, WordPerfect document, this an '.doc' are common extensions for documents
- .wpg, WordPerfect Graphic; WordPerfect's proprietary graphic format |
|
|
Term
|
Definition
- .ani, Animated cursor files; contains animated mouse pointers
- .bak, Backup files; used as a default extension by a number of applications.
- .bin, Binary drivers; used for a few system drivers, such as 'drvspace.bin'
- .cpl, Control Panel files; contains interface to adjust Windows settings
- .cur, Cursor files; holds graphical info to display mouse cursor
- .dat, Data files; used with the Registry files
- .dll, Dynamic Link Library; contains common and reusable code that can be called by any application to reduce the amount of code that has to be placed within specific applications
- .drv, MS-DOS or realmode driver files; Contains MS-DOS-formatted binary drivers
- .ini, initialization files; text files that contain settings for applications; PHASED OUT IN FAVOR OF REGISTRY
- .msc, Microsoft Console settings files; seen often with Windows 2000 or above and a bit with Windows NT 4.0
- .msg, Error message file; contains messages to be displated in the event of an error
- .msi, Microsoft Installer files; a file format used to distribute software to comps running the Windows Installer service
- .scr, Windows Screensaver files; holds binary code to display Windows-based screensaver
- .sys, Systen driver files; used with MS-DOS and Windows for backward compatibility
- .tff, True Type font definition files; contains formula description used to display scalable fonts
- .vxd, Virtual Device Drivers; holds binary code for Windows-based device drivers |
|
|
Term
Basic attributes: Read-only |
|
Definition
Cannot be deleted from the command line and cannot be written to or saved over |
|
|
Term
|
Definition
Invisible to users unless those users have changed their viewing options to display hidden files. Hidden files cannot have their attributes changed by the 'attrib.exe' command |
|
|
Term
|
Definition
Flagged as being required by the OS. They cannot have their attribute changed by the 'attrib.exe' command |
|
|
Term
|
Definition
Ready for archive or backup. |
|
|
Term
|
Definition
If you move a compressed file within a partition, the file will retain its compression.
If you copy a compressed file to a folder, it inherits the compression attribute that is set for the destination folder |
|
|
Term
|
Definition
if the file moves between NTFS partitions (even computers), it will remain encrypted.
If the file is moved to a non-NTFS partition, the file is automatically decrypted.
If you cannot decrypt the file, you will receive an 'Access Denied' message when you attempt to move the files to a location which is on a different partition. |
|
|
Term
|
Definition
- Windows is not limited to the 8.3 naming convention
- Windows supports simulated 8.3 naming for backward compatibility
- the four basic file attributes are, Read-only, Hidden, System, and Archive.
- Windows XP, Vista, and 7 support additional file attributes for compression, encyrption, and indexing. These attributes are available only on the Windows NT File System (NTFS).
- The Archive attribute is still used by many backup programs to locate files that have changed since the last backup. |
|
|
Term
What is the maximum character length of a filename under Windows XP? 1. 64 2. 128 3. 254 4. 255 5. 256 |
|
Definition
|
|
Term
Windows XP and Vista's main command line command |
|
Definition
cmd.exe and command.com (backward compatibility)
command.com is not supported on 64-bit Windows OSes |
|
|
Term
defrag.exe does not exist for what Windows version? |
|
Definition
Windows 2000.
Only available on Windows XP and newer |
|
|
Term
|
Definition
- 'attrib' changes file attributions, such as read-only, hidden, system, and archive
- 'copy' copies one or multiple files from one directory to another
- 'defrag' defragments your hard drive to increase performance
- 'dir' displays a list of files in a directory
- 'format' prepares a disk for accepting data or to erase a disk
- 'chkdsk' checks a disk for errors that could cause data loss
- 'ver' displays the version of Windows that is in use
- 'xcopy' is like copy but it can be used to copy entire directory structures |
|
|
Term
You need to regularly backup files in a directory, but you only want to back up files that have changed. What commands can you use to accomplish this in the easiest way possible? 1. fc and xcopy 2. attrib and copy 3. fc, changes, and xcopy 4. xcopy and attrib |
|
Definition
|
|
Term
|
Definition
- Virtual memory is managed by the Virtual Memory Manager, which presents a 4GB address space to applications on the system.
- Virtual memory is made up of physical RAM and hard disk space in the form of a swap file or paging file.
