notes it essentials chpt 1-16

25
X Final Exam for Ch 11-16 Take assessment - final exam for ch 11 - 16 - IT essentials: PC Hardware and software (version 4.0) Chapter 16:Advanced Security 3 layers of security – security applications Security hardware Local security policy Is there full time internet access. Outline security policy – rules, guidelines, and checklists Have the network secure as possible and keep the users happy. To many passwords or long ones make them angry. Identify who can mess with what. Define the requirements necessary for data to remain confidential on a network How to keep the data safe and within the network. Create a process for employees to acquire access to equipment data Ect. Smpr net, nmpr net Sar forms, to get accounts Security hardware, restrict access to premises , Protect the network infrastructure like vault Protect individual computers , cable locks and cases. Protect data, you might use lockable HD carries and/or USP security dongles. Security software / applications IDS – intrusion detection systems Application and OS patches . to fix vaulnerabilies. Loop holes, Anti-virus and anti-malware software Compare the cost of data loss to the expense of security protection, and then determinee what tradeoffs are Selecting security components – Advantage and disadvantages of component. Retinal scanner – aren’t perfect, expensive and slow.

Upload: zelmi

Post on 16-Nov-2014

7.556 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: NOTES IT Essentials Chpt 1-16

X

Final Exam for Ch 11-16

Take assessment - final exam for ch 11 - 16 - IT essentials: PC Hardware and software (version 4.0)

Chapter 16:Advanced Security

3 layers of security – security applications Security hardware Local security policy

Is there full time internet access.Outline security policy – rules, guidelines, and checklistsHave the network secure as possible and keep the users happy. To many passwords or long ones make them angry.

Identify who can mess with what. Define the requirements necessary for data to remain confidential on a networkHow to keep the data safe and within the network.Create a process for employees to acquire access to equipment dataEct. Smpr net, nmpr net

Sar forms, to get accounts

Security hardware, restrict access to premises , Protect the network infrastructure like vaultProtect individual computers , cable locks and cases.Protect data, you might use lockable HD carries and/or USP security dongles.

Security software / applicationsIDS – intrusion detection systemsApplication and OS patches . to fix vaulnerabilies. Loop holes,Anti-virus and anti-malware software

Compare the cost of data loss to the expense of security protection, and then determinee what tradeoffs are

Selecting security components – Advantage and disadvantages of component.Retinal scanner – aren’t perfect, expensive and slow.

Overlapping features and functions.Like retinal scanner and fingerprint scanner. 2 devices for the same reason. Too much security for this room.How hard is to setup and fix.Budget restrictions.Real and perceived threats. Student stealing computer or a terrorist from iraq doing it.

Security techniques – use encrypted passwords to login to the network HTTPS - securedSetup data encryption over wireless – no wep. Yes wpaMonitor network activity through logging and auditing

Encryption methods include :

Page 2: NOTES IT Essentials Chpt 1-16

Hash encoding uses an algorithm to track tampering. Needs to match on server and transfer. Make sure nothing has been injected or changed.Symemetic encryption – uses a key to encode/decode dtaAsymmetric encryption – uses one key to encrypt and other to decrypt VPN Virtual Private networks– creates a virtual “secure tunnel.” – kinda like taking a subway by yourself

Access control devices, -locks, video surveillance , card key, conduit , gaurds.

Smart key, security key fob, biometric device

Firewall types

Hardware firewall

Free standing and uses dedicated hardwareInitial cost for hardware and software updates can be costlyMultiple computers can be protectedLittle impact on the computer performance

Software firewall

Available 3rd party software and cost variesIncluded in windows xp operating system

Config security settings – two primary security settings includeSetting levels of permissions on folders and files. Use FAT or NTFS to configure folder sharing or folder level perm’s for users with network accessUse file-level prem’s with NTFS

Securing wireless access pointsWEP – wired equivalent privacyWPA wi-fi protected accessMAC address filtersUnused wireless connectionsSSID service set identifier broadcastingWireless antenna

65,535 ports

Automatic – downloads and installs without interventionOnly DL’sNotify – gives the user and option

Normal or full back up. Archives all selected filesIncremental backup – archives all selected files that have changed since last full or incremental backup. It marks file as having been backed up . saves timeDifferential backupDaily backupCopy backup

Page 3: NOTES IT Essentials Chpt 1-16

Chapter 15:Advanced networks

Chemical hazards and potential for broken glass. Safety procedures , always wear eye protection and don’t touch the end of the cables.

