new Flashcards
What is form factor?
the physical size and shape of a piece of computer hardware
troubleshooting process
Identify the problem.
Establish a theory of probable cause.
Test the theory to determine the cause.
Establish a plan of action to resolve the problem and implement the solution.
Verify full system functionality and, if applicable, implement preventive measures
Differentiate between RISC and CISC as used in CPU architecture.
RISC emphasizes efficiency in cycles per instruction and CISC emphasizes efficiency in instructions per program.
3 examples of intermediary network devices
switches and wireless access points (network access)
routers (internetworking)
firewalls (security).
Examples of host devices include computers, personal devices, thin clients, and multi-function devices.
what is MAC address in full
media access control address
Differentiate between open source and closed source software
open- usually available for free and can be accessed and changed by anyone
closed- usually sold to end users and can only be accessed and changed by licensed vendors
How to protect against social engineering
security awareness training Phishing simulations Setting up protocols that would require data crosschecks Prevent Scam Emails Using Gateways Implementing password management
Name 5 advantages of server virtualization
Reduced Hardware Costs. Faster Server Provisioning and Deployment. Greatly Improved Disaster Recovery. Increased Productivity. Energy Cost Savings.
social engineering techniques
Baiting- piquing interest
Scareware- fictitious threats
Phishing- pretending
Differentiate between adware and ransomware
Ransomware is a form of malware designed to block access from system until a ransom fee is paid. while adware -software that automatically displays or downloads advertising material such as banners or pop-ups when a user is online
an example of a hypervisor
VMware and Hyper-V
what is a data centre
a large group of networked computer servers
Discuss any two advantages of file extensions
help Windows, or other operating systems you’re using, determine which program to use to open those types of files.
tell your computer what icon to use for the file,
Differentiate between an update and an upgrade as used in operating systems.
Basically, think of an upgrade as a less frequent, more drastic change to the software you are currently using. A software update, on the other hand, can be more frequent, fix little bugs or make small tweaks, and is often used to repair the product.
Discuss two factors to consider before upgrading an operating system
vendor support
compatibility with current applications