- The Windows XP, Vista, 7, boot process uses the 'ntldr', 'ntbootdd.sys', 'ntdetect.com', 'bootmgr', 'BCD', 'winload.exe', and 'boot.ini' files. |
|
|
Term
A user has a program that automatically starts when he logs into his computer. He would like to disable it. Where should he look for possible settings? 1. load = lines in 'win.ini' 2. The Startup group in the Start menu 3. the RUN key in the registry 4. All the above 5. None of the above |
|
Definition
|
|
Term
A user boots his computer and sees a message stating, "NTLDR is missing. Press any key to restart." What should he do first? 1. Set the CD-ROM as bootable in the systems CMOS and insert the Windows XP CD. This will allow him to complete an emergency repair. 2. Reinstall Windows XP 3. Reboot the computer and enter Safe Mode; then choose RebuildBootSect.exe from the \windows\system32 directory. 4. Remove the floppy disk from the A: drive. |
|
Definition
4. Remove the flopy disk from the A:drive.
the computer tries to boot from the A: drive due to its order in CMOS. |
|
|
Term
What is the first file that is loaded as part of the Windows XP boot process? 1. io.sys 2. ntbootdd.sys 3. ntbooter 4. ntldr |
|
Definition
|
|
Term
What file is a copy of the SCSI drivers for the SCSI controller in your windows XP computer? 1. ntbootdd.sys 2. boot.ini 3. ntldr 4. ntdetect.com |
|
Definition
1. ntbootdd.sys
the ntbootdd.sys file is a copy of the SCSI driver that has been renamed and is used during the boot process |
|
|
Term
|
Definition
Is the main tool used for configuring and removing installed device drivers |
|
|
Term
|
Definition
is designed to increase system stability by requiring hardware manufacturers to validate their drivers with Microsoft |
|
|
Term
|
Definition
term used to describe components that can be replaces while the computer is asleep, standby, or low-power state |
|
|
Term
|
Definition
- The driver installation procedures are found in the INF files
- Drivers verified and signed by Microsoft include CAT file, which contains the signature.
- Plug and Play takes care of devices resource settings for most devices.
- Device Manager is the basic management tool for driver management
- Driver errors can be recovered by updating drivers, using Safe Mode, loading the Last Known Good Configuration, or restoring to a system restore point |
|
|
Term
Plug and Play process's 3 major components |
|
Definition
- Bus Enumerator
- Configuration Manager
- Resource Arbitor |
|
|
Term
Which of the following is not part of the Plug and Play procedure?
1. Resource Arbiter 2. Dynamic Reconfigurator 3. Configuration Manager 4. Bus Enumerator |
|
Definition
2. Dynamic Reconfigurator is not part of the Plug and Play procedure |
|
|
Term
Running out-dated applications on Window XP or Vista |
|
Definition
Check the Application Compatibility Settings |
|
|
Term
|
Definition
- 16-bit, 32-bit, and DOS-based applications function under Windows 9x and Windows XP, and 64-bit applications if the OS is 64-bit Windows
- There are core architectural differences between 32-bit and 64-bit Windows. Support for applications differs based on the architectural differences of the OSes
- The new application compatibility features in Windows allow it to support a wider range of older Windows applications |
|
|
Term
Which of the following types of multitasking are supported by Windows XP? (choose 2)
1. Share-based multitasking 2. Equality multitasking 3. Cooperative multitasking 4. Preemptive mutlitasking |
|
Definition
3,4; Cooperative and Preemptive |
|
|
Term
Which of the following are benefits of 32-bit Windows applications? (choose 2)
1. They share a common message queue. 2. They run in separate memory spaces 3. They are preemptively multitasked 4. They support running multiple applications in one virtual machine |
|
Definition
2,3; They run in separate memory spaces (so that when an application hangs it does not affect the others) and are preemptively multitasked |
|
|
Term
How can you preemptively multitask 16-bit windows applicatiosn when using Windows XP? 1. Right-click the application icon and choose Launch in Seperate Memory Space. 2. Choose Start->Run, use the Browse button to locate the application, then select the Start in Separate Memory Space check box. 3. use start /separate in a command prompt 4. This cannot be done |
|
Definition
3, using the START command allows you to run applications in separate memory spaces |
|
|
Term
What effect does a 32-bit Windows application have on the rest of a Windows XP system when it hangs or crashes? 1. it halts 32-bit Windows applications that are running on the system 2. It halts 16-bit Windows applications that are running on the system. 3. It halts MS-DOS-based applications running on the system. 4. It has no effect on other applications |
|
Definition
4. when a 32-bit Windows application crashes, it has no effect on other applications running on the system. |
|
|
Term
What effect does a 16-bit Windows application have on the rest of a Windows XP system when it hangs or crashes? 1. it halts 32-bit Windows applications that are running on the system 2. It halts 16-bit Windows applications that are running on the system. 3. It halts MS-DOS-based applications running on the system. 4. It has no effect on other applications |
|
Definition
2. When a 16-bit Windows app crashes, it halts other 16-bit Windows applications in the same memory space. MS-DOS and 32-bit Windows apps should continue to operate. |
|
|
Term
Which main subsystems are where system bottlenecks occur? |
|
Definition
Either in the: -Processor -Memory -Disk -Network |
|
|
Term
|
Definition
component of Performance that makes the graphs of current and logged activity.
Windows Vista and 7 have gone back to calling the component that makes the graphs "Performance Monitor" |
|
|
Term
|
Definition
- Virtual memory and applications that access the paging file reduce performance.