Network design, mission. Means to get it done. Man power and equipment. Availability

SIPR net and NIPR net. Secured and unsecured

Site survey. Physical inspection of the building or area, physical and logical topology.

Need to ping self to make sure tcp/ip is working correctly. Ping 127.0.0.1

Firewalls block ping requests

Tracet- maps out the hops your packet takesPackets wont always take the same path

Email installation

Fully functional and reliable DNS deployment Active Directory domain At least one Global Catalog Windows 2000 or higher native domain functionality Exchange server software Windows server support tools Schema master server High-speed Internet connection

Chapter 14:Advanced Printers and Scanners

How to maintain and configure and fixPrinters can be heavy. 2 man lifts, lift from the knees not the back

Allow it to cool before starting workSerial, - sinlge bit xfer, dot matrix printersParallel mutilple bits persecondSCSI – ports can be DB 50 Mini DB 50 and DB 68 may be male or femaleUSB – PnP

Page 4: NOTES IT Essentials Chpt 1-16

FireWire high speed communication bus that interconnects digital devices such as printers, scanners, and hard drives. FireWire provides a single plug-andsocket connection on which up to 63 devices can be attached with data transfer speeds up to 400 Mbps

Ethernet – connecting a printer to a network requires cabling that is compatible with both the existing network and the network port installed in the printer

Drivers and softer – try to update and drivers, on manufactures website. Test pages – start>setting> printers and fax> properties>test page

Global and per-document methods – once its on their it effects everyone. Per-doc – change settings for each new doc.

After installation – check settings. Grayscale, blac-white. Colors, double sided documents, resolution and suchSharing a printer because a printer server.Printers folder

Print server has 3 funtions. Provide acess, admin jobs – ques, feeding spooling , feedback to the user

3 print servers – network printer server devices dedicated pc print servers computer shared-printer

Start>control panel> printers and other hardware> printers and faxes.Start>control panel>printers and other hardware > printers and faxes.Creates a virtual port for drivers to print on the network.

Upgrade – paper trays , sheet feeders, network cards and expansion memory. Print speed, job buffering, duplex printing to enable dual-sided printingScanners can also be configured to do more to meet needs. Improved color and resizing. Sharpening, brightening or darkening, color correction, color inversion. Resolution. Output file format, 24 bit is the highest it can go. A lot of colors. Output, file type. .gif , .tif , .jpeg ect.To keep printers up and running - suitable environment.Manual to clean specific printer or scanner. Check the capacity of ink cartridges and toners.

Laser clean kit- fuser assembly, transfer rollers, separation pads, pickup rollers. Printers and scanners are affected by temperature, humidity, and electrical interference. Keep in cool, dust-free environment, paper dry. Let printers vent. Clean glass on scanners. Ink cartridges and toners. You can set the printer software to reduce the amount of ink or toner that the printer uses

Page 5: NOTES IT Essentials Chpt 1-16

Chapter 13: Advanced Labtop and PDA/SmartPhone

Bluetooth technology- 2.4 to 2.485 in the unlicensed industrial, scientific and medical ISM band.IR light signals operate in the lowest light freq, 100ghz to 1000thzFlash cards for chartCRU- customer repairable unitsFRU-field replacement units

Chapter 12:Advanced Operating System

OS’s Microsoft windows, apple mac, unix, linuxScalable cpu, more than one

Remote desktop, network sharing, scalable cpu, (encrypted file systems)efs support, enhanced security.

Right click, context menu.

NOS (network OS) – wondwos 2000/2003 server, unix, linux, novell netware, mac os x.

