General Definitions: WINDOWS Flashcards

1
Q

What Branch of Information Technology are Systems Administrators in?

A

Infrastructure Support Branch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an URL ?

A

Uniform Resource Locator also known as a weblink

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Web Application?

A

IT IS A
• PROGRAM
• DESIGNED TO ACCOMPLISH A SPECIFIC TASK OR USE AND
• MUST BE INSTALLED ON AN OPERATING SYSTEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Web Browser?

A

It is a • computer application
• used to search or browse the internet
• such as Google Chrome, Internet Explorer, Safari, FireFox, Microsoft Edge, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Etc:

A

Pronounced “Itsy” Directory in LINUX & UNIX systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the computer term(s) used for the USERNAME/PASSWORD?

A

Login credentials or authentication information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Data?

A

Data is information that is stored in a file or text that is stored in a file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

WIFI

A

Wireless Fidelity
Uses Radiowaves to transmit data between different systems within a LAN
Uses Radiowaves to transmit data from mobile devices through router to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A COMPUTER IS

A

A device that creates, stores, manages and processes data by receiving input which it processes and then delivers an output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Other computer Names

A

Personal Computer (PC); a box, a unit, or a Machine eg LINUX Machine,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Network?

A
It is two or more computers or systems that 
share information and 
computer resources, 
exchange files and
 allow electronic communication, 

The computers on a network may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a LAN?

A

It stands for Local Area Network. It is a group of networks that

  1. share information,
  2. share computer resources and
  3. communicate with one another and

that span a small geographic area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an APPLICATION?

A

It is a program designed to accomplish specific task(s) eg; Google Chrome – designed to browse internet, Word -word processor, VMware – build systems); It must be installed onto an Operating System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

WINDOWS

A

It is an Operating system built by Microsoft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Windows Operating System

A

It is an operating system that uses JAVA and Visual basic, Easily compromised, virus-prone,

It is a More usable friendly, more compatible with other systems, companies pay a lot of money to secure these systems called system hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an Operating System?

A

It is the main software or program running on a computer or the first software or program that loads when you turn on a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Software?

A

It is the virtual, intangible part of a computer, eg. Operating system, files, folders, apps, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Hardware?

A

It is the physical or tangible part of a computer eg. Keyboard, mouse, CD,DVD ROM, monitor etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a Server?

A

It is a super computer that has extra processing power designed for business use,
It is a supercomputer that has different components and parts for business use, eg. Windows Server 2008 or 2019; Solaris or AIX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does a PC Technician (Windows Desktop Support) do?

A

o Troubleshoots and Fixes computer related issues eg. Virus, software, performance issues)
o Fix computer software and hardware issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does a Windows Server or Domain Administrator do?

A

o Sets up Domain
o Sets up Active Directory (mainly for Microsoft)
o Sets up Server – Server Administration – build from scratch from installing operating system
o Troubleshoots and Fixes computer related issues eg. Virus, software, performance issues)
o Fix computer software and hardware issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a DOMAIN?

A

It is a group of systems that are connected together that share common information (eg. Printer, folders, files, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a Systems Administrator?

A

It is an expert in different operating systems such as Windows, LINUX, UNIX, Microsoft Azure, AWS, DevOps, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a Systems Administrator?

