midterm review

28
MidTerm Review ITE 1

Upload: lilith

Post on 07-Jan-2016

20 views

Category:

Documents


4 download

DESCRIPTION

MidTerm Review. ITE 1. Things to Know. Be able to identify common computer ports by sight RJ-45 USB Firewire PS2. Things to Know. Be able to identify common indicator lights by symbol Battery HD Activity Wireless Bluetooth. Things to Know. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: MidTerm Review

MidTerm ReviewMidTerm Review

ITE 1ITE 1

Page 2: MidTerm Review

Things to KnowThings to Know

• Be able to identify common computer ports by sight• RJ-45• USB• Firewire• PS2

• Be able to identify common computer ports by sight• RJ-45• USB• Firewire• PS2

Page 3: MidTerm Review

Things to KnowThings to Know

• Be able to identify common indicator lights by symbol• Battery• HD Activity• Wireless• Bluetooth

• Be able to identify common indicator lights by symbol• Battery• HD Activity• Wireless• Bluetooth

Page 4: MidTerm Review

Things to KnowThings to Know• What power-management control is

used to extend laptop battery life?• ACPI

• Where can you find setting to control the amount of time before a laptop goes into hibernate mode?• Under “Power Options>Power

Schemes”

• What power-management control is used to extend laptop battery life?• ACPI

• Where can you find setting to control the amount of time before a laptop goes into hibernate mode?• Under “Power Options>Power

Schemes”

Page 5: MidTerm Review

Things to KnowThings to Know

• With Laptops it’s important to keep the vent holes clear to avoid overheating. (Duh!)

• With Laptops it’s important to keep the vent holes clear to avoid overheating. (Duh!)

Page 6: MidTerm Review

Things to KnowThings to Know

• What you can do to increase the strength of passwords

• What you can do to increase the strength of passwords

Page 7: MidTerm Review

Things to KnowThings to Know

• What is a Characteristic of a DDoS Attack?• There are many computers

involved in a coordinated attack.• The slave computers are called

Zombies.

• What is a Characteristic of a DDoS Attack?• There are many computers

involved in a coordinated attack.• The slave computers are called

Zombies.

Page 8: MidTerm Review

What is Spoofing?What is Spoofing?

• Sending data that appears to come from a different source other than where it actually originates.

• Sending data that appears to come from a different source other than where it actually originates.

Page 9: MidTerm Review

Things to KnowThings to Know

• What interfaces can be “Hot Plugged” on both laptop and desktop machines.

• What interfaces can be “Hot Plugged” on both laptop and desktop machines.

Page 10: MidTerm Review

Things to KnowThings to Know

• If you change a setting in Windows, but it has no effect, even after restart, where should you check next to see if you need to change a setting?• The machine BIOS

• If you change a setting in Windows, but it has no effect, even after restart, where should you check next to see if you need to change a setting?• The machine BIOS

Page 11: MidTerm Review

Things to KnowThings to Know

• If you need to change a component that is NOT hot-swappable in a laptop what two things should you do?• Unplug the power• Remove the battery

• If you need to change a component that is NOT hot-swappable in a laptop what two things should you do?• Unplug the power• Remove the battery

Page 12: MidTerm Review

Things to KnowThings to Know

• In Windows XP where can you set the shutdown, hibernate and standby modes?• Power Options

• In Windows XP where can you set the shutdown, hibernate and standby modes?• Power Options

Page 13: MidTerm Review

Things to KnowThings to Know

• Know the steps, in order, to safely remove a hot-swappable device such as a USB drive in Windows.

• Know the steps, in order, to safely remove a hot-swappable device such as a USB drive in Windows.

Page 14: MidTerm Review

Things to KnowThings to Know

• When trouble-shooting hardware remove as many devices as possible to try to isolate conflicts.

• When trouble-shooting hardware remove as many devices as possible to try to isolate conflicts.

Page 15: MidTerm Review

Things to KnowThings to Know

• Laptops use special processors for what reason?• Laptop processors use less power.

• Laptops use special processors for what reason?• Laptop processors use less power.

Page 16: MidTerm Review

What Should Be Used to Clean Electrical

Contacts?

What Should Be Used to Clean Electrical

Contacts?• Isopropyl Alcohol• Isopropyl Alcohol

Page 17: MidTerm Review

What You Need to KnowWhat You Need to Know

• What kind of adapter is used to connect multiple hard disks for redundancy?• RAID

• What kind of adapter is used to connect multiple hard disks for redundancy?• RAID

Page 18: MidTerm Review

PartitioningPartitioning

• The bootable partition is called the Primary Partition.

• Any additional logical drives are installed on an extended partition.

• Partitioning is set up using fdisk.

• The bootable partition is called the Primary Partition.

• Any additional logical drives are installed on an extended partition.

• Partitioning is set up using fdisk.

Page 19: MidTerm Review

File SystemsFile Systems

• NTFS is more secure than FAT.• NTFS is more secure than FAT.

Page 20: MidTerm Review

Things to KnowThings to Know

• What type of Scanner provides the highest-quality images?

• A Drum Scanner• How much do they cost?• If you have to ask you probably

can’t afford one.

• What type of Scanner provides the highest-quality images?

• A Drum Scanner• How much do they cost?• If you have to ask you probably

can’t afford one.

Page 21: MidTerm Review

ConnectorsConnectors

• Molex connectors are used to for Hard Drive and DVD/CD power.

• What cable standard uses 9 pins and can support speeds in excess of 800 mbps?• IEEE 1394b

• Molex connectors are used to for Hard Drive and DVD/CD power.

• What cable standard uses 9 pins and can support speeds in excess of 800 mbps?• IEEE 1394b

Page 22: MidTerm Review

PostingPosting

• When a computer completes testing all adapter cards that have a BIOS what is the next step?• Reading the Master Boot Record

and starting to load the OS.

• When a computer completes testing all adapter cards that have a BIOS what is the next step?• Reading the Master Boot Record

and starting to load the OS.

Page 23: MidTerm Review

Stuff to knowStuff to know

• In the event of a catastrophic failure what Windows XP utility tries to recover the operating system?• Automated system recovery.

• In the event of a catastrophic failure what Windows XP utility tries to recover the operating system?• Automated system recovery.

Page 24: MidTerm Review

Stuff to KnowStuff to Know

• What class of IP addresses is used to send broadcasts?• D

• What class of IP addresses is used to send broadcasts?• D

Page 25: MidTerm Review

Stuff to KnowStuff to Know

• What protocol adds security to remote connections.• SSH!

• What protocol adds security to remote connections.• SSH!

Page 26: MidTerm Review

Startup FailureStartup Failure

• How does the BIOS let you know where to look for a hardware failure?• A series of beeps. The number of

beeps tell you where to look.

• How does the BIOS let you know where to look for a hardware failure?• A series of beeps. The number of

beeps tell you where to look.

Page 27: MidTerm Review

Floppy DrivesFloppy Drives

• A constant “on” of a newly installed floppy drive indicates what problem?• The data cable is installed wrong.

• A constant “on” of a newly installed floppy drive indicates what problem?• The data cable is installed wrong.

Page 28: MidTerm Review

That’s all folks!That’s all folks!

• Good luck • Good luck