NOS – designed to share databases, centralized data storage, LDAP.Print que, access and security, Redundant store, back and RAIDNetwork protocols, HTTP – how files are exchanged on the webFTP – file transfer protPOP- retreves emails from serverDNS – urls from ip addressDHCP – dynamic host configuration protocol . auto selects ip

Regional settings and network settings. Customize a windows XP pro installation. Include apps to make things easier.

Unattended installation Image-based installation – using a copy of a image to push it to a lot of other machines from a serverRIS- remote installation services, across a networkOS deployment feature pack – helps simplify installation over and entire company

Disk structurePrimary partitions , extended partitions and logical drives

Disk management utility . can split and make partitions.

File extensions.

System tools, Disk error checking – file structure errorHard drive defragmentation – fragmented files put togetherVirtual Memory – uses it first.

Page 6: NOTES IT Essentials Chpt 1-16

Ccleaner – free doc that disk cleans up. And cleans registryDefraggler – defragmenterMd5 checker

POP3 or IMAP mailing servers

SMTP is outing mailing server

Email protocolsPost office protocols, version 3. downloads email and stores on the local server. IMAP on server read thereSMTP – sends text only email, used normally with pop3 or imapMIME – transfers attachments videos and pictures.Hz or times per second

On the command line use “at” to schedule a task and updateAt/?

Make a restore point before updating. System tools

Linux for dummies

Coretemp realtemp.

Chapter 11: Advanced personal computers

Field technician – needs troubleshooting skills and customer service skills, because they work on-site, are in regular contact with customers and work on a wide variety of hardware and software.Remote technician – guy who sits at a desk and deals with calls and may send out other techs. Good listening skills, trouble shooting skills and help remotelyBench technician – people who never see customers, they work with themselves and work with computers.

Safety rules, clean. No drinks, no jewelry, power off, do not look into laser beams. Make sure fire extinguisher available, cover sharp edges on site like computer casesUse Antistatic mats, clear floors, dispose of monitors and printer cartridges properly.

Using proper tools, help to prevent damage and work safelyHigh voltage companionts – most broken or used power supplies are replaced. Display monitors. Replace not repair. Laser printers are better to repair not replace, high voltage

Computer recycling warehouse – derma. Proper disposal for monitors , batteries and such

SCSI – 1 50 pin 5 MBps

Page 7: NOTES IT Essentials Chpt 1-16

Fast SCSI – plain SCSI – 50pin 10 MBpsUltra320- Flash cards

Flashing the BIOS – upgrading the BIOSRAID – redundant array of independent disks

Parity, no check sum, no way to reread, no fault toleranceInstall RAID using hardware of software. Hardware is the way to use it. More dependable but more expensive. Read and write speeds that are increased.

Keep compressed up upright, so liquid doesn’t spill on component. .

Arma2 – DL from steam

Chapter 9: Security

Importance of security – private info, company secrets, financial data, computer quipment and items of notion security.

Security threats – physical, theft damage or destruction to computer equipment.Data – removal , corruption, denial of access, unauthorized access, or theft of information

Potential threats to computer security : internal and external threatsInternal – employees can cause a malicious threat or an accidental threat.External – outside users can attack in an unstructured or structured way.

Viruses – software code that is deliberately created by an attack. May collect info or alter or destroy info

Worm – is a self-replicating program that uses the network to duplicate its code to the hosts on the network. At a minimum, worms consume bandwidth in a network.

Trojan horse - technically a worm and is named for its method of getting past computer defenses by pretending to be something useful.

Anti-virus software is designed to detect, disable, and remove viruses, worms, and Trojan hourses before they infect the computer.

ActiveX – controls interactivity on web pages . lots of holes within it

Java – allows applets to run within a browser. Example: a calculator or a counter.

Page 8: NOTES IT Essentials Chpt 1-16

JavaScript – Interacts with HTML source code to allow interactive web sites. Example: a rotating banner or a popup window

Adware, spyware and grayware – multiple windows up at once.

DoS – Denial of service. Prevents users from accessing normal services. Sends enough requests to overload a resource or even stopping its operationPing of Death – is a series of repeated , larger than normal pings intended to crash the receiving computerE-mail Bomb – is a large quantity of bulk e-mail that overwhelms the email server preventing users from accessing emailDistributed DoS (Denial of service) - is an attack launched from many computers called zombies.