A

It is an expert in different operating systems such as Windows, LINUX, UNIX, Microsoft Azure, AWS, DevOps, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is UNIX?
It is a group of operating systems that have a similar kernel built by Bell Labs
26
What is a UNIX Kernel?
It is the core or heart of the UNIX operating system or foundation of the UNIX operating system. Built by Ken Thomson (Applications Developer) and Dennis Ritchie (C++ Language programmer) in 1969. It is also Freeware – free software, and It is Opensource – code used to build the kernel is open to the public; It is secure, stable, No virus, good and agile
27
Name some UNIX Operating systems
Sun Microsystems which became ORACLE"s SOLARIS, IBM’s AIX, HP’s HP-UX; and Apple’s MAC-OS
28
What is INFORMATION TECHNOLOGY (IT)?
It is the use of technology (machines, software or networks) to create and manage data (information) ; data management business; manage a Network for data to flow It is the use of technology to share information across systems
29
What is an IT Professional?
It is person who works as and is able to a) build and manage systems, b) store and secure and transfer data, c) user access security d) ensure data is always available, and e) Backup creation or clustering
30
List 4 UNIX Flavors
1. *SOLARIS – We will learn Solaris in Class – Owned by ORACLE (Sun Microsystems) 2. *HP-UX – Owned by HP 3. AIX– Owned by IBM 4. MAC-OS– Owned by Apple  
31
LIST 6 LINUX Flavors & Distributions
1. *RHEL - We will learn RHEL in Class. Owned by Red Hat Company (vendor) 2. *CENTOS - We will learn CENTOS in Class. Sponsored but not supported by Red Hat Company. Open to community. Freesource. Inspires innovation that helps Red Hat. 3. *UBUNTU - We will learn UBUNTU in Class. A community sponsored project 4. FEDORA – Community Sponsored 5. ANDROID 6. IOS – Owned by Apple (sells the Hardware)
32
What is LINUX?
A modified UNIX Kernel based operating system created by Linus Torvald from Helsinki to make UNIX more user friendly; Easier than UNIX
33
What is VMware?
It is software used to build virtual systems; Stands for Virtual Machine Ware
34
What is a hypervisor?
It Is a type of VMware Software
35
List 2 Types of Hypervisor
1. Hosted Hypervisor | 2. Baremetal Hypervisor
36
What is a Hosted Hypervisor?
It is an application type of Hypervisor; i.e. Must be installed on an Operating system eg Oracle Virtual Box A hosted hypervisor is installed on a host computer, which already has an operating system installed. It runs as an application like other software on the computer. Most hosted hypervisors can manage and run multiple VMs at one time. It requires you to install an operating system before deploying the hypervisor, meaning the hypervisor doesn't have direct access to hardware resources. These kinds of hypervisors are often cheaper than bare-metal, so they're well-suited for small data centers or test and development environments.
37
What is a Baremetal Hypervisor?
It is an OS Type of Hypervisor i,e. must be installed on a physical system eg. VMware Esxi. Most companies use this one. It is virtualization software that is installed on hardware directly. At its core, the hypervisor is the host or operating system. It is structured to allow for the virtualization of underlying hardware components to function as if they have direct access to the hardware
38
What is cloud Computing?
It is storing and accessing data and programs over the Internet instead of your computer's hard drive. Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. The term is generally used to describe data centers available to many users over the Internet. Difficult to hack systems on a cloud, are hardened systems, safer
39
A Network is
Two or more computers that are linked in order to share resources, exchange files, or allow electronic communications. The computers on a network may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams. Enables the movement of data.
40
A switch is
A device that connects systems in a Network together
41
A router is
A device that connect Networks together
42
A modem is
A device that is a PRIMITIVE ROUTER USED TO TRANSMIT DATA OVER PHONELINES ; UPDATED TO ROUTERS
43
AP
AP (Wireless Access Point)
44
ISP
Internet Service Provider It is a company that provides internet to your network eg. Verizon Fios, Comcast. Comcast, etc
45
WAN
– Wide Area Network b. It is a group of networks connected together sharing information spanning a wide geographical area (usually correspond to a company’s networks) c. Combination of LANs to form WANs d. Combination of LANs spanning a wide network
46
MAN
Metro or Metropolitan Area Network e. It is a group of systems connected together sharing information spanning a metro area f. It is a network spanning a metro area g. METRO AREA: IT IS A GROUP OF NEIGHBORING STATES THAT DO BUSINESS TOGETHER DESIGNATED BY THE GOVERNMENT SUCH AS DC METRO (MD, DC, VA) NY METRO (NY, NJ, PA)
47
Troubleshooting: | If Router is not working, it could be issues with:
* IP Address * Cable * OS
48
An IP Address is
A number that is assigned by the DHCP to each system in a network so that systems can communicate with each other within a network
49
What is a Vmware Host?
It is a system that has a hypervisor installed on it that is used to host guest systems or virtual systems
50
What is a Networked System?
A Networked System is an operating system designed to primarily support workstations and personal computers on a local area network
51
What is a CRT?
Cathode Ray Tube - A machine (eg TV) that transmits electrons through cathode ray tube in order to display an image. It displays analog signal (Has Maximum Picture Resolution less than 720 p;)
52
What is a LED?