- Performance is increased by using the computer's faster interface available for a device, such as using a FireWire rather than serial.
- To improve performance, reduce the number of processes and services running.
- Printers can be optimized by changing the location of the spool directory |
|
|
Term
What 2 things can you do to improve hard disk access? 1. Double the number of pins on your drive that are carrying data. 2. Defragment your drive. 3. Add a speed doubler to the drive bus 4. Change to a faster bus architecture |
|
Definition
|
|
Term
|
Definition
Disk maintenance programs, such as 'fdisk,' 'defrag,' and 'chkdsk,' are used to improve performance and reliability of the disk subsystem
- Configuration utilities, such as the system configuration utility, System Information tool, Registry editors, Registry scanners, Device Manager, and the Computer Management Console are used to view or change Windows Configuration settings.
- 'wordpad.exe' or 'notepad.exe' can be used to create or modify text files.
- 'expand.exe' can be used to decompress Windows XP source files |
|
|
Term
Which files on your hard drive make up the Windows XP Registry? 1. system.dat and registry.dat 2. user.dat and system.dat 3. user.dat and hardware.dat 4. system, sam, security, and ntuser.dat |
|
Definition
4. system, sam, security, and ntuser.dat, in addition ro software, are the files that make up the registry.
All of the files are found in <%systemroot%>\system32\config, with the exception of ntuser.dat, which is found in each user's profile directory |
|
|
Term
You need to automate a procedure on your computer. What tools could you use? 1. wscript.exe 2. ScriptIt.exe 3. config.sys 4. Local ASP |
|
Definition
wscript.exe, Windows Script Host, can be used to automate processes |
|
|
Term
What is the name of the command-line version of Windows Script Host? 1. ComScript.exe 2. wscript.exe 3. cmscript.exe 4. cscript.exe |
|
Definition
4. cscript.exe is the command line script interpreter. |
|
|
Term
|
Definition
- "No operating system found" is an MS-DOS error message and might mean that a floppy disk was left in your Windows XP Computer.
- Most Windows boot sector or boot file errors can be fixed with either the Emergency Repair Process or Recovery Console.
- Safe Mode is used to diagnose and resolve driver or startup problems
- Event viewer should always be checked as part of the troubleshooting process to see what error messages are being reported by Windows. |
|
|
Term
Which of the following options are valid procedures for trying to resolve corrupted boot files with Windows XP? (choose 2) 1. Recovery Console 2. sys.com 3. fdisk.exe 4. Emergency Repair Process |
|
Definition
1,4; Both allow you to repair problems with the boot files. |
|
|
Term
|
Definition
Windows 9x term for paging or page file (virtual memory) |
|
|
Term
You installed Windows XP in the default location, C:\windows. What will be the effect of deleting your boot.ini file? 1. Your system with boot as normal but will not display a boot menu. 2. Your system will not boot and will display a missing boot.ini error message 3. your system will not boot and will display a missing ntoskrnl32.exe error message 4. Your system will not boot and will display a missing ntdetect.com error message. |
|
Definition
1. your system will bot as normal; when boot.ini is missing, Windows attempts to boot from the default installation location. |
|
|
Term
You are missing your copy of ntldr, and your Windows XP computer will not boot. How can you replace your copy of ntldr? 1. use the retrieve.exe command to get a copy from the Windows XP installation CD-ROM. 2. Replace this file via the Recovery Console 3. This file is not required and does not have to be replaced. 4. Copy it from any other computer that is running Windows XP |
|
Definition
4. ntldr is identical across all copies of Windows XP. |
|
|
Term
What is the ntbootdd.sys file? 1. Text configuration information for your Windows XP system. 2. The boot loader 3. The SCSI driver for your SCSI adapter if the BIOS is disabled on the adapter 4. The boot menu configuration file |
|
Definition
3. ntbootdd.sys containts the SCSI driver for your SCSI adapter if the BIOS on the adapter has been disabled |
|
|
Term
What file or files make up the user portion of the Registry? 1. registry.dat 2. system.ini and registry.dat 3. user.dat 4. ntuser.dat |
|
Definition
|
|
Term
|
Definition
If you are having a print spooler problem, restarting the spooler service is usually the correct answer |
|
|
Term
Common Automatic Reboot (auto-restart) errors |
|
Definition
- Service configuration
- CPU fan
- Power supply problem
- Power source problem
- Bad memory
- Network attack
- Automatic updates |
|
|
Term
Common reasons for Stop errors |
|
Definition
- Service, application, or device error
- Compatibility problems
- Hardware problems
- File system corruption errors
- Compatibility issues with firmware or BIOS
- Viruses |
|
|
Term
Stop errors information: First Line |
|
Definition
- error type numerically - memory address of the code that was being accessed - type of access attempted or error parameter - memory address that made the access attempt |
|
|
Term
Stop errors info: Second Line |
|
Definition
- text-based description of the error - if possible, name of the driver that was found at that location. |
|
|
Term
|
Definition
- Dealing with stalled print spooler and other services by restarting services
- Identifying root causes for auto-restart and Stop errors
- using Event Viewer to diagnose driver problems
- Dealing with application start problems in the form of shortcuts, settings, or memory space issues |
|
|
Term
What command is used to restart a service from the command prompt? 1. service.exe 2. services.exe 3. cmdrun.exe 4. net.exe |
|
Definition
4. net.exe is the command that can stop and start services from the command prompt |
|
|
Term
Only 16-bit Windows applications will produce General Protection Faults (GPFs). (T/F)? |
|
Definition
False: 16-bit applications will GPF more often and are responsible for most, but not all, GPFs. |
|
|
Term
Use Windows XP boot disk only... |
|
Definition
as a replacement for a damaged or corrupted hard drive boot sector |
|
|
Term
Emergency Repair Disk (ERD) |
|
Definition
is not required when performing an Emergency Repair with Windows XP, Vista, or 7 |
|
|
Term
|
Definition
are required to fully restore a computer to its original state and identity on the network.