Spam – is unsolicited email that can be used to send harmful links or deceptive content.Popups – are windows that automatically open and are designed to capture your attention and lead you to advertising sites.

Social engineering – never give out your PWAsk for ID from the unknown personEscort visitorsRestrict access of unexpected visitors

TCP/IP attacks is used to control all internet commSYN flood attack – 3 way handshake - synchronized, synchronized acknowledged, acknowledge. Flood means lots of synchronized being sent out and no ack being sent backSpoofing looks like another user.Man in the middle is spoofing plus changing infoReplay attacks- makes the server think it is the same user. But hacker just replays like iden theftDNS poisoning – use the dns cache to change the ip of the dns

Comp disposal and recycling – earase all hard drives using a magnet type toolHammer is the only way to destroy dataDestroy cd’s and software with shreading machines

Never take a user’s PW

Chapter 8: Networking

8bits = 1 byteMove right or left of that byteHex = 4 bits 0 – F is the most you can have for a hex. 0123456789abcdef (15 total)

Mbps = bitsMBps = bytes

bits 1 byte 1kilobits 1024 kilobytes 1024megabits 1024 megabytes 1024gigabits 1024 gigabytes 1024terabits 1024 terabyte 1024

Page 9: NOTES IT Essentials Chpt 1-16

exabits 1024 exabyte 1024

128bytes = 1 kilobit or 1024 bits

10Megabytes per second = 1.25 Megabits per second

10,240 x 1024 = 10,485,760 / 8 = 1,310,720 / 1024 = x / 1024 = 1.25

Down divide : Up multiply

LAN – Local Area NetworkWAN – Wide Area NetworkWLAN – Wireless Local Area Network

Networks are systems that are formed by links. Like a mail delivery system, telephone, public transportation, corporate computer networks, The Internet.Networks share data and resourcesNetworks are as simple as a cable between 2 computers or hundreds.

Network devices include, desktop and labtop computers, printers, scanners, pdas, smartphones, files and print servers. Resources shared across networks include: services like printing or scanningStorage devices, hard drives, optical drivesApplications such as databasesDifferent types of network media: copper cabling – electricity conductorFiber-optic cabling - lightWireless connection – radio waves

Benefit of networkingIncreased communication capabilitiesFewer peripherals neededAvoid file duplication and corruptionLower cost licensingCentralized administrationConserve resources

Types of networks: identified by –Type of media used to connect the devicesType of networking devices usedHow to manage resourcesHow the network is organizedHow the data is storedThe area it serves

LAN- WAN- LAN’s connected over geographically separated locationsThe internet is one bit WANTSP - Telecommunications service providers are used to interconnect these LANs at different locations

Peer to peer networking – no domain controllers. No central networking.No computer over another, choose what to shareBest if 10 or fewer computers because no centralized adminNo network resources adminEach computer needs its own security, back ups, and managed network

Client /server network

Page 10: NOTES IT Essentials Chpt 1-16

Provides control and security for the networkClient requests from serverServer sends response and requested informationServers are maintained by network adminsData backups and security measuresControl of user access to network resourcesCentralized storage and services include data stored on a centralized file serverShared printers managed by a print serverUsers have proper permissions to access data or printers(printer server- printer connected to my computer, but other people on my network can use my printer)

Bandwidth - are like lanes on a street. The more lanes the faster you can go.bps- bits per secondKbps – kilobits per secondMbps – megabits per secondNetwork devices direct the dataData are like vehicles

Three modes of transportationSimplex- unidirectional transmission is a single, one-way transmitionHalf-duplex – allows data to flow in one direction at a time. Simultaneous transmission in two directions is not allowed. Full-duplex – allows data to flow in both directions at the same time. Bandwidth is measured in only one direction. 100 Mbps full-duplex means a bandwidth of 100 Mbps in each directionDLS have full-duplex

IP Address, unique number to identify each machineRepresented as a 32-bit binary number, divided into for octets (groups of eight bits) (12345678) (23456798) (32456798) (41235678)If all bits are on, 255 is the highest number possibleSubnets are like zip codes255.255.255.255 is Dotted decimal format

