ITF + Exam Outline Flashcards
Binary
Notational system with 2 values per digit. (0,1). Computers process code in binary because the transistors in its CPU and memory components also have two states (off and on)
Hexadecimal
Notational systems with 16 values per digit. Values above 9 are represented by the letters A, B, C, D, E, F. Hex is a compact way of referring to long byte values, such as MAC and IPv6 addresses
Decimal
Decimal system is based on the principle of expressing ten different numbers using a single digit in the range 0 to 9. Once you have a value or more than ten, then you require two digits of decimal to express it. Thus, when twelve is expressed numerically in decimal as 12 that means 110 plus 21
ASCII
7-bit code page mapping binary values to character glyphs. Standard ASCII can represent 127 characters, though some values are reserved for non-printing control characters
Unicode
Extensible system of code pages capable of representing millions of character glyphs, allowing for international alphabets
Char
Data type supporting storage of a single character
Strings
Data type supporting storage of a variable length series of characters
Integers
Data type supporting storage of whole numbers
Floats
Data type supporting storage of floating point numbers (decimal fractions)
Boolean
Data type support 1-bit storage, representing FALSE and TRUE. Boolean logic is a statement that resolves to a true or false, condition and underpins the branching and looping features of computer code
Input
the computer receives data entered by the user through peripheral devices, such as mice, keyboards, scanners, cameras, and microphones
Output
the processed data is shown or played to the user through an output device, such as monitor or loudspeaker system
Processing
the data is written to memory and manipulated by the CPU, acting on instructions from the operating system and applications software
Storage
the data may be written to different types of storage devices, such as hard disks or optical discs, because data stored in most types of system memory is only preserved while the computer is powered on
Data and information as assets
For organizations, and even for individuals, computer data can be considered an asset
Importance of investing in security
A mechanism designed to protect an information asset or processing system is called a security control. There are many types of security controls, and they can be classed in different ways. Typically there are designed to prevent, deter, detect, and/or recover from attempts to view or modify data without authorization.
Relationship of data to creating information
The process of using data in this way is usually called analytics.
Trademarks
As copyright is not given to the selection of a name, if a company wants to promote its goods it will normally trademark its name and/or logo
Copyright
is automatic legal protection granted to certain types of work indicating that the copyright holder owns the right to control the use of the work, including rights of publication, distribution, or sale
Patents
is legal protection for some kind of invention. Unlike copyright, a patent can apply to an idea so long as the idea is original, useful, and distinctive or on-trivial
Digital products
Is one that is sold or distributed as binary computer data
Data capture and collection
Data points can be collected from many different sources
Data correlation
The information layer requires software to perform data correlation. This means analyzing the whole data set and finding connections and links between data points
Meaningful reporting
To inform human decision making at the insights layer, the information identified by the analytics system must be presented in ways that humans can analyze and interpret
Storage Unit
Bit-Basic unit of computer data is the binary digit, which can represent two values (zero or one)
Byte-eight bits
KB-1000 bytes
MB-1,000,000 bytes
GB-1,000,000,000
TB-1000 GB
PB-1000 TB
Throughput Unit
BPS-when data is transferred between a components in the computer or between computers over a network, the throughput rate that a particular connection can sustain is measure in bps
Kbps-1000 bits per second. Older computer peripheral interfaces (or buses) and slow network links
Mbps-1,000,000 bits per second. Many internal computer interfaces have throughputs measured in Mbps. Wireless networks and residential internet links also typically have this sort of throughput.