Light Emitting Diode – Image is displayed by variations in light emitted by diode as light hits it and projects images on screen, It has better picture quality and displays a digital signal. (Has Maximum Picture Resolution about 4000 p – High definition resolution)
53
What is a LCD?
Liquid Crystal Display – Image is displayed on the screen by the light emitted when fluorescent light hits the display screen and displays a digital signal. (Has Maximum Picture Resolution about 1080 p – High definition resolution)
54
What is a Blade Server?
A Blade Server is a server that is used in most large business settings that is a rectangular server with about 9 hard drives installed in it. It is usually stored in racks enabling greater processing power to handle large amounts of data needed by big businesses.
55
What is a Systems Engineer?
Systems Engineer • Is able to design and build a network from scratch • Is an expert in 2 or more operating system servers such as Windows, LINUX, or UNIX • Is able to do all the tasks performed by a Systems Admin, Network Tech and PC Tech.
56
What is a Network Administrator?
Network Administrator: • Is an expert in one operation system server as Windows, LINUX, or UNIX • Is able to do all the tasks performed by a Network Tech and PC Tech.
57
What is a Systems Administrator?
A Systems Admin: • Is an expert in at least 2 operating system servers such as Windows, LINUX, or UNIX • Is able to do all the tasks performed by a Network admin, Network Tech and PC Tech.
58
How is a Systems Admin different from a Network Admin and a Systems Engineer
A Systems Admin: • Is an expert in at least 2 operating system servers such as Windows, LINUX, or UNIX • Is able to do all the tasks performed by a Network admin, Network Tech and PC Tech. And A Network Administrator: • Is an expert in one operation system server as Windows, LINUX, or UNIX • Is able to do all the tasks performed by a Network Tech and PC Tech.
59
What is HTML?
. html: It stands for Hypertext Markup Language and is a language that is used to convert a private LAN resource into a public internet resource. It creates static web sites with just information or text
60
What is HTTP?
It stands for Hypertext Transmission Protocol, and is used to transport or transmit web pages It transfers clear text over internet. This data transmission is not secure and can be easily read and stolen if intercepted
61
What is HTTPS?
It stands for Hypertext Transmission Protocol Secure, and is used to transmit Transfers encrypted data or webpages over internet in a secure manner. Converts Human Readable information to Non Human readable information
62
What is WWW?
It stands for World Wide Web, and it is a combination of internet resources made available to the public. It is the world wide web of internet resources.
63
How is Internet different from WWW?
* Internet: It is the combination of LANs connected together spanning the globe. It is connected by ISPs using routers and switches. * WWW: It stands for World Wide Web, and it is a combination of internet resources made available to the public. It is the world wide web of internet resources.
64
What is the Internet?
It is the combination of LANs connected together spanning the globe. It is connected by ISPs using routers and switches.
65
What is a Operating System?
The main software or program that runs on a computer
66
Operating Systems we will learn in class are:
``` Windows LINUX UNIX Cloud Computing eg Amazon AWs, Microsoft Azure DevOps VMware ```
67
What is Computer Software?
Computer Software: The virtual or intangible parts of a computer eg. Files, or apps,
68
What is Computer Hardware?
Computer Hardware: The physical or tangible parts of a computer eg. Keyboard or mouse
69
Who are the founding Fathers of UNIX?
The founders of UNIX are Ken Thomson (Developer) and Dennis Ritchie (C++ Language Programmer)
70
What is the difference between computer memory and storage?
Computer memory is any physical device in the computer that temporarily stores information that makes it readily available for immediate use, and Computer storage is a physical device, such as a hard disk drive or solid state drive, where data is recorded and can stay indefinitely, to be recalled as needed.
71
What is MEMORY?
MEMORY: 1. IT HOLDS SOFTWARE AND IS USED TO TEMPORARILY LOAD SOFTWARE 2. SOFTWARE IS LOADED ONTO RAM OR MEMORY CACHE IN ORDER TO LOAD 3. CANNOT OPEN OS IF RAM IS NOT WORKING WHEN RAM IS DEFECTIVE COMPUTER SCREEN IS BLANK OR COMPUTER DOES NOT LOAD
72
What is NON- HUMAN READABLE DATA (NON- ASCII DATA)?
NON- HUMAN READABLE DATA (NON- ASCII DATA) a. Files like picture files - b. Files like video files - c. Files like audio files - d. Files like System files - - executable files
73
What is HUMAN READABLE DATA (ASCII DATA)?
HUMAN READABLE DATA (ASCII DATA) a. Files like word files - b. Files like PDF files - c. Files like excel files - d. Files like powerpoint files -
74
What are the 2 types of Data?
1. NON- HUMAN READABLE DATA (NON- ASCII DATA) | 2. HUMAN READABLE DATA (ASCII DATA)
75
Power Button turned on then....
Power Button turned on ----OS Stored in the Hard Drive (HD) loads from Hard drive to RAM then it shows up on the monitor when you choose Chrome ---Mr. CPU will send signals to Chrome to load on OS
76
What is RAM?
RAM: | Stands for RANDOM ACCESS MEMORY
77
What does the CACHE do?
CACHE: HOLDS SOFTWARE
78
What does the Storage (Hard-drive) do?
STORAGE (HARD DRIVE): IT IS USED TO PERMANENTLY STORE SOFTWARE
79
Name the types of RAM?
TYPES OF MEMORY: 1. RAM - Random Access Memory 2. ROM - Read Only Memory 3. SWAP -
80
What is Ransomware?
It is a Virus that holds your system hostage
81
What is Zero Day Attack?
Zero Day attack: | Brand new malware; Unknown attack – attack that has not been seen before or admins do not know about