IP address classesClass A first octect 1-127 Large networks, implemented by large companies and some countries Class B first octect 128-191 Medium-sized networks, implemented by ISP for customer subscriptionsClass D first octect 192-223 Special use for multicastingClass E first octect 240-254 used for experimental testing255 is a broadcast address

Subnet masks Class A first Oct is used for network. Oc2 – Oct 4 for hostsDefault subnet masks for the 3 classes of ip addresses are Class A 255.0.0.0Class B 255.255.0.0Class C 255.255.255.0

Class B network needs to provide IP addresses for four LANs, the organization will subdivide the Class B network into four smaller parts by using subnetting, which is a logical division of a network. The subnet mask specifies how it is subdivided.

Manual configuration is a static network. The IP wont change unless I change itDynamic Host Configuration Protocol (DHCP) – server automatically assigns IP addresses to network hostsFrom the manufacture

Page 11: NOTES IT Essentials Chpt 1-16

For every NIC is a permanent MAC addressNetwork Interface Card (NIC)- is hardware that enables a computer to connect to a network and it has two addresses. IP addresses is a logical address that can be changed. Media Access Control ( MAC) address is “burned-in” or permanently programmed into the NIC when manufactured. The MAC address cannot be changed.

DHCP server DNS – Domain Name System. server address

Protocols are a set of rules for communication between computers. Controls what is sent. Receved, data files and email.

ICMP – Internet control message protocol . is used by devices on a network to send control and error message to computers and servers.

PING – Packet Internet Groper a command line utility used to test connections between computers. Used to determine whether a specific ip address is accessible. Used with either the hostname or the IP address. Works by sending an ICMP echo request to a destination computer

Physical networking components – Hubs – extend the range of a signal by receiving then regenerating it and sending it out all other portsTraffic is sent out all ports of the hubAllow a lot of COLLISIONS on the network segment and are often not a good solutionAlso called concentrators because they serve as a central connection point for a LAN

Bridges and switches –A packet along with its mac address information is called a freamSegments bound by bridgesA bridge determines if incoming frame is sent to a different segment or dropped. A bridge has two portsA Switch (multiport bridge) several ports and refers to a table of mac addresses to determine which port to use to forward the frame. Can reduce noise and collisions. It sends packets, frames, mac addy’s to a single pcSwitch is just a bigger bridge

Routers connect entire networks to each other.Use ip addresses to packets to other networksCan be a computer with special network software installedCan be a device built by network equipment manufacturesContain tables of ip addresses along witch optimal routes to other networks

Coaxil cable

Bus topology – only 1 computer can transmit data at a time or frams will collide. Terminators on the ends. Computer to computer connectionRing topology – hosts are connected in a physical ring circle. Ring has no beginning or end so the cable does not need to be terminatedwhen one fails in the ring, they all fail A special token travels around the ring stopping at each host. No collisions. Computers can’t talk on the network without the token.Two types of ring topologies sing and dual ring. Adds another token?Star topology- has a central connection point. A hub switch or routerHosts connect directly to the central point with a cableCosts more to implement than the bus topology because cable is used and central

Page 12: NOTES IT Essentials Chpt 1-16

Hierarchical or extended star topology – a star network with an addition networking device connected to the main networking device to increase the size of the network. Use for large networksMesh topology – connects all devices to each other. Used in WANs that interconnect LANsExpensive and difficult to install because of the amount of cables neededOften used in governments

First come first server broadcast topologyLAN architecture- overall structure of a computer or communication systemEthernet based on IEEE 802.3 Carrier sense multiple acces with collision diction (CSMA/CD)Token ring- designed by IBM, physically a star network ring. FDDI – fiber distributed data interface – often token ring network

802.11a Devices conforming to the 802.11a standard allow WLANs to achieve data rates as high as 54 Mbps. IEEE 802.11a devices operate in the 5 GHz radio frequency range and within a maximum range of 150 feet (45.7 m).

802.11b operates in the 2.4 GHz frequency range with a maximum theoretical data rate of 11 Mbps. Typically 6.5. These devices operate within a maximum range of 300 feet (91 m).