Gbps-1,000,000,000 bits per second-The latest PC bus standards and networks can support this higher level of throughput
Tbps-1,000,000,000,000-This sort of capacity is found in major telecommunications links between data centers, cities, and countries
Processing speed
MHZ-1 million cycles per second. Older PC bus interfaces and many types of network interface work at this slower signaling speed
GHZ-1000 million cycles per second. Modern CPUs and Bus types plus fiber optic network equipment work at these much faster speeds
Troubleshooting methodology
1) Identify the problem
2) Research knowledge base/internet, if applicable
3) Establish a theory of probable cause
4) Test the theory to determine the cause
5) Establish a plan of action to resolve the problem and identify potential effects
6) Implement the solution or escalate as necessary
7) Verify full system functionality and, if applicable, implement preventive measures
8) Document findings/lessons learned, actions, and outcomes
Networking-Wired
Telephone Connector (RJ-11)-While local networking uses Ethernet technologies, some networking and communications functions depend on direct use of the telephone network
Ethernet connector (RJ-45)-An ethernet network adapter used with twisted pair cable will have an RJ-45 port to connect the computer to the network, via another RJ-45 port in the network equipment.
Networkin-Wireless
Bluetooth-is used for so-called Personal Area Networks (PAN) to share data with a PC, connect to a printer, use a wireless headset, connect to a wireless mouse/keyboard, and so on
NFC-is a peer-to-peer version of RFID; that is, an NFC device can work as both tag and reader to exchange information with other NFC devices. NFC normally works at up to two inches at data rates of 106, 212, and 424 kbps.
USB
The Universal Serial Bus(USB) has become the standard means of connecting peripheral devices to a computer. USB devices are plug and play
Firewire
bus was based on the IEEE 1394 standard and the Small Computer System Interface (SCSI) communications protocol.
The firewire 400 standard used 6-pin alpha connectors and cabling. The maximum transfer rate is 400 Mbps
Thunderbolt
Can be used both as a display interface and as a general interface like USB or firewire
Bluetooth
a standard for the short-range wireless interconnection of mobile phones, computers, and other electronic devices.
RF
RFID-is a means of targeting and tracking objects using specially-encoded tags
NFC
Near field communications is a peer to peer version of RFID; that is, an NFC device an work as both tag and reader to exchange information with other NFC device
Graphic Device
VGA
HDMI
DVI
Display port
Mini Display port
Installation types-Plug and play vs. Driver installation
This means that when you connect a new device, windows identifies it and tries to install a device driver. The device driver makes the device work with the operating system
IP based peripherals
Some types of devices are not connected to the computer via a peripheral portbut accessed over a network
Motherboard/System board
If you open up a PC or laptop, the main thing you will see is the motherboard (or system board). The motherboard is a printed circuit board (PCB) with some built-in processors (the chipset), sockets and slots for upgradable components (CPU, RAM, adapter cards, disk drives), and wires (buses) to connect them together
Firmware/BIOS
When a computer is powered on, it needs some standard means for the CPU to start processing instructions and initialize the other components. This is referred to as bootstrapping or more simply as booting. The bootstrapping process occurs before the operating system software is loaded and is enabled by a low-level operating system called firmware.
The BIOS (Basic input/output system) is one example of PC firmware. It provides industry standard program code to get the essential components of the PC running and ensures that the design of each manufacturer’s motherboard is PC compatible
RAM
When a program is started, its instructions are loaded into system memory. System memory uses a type of technology called Random Access Memory (RAM). Having more RAM allows the PC to open more programs simultaneously and work on large files more efficiently. As well as system memory size, the speed of the memory subsystem is also important. The CPU fetches instructions from system memory as it needs them. This means that the bus between the CPU and memory, often referred to as the FRONT SIDE BUS(FSB), must be as fast as possible.
CPU
is the device that “runs” software programs. Software is composed of many simple instructions. The CPU processes these instructions and directs other components to perform actions, such as displaying an image on the screen or printing a document
ARM
Mobile Phone
Tablet
32-bit
Laptop
Workstation
Server
64-bit
Laptop
Workstation
Server
Storage
Hard drive-are based on magnetic disk technology
SSD-Use a type of transistor based memory called flash memory and are much faster than HDDS
GPU
Displaying a high resolution image to the user requires a lot of processing power, especially if the image changes rapidly, as with video, or uses complicated 3D and texture effects, as with computer games.
