Chapters 1-9 Flashcards
This is the original power supply for legacy computer systems now considered obsolete
Advanced Technology (AT)
This is considered the brain of the computer
Central Processing Unit(CPU)
Temporary location to store data and applications
Random Access Memory(RAM)
Provide locations to connect additional components
Expansion Slots
This consists of the integrated circuits on the motherboard that control how system hardware interacts with the CPU and motherboard. It also establishes how much memory can be added to a motherboard and the type of connectors on the motherboard.
Chipset
Controls high speed access to the RAM and video card. It also controls the speed at which the CPU communicates with all of the other components in the computer. Video capability is sometimes integrated into northbridge
Northbridge
Allows the CPU to communicate with slower speed devices including hard drives, Universal Serial Bus,and expansion slots
Southbridge
This is the most common motherboard form factor. The ATX case accommodates the integrated I/O ports on a standard ATX motherboard. The ATX power supply connects to the motherboard via a single 20-pin connector.
Advanced Technology eXtended (ATX)
This is a smaller form factor that is designed to be backward-compatible with ATX. Micro-ATX boards often use the same Northbridge and Southbridge chipsets and power connectors as full sized ATX boards and therefore can use many of the same components.
Micro-ATX
There are many types of ITX motherboards;however,Mini-ITX is one of the most popular. It uses very little power,so fans are not needed to cool it.
ITX
In PGA architecture, the pins are on the underside of the processor package and is inserted into the motherboard CPU socket using zero insertion force (ZIF).
Pin Grid Array (PGA)
Amount of force needed to install a CPU into the motherboard socket or slot
Zero Insertion Force (ZIF)
In an LGA architecture, the pins are in the socket instead of the processor
Land Grid Array (LGA)
Sound Adaptors provide audio compatibility
Sound Adaptor
A NIC connects a computer to a network using a network cable
Network Interface Card (NIC)
A wireless NIC connects a computer to a network using radio frequencies
Wireless NIC
Video adaptors provide video capability
Video Adaptor
Capture cards send a video signal to a computer so that the signal can be recorded to a storage drive with the video capture software
Capture Card
These provide the ability to watch and record television signals on a PC by connecting a cable television,satellite,or antenna to the installed tuner card.
TV Tuner Card
Provides additional USB ports to connect the computer to peripheral devices
Universal Serial Bus (USB) controller card
Unbuffered Memory
This is the regular memory for computers. The computer reads data directly from the memory banks making it faster than buffered memory. However,there is a limit on the amount of RAM that can be installed
Buffered Memory
This is specialized memory for servers and high end workstations that use a large amout the n of RAM.These memory chips have a control chip built into the module.
Graphics Card
The type of graphics card installed affects the overall performance of a computer. The computer mus have the slots,RAM,and CPU to support the full functionality of an upgraded graphics card.
Sound Card
The type of sound card installed determines the sound quality of your computer. Computer system must have quality speakers and a subwoofer to support the full functionality of a an upgraded sound card
Storage Controller
Storage controllers can be integrated or added as an extension card. They allow for the expansion of internal and external drives for a computer system.
I/O Card
Installing and I/O card in a computer is fast and easy way to add I/O ports. USB are some of the most common ports to install a computer.
NIC
Customers often upgrade a network interface card (NIC) to get wireless connectivity or to increase bandwidth.
Capture Card
A capture card imports video into a computer and records it on a hard drive. The addition of a capture card with a television tuner allows you to view and record television programming.
Peripheral Component Interconnect (PCI)
PCI is commonly available to support older expansion cards
PCI Express (PCIe)
Has four types of slots; x1, x4, x8, and x16. These slots vary in length with the x1 being the shortest.
Secure Digital (SD)
SD cards were designed for use in portable devices such as cameras,MP3 players,and laptops. SD cards can hold as much as 2 TB of data
MicroSD
This is a much smaller version of the SD, commonly used in smartphones and tablets
MiniSD
A version of SD between the size of an SD card and a microSD card. The format was developed for mobile phones
CompactFlash
CompactFlash is an Older format,but still in wide use because of its high speed and high capacity. Often used for video cameras.
Memory Stick
Created by Sony Corporation,Memory Stick is a proprietary flash memory used in cameras, MP3 players,hand held items,and other portable electronics.
xD
Also known as a Picture Card,it was used in some digital cameras
Power Button
The power button turns the computer on and off. If the power button fails to turn off the computer,hold down the power button for several seconds.
Reset Button
The reset button restarts the computer without turning it on or off
Power LED
The power LED remains lit when the computer is on,and often blinks when the computer is in sleep mode
Drive Activity LEDs
The drive activity LED remains lit or blinks when the system is reading or writing to hard drives
Passwords
Passwords allow for different levels of access to the BIOS settings.