IEEE 802.11g provides the same theoretical maximum speed as 802.11a, which is 54 Mbps, but operates in the same 2.4 GHz spectrum as 802.11b. Unlike 802.11a, 802.11g is backward-compatible with 802.11b. 802.11g also has a maximum range of 300 feet (91 m).

802.11n is a newer wireless standard that has a theoretical bandwidth of 540 Mbps and operates in either the 2.4 GHz or 5 GHz frequency range with a maximum range of 984 feet (250 m).

Chapter 7: Printers and Scanners

Sager computer. vmware.com virtual computerU-torrent

Laser Printers 8-200 ppm uses laser beam to creater image. Toner cartridge, laser scanner, high voltage power.

6 steps to print info onto a single sheet of paperStep 1- cleaning

Step 2- Conditioning Strep 3- Writing

Step 4- DevelopingStep 5- Transferring

Step 6- Fusing

inject printers 2-6ppm use spray ink through tiny holes or nozzles. Two types of nozzles

Page 13: NOTES IT Essentials Chpt 1-16

Thermal- a pulse of electrical current is applied to head chambers making a bubble of steamPiezoelectric- uses vibrations to printInject printers are wet for 15 seconds.

Printers can buffer to negate slow prints.Print spool – buffering on the computer

Print Calibration – adjust settings to match the colors seen on the screen and paper

Test Page verifies, printer working, driver software works, printer and computer communicating.

Printing from the command line are limited to ASCII files only like .txt and .bat

OCR – optical character recognition can scan pages to convert into word and type into it.

Dot matrix printers

DPI – dots per inch. Higher dpi higher resolutionMTBF- mean time between failures. Average time it lasts before failure.

TCO- total cost of ownership includes paper, ink, maintenance costs, Price per page, warranty costs, the amount of material to be printed, expected lifetime of the printer.

Printer to Computer interfacesSerial- transfers data in single bits in a single cycle, D-shell and either male or female.

Parallel twice as fast as serialSCSI- USB-

Wi-Fi or IEEE 802

Chapter 6: Fundamentals Laptops and Portable Devices

Expansion capabilities. PC BUS and Express BusPC BUS Type 1 3.3mm SRAM Flash

Type 2- 5mm Moden LAN wirelessType 3- Hard drive 10.5mm

Express bus

ACPI standards.SO-S5 On to Off.

SMS- short message serviceMMS-multimedia message service

Packet switching- used for accessing the interent

Optimal operating environments- Pack for transport, soft cushion clean properly, ventilate, air temperature, and humidity.

Page 14: NOTES IT Essentials Chpt 1-16

Chapter 5: Operating Systems

OS controls almost all functions on a computerWindows 2000 and XP

Provides interface, applications and hardware. Boots computer and manages file. OS’s can support multiple tasks, users or CPU.

OS has 4 main roles. Control access, manage files folders, provides GUI, manage apps.

CLI- command line interfaceGUI- graphical user interface

OpenGL- open graphics libraryDirectX – for gamers

Multi-user – two or more users can work with programs and share peripheral devices, such as printers, at the same time.

Multi-tasking – the computer is capable of operating multiple apps at the same timeMulti-processing – multiple CPUs that programs share.

Multi-threading – a program can be broken into smaller parts that can be loaded as needed by the OS. Multi-threading allows individual programs to be multi-tasked. Like tabs in foxfire. Each doing something

at the same time within foxfire.

Real mode (DOS)- 1 program at a time. Command line, dos and dos apps. Subject to crashes. Only 1 Mb of memory at a time

Protected Mode – windows 95 and 98 access to all memory, protected from program errors (bad code), HAL- hardware abstraction layer. Stops bad codes

Virtual read mode – like real mode, 1mb. Dos within XP (command prompt) only protects crashes. Can still access protected mode.

DOS-desktop operating system for 1 user.NOS- network operating systems for multiple users.

Hard drive’s have Tracks, Disks , sectors and in a sector is a Header Synchronization info and data, error correcting code.