If you are concerned with the data and file system permissions only, you do not need to back up the system state |
|
|
Term
|
Definition
replacement for the F8 boot option of Last Known Good Configuration although Microsoft still supports the older and widely known Restore feature. |
|
|
Term
Lost Automatic System Recovery (ASR) Floppy disk |
|
Definition
You will not be able to restore that ASR backup |
|
|
Term
|
Definition
- Using the NTBackup.exe utility to protect your data
- F8 boot options that can be used to correct startup problems
- System restore points and how to use them to repair configuration problems
- Recovery CDs and partitions, and rescue CDs and partitions |
|
|
Term
What command would you use from Recovery Console to attempt to repair the boot sector? 1. listsvc 2. disable 3. systemroot 4. fixboot |
|
Definition
|
|
Term
Which file is not required on a Windows XP boot disk? 1. ntldr 2. ntbtlog.txt 3. ntdetect.com 4. boot.ini |
|
Definition
|
|
Term
|
Definition
Local Area Network: not a lot of distance between the systems on the network |
|
|
Term
|
Definition
Wide area network: involves to or more LANs. Companies will link multiple offices LANs to each other, creating WAN. |
|
|
Term
|
Definition
Metropoilitan-area network: covers a small metropolitan area
not as big as WAN |
|
|
Term
|
Definition
personal-area network: created by personal devices typically using bluetooth |
|
|
Term
|
Definition
any break in the wire creates a 'nonterminated end'
as a result the entire network collapses |
|
|
Term
|
Definition
most popular types of cabling used
contains 4 pairs of wires twisted around each other inside the cable's jacket.
max length of 100meters |
|
|
Term
Unprotected Twisted Pair: Category 1 (CAT1)speed |
|
Definition
|
|
Term
Unprotected Twisted Pair: Category 2 (CAT2)speed |
|
Definition
|
|
Term
Unprotected Twisted Pair: Category 3 speed |
|
Definition
|
|
Term
Unprotected Twisted Pair: Category 4 speed |
|
Definition
|
|
Term
Unprotected Twisted Pair: Category 5 speed |
|
Definition
|
|
Term
Unprotected Twisted Pair: Category 5e speed |
|
Definition
|
|
Term
Unprotected Twisted Pair: Category 6 speed |
|
Definition
|
|
Term
|
Definition
carries data through pulses of light along its glass core and can reach distances of 2km
Transmits info at speeds ranging: 100Mbps-10Gbps |
|
|
Term
Fiber Optic Connectors: Straight Tip (ST) |
|
Definition
derived from BNC-style connector but uses fiber optic cable |
|
|
Term
Fiber Optic Connectors: Subscriber Connector (SC) |
|
Definition
rectangular and somewhat similar to an RJ-45 connector |
|
|
Term
Fiber Optic Connectors: Fiber local connector (LC) and mechanical transfer-registered jack (MT-RJ) |
|
Definition
|
|
Term
All Ethernet environments |
|
Definition
use CSMA/CD (Carrier Sense Multiple Access/Collision Detection) as an access method. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
Network Interface Card (NIC) and its benefits |
|
Definition
responsible for connecting computer to a network.
contains unique address burned onto the ROM chip (hardware address) or Media Access Control address (MAC)
2 lights: - Activity: on when connected - Link: blinks when sending/receiving data |
|
|
Term
Repeater and its benefits |
|
Definition
Regenerates a signal in a network so it can travel the extra distance. |
|
|
Term
|
Definition
Prevents buildup of network traffic.
Connects network segments and also regenerates the signal (like a repeater).