Drive Encryption
A hard drive can be encrypted to prevent data theft. Encryption changes the data on your hard drive into a code.
LoJack
This is a security feature that consist of two programs;the Persistence module and the Application agent.
Trusted Platform Module (TPM)
This is a chip designed to secure hardware by strong encryption keys, digital certificates, passwords,and data. Is used by windows to support Bitlocker full disk encryption.
Secure Boot
Secure Boot is a UEFI security standard that ensures that a computer only boots an OS that is trusted by the motherboard manufacturer. Secure boots prevents an “Unauthorized” OS from loading during startup.
Blackout
Complete loss of AC power. A blown fuse, damaged transformer, or a downed power line can cause a blackout.
Brownout
Reduced voltage level of AC power that last for a period of time. These occur when the power line voltage drops below 80 percent of the normal voltage level and the electrical circuits are overloaded,
Noise
Interference from generators and lightning. Noise results in poor quality power, which can cause errors in a computer system.
Spike
Sudden increase in voltage that last for a short period and exceeds 100 percent of the normal voltage of a line. Spikes can be caused by lightning strikes, but can also occur when the electrical system comes back on after a blackout
Power Surge
Dramatic increase in voltage above normal flow of the electrical current. A power surge last for a few nanosecond, or one-billionth of a second.
Surge Protector
Helps protect against damage from surges and spikes. A surge suppressor diverts extra electrical voltage that in on the line to the ground. Amount of protection offered is measured in Joules.
Uninterruptible Power Supply (UPS)
Helps protect against potential electrical power problems by supplying a consistent level of electrical power to a computer or other device.
Standby Power Supply (SPS)
Helps protect against potential electrical power problems by proving a backup battery to the power supply when the incoming voltage drops below the normal level.
Reduced Instruction Set Computer (RISC)
This architecture uses a relatively small set of instructions. RISC chips are designed to execute these instructions very rapidly. Some well known CPU
Complex Instruction Set Computer (CISC)
This architecture uses a broad set of instructions, resulting in fewer steps per operation. Intel x86 and Motorola 68k are some well known CPU’s using CISC.
Striping
This RAID eneables data to be distributed across multiple drives. This provides a significant performance increase.
Mirroring
This RAID type stores duplicate data on one or more other drives. This provides redundancy so that the failure of a drive does not cause the loss of data.
Parity
This RAID type provides basic error checking and fault tolerance by storing checksums separately from data.
Double Parity
This RAID type provides fault tolerance up to two failed drives
Native Mode
This term describes when the image is sent to the monitor by the video adaptor card matches the native resolution of the monitor.
CPU heatsink and fan assembly
The fan should spin freely, the fan power cable should be secure, and the fan should turn when the power in on.
RAM Modules
The modules must be seated securely in the RAM slots. Ensure that the retaining clips are not loose.
Storage Devices
All cables should be firmly connected. Check for loose, missing, or incorrectly set jumpers. A drive should not produce rattling, knocking, or grinding sounds.
Screws
A loose screw in the case can cause a short circuit
Adaptor Cards
Ensure that they are seated properly and secured with the mantaining screws in their expansion slots. Loose cards can cause short circuits. Missing expansion slot covers can let dust inside of the computer.
Cables
Examine all cable connections. Ensure that pins are not broken and bent and that the cables are not crimped. Retaining scres should be finger tight.
Power Devices
Inspect power strips, surge suppressors, and UPS devices. Make sure that the devices work properly and that there is clear ventilation.
Keyboard and Mouse
Use compressed air to clean the keyboard, mouse, and mouse sensor.
Storage Device Problems
Are often related to loose, or incorrect cable connections, incorrect drive and media formats, and incorrect jumper and BIOS settings.
Motherboard and Eternal Components Problems
These are often caused by incorrect, or lose cables, failed components, incorrect drivers, and corrupted updates.
Power Supply Problems
Power problems are often caused by a faulty power supply, lose connections, and inadequate wattage
CPU and Memory Problems
Processor and memory problems are often caused by faulty installations, incorrect BIOS settings, inadequate cooling and ventilation, and compatibility issues.
Display Problems
Display problems are often caused by incorrect settings, loose connections, and incorrect or corrupted drives.
Switch
Connects multiple devices to the network
Router
Forwards traffic between networks
Wireless Router
Connects multiple devices to the network and may include a switch to connect wired host.
Access Point (AP)
Connects to a wireless router and is used to extend the reach of a wireless network
Modem
Connects a home or small office to the internet
Journal
Include descriptions of the problem, possible solutions that have been tried to correct the problem, and steps taken to repair the problem.