82
What is a PC Technician?
A PC Technician works to fix problems related to PC
83
What is a Network Technician?
A Network Technician fixes network related issues | and does everything that a PC Technician does
84
What are Dynamic Webpages?
Dynamic Webpages are Websites with media eg. Videos eg php, PHP, MySQL (pronounced my sequel)
85
What is Clear Text?
Clear Text: Information that can be read by others over internet: Human readable
86
What is Encrypted text?
Encrypted text: Non Human readable text; Information that cannot be read by other humans over the internet:
87
What is a Secure Shell?
Secure Shell is a LINUX and UNIX system login
88
What is an ISP?
An ISP is an Internet Service Provider
89
What is an ISO?
An ISO image file is a snapshot of the data and layout of a CD or DVD, saved in ISO-9660 format. ISO image files are widely used for storing CD content. ISO is a common CD image format for DOS, Windows (Joliet ISO extension), Linux (RockRidge ISO extension), and other operating systems.
90
What is Bandwidth?
It is the maximum amount of data that can flow through a medium per second
91
WHAT IS A COMPUTER?  
It is a machine that manages and processes data It is an electronic device that receives input, processes that input, and release an output
92
What is an expandable system?
It is a system with room so that specs can be added eg. hard drives, CPUs, or power supply units
93
What is a CPU?
It stands for Central Processing Unit. It is the brain of the computer where most calculations take place CPU Manufacturers: 1. Intel 2. AMD
94
What is a Desktop Computer?
It is a computer designed for the desktop and comes with separate components such as a monitor, keyboard, mouse, speakers and system unit
95
What are laptops?
It a computer designed for the lap that comes with components attached to each other
96
What is a Server Computer?
It is a Supercomputer with extra processing power which is expandable and mainly used for business
97
What are Mobile Computers?
Mobile Computers are small electronic devices designed to create and manage data eg. Smart phone, Smart TV, Refrigerator, Car, watches, Ipads, tablets, etc
98
What is a domain controller?
It is a server that responds to authentication requests and verifies users on computer networks.
99
What Interface does Windows OS use? | What Interface do LINUX/UNIX use?
Windows is a mostly GUI (Gooey) based OS but also has a TUI. The TUI of Windows is the Command Prompt UNIX & LINUX come with GUI and TUI (Tooey) based OS
100
What is a TUI BASED OPERATING SYSTEM?
TUI BASED OPERATING SYSTEM TUI: - Text User Interface:- OS is made using text or command lines or CLI: - Command Line Interface: - OS is made using command lines TUI & CLI are the same
101
What is a GUI BASED OPERATING SYSTEM?
GUI BASED OPERATING SYSTEM GUI: - Graphical User Interface: - OS is made using graphics and colors; very user friendly Interface: - It is a platform that allows a user to interact with the system (OS)
102
Name the 2 Types of Operating System Interfaces
1. GUI Based operating system | 2. TUI or CLI based operating system
103
What is a Folder?
Folder: - It is a container or holder of the folders and files
104
What is a Subfolder?
Subfolder: - It is a folder within another folder (parent folder)
105
What is a Directory?
Directory: - It is folder in LINUX and UNIX systems File: - It is a container of text or information (either Human readable or Non Human readable files)
106
What is a Icon?
Icon: - It is a graphical or pictorial representation of an application or an operating system tool or component eg. Google chrome
107
What is a folder?
Folder: - It is a container or holder of the folders and files
108
What is a file?
Files: - It is a container of text or information (either Human readable or Non Human readable files)
109
Expound on what a User Profile is?
Profile: 1. It is the environmental set up of a user account. 2. It is associated or linked to one account only. 3. A new user profile account is only created when a user logs into the new account for the very first time and not before. 4. A profile is named after your account. 5. Admin can delete any user profile they want. 6. A profile can be replaced
110
What is a Taskbar?
Taskbar: - It is a horizontal bar located at the bottom of the OS desktop by default used to store icons and stage running applications
111
What is a Control Panel?
Control Panel: - It stores tools used to change the configuration of the operating system How to access the Control Panel: Windows Search bar/type Control Panel
112
What is Malware?
Malware: - It is a malicious software or bad software that is bad to the system if introduced into the system
113
What is a Firewall?
Firewall: - It is hardware or software used to prevent unauthorized access to a system
114
What is an OS Desktop?
OS Desktop:- It is the main platform or interface of the OS that allows a user to interact with the OS
115
Name 3 Types of Malware?
TYPES OF MALWARE (Malicious Software) 1. Trojan or Virus: 2. Spyware: 3. Adware:
116
HOW TO UNINSTALL ANTIMALWARE
HOW TO UNINSTALL ANTIMALWARE Go to: Search bar/type Control Panel/ Programs/Uninstall Programs/ Select McAfee/Right click uninstall Install new antimalware software
117
HOW TO FIND OUT IF YOU HAVE ANTIMALWARE ON A SYSTEM
HOW TO FIND OUT IF YOU HAVE ANTIMALWARE ON A SYSTEM Go to: Search bar/type Control Panel/System Security/Windows Defender Firewall/ If Green - no third-party antimalware If Red/Green – Have a 3rd party Antimalware on the system, eg McAfee; Have to uninstall antimalware to install another
118
NAME 6 POPULAR ANTIMALWARE APPLICATIONS