Filters data so it is sent only to the proper portion of the network |
|
|
Term
|
Definition
Responsible for sending info from one network to another. |
|
|
Term
|
Definition
unique network device (or piece of software) responsible for converting info from one format to another.
aka a translator |
|
|
Term
|
Definition
central device that acts as a connection point for all hosts on the network. basic device that send info to every connected port.
can cascade one hub to another |
|
|
Term
|
Definition
Similar to a hub but only sends data specifically to where it needs to go. |
|
|
Term
|
Definition
- three types of cables used on networks are twisted pair, coax, and fiber optic
- 3 basic network layouts (topologies) are bus, star, and ring
- An acesss method determines how a system places data on the wire. 2 popular access methods are CSMA/CD and token passing
- Ethernet is the most popular network architecture used today. Other examples of network archs are token ring and FDDI
- Some of the most popular networking devices are hubs, switches, and routers
- Switches filter network traffic by sending data only to the port used by the destination system. Routers are responsible for sending data from one network to another. |
|
|
Term
What is the max distance of Thinnet segment? 1. 100 meters 2. 500 meters 3. 250 meters 4. 185 meters |
|
Definition
|
|
Term
What is the recommended number for a Peer-to-Peer network? 1. less than 100 2. more than 100 3. less than 10 4. more than 10 |
|
Definition
|
|
Term
What access method is used for Ethernet? 1. Token passing 2. CSMA/CA 3. Twisted Pair 4. CSMA/CD |
|
Definition
4. CSMA/CD
CSMA/CA has been used in AppleTalk networks |
|
|
Term
Which of the following defines 'half-duplex' communication? 1. allows info to be both sent and received, but not at the same time 2. allows info only to be sent 3. allows info to be sent and received at the same time 4. allows info to be sent, but only after dependent info is received |
|
Definition
1. Both sent and received but not same time |
|
|
Term
What access method best describes CSMA/CA? 1. Data is placed out on the wire; sending workstation detects whether there is an error and retransmits if there is. 2. A token runs around the network; when a computer wishes to send data out on the network, it fills the token with information
3. Dummy data is placed on the wire; if the dummy data collides with other information, then the real info is not transmitted. If dummy data does not collide, real data is delivered 4. Dummy data is placed on the wire; if the dummy data collides with other information, then the real info is not transmitted. If dummy data does not collide, real data is withheld. |
|
Definition
3. You comp avoids a collision with the real data by placing dummy data on the wire first. |
|
|
Term
What is the max length of 10Base5 cabling? 1. 100m 2. 185m 3. 250m 4. 500m |
|
Definition
4. 10Base5 is Thicknet that has a max distance of 500m |
|
|
Term
What ethernet architecture transfer information at 1Gbps over short distances and uses fiber optic cabling? 1. 1000BaseSX 2. 1000BaseLX 3. 1000BaseTX 4. 100BaseTX |
|
Definition
|
|
Term
WPA and WPA 2 encyrptions |
|
Definition
most common security method used on wireless networks. |
|
|
Term
Wireless Security Best Practices: Change default usernames and passwords |
|
Definition
ensure you connect to the wireless router and change default usernames and passwords |
|
|
Term
Wireless Security Best Practices: Change the SSID |
|
Definition
to something that has no relevance to your physical location or company name |
|
|
Term
Wireless Security Best Practices: Set encryption |
|
Definition
ensure that you enable wireless encryption to the highest possible level. |
|
|
Term
Wireless Security Best Practices: Disable SSID broadcast |
|
Definition
after setting the SSID value, ensure that you disable SSID broadcasting.
Known as the visibility setting on some routers |
|
|
Term
Wireless Security Best Practices: Enable MAC filtering |
|
Definition
Enable to limit which devices can connect to your wireless network by MAC address |
|
|
Term
Wireless Security Best Practices: Place the access point |
|
Definition
in the middle of the building to get equal coverage |
|
|
Term
Wireless Security Best Practices: Set radio power levels |
|
Definition
reduce power level on the router so that the signal weakens after a short distance.
Someone sitting out on the street cannot connect to your wireless network |
|
|
Term
Wireless Security Best Practices: Assign static IP addresses |
|
Definition
Although this is an admin nightmare, in high-secure environments, you may want to disable DHCP on the router and require static addresses to be configured on any system connecting to the network |
|
|
Term
Wireless Security Best Practices: Disable ports |
|
Definition
the SOHO network will have wired ports on the switch. Disable any ports on the switch that are not being used to prevent unauthorized systems from connecting to the port |
|
|
Term
Wireless Security Best Practices: provide phsyical security |
|
Definition
Ensure that routers and switches are in a central roo that is locked down to prevent unauthorized personnel from gaining physical access to the router and switches |
|
|
Term
|
Definition
- Infrared technology depends on line-of-sight and tends to be used for low-bandwidth solutions
- a number of factors affect wireless signal quality and strength, like interference, range, and number of connected clients
- 102.11a/b/g networks all range 30m (100ft), and 802.11n has rang of 50m (165ft). 802.11a network operates in the 5GHz spectrum, and 802.11b/g operate in 2.4 GHz spectrum; 802.11n can operate in both 5GHz and 2.4 GHz spectrums
- WEP and WPA are the most common methods to secure wireless networks, but other options include disabling SSID broadcasting, MAC filtering, placing wireless APs in a DMZ, and changing default passwords.