Cooling
Heatsinks and thermal paste-A heatsink is a block of metal with fins. As the fins expose a larger surface area to the air around the component, a greater cooling effect by convection is achieved. The heat sick is “glued” to the surface of the chip using thermal paste, also referred to as thermal grease or compound, to ensure the best transfer of heat.
NIC-Wired vs Wireless
on a home network, the computer will be connected to an internet router via an Ethernet port. On a business network, the computer will be connected to the wider network via an Ethernet Switch. The Ethernet port in the computer is provided by a Network Interface Card (NIC). Wireless network-most homes networks support Wi-Fi radio networking so that computing devices do not have to be cabled to the internet router to access the network.
NIC-On-board vs add-on card
Almost all workstation computers come with a NIC on the motherboard (onboard card). Servers may have additional NICs supplied on expansion or (addon) cards. The connection to the router is made using a cable with RJ-45 connectors on each end
Fiber optic
Fiber optic cables perform much better over long distances and are not affected by noise in the way that electrical signals over copper cable are.
Cable
Where FTTC is offered by providers with origins in the telephone network, a cable internet connection is usually provided as part of a Cable Access TV (CATV) service. These networks are often described as Hybrid Fiber Coax (HFC) as they combine a fiber optic core network with coax links to customer premises equipment
DSL
is one of the most popular SOHO internet service types. DSL works over an ordinary telephone line, providing the line is of sufficient quality. The DSL modem/router is connected to the telephone line using a cable with RJ-11 connectors between the WAN port on the router and the telephone point.
Wireless-Radio Frequency
is a means of provisioning a wireless local network using Wi-Fi standard equipment. While this isn’t a means of internet service position in itself, it is a means for a client to connect to a wireless router offering internet access
Wireless-Satellite
systems provide far bigger areas of coverage than can be achieved using other technologies. The microwave dishes are aligned to orbital satellites that can either relay signals between sites directly or via another satellite.
Wireless-Cellular
data connections use radio transmissions but at greater range than Wi-Fi. Cellular data is more closely associated with internet access for cell phones and smartphones than with computers.
Volatile vs non-volatile
Volatile means that data is only retained in the memory chips while there is a power source. Non-volatile where the data is preserved when the power is turned off
RAM
Random access memory
Hard drive
Data on an HDD is encoded magnetically on specially coated glass or plastic platters accessed by drive heads
Solid state vs. spinning disk
are designed to replicate or supplement the function of the hard drive. Solid state storage uses of non-volatile memory technology called flash memory.
Optical
CDS, DVDs, Blu-rays are considered optical drives because a laser is used to read date from the discs
Flash drive
USB thumb drive
NAS
Appliance is one or more hard drives housed in an enclosure with basic server firmware, usually running some form of Linux. The NAS appliance provides access to its storage devices using various file sharing protocols.
File server
All computers have at least one internal hard disk, or SSD, for storing the operating system and software applications plus user data.
Cloud storage service
both for home and business use. Some vendors offer users a certain amount of free cloud-based storage. There are also business oriented solutions, such as drop box and amazon.
Internet of Things
Home appliances
Home automation devices
-Thermostats
-Security systems
-Modern cars
-IP cameras
-Streaming media devices
-Medical devices
Basics of packet transmission
Network signals must be packaged in such a way that each host is able to understand them. Also, each host must have a means of recognizing the location of other hosts on the network. These functions are provided by a network protocol. A network protocol identifies each host on the network using a unique address. It also defines a packet structure. A packet is a wrapper for each data unit transmitted over the network. A packet generally consists of a header and a payload
DNS-The Domain Name System
is a hierarchical, client/server-based distributed database name management system. The purpose of the DNS database is to resolve resource names to IP addresses. In the DNS, the clients are called resolves and the servers are called name servers.