1. Norton Security Suite 2. McAfee Security Suite 3. Pc Cillin Security Suite 4. Kapersky Security Suite (Russian) 5. Webroot Security Suite 6. Malwarebytes*** - Lightweight application with low RAM & CPU
119
List Advantages of Malwarebytes Malware
Besides Malwarebytes - Others use a lot of CPU and RAM and slow down system sometimes to a halt - Others may be oversensitive - Or highjack browsers or scans everything - Only 1 anti-malware per computer Uninstalling these anti-malwares may require installing a tool to remove the antimalware
120
What is AntiMalware?
Antimalware is set up to detect and prevent zero day virus attack from happening
121
What is a Zero Day virus?
Zero Day virus:- It is a virus that has not been studied and there is no software antidote available for it. Some
122
What is a Firewall?
Firewall: - It is a software that prevents unauthorized access from an individual into your system
123
What are Anti Malware Applications?
8. ANTIMALWARE APPLICATIONS Antimalware: - It is an application used to 1. deter or 2. prevent malware 3. and can also be used to remove malware from an infected system
124
What are Anti Malware Suites?
Antimalware suites:- It is a combination of applications eg Microsoft Office instead of just one application For Example: Takes Care OF: Type of Malware Norton Anti-Virus Norton Security Suite (Bundle) Bad Software Anti-Virus Yes Yes Bad Software Anti-Spyware No Yes Bad Software Anti- Adware No Yes Defends Firewall No Yes
125
What is Spyware?
Spyware: a. It is designed to steal personal information from a system b. It is the most dangerous malware. c. It sits on the system and waits for you to log into account and transmits information to spyware developer. d. It gets into contacts and sends contacts messages acting as the user. e. You don’t know it’s there until damage is done OS
126
What is a Trojan or a Virus?
1. Trojan or Virus: | a. It is a malware designed to detroy software eg attack and destroy profiles, slows system, error messages etc
127
What is Adware?
3. Adware: a. It is designed to deceive you into going to fake websites and spending money eg via western Union b. Ransomware: - Is a type of trojan or adware i. It takes over your browser, ii. Then changes the configuration of the OS and iii. takes system ransom (asks user to pay for system to be released) Problem fixed by doing a recovery
128
System recovery after Adware attack?
Problem fixed by doing a recovery 1. Shut down computer 2. Copy onto new system 3. Reconfigure 4. Scan and remove malware 5. Is still unstable, have to rebuild OS
129
HOW TO CONVERT LOCAL USER ACCOUNT TO ADMIN ACCOUNT
Search bar/type Control Panel/User Accounts/User Accounts/Display user accounts already on system/click on local account user26/change account type/Select Administrator Account • Only an Admin can change the account type of a standard local account
130
List 2 Types of User Accounts in Windows
Types of User Profile Accounts 1. Standard Local User Account: - It is a basic user profile account that has no admin rights and no unrestricted access to the system privileges 2. Local Admin Account: - It is a user profile account that has unrestricted access to the system HOW TO CONVERT LOCAL USER ACCOUNT TO ADMIN ACCOUNT Search bar/type Control Panel/User Accounts/User Accounts/Display user accounts already on system/click on local account user26/change account type/Select Administrator Account • Only an Admin can change the account type of a standard local account
131
PROVISIONING A SYSTEM
Creating Standard User Accounts
132
HOW TO CREATE STANDARD USER ACCOUNTS
Search bar/type Control Panel/User Accounts/User Accounts/Display user accounts already on system/Manage another account/ Add a new user on this PC setting/ Add someone else to this PC/ I don’t have this person’s sign in info/Add user without Microsoft account/Who’s going to use this PC/Type in “User26”/pw: “school1/In case you forget your password for User26 ( pw: Q1:school Trinitech, Q2: City born: Beltsville Q3: Pet name: Trini New profile stored in users folder of C:- drive Types of User Profile Accounts 1. Standard Local User Account: - It is a basic user profile account that has no admin rights and no unrestricted access to the system privileges 2. Local Admin Account: - It is a user profile account that has unrestricted access to the system HOW TO CONVERT LOCAL USER ACCOUNT TO ADMIN ACCOUNT Search bar/type Control Panel/User Accounts/User Accounts/Display user accounts already on system/click on local account user26/change account type/Select Administrator Account • Only an Admin can change the account type of a standard local account HOW TO CHECK IF WE HAVE A PROFILE FOR THIS ACCOUNT File Explorer/This PC/ Windows C:-/Users HOW TO LOG INTO A NEW USER ACCOUNT Start bar/Right Click/Logout/ Log into new account Or Start bar/click on Profile icon/Select New User Account/Login Or File Explorer/This PC/ Windows C:-/Users/ Find user HOW TO LOG OUT OF A NEW ACCOUNT Start bar/Right Click/Shut down or sign out Operating System Desktop: -   10. PUTTY (a terminal emulator) It is an application or tool used to connect to a LINUX or UNIX system from another system such as Windows Enables you to sit in your office in front of your Windows 10 computer and connect to your LINUX or UNIX server computer System Admins use Putty 80% of the time IMAGES IMAGES Local Server: - It is a server that is proximal to you Remote server: It is a server that is far away from you Host Name: It is a label assigned to a system by an Admin IP Address: It is a unique number assigned to a network that enables it to talk (transfer data or information) with other systems within a network (LAN – Local Area Network) Your system will not be able to talk to other systems without an IP Address ``` WHAT