Notes
Make notes as you go through the troubleshooting and repair process to avoid repeating steps.
Analog Telephone
Analog Telephone internet access can transmit data over standard voice telephone lines. This type of service uses an analog modem to place a telephone call to a remote site. Also known as dialup.
Integrated Services Digital Network (ISDN)
Uses multiple channels and can carry different types of services; therefore is considered a type of broadband. Is a standard that uses multiple channels to send voice, video, and dara over normal telephone wires.
Broadband
Broadband uses different frequencies to send multiple signals over the same medium.
DSL
DSL is an always-on-service, which means that there is no need to dial up each time you want to connect to the internet. Voice and data signals are carried on different frequencies on the copper telephone wires.
Cable
A cable internet connection does not use telephone lines. Cable uses coaxial cable lines originally designed to carry cable television. A cable modem connects your computer to the cable company.
Fiber
Fiber optic cables are made of glass or plastic and uses light to transmit data. They have a very high bandwidth, which enables them to carry large amounts of data.
Bluetooth
A bluetooth device can connect up to seven other bluetooth devices.
RFID
RFID uses frequencies within the 125 MHz to 960 MHz range to uniquely identify items, such as in a shipping department.
NFC
NFC uses frequencies 13.56 MHz and is a subset of the RFID standards. NFC is designed to be a secure method to complete transactions.
Zigbee
Zigbee uses low-power digital radios based on IEEE 802.15.4 wireless standard for low-rate wireless personal area networks that is meant to be used by low-cost, low-speed devices.
Z-Wave
Z-Wave technology is a proprietary standard that is now owned by Silicon Labs. However a public version of the interoperability layer of Z-Wave was open sourced in 2016.
The Smart Home Market
The market for smart home products continues to grow. In 2018 the number of smart homes was 34.8 million.
File Transfer Protocol Secure (FTPS)
An FTP client can request the file transfer session be encrypted. The file server can accept or deny the request.
SSH File Transfer Protocol (SFTP)
As an extension to Secure Shell protocol, SFTP can be used to establish a secure file transfer session.
Secure Copy (SCP)
SCP also uses SSH to secure file transfers.
Repeater
Regenerating weak signals is the primary purpose of a repeater.
Hub
Hubs receive data on one port and then send it out to all other ports.
Bridge
Bridges were introduced to divide LAN’s into segments. Bridges keep a record of all the devices on each segment.
Switch Operation
Every device on a network has a unique media access control address. This address is hardcoded by the manufacturer of the NIC.
Single-Mode Fiber (SMF)
Consist of a very small core and uses laser technology to send a single ray of light.
IP Address
Identifies the device on the network.
Subnet Mask
Is used to identify the network on which this device is connected.
Default Gateway
Identifies the router that this device uses to access the internet or another network.
Optional Values
Such as the preferred Domain Name System (DNS) server address and the alternate DNS server address.
Network Components
Includes wired and wireless network interface cards (NIC) and network devices such as switches, wireless access points (APs), routers, multipurpose devices,and more.
Network Design
Involves knowing how networks and interconnected to support the needs of a buisness.
0db8
Can be represented as db8, in the first IPv6 address
0123
Can be represented as 123
0001
Can be represented as 1
IPv4 Link-Local Address
If your windows computer cannot communicate with a DHCP server to obtain an IPv4 address, then Windows automatically assigns an Automatic Private IP Addressing address.
What are MAC addresses?
They are the physical addresses of the computer system. They do not change and are integrated into the NIC. MAC stands for Media Access Control.
What are the 6 digits of a MAC address
They are the OUI
How are MAC addresses typically represented
In Hexadecimal
Can routers have multiple NICs
Yes. They connect to multiple networks and thus require multiple NIC’s
What are Subnet Mask
They are 32 bit addresses, represented as decimal.
How do you physically install a NIC?
You must install it into the IPCE slot and configure the antenna. The antenna may be attached or must be manually attached with a cable.
What is ICMP?
Internet Control Message Protocal
What is ICMP used for?
It is used to send or control error messages.
How do you configure a NIC
Windows is already dynamic so this is not a concern
How do you update a NIC
New drivers may be published, this is what the update will entail.
Smartwatches
Smartwatches are a type of wearable that includes a microprocessor, a special operating systems, and apps.
Fitness Trackers
Fitness trackers are similar to smartwatches but are limited to monitoring the body such as physical activity, sleep, and exercise.
E-Reader
Special purpose device with 6” or larger black and white display optimized for reading text.
Smartphone
Uses a special mobile OS. Small screen sizes averaging 5”. Touch screens with no physical keyboard. Wi-Fi, Bluetooth, and cellular compatibility. Software apps are downloadable from app stores.