POST checks hardware– BIOS loads hardware configurations – MBR (master boot record) NTFS/FAT32 – NTLDR(NT Loader) Boot.INI what OS to load and where on the driver. NTDETECT.COM checks the

hardware for the OS. – NTOSKRNL.EXE all configurations and HAL (checks code errors) – WINLOGON.EXE

POST is a cold startWarm boot is BIOS onward

Registry starts with HKEY_”Freddy” or HKEY_”Elly” Profile/user . every setting is stored in the registry. Everything, like control panel, file Associations, system polices, or installed software

HKEY_CLASSES_ROOT - .pdf program to open fileHKEY_CURRENT_USER desktop setting

HKEY_USERS internet log ons

Page 15: NOTES IT Essentials Chpt 1-16

HKEY_USERHKEY_CURRENT_CONFIG

LSASS.EXE is the program that displays windows xp login.

Safe mode – for troubleshooting and removing virus

ATTRIB command shows, RASH Read only, Archive, System file, Hidden file.

FAT32 only 4gb at a time of memory. not as secure as NTFS. For more OS’s mac’s lynix and old windows. PSP. PS3

NTFS larger file sizes. More secure with options.

AT on cmd schedule programs

Differential doesn’t clear archive bit. Backs up anything that is changed to the last Incremental or Normal back up. Saves space and only 1 restore.

Incremental does clear archive bit. Backs up anything that is changed, up to the last normal backup. Smaller backup sizes and more restores.

Daily backs up only files that changed on a certain day

Chapter 4. Basic of Preventive Maintenance and Troubleshooting (not testable, no quiz)

Reduces likelihood of software and hardware damage. Maintenance. Condition of parts, replace worn parts, clean.

Troubleshooting process1- Gather data from the customer2- Verify the obvious issues3- Try quick solutions first4- Gather data from the computer5- Evaluate the problem and implement the solution6- Close with the customer

Eliminate variables one at a time.

Be very tactful. Communication is key.

Event View- Event ID on google will help to solve the problem.Beep codes are due to hardwareMemtest. Prime95. Knoppix- lynix. DL nod est-$. Avast- free. ABG- free. Virtual drive. Spybot search and destroy.

(90% of what I do.)

Page 16: NOTES IT Essentials Chpt 1-16

Chapter 3. Computer Assembly

Everything has only place to fit. “Plug it in where it fits. It doesn’t fit, it probably doesn’t belong there.”

Prepare the workplace before opening the computer case. Lighting, ventilation, room temp, accessible, avoid clutter, antistatic mat, containers for screws.

On power supply. Fan facing down and fan out of case, correctly inserted.

Small components to the motherboard.

CPU, touch only corners and use antistatic bands.

Thermal compound- helps keep CPU cool. Evaporates very fast.Isopropyl alcohol removes the old compound.

Articsilver.com and manufacturer’s recommendations about applying the thermal compound. Different techniques for apply

Heatsink/fan has a 3 pin cable that attaches on the motherboard between, cpu and ram. (some motherboards will have more than 1 fan connector. Controlled by BIO’s)

CPU connection with pin 1 on the cpu socket. TriangleThermal sink must be placed on evenly.

After ram is installed, motherboard can be installed the case. Plastic and metal standoffs are used to mount the motherboard and to prevent it from touching the metal portion of the case. Metal standoff’s are better

than plastic.

Install internal drives. Cd/HDD so on. After motherboard is aligned in the case.External drives.

Install cards. Network cards. Wireless and NIC’s. Video adapter card.

After everything is put in, cables get connected. Power cables are used to distribute electricity from the power supply to the motherboard and other

componentsData cables transmit data between the motherboard and storage devices, such as hard drives.

ATX- 20 or 24 pins Power. 20pin will work in a 24 pin socket.SATA power 15pin connectorMolex are used where SATA power connectors aren’t used(Molex and SATA can’t be used at the same time: can be used for anything that supports molex)Berg 4pin is used for floppy drive

Pata CABLE Ribbion (PATA) 40 or 80 conductors. Master at the end and Slave is in the middle of the cable. (3

connectors.) Motherboard to optical drive

SATA 7pin connector. 2 connectors. Motherboard to drive

Floppy drive cables, 34 pin. Stripe is the location of pin, must be lined up. A drive end (master) middle drive will be B drive (slave) twist in cable.