IS REQUIRED TO LOGIN TO REMOTE SYSTEMS 1. Hostname 2. Or IP Address   PUTTY   ``` USE PUTTY TO CONNECT TO REMOTE LINUX SYTEM IN GERMANTOWN EXERCISE ***Linux and Unix are case sensitive Download http://web.trinitechglobal.com:81/school/pluginfile.php/11727/mod_assign/introattachment/0/Putty.exe?forcedownload=1 1. Open Putty.exe 2. Enter Hostname (or IP Address) Hostname: web.trinitechglobal.com Username or login name: class26 PW: school1 3. Putty Warning Alert: Click Yes UNIVERSAL COMMANDS USED IN LINUX OR UNIX 1. Display your current location in the LINUX filesystem pwd: - Stands for Present Working Directory Command line: $pwd Result /home/class26 2. Display the content of your pwd (what is in your current folder/directory) Command line: - $ls (list command – lists all files in folder) 3. Create a file called in your pwd Command line: - $touch thabi (creates new file with that name) Command line: - $ls (lists all files so you can see if created) 4. Clear the interface Command line: - $clear (clears screen but saves command thread) 5. Display the date and time of the system Command line: - $date 6. Display the calendar of the month Command line: $cal Command line: $cal 2020 ( will display the calendar of that year) Comand lineL $cal 03 1977 (will display calendar of March 1977) Born on Saturday To restart – Right click on top bar of putty (interface bar)/Click Restart To copy command thread – Right click interface bar/copy (can paste on word on windows) Other commands – Right click top interface bar   11. WINSCP – Windows Secure Copy It is a tool used to transfer data from a Windows system to a LINUX or UNIX system and vice versa IMAGES IMAGES What tool do you use to connect to a remote server? Putty What tool have you used to transfer data between UNIX and LINUX? WinSCP Log into WinSCP See Windows file directory on one side and LINUX on the other IMAGES IMAGES Create Windows folder File Explorer/Documents/New Folder (name folder) To Transfer folder to LINUX System Go to bottom of LINUX window in WinSCP/Drag new folder from Windows side to LINUX directory/Select copy/See folder in LINUX side (and vice versa)   12. TEAMVIEWER It is an application used to connect to a remote system or host online meetings It is an app that can be loaded onto a phone, computer etc What system do you use for remote support? Teamviewer Open Teamviewer/Enter other person’s ID/Enter password of the other person Should be able to see other person’s screen on your monitor   COMPUTER HARDWARE & COMPONENTS Go to Introduction to Computer Hardware and Components pdf for details IMAGES IMAGES 1. MOTHERBOARD Motherboard: It is the main hardware component in a system that connects all other components together. Everything in your system is connected to the motherboard. It is the backbone of the computer. A Desktop motherboard can be replaced. A Laptop motherboard is harder to replace A system driver: It is a software that enables the OS to connect to hardware. Each hardware component in the computer has a driver Device Manager: It is an application that enables user to view and manage system hardware and contains a list of hardware that are operating and communicating with the OS. When a piece of hardware is not working, the offending hardware is highlighted in the Device Manager app for the user to deal with. Go to: - Right click Start/Select Device Manager Hard Drive Vendors: 1. ST Seagate 2. Intel 3. WDC – Western Digital Company 4. Toshiba FRU (Field Replaceable Unit): -It is a computer hardware component that can easily be replaced in the field by a technician Other Names for a Motherboard: 1. MB 2. Mobo (most commonly used name) 3. System board 4. Logic Board Motherboard Manufacturers 1. ASUS 2. ASRock 3. Intel 4. ABIT 5. MSI 6. Gigabyte 7. Bioster Motherboard Peripheral Ports or Connectors: Side ports on computer USB (Universal Serial Bus ): - It is used to 1. connect external storage or 2. input and output devices to the system or 3. power small electronic devices   2. PORT INVENTORY Go to Introduction to Computer Hardware and Components pdf for details SOP (Standard Operating Procedure): - It is a set of step-by-step instructions compiled by an organization to help workers carry out complex routine operations. SOPs aim to achieve efficiency, quality output and uniformity of performance, while reducing miscommunication and failure to comply with industry regulations. USB (Universal Serial Bus): - It is used to 1. Connect external storage or 2. Input and output devices to the system or 3. Power small electronic devices Port Connectors – Male components - Fit into the female components Ports – Female components – Receive the male components ``` Peripheral port: - Side port IMAGES IMAGES Port Connectors – Male components Ports – Female components ```   ``` DIFFERENT PORTS TYPES OF PORTS TYPES “Shape” Type A Rectangular Type B Square Type C Oblong Apple Lightning ports Mini- A Rectangular Mini- B Square ``` USB PORTS ARE PLUG AND PLAY PORTS USB Versions USB Version Max Speed Color Ports/Misc USB V1 12 mbps Black Obsolete USB V2 480 mbps Black Type A, B, Mini-B, Micro-B USB V3 5000 mbps or 5gbps Black or blue Type A, B, C, Micro-B, Apple Lightning USB IMAGE 1 IMAGES IMAGES TYPE C IMAGE 2 USB Technology and Max Speed USB Type A Port Details Power Data Data Grounding Pin Pin (5Volts) How many volts of electricity can you get from a USB port? 5 Volts Grounding pin: Conducts an overflow of electricity to the earth: Earthing ESD Mart: Electrostatic Discharge – portable work area used for earthing while working on harddrives; comes with a wristband for grounding; Can use shoes with rubber soles or rubber gloves Power Cable connector has a grounding pin – 3rd round pin on