Chapters 1-9 Flashcards

(170 cards)

1
Q

This is the original power supply for legacy computer systems now considered obsolete

A

Advanced Technology (AT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This is considered the brain of the computer

A

Central Processing Unit(CPU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Temporary location to store data and applications

A

Random Access Memory(RAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Provide locations to connect additional components

A

Expansion Slots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This consists of the integrated circuits on the motherboard that control how system hardware interacts with the CPU and motherboard. It also establishes how much memory can be added to a motherboard and the type of connectors on the motherboard.

A

Chipset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Controls high speed access to the RAM and video card. It also controls the speed at which the CPU communicates with all of the other components in the computer. Video capability is sometimes integrated into northbridge

A

Northbridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Allows the CPU to communicate with slower speed devices including hard drives, Universal Serial Bus,and expansion slots

A

Southbridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This is the most common motherboard form factor. The ATX case accommodates the integrated I/O ports on a standard ATX motherboard. The ATX power supply connects to the motherboard via a single 20-pin connector.

A

Advanced Technology eXtended (ATX)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This is a smaller form factor that is designed to be backward-compatible with ATX. Micro-ATX boards often use the same Northbridge and Southbridge chipsets and power connectors as full sized ATX boards and therefore can use many of the same components.

A

Micro-ATX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

There are many types of ITX motherboards;however,Mini-ITX is one of the most popular. It uses very little power,so fans are not needed to cool it.

A

ITX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In PGA architecture, the pins are on the underside of the processor package and is inserted into the motherboard CPU socket using zero insertion force (ZIF).

A

Pin Grid Array (PGA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Amount of force needed to install a CPU into the motherboard socket or slot

A

Zero Insertion Force (ZIF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In an LGA architecture, the pins are in the socket instead of the processor

A

Land Grid Array (LGA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Sound Adaptors provide audio compatibility

A

Sound Adaptor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A NIC connects a computer to a network using a network cable

A

Network Interface Card (NIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A wireless NIC connects a computer to a network using radio frequencies

A

Wireless NIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Video adaptors provide video capability

A

Video Adaptor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Capture cards send a video signal to a computer so that the signal can be recorded to a storage drive with the video capture software

A

Capture Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

These provide the ability to watch and record television signals on a PC by connecting a cable television,satellite,or antenna to the installed tuner card.

A

TV Tuner Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Provides additional USB ports to connect the computer to peripheral devices

A

Universal Serial Bus (USB) controller card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Unbuffered Memory

A

This is the regular memory for computers. The computer reads data directly from the memory banks making it faster than buffered memory. However,there is a limit on the amount of RAM that can be installed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Buffered Memory

A

This is specialized memory for servers and high end workstations that use a large amout the n of RAM.These memory chips have a control chip built into the module.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Graphics Card

A

The type of graphics card installed affects the overall performance of a computer. The computer mus have the slots,RAM,and CPU to support the full functionality of an upgraded graphics card.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Sound Card