Page 17: NOTES IT Essentials Chpt 1-16

Lastly, connect external cables. (mouse keyboard monitor) and reattach side panels.

Boot computer for the first time. Basic input output system. Will perform a Power-on selft test (POST)

Identify beep codes. POST checks to see that all of the hardware in the computer is operating correctly.1 beep means everything is good. Multiple beeps means a problem. Motherboard documentation will give

beep translation.

CMOS- complementary metal-oxide semiconductor. CMOS is maintained by the battery in the computer. BIOS is stored in CMOS. Special memory chip called

CMOS

Chapter 2. Safe Lab Procedures and Tool Use

Safe working conditions, clean organized, properly lit. proper handling and disposal.

Fire plan – Contact Emergency services.

Class A – Paper, wood, plastics, cardboard - Ordinary combustible

Class B – Gasoline, kerosene, organic solvents - Liquid combustible

Class C – Electrical equipment

Class D – Combustible metals

ESD- Electrostatic discharge can damage is computer. only 30 volts of ESD can damage a component.Preventing ESD damage- antistatic bags to store components. Grounded mats on workbenches, grounded

floor mats in work areas, and use antistatic wrist straps when working on computers.

Power Fluctuation can cause data loss or hardware failure: blackouts brownouts, noise(electrical interference, crosstalk), spikes, power surges (lightning).

Surge suppressors – UPS – SPS keep the power supply constant. UPS is the best. Enough time to shut down computer without power. Do not plug printer into ups

Proper Disposal- Batteries from portable computer systems may contain lead, cadmium, lithium, alkaline, manganese and mercury.

Used printer toner kits and printer cartridges.Monitors – 4 pounds of lead

Tools for the job- ESD tools, antistatic wrist strap matHand tools- screwdrivers, needle-nose pliers Cleaning tools soft cloth compressed air can

Diagnostic tools- digital multimeter loopback adapter.

Page 18: NOTES IT Essentials Chpt 1-16

Software tools- FDisk (makes partitions), Format (erase stored information), Scandisk or Chkdsk, Defrag, Disk cleanup, Disk management (same as FDisk and Format but is GUI- shows charts and stuff), System

file checker (SFC)

Organizational tools- personal reference tools notes, journal, history of repairs.Internet reference tools-search engines, news groups, forums ((Marine tactical network))

Misc tools- spare parts, a working labtop

Took a Skills Review exam today. Received a 97, 1 question wrong in the Basic Hand Tool and Environmental Knowledge/Safety.

Chapter 1.

Hardware, electricity.

Safe lab procedures, troubleshooting, OS’s, networks, security, communication skill.

AC alternating current. DC direct current. DC is lower voltage. Used for all computer parts that need power.

Form factor- size and layout of a case

RPM’s- Revolutions per minute. Speed at which a hard drive is read.

LED indicators. Are little lights that show status of computer. ie. Hard drive being used

Voltage(V) Current (I)

Buses allow data to travel among the various components.

IDE(ATA)- 40pin early drive controller interface that connects computer and hard disk driveEIDE(ATA-2)-

CPU – processor, brain of computer RISC, small- reduced instruction set computerCISC, complex instruction set computer. larger more at the same time

Hyperthreading – two CPU’s at the same time.

GPU- Graphics card has its own processor and fan on it.

PCI are the expansion ports used today.PCI-Express is better. PCI-Express version 2 is the best right now.

IEEE1394a. 400 Mbps 6-pin or a 4pin connectorIEEE1394b 800Mbps 9pin

Parallel IEEE1284 8 bits of dataSerial Cable transfer 1 bit at a time.

RJ-45 port connects a computer to a network

Page 19: NOTES IT Essentials Chpt 1-16

PS/2 is 6pin

s-video is an output only device

IRQs ticket in line. Process requests.I/O 65,535 I/O ports in a computer. communication between, devices and softwareDMA used by high speed devices. Bypass cpu. New computers have channels 0-7