outlet One USB can be connect to as many as 127 devices USB HUB – USB expansion device that gives you more USB ports Daisy chain Hubs – connecting several USB hubs together to enable you to have access to more ports IMAGES IMAGES   ETHERNET PORTS Also known as Network port or Network Connector or Network Controller or Network Interface Card (NIC) Ethernet: - It is the term used to describe LAN and WAN wired technology eg, cables, switches, routers etc Internet: - It is a combination of LANS connected together sharing information spanning the globe IMAGES IMAGES A bit: - It is a binary unit; It is the smallest unit of data stored on a computer A byte: - It is the smallest unit of data that can store 1 ASCII character eg “h” Computer Data Storage Units Unit (Data Storage units) Conversion Unit 8 bits 1 Byte 1000 bytes 1 kb 1000 kilobytes 1 mb 1000 megabytes 1 gb 1000 gigabytes 1 Tb Ethernet Technology and Max Speed What is the maximum speed of Ethernet? 10 gbps Ethernet Technology Maximum Speed Notes: 10 base T 10 mbps Megabyte Ethernet; Obsolete 100 base T 100 mbps Megabyte Ethernet 1000 base T 1gbps – 10gbps Gigabyte Ethernet Base T: - Baseband Signaling that only ethernet technology carries IMAGES IMAGES Ethernet Connectors and Technology Cable Max Speed Ethernet Technology Cat 5 100mbps 10 base T (Max speed 10mbps) 100 base T (Max speed 100mbps) Cat 5e 1gbps 10 base T (Max speed 10mbps) 100 base T (Max speed 100mbps) 1000 base T (Max speed 10gbps) Only uses up to 1gbps of 1000 base T Cat 6 & 7 10gbps 10 base T (Max speed 10mbps) 100 base T (Max speed 100mbps) 1000 base T (Max speed 10gbps) Mainly used for transmitting greater than 1 gb Base T IMAGES IMAGES IMAGES How do you tell if it is a Megabyte NIC or a Gigabyte NIC? Right click Start bar/Device Manager/Network adapters/click arrow Adapter will have a GBE in name or FE FE – Fast Ethernet – 100mb – Megabyte NIC GBE – Gigabyte Ethernet – Gigabyte – Gigabyte NIC Cat 7 – uses different alloy from Cat 6 which transmits more electricity What is the maximum range of ethernet cables? 100m (328 ft) This is the longest cable for ethernet technology, Can use a repeater to extend the range Repeater: - extends the range for wifi or ethernet by boosting signal another 100 m (for ethernet); also know as a signal booster or range extender Ethernet Versus Phone Technology Ethernet Phone Connector (ports) RJ45 RJ11 Cables Cat 5, 5e, 6 & 7 Cat 3 IMAGES IMAGES For ethernet technology, Data is transmitted through electrical signals through copper wires Medium of Ethernet Technology: Copper Wires; Medium: - material used to transmit data Mode of Ethernet Technology: Electrical Signals Mode: It Is the form that the data is transmitted in through the cables Ethernet NIC – located on the side of the computer IMAGES IMAGES Range: - It is how far the data can travel from the system   WIFI PORT OR CONNECTOR OR ADAPTOR Wifi: _ Wireless Fidelity WLAN – Wireless LAN Port – term used to refer to wifi at work; It is found inside your system. It is responsible for transmitting data to and from the system via radiowaves Medium of WLAN Technology: radiowaves; Mode of WLAN Technology: Radiowaves TYPES OF WIFI OR WLAN NIC Wireless NIC USB to WLAN Adapter NIC W9 PCI Card You can replace a wireless NIC in 5 minutes, Not so for a hardwired NIC. In Desktop, Ethernet NIC is hardwired to the motherboard If a problem with NIC in this system occurs, you have to replace motherboard because if a hardwired NIC is not working due to circuit issues it may spread to the rest of the motherboard in no time affecting the CPU and RAM and causing the server to shut down. Most companies would rather get a new motherboard Before your could use a PCI card slot (only fits PCI slots) and can fix NIC by replacing with a PCI card slot. But now have to replace whole motherboard Hardwired: - Permanently attached to the motherboard Downtime: not working and still paid (due to network crash etc) TROUBLESHOOTING OF WIFI OR WLAN NIC IMAGES IMAGES How can you troubleshoot a defective NIC? System is not connecting to network 1. Check if it is a software related problem: Check Driver and OS 2. Go to the NIC vendor and reinstall driver from the vendor 3. CHECK if it is a hardware problem (defective cable, port or NIC) Check if it is a defective cable problem – unplug CAT NIC cable and connect it to another system, and if it works then the cable has no problem 4. Check if it is a defective port issue – Unplug cable from port and connect into another port, if it is working then it is not the port 5. Check if the NIC is defective – Use USB to RJ45 adapter and connect CAT to a new USB port if it works (and you’ve checked all other possibilities outlined above) then its likely the NIC is defective WLAN PROPERTIES: TECHNOLOGY AND MAXIMUM SPEED WLAN Technology Maximum Speed 802.11b 11mbps 802.11 a/g 54mbps 802.11 n 600 mbps 802.11 ac 5gbps Internet speed has to do with bandwidth provided by ISP (Internet Service Provider) This WLAN Maximum Speed is the maximum speed that WIFI data can be transmitted within your network For superspeed in home use AC technology for everything HOW DO WE VERIFY WHICH WLAN TECHNOLOGY WE HAVE IN THE SYSTEM Go to Right click Start bar/Device Manager/Network Adapters/Click Arrow Displays list of wireless adapters Check if you can see AC (802.11 ac), C (802.11 ac), N (802.11 n), BGN (802.11 n IMAGES IMAGES WLAN FREQUENCY AND RANGE WIFI FREQUENCY MAX RANGE NOTES 2.4 ghz 46 meters Slower data transmission rate Longer transmission range Weaker wavelength 5 ghz 15.4 meters Faster transmission of data (faster rate) Shorter transmission Range Stronger wavelength WIFI has a repeater than can extend the range (doubles the range capacity of