- Bluetooth is used only for short-range communication |
|
|
Term
Which of the following is not a technology that can be used to connect to a printer? 1. Bluetooth 2. WWAN 3. 802.11b 4. Infrared |
|
Definition
2. WWAN Printers from different manufacturers support some or all of the listed wireless techs, and WWAN is a tech used to connect to your network while out of the office. |
|
|
Term
Typical client Bluetooth implementations have what ranges? (pick 2) 1. 1m 2. 5m 3. 10m 4. 25m |
|
Definition
1,3. Has ranges of 1, 10, and 100m depending on the class of devices that are being used. |
|
|
Term
What is the standard range of 802.11z/b/g networks? 1. 10m 2. 30m 3. 50m 4. 100m |
|
Definition
2. most have a range of 30m in open air |
|
|
Term
802.11g networks are backward compatible with which other 802.11 tech? 1. 802.11a 2. 802.11b 3. 802.11i 4. 802.11n |
|
Definition
2. 802.11b they both use 2.4 GHz spectrum and were designed to be backward compatible. |
|
|
Term
|
Definition
physical network card inserted into a computer's expansion bus slot, usb device, or integrated into the system board.
after installation of the card, you install the driver for that card within the OS. (allows OS to communicate with hardware via driver). |
|
|
Term
|
Definition
there are client specific networks that you must have the correct 'client' in order to access it.
to install a network client: 1. locate network connections 2. Right-click your local area connection and choose Properties 3. General tab 4. Verify that Client for Microsoft Networks appears in the list of components and has a check mark beside it. |
|
|
Term
|
Definition
Are languages used to hold conversation on a network.
All computers on the same network must have the same protocol installed. |
|
|
Term
|
Definition
example: File sharing - allows the server to share files with other users on the network
Printer sharing - allow a printer to be used by multiple users on the network. You don't need to purchase a separate printer for each user on the network. |
|
|
Term
|
Definition
NetBIOS Extended User Interface
dev'd by IBM for small networks (fewer than 10 comps)
impractical because information cannot leave the network and is nonroutable.
Benefit: there is no configuration |
|
|
Term
|
Definition
Transmission Control Protocol/Internet Protocol
Is a routable protocol |
|
|
Term
|
Definition
First octet value: 1-127 n.h.h.h subnet mask: 255.0.0.0 |
|
|
Term
|
Definition
First octet value: 128-191 n.n.h.h Subnet mask: 255.255.0.0 |
|
|
Term
|
Definition
First octet value: 192-223 n.n.n.h Subnet mask: 255.255.255.0 |
|
|
Term
|
Definition
made up of 4 sets of numbers seperated by periods.
each number represents an octet (each octet represents 8 bits of data)
to decipher which Class IP address look at the first octet |
|
|
Term
|
Definition
what your computer uses to determine whether the network device it is truing to comm with is on the same network.
determines network ID portion of the IP address by comparing the subnet mask against the IP address |
|
|
Term
|
Definition
TCP/IP option configured on each workstation. typically all comps on the same network point to the same router. |
|
|
Term
Communicating with systems off the network |
|
Definition
need: IP address subnet mask default gateway |
|
|
Term
Communicating with systems on the network |
|
Definition
need: IP address subnet mask |
|
|
Term
Troubleshooting network connectivity |
|
Definition
use 'ipconfig' command to view the TCP/IP settings
if the IP is 169.254.x.y, client cannot communicate with the DHCP server
make sure client is connected to network correctly and then verify the DHCP server is functioning |
|
|
Term
What resolves FQDNs to IP addresses? |
|
Definition
|
|
Term
What resolves computer names to IP addresses? |
|
Definition
|
|
Term
Troubleshooting network issues: No connectivity |
|
Definition
check the physical connections first and verify your network configuration, like the IP configuration |
|
|
Term
Troubleshooting network issues: APIPA address |
|
Definition
If you have an IP address of 169.254.x.y, you are having trouble obtaining an IP address from the DHCP server. you need to verify that the client is connected to the network properly and check the DHCP server |
|
|
Term
Troubleshooting network issues: Limited connectivity |
|
Definition
If connected to a network and experiencing limited connectivity, verify the IP settings such as the default gateway and the DNS server setting/
Verify router is connected to the internet |
|
|
Term
Troubleshooting network issues: Local connectivity |
|
Definition
double-check that the system has a default gateway configured and that the router has a connection to the internet. |
|
|
Term
Troubleshooting network issues: Intermittent connectivity |
|
Definition
difficult to troubleshoot.
verify there is not a problem with the cable, check for devices that could be causing interference |
|
|
Term
Troubleshooting network issues: IP conflict |
|
Definition
If duplicate IP address, you will be unable to join network.