Laptop
Can run on battery or be plugged in. Usually runs a full OS and can run desktop software. CPU power, RAM resources, and fixed disk storage are similar to desktop computers. RAM and storage units are upgradable.
LCD
This uses a fluorescent backlight to illuminate the display.
OLED
This uses individually lit pixels
Digitizer
This converts the touch actions into a digital signal
Inverter
This converts direct current to alternating current
Wi-Fi Components
Wi-Fi antennas transmit and receive data carried over radio waves.
Wi-Fi Antenna Connectors
Wi-Fi antennas in laptops are typically located above the screen.
Wi-Fi Antenna Leads
The Wi-Fi antenna is connected to a wireless card by an antenna wire and antenna leads.
Wi-Fi Antenna Wire Guides
The wires are fastened to the display unit by wire guides which are located on the sides of the screen.
Near Field Communication (NFC)
NFC enables mobile devices to establish radio communications with other devices by placing the devices close together or by touching together.
Infrared (IR)
If a mobile device is IR enabled, it can be used to control other IR controlled devices remotely, such as a TV, set top box, or audio equipment.
Bluetooth
This wireless technology allows data exchange over a short distance between two bluetooth-enabled devices or connect to other bluetooth-enabled peripheral devices, such as speakers or headphones.
Tether
This uses your cellular phone as a modem for another device, such as a tablet or laptop. The connection is made over a USB cable or Bluetooth.
Mobile Hotspot
A hotspot is where devices connect using Wi-Fi to share a cellular data connection.
Flash Card Readers
Most modern laptops feature a flash card reader for Secure Digital (SD) and Secure Digital High Capacity (SDHC) flash cards.
Contact
This type of reader requires a physical connection to the card, made by inserting the card into the reader.
Warranty
Identify what is covered within the warranty.
Scheduled Servicing
Servicing is based on expected usage. Using information is the documentation or on the manufacturer’s website.
Mean Time Between Failures (MTBF)
The printer should work without failing for an average length of time. This information is the documentation or on the manufacturer’s website.
Imaging Drum
Used by laser printers to create the image.
DPI
Refers to the quality of the image resolution.
CMYK
The colors of ink used in color printing.
Electrostatic Spray
Used by inkjet printers to create the image.
PPM
Rate at which the printer can output pages.
ADF
Refers to the feature of some laser and inkjet printers which also have copy machine capabilities.
Print Head
This is located on the carriage, which is attached to a belt and motor.
Ink Cartridges
Inkjet printers use these to spray ink onto a page.
Piezoelectric crystals
These are located in the ink reservoir at the back of each nozzle. A charge is applied to cause them to vibrate. This vibration controls the flow of ink onto the paper.
Carriage
As rollers pull paper in from the feeder, the belt moves this back and forth across the paper to spray ink onto the page.
Nozzles
These are tiny holes in the print head.
Thermal
A pulse of electrical current is applied to heating chambers around the nozzles. The heat creates a bubble of steam in the chamber. The steam forces inl out through the nozzle and onto the paper.
Duplexing Assembly
Turns the page that is already printed on one side so that it can be printed on the other side.
Fuser Assembly
This is made up of hot rollers, which melt the toner into the paper.
Pickup Rollers
These move the sheet of paper out the tray or cassette, then through the printer during the printing process.
Toner Cartridge
This is one of the primary consumable items in a laser printer.
Transfer Roller
This assist in transferring the toner from the imaging drum to the paper.
Wasted Resources
This occurs when dedicated servers sit idle for long periods waiting until they are needed to deliver their specific resource. Meanwhile, these servers waste energy.
Single-Point Failure
This occurs when a dedicated server fails or goes offline. There are no backup servers to handle the failure.
Host Computer
This is the physical computer controlled by an user. VMs use the system resources of the host machine to boot and run an OS.
Host Operating System
This is the operating system of the host computer. Users can use a virtualization emulator on the host OS to create and manage VMs.
Guest Operating System
This is the OS that is running in the VM. Drivers are required to run the different OS version.
Processor support
Processors, such as Intel VT and AMD-V, were specifically designed to support virtualization. The virtualization feature on these processors may need to be enabled. Processors with multiple cores are also recommended as the additional cores increase speed and responsiveness when running multiple VMs.
Memory Support
Consider that you need memory for your host OS and will now need enough RAN to meet the requirements of each VM and their guest OS.
Storage
Each VM creates very large files to store operating systems, applications, and all of the VM data. You must also factor in that an active VM will require a few GB of storage space.
Network Requirements
Depends on the type of VM. Some VMs do not require outside connections while others do.
Server Sprawl
This occurs when an organization does not have adequate space to physically house underutilized servers. The servers take up more space than is warranted by the services that they provide.