whatever WIFI frequency is being used 5ghz wifi with a repeater will extent to 30.8 meters) HOME ROUTER IMAGES IMAGES MAXIMUM SPEED OF WLAN: 5ghz for 802.11 ac MAXIMUM RANGE OF WLAN: 46 meters for 2.4 ghz and 15.4 m for 5ghz MEDIUM OF WLAN TRANSMISSION: Radiowaves MODE OF WLAN TRANSMISSSION: Radiowaves WIRELESS SECURITY WEP Wired Equivalent Privacy • Least secure • Easy to hack • Obsolete WPA Wifi Protected Access • More Secure WPA2 WIFI Protected Access Version 2 • Most Secure Password Policy: Set parameters to minimize password security breaches, eg. 1. Enforce a Password Length Rule 2. Enforce Password Complexity Rule 3. Enforce a Password Aging Rule (update pw frequency parameter) 3 TYPES OF HACKERS TYPES DESCRIPTION WHITE HAT HACKERS • Paid to hack into systems • Healthcare providers (or companies that use credit cards or have access to lots of private information) must harden their systems yearly and hire white hackers to find vulnerabilities in their system GREY HAT HACKERS • Not harmful • Intention just to get into systems and prove they are good • Not intending to steal or destroy • As long as you get into an unauthorized system – it is considered a crime BLACK HAT HACKERS • Harmful • Intend to harm and steal information and destroy the system WPS – Device used to allow system connect to devices without using a router; Vulnerable as can easily be hacked into   FIBRE OPTICS PORT Transmits data into and out of a system using fibre optics technology It is used for: • High Speed data Transfer • Connecting LANS together into a WAN scenario Properties of Fibre Optics: MAXIMUM SPEED OF WLAN: 100 tbps MAXIMUM RANGE OF WLAN: 20 Km (also has repeaters) MEDIUM OF WLAN TRANSMISSION: Fibre Glass (Glass) MODE OF WLAN TRANSMISSSION: Light pulses In comparison: Ethernet max Speed and Range = 10gbps and 100 m WIFI Max Speed and Range = 5 gbps and 46 km Fibre Optic – Is designed to withstand harsh weather as glass is not affected by water; Good for transmitting data outside; Transmits data really fast as the speed of light 3 x 10^8 m/s Copper – affected by magnets or electromagnetic waves interrupting flow of data; Plastic casing to prevent water from getting in and insulate from electromagnetic waves; prone to corrosion, never have IT equipment in electrical closet (electromagnetic waves) Lots of companies use fibre for back up backbone – as large amounts data can be transmitted faster so can back up everything for that day and not miss anything IMAGES NETWORK STORAGE SOLUTIONS NAS: Network Attached Storage: - Ethernet connector SAN: Storage Area Network: - typically a fibre channel connector Incremental backup: - Back up organizational data in batches (successive copies) that only include data that has been updated since last back up (not full back up)eg back up for that day each day Full backup: - Back up of organizational data in a single batch backup operation A differential backup: is a type of data backup that preserves data, saving only the difference in the data since the last full backup. LOOK AT DIFFERENT CONNECTORS OR ADAPTERS OR PORTS OR CONTROLLERS Display Adapter or Connector or Controller or Ports 1. VGA Port (Visual Graphical Array) It is a 15 pin port used to connect a monitor to a system. It was developed in 1987 by IBM and has a resolution of 64x480pixels IMAGES IMAGES Display Port: - It is used to connect a monitor to a system and performs graphic processing 2. DVI Port (Digital Visual Interface) IMAGES It is a video display interface used to connect a monitor to a system DVI PORT SIGNAL DVI - A Analog Signals < 720p DVI - I Integrated; Both analog and Digital signals DVI-D Digital Signals >720p DVI VISUAL GUIDE DVI- D Single Link 9 ______ 9 ------ pin DVI- D Dual Link 9 9 9 ------ pin DVI- I Single Link 9 ______ 9 4 pins DVI- I Dual Link 9 9 9 4 pins DVI- A Single Link 8 ______ 4 4 pins IMAGES 3. HDMI Port (High Definition Multimedia Interface) It is a proprietary audio and video interface for transmitting uncompressed video data and compressed and uncompressed audio data. It is the best display port used to connect a monitor to a system. It transmits both video and audio signals. It transmits digital signals. What is the difference between HDMI and DVI-D? HDMI – Transmits audio and visual signals DVI – Transmits only video IMAGES IMAGES Different Types of HDMI Ports Standard Mini Micro See Week 4 Image IMAGES IMAGes  
133
What is a Local Server?
Local Server: - It is a server that is proximal to you
134
What is a Remote server?
Remote server: It is a server that is far away from you
135
What is a Hostname?
Host Name: It is a label assigned to a system by an Admin
136
What is an IP Address?
IP Address: It is a unique number assigned to a network that enables it to talk (transfer data or information) with other systems within a network (LAN – Local Area Network) Your system will not be able to talk to other systems without an IP Address
137
List 2 Types of Hackers
3 TYPES OF HACKERS WHITE HAT HACKERS GREY HAT HACKERS BLACK HAT HACKERS
138
What are Black Hackers?
What is a Black Hat Hacker? BLACK HAT HACKERS • Harmful • Intend to harm and steal information and destroy the system
139
What are Grey Hackers?
What is a Grey Hat Hacker? GREY HAT HACKERS • Not harmful • Intention just to get into systems and prove they are good • Not intending to steal or destroy • As long as you get into an unauthorized system – it is considered a crime
140
What are White Hackers?
What is a White Hat Hacker? WHITE HAT HACKERS • Paid to hack into systems • Healthcare providers (or companies that use credit cards or have access to lots of private information) must harden their systems yearly and hire white hackers to find vulnerabilities in their system