Make sure IP addresses are unique |
|
|
Term
Troubleshooting network issues: Slow transfer speeds |
|
Definition
check the card settings and the settings on the router to see if there is an explanation that the network devices would be using a slow transfer rate |
|
|
Term
Troubleshooting network issues: Low RF signal |
|
Definition
you may need to go into the router and increase the power level of the signal |
|
|
Term
|
Definition
- 4 major networking components are required in Windows networks: # A network client # A network adapter # A common protocol # A service
- TCP/IP is the most popular network protocol used today. When installing TCP/IP, you need to configure the following: # An IP address # A subnet mask # A default gateway
- The NetBEUI protocol is a nonroutable protocol used on small networks
- In Microsoft networking environments, to allow users to connect to your hard drive or printer, you must install the File and Printer Sharing service
- You may use the 'ipconfig' comand in Windows to view your TCP/IP configuration
- The 'ping' command is used to send test messages to a remote system to verify that the communication can take place on that system |
|
|
Term
Which resolution technique is used to resolve the IP address to a MAC address? 1. DNS 2. WINS 3. ARP 4. ipconfig.exe |
|
Definition
3. Address Resolution Protocol (ARP) converts the IP address to the network card address (MAC).
DNS and WINS convert different types of names to an IP address |
|
|
Term
Which service is responsible for converting 'www.wiley.com' to an IP address? 1. DHCP 2. DNS 3. WINS 4. ARP |
|
Definition
|
|
Term
You want to share the data folder as a resource to be used only by network administrators. How should you do this? 1. Hide the sahre by naming it data$ and then set up permissions so that only admins have access. Tell the admins the UNC path 2. Don't share the folder; tell the admins to go to the local computer to access the resource 3. Set up the share permissions so that only admins have access to the share 4. Share the resource and don't set any permissions |
|
Definition
1. it may be best to hide it from the network by making it a hidden share to no one tries to sneak into it. |
|
|
Term
Network Based Attack: Social Engineering Attack |
|
Definition
hacker tries to trick a user or admin to divulge sensitive information through social contact.
Hacker uses that info to compromise the system or network |
|
|
Term
Network Based Attack: Password Attacks: Dictionary |
|
Definition
Hacker has 2 files: - all user names - every word in the dictionary + others
tries every word in dictionary+ to crack each account |
|
|
Term
Network Based Attack: Password Attacks: Brute Force |
|
Definition
hacker uses a program that tries to figure out your password with different combos of characters |
|
|
Term
Network Based Attack: Denial of Service (DoS) Attack |
|
Definition
designed to cause a system to be so busy that it cannot service a real request from a client.
have a firewire installed as well as updated patches to prevent this attack |
|
|
Term
Network Based Attack: Spoofing attack |
|
Definition
hacker modifies the source address of a network packet (piece of info sent out on the network).
3 types: - MAC - IP - E-mail
implement encryption and authentication services on the network |
|
|
Term
Network Based Attack: Eavesdropping Attack |
|
Definition
Hacker uses some sort of packet sniffer program to see all the traffic on a network.
utilized to find login passwords or monitor activities
To protect, encrypt network traffic |
|
|
Term
Network Based Attack: Man-in-the-middle Attack |
|
Definition
hacker monitoring traffic but also intercepting data, and possibly modifying the data, then sending out the result.
to protect: - restrict access to the network, implement encryption and authentication services on the network |
|
|
Term
Network Based Attack: Session hijacking Attack |
|
Definition
similar to Man-in-the-middle, instead the hacker poses as the party it was supposed to be sent to and hijacks the conversation.
Protect: - restrict access to the network and implement encryption and authentication services |
|
|
Term
Physical Security Best Practices |
|
Definition
- Secure server placement - Lock the workstation - Disable boot devices - Set CMOS password - Disable network ports - Use a lockdown cable |
|
|
Term
Encryption: Secure Sockets Layer (SSL) |
|
Definition
encrypts different types of internet traffic by applying digital certificates
Digital Certificate: - contains the key that is used to encrypt and decrypt the traffic |
|
|
Term
Encryption: Internet Protocol Security (IPSec) |
|
Definition
Can encrypt all TCP/IP traffic between systems.
unlikely solution for Websites but great for encrypting traffic on your network |
|
|
Term
Encryption: Virtual Private Network (VPN) |
|
Definition
Allows a user to connect across the Internet to a remote network and send info between her system and the office network securely.
creates a security tunnel that is encrypted. |
|
|
Term
|
Definition
Copies files that you select, and clears the archive bit on any file that is backed up -- essentially recording the fact that the file has been backed up |
|
|
Term
|
Definition
- Copies files that have been changed - Does not clear archive bit (no record files have been backed up) - Next time it backs up, the files will be backed up again |
|
|
Term
|
Definition
- Copies any file that has changed and then clears archive bit on those files - Files will not be backed up again unless they were changed since last backup |
|
|
Term
RAID (Redundant Array of Inexpensive Disks)Level 0 (striped volume) |
|
Definition
- Writes different parts of the data to different disks at the same time - Benefit: get performance benefit by writing data at the same time to multiple disks, taking less time to read/write file. (data is split up, not duplicated) - not a redundant solution |
|
|
Term
RAID (Redundant Array of Inexpensive Disks)Level 1 (mirrored volume) |
|
Definition
- Duplicates the data stored on one disk to another. - If one fails the other disk has a copy |
|
|
Term
RAID (Redundant Array of Inexpensive Disks) Level 5 (volume) |
|
Definition
requires a minimum of 3 drives and writes to all drives in the solution like a striped volume. - stores redundant data (parity data) on one of the disks. - Redundant data is used to calculate the missing data when a disk goes missing, ensuring that users can still retrieve data without noticing a problem |
|
|
Term
|
Definition
- Authentication is the process of proving an identity to the network, but Authorization is the process of determining whether accessing a resource is allowed after authentication takes place.
- Hackers take many different approaches to compromise a system. Protect your environment from both network-based and software-based attacks, and make sure that physical security is in place.
- a denial of service (DoS) is an attack on a system or network that prevents the system or network from performing it's regular function.
- Social engineering is a popular type of attack involving the hacker compromising security by tricking an employee through social contact.
- You secure network traffic by encyrpting traffic between two systems by using technologies such as SSL and IPSec. Admins typically use SSL to encrypt web traffic and IPSec to encrypt internal or VPN traffic.
- securing your data involves not only protecting resources with permissions but also protecting your data by following proper data destruction procedures and backup strategies as well as creating redundant disk solutions. |
|
|
Term
Windows Built-in accounts |
|
Definition
- Administrator - Guest
Guest is disabled by default |
|
|
Term
Windows Default Groups: Administrators |
|
Definition
Members have full access to the system and can change any setting on the system. |
|
|
Term
Windows Default Groups: Backup Operators |
|
Definition
Members can perform backups and restores on the system |
|
|
Term
Windows Default Groups: Account Operators |
|
Definition
Members can create user accounts not the entire system |
|
|
Term
Windows Default Groups: Printer Operators |
|
Definition
Members can change any settings on the printers. |
|
|
Term
Windows Default Groups: Users |
|
Definition
All members can be assigned specific permissions |
|
|
Term
Windows Default Groups: Power Users |
|
Definition
Prior to Windows Vista, members allowed to create user accounts and manage printing environment.
Use this if the desktop OS does not have an account operator or a printer operator group |
|
|
Term
Copying and moving files: Move on same partition |
|
Definition
It keeps the files permissions |
|
|
Term
Copying and moving files: Copy on same partition |
|
Definition
The new file inherits the permissions of the folder it was copied to |
|
|
Term
Copying and moving files: Move across partition |
|
Definition
file inherits the permissions of the target folder, not the original permissions |
|
|
Term
Copying and moving files: Copy across partition |
|
Definition
new file inherits the permissions of the destination folder |
|
|
Term
Exposing servers to the internet |
|
Definition
Be sure to put these servers in a DMZ (demilitarized zone) so you can selectively choose which type of data is allowed to reach your servers. |
|
|
Term
|
Definition
- Create user accounts for each user of the system. Make sure that users use strong passwords for those accounts and understand to not share those passwords
- Assign permissions to resources such as folders and files to ensure that unauthorized users don't get access to the resource
- Enable auditing so that you are aware of any security-related events that happen on the system. Also be sure to review the security log often
- Enable a firewall for the network and enable the Firewall on the Windows System
- Secure your wireless router by disabling the wireless feature if you are not using the wireless components of the router. If you are using wireless, be sure to implement WEP or WPA and disable SSID broadcasting |
|
|
Term
You have enabled auditing; where do you go to view the audit information? 1. Local Security Policy 2. Event Viewer 3. LAN Connection Properties 4. Firewall |
|
Definition
|
|
Term
A privilege to perform an operating system task is known as what? 1. Permission 2. Policy 3. Right 4. Firewall |
|
Definition
3. A right gives you the privilege to perform an operating system task |
|
|
Term
|
Definition
- A virus is a program that does harm to your system
- Popular types of viruses are file, boot sector, and macro viruses
- Other types of malicious software are Trojan horse, worms, and spyware
- You may use antivirus software to remove viruses from your system and antispyware software to remove spyware from your system
- Be sure to update your virus definitions on a regular basis so that your virus protection software can protect your system against the most popular viruses |
|
|
Term
What software allows the network administrator to deploy patches to all the systems on the network after they are downloaded to a central server? 1. Virus protection software 2. Virus definitions 3. WSUS 4. Trojans |
|
Definition
3. WSUS can deploy updates to all systems on the network |
|
|