A

The type of sound card installed determines the sound quality of your computer. Computer system must have quality speakers and a subwoofer to support the full functionality of a an upgraded sound card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Storage Controller
Storage controllers can be integrated or added as an extension card. They allow for the expansion of internal and external drives for a computer system.
26
I/O Card
Installing and I/O card in a computer is fast and easy way to add I/O ports. USB are some of the most common ports to install a computer.
27
NIC
Customers often upgrade a network interface card (NIC) to get wireless connectivity or to increase bandwidth.
28
Capture Card
A capture card imports video into a computer and records it on a hard drive. The addition of a capture card with a television tuner allows you to view and record television programming.
29
Peripheral Component Interconnect (PCI)
PCI is commonly available to support older expansion cards
30
PCI Express (PCIe)
Has four types of slots; x1, x4, x8, and x16. These slots vary in length with the x1 being the shortest.
31
Secure Digital (SD)
SD cards were designed for use in portable devices such as cameras,MP3 players,and laptops. SD cards can hold as much as 2 TB of data
32
MicroSD
This is a much smaller version of the SD, commonly used in smartphones and tablets
33
MiniSD
A version of SD between the size of an SD card and a microSD card. The format was developed for mobile phones
34
CompactFlash
CompactFlash is an Older format,but still in wide use because of its high speed and high capacity. Often used for video cameras.
35
Memory Stick
Created by Sony Corporation,Memory Stick is a proprietary flash memory used in cameras, MP3 players,hand held items,and other portable electronics.
36
xD
Also known as a Picture Card,it was used in some digital cameras
37
Power Button
The power button turns the computer on and off. If the power button fails to turn off the computer,hold down the power button for several seconds.
38
Reset Button
The reset button restarts the computer without turning it on or off
39
Power LED
The power LED remains lit when the computer is on,and often blinks when the computer is in sleep mode
40
Drive Activity LEDs
The drive activity LED remains lit or blinks when the system is reading or writing to hard drives
41
Passwords
Passwords allow for different levels of access to the BIOS settings.
42
Drive Encryption
A hard drive can be encrypted to prevent data theft. Encryption changes the data on your hard drive into a code.
43
LoJack
This is a security feature that consist of two programs;the Persistence module and the Application agent.
44
Trusted Platform Module (TPM)
This is a chip designed to secure hardware by strong encryption keys, digital certificates, passwords,and data. Is used by windows to support Bitlocker full disk encryption.
45
Secure Boot
Secure Boot is a UEFI security standard that ensures that a computer only boots an OS that is trusted by the motherboard manufacturer. Secure boots prevents an “Unauthorized” OS from loading during startup.
46
Blackout
Complete loss of AC power. A blown fuse, damaged transformer, or a downed power line can cause a blackout.
47
Brownout
Reduced voltage level of AC power that last for a period of time. These occur when the power line voltage drops below 80 percent of the normal voltage level and the electrical circuits are overloaded,
48
Noise
Interference from generators and lightning. Noise results in poor quality power, which can cause errors in a computer system.
49
Spike
Sudden increase in voltage that last for a short period and exceeds 100 percent of the normal voltage of a line. Spikes can be caused by lightning strikes, but can also occur when the electrical system comes back on after a blackout
50
Power Surge
Dramatic increase in voltage above normal flow of the electrical current. A power surge last for a few nanosecond, or one-billionth of a second.
51
Surge Protector
Helps protect against damage from surges and spikes. A surge suppressor diverts extra electrical voltage that in on the line to the ground. Amount of protection offered is measured in Joules.
52
Uninterruptible Power Supply (UPS)
Helps protect against potential electrical power problems by supplying a consistent level of electrical power to a computer or other device.
53
Standby Power Supply (SPS)
Helps protect against potential electrical power problems by proving a backup battery to the power supply when the incoming voltage drops below the normal level.
54
Reduced Instruction Set Computer (RISC)
This architecture uses a relatively small set of instructions. RISC chips are designed to execute these instructions very rapidly. Some well known CPU
55
Complex Instruction Set Computer (CISC)
This architecture uses a broad set of instructions, resulting in fewer steps per operation. Intel x86 and Motorola 68k are some well known CPU’s using CISC.
56
Striping
This RAID eneables data to be distributed across multiple drives. This provides a significant performance increase.
57
Mirroring
This RAID type stores duplicate data on one or more other drives. This provides redundancy so that the failure of a drive does not cause the loss of data.
58
Parity
This RAID type provides basic error checking and fault tolerance by storing checksums separately from data.
59
Double Parity
This RAID type provides fault tolerance up to two failed drives
60
Native Mode
This term describes when the image is sent to the monitor by the video adaptor card matches the native resolution of the monitor.
61
CPU heatsink and fan assembly
The fan should spin freely, the fan power cable should be secure, and the fan should turn when the power in on.
62
RAM Modules
The modules must be seated securely in the RAM slots. Ensure that the retaining clips are not loose.
63
Storage Devices
All cables should be firmly connected. Check for loose, missing, or incorrectly set jumpers. A drive should not produce rattling, knocking, or grinding sounds.
64
Screws
A loose screw in the case can cause a short circuit
65
Adaptor Cards
Ensure that they are seated properly and secured with the mantaining screws in their expansion slots. Loose cards can cause short circuits. Missing expansion slot covers can let dust inside of the computer.
66
Cables
Examine all cable connections. Ensure that pins are not broken and bent and that the cables are not crimped. Retaining scres should be finger tight.
67
Power Devices
Inspect power strips, surge suppressors, and UPS devices. Make sure that the devices work properly and that there is clear ventilation.
68
Keyboard and Mouse
Use compressed air to clean the keyboard, mouse, and mouse sensor.
69
Storage Device Problems
Are often related to loose, or incorrect cable connections, incorrect drive and media formats, and incorrect jumper and BIOS settings.
70
Motherboard and Eternal Components Problems
These are often caused by incorrect, or lose cables, failed components, incorrect drivers, and corrupted updates.
71
Power Supply Problems
Power problems are often caused by a faulty power supply, lose connections, and inadequate wattage
72
CPU and Memory Problems
Processor and memory problems are often caused by faulty installations, incorrect BIOS settings, inadequate cooling and ventilation, and compatibility issues.
73
Display Problems
Display problems are often caused by incorrect settings, loose connections, and incorrect or corrupted drives.
74
Switch
Connects multiple devices to the network
75
Router
Forwards traffic between networks
76
Wireless Router
Connects multiple devices to the network and may include a switch to connect wired host.
77
Access Point (AP)
Connects to a wireless router and is used to extend the reach of a wireless network
78
Modem
Connects a home or small office to the internet
79
Journal
Include descriptions of the problem, possible solutions that have been tried to correct the problem, and steps taken to repair the problem.
80
Notes
Make notes as you go through the troubleshooting and repair process to avoid repeating steps.
81
Analog Telephone
Analog Telephone internet access can transmit data over standard voice telephone lines. This type of service uses an analog modem to place a telephone call to a remote site. Also known as dialup.
82
Integrated Services Digital Network (ISDN)
Uses multiple channels and can carry different types of services; therefore is considered a type of broadband. Is a standard that uses multiple channels to send voice, video, and dara over normal telephone wires.
83
Broadband
Broadband uses different frequencies to send multiple signals over the same medium.
84
DSL
DSL is an always-on-service, which means that there is no need to dial up each time you want to connect to the internet. Voice and data signals are carried on different frequencies on the copper telephone wires.
85
Cable
A cable internet connection does not use telephone lines. Cable uses coaxial cable lines originally designed to carry cable television. A cable modem connects your computer to the cable company.
86
Fiber
Fiber optic cables are made of glass or plastic and uses light to transmit data. They have a very high bandwidth, which enables them to carry large amounts of data.
87
Bluetooth
A bluetooth device can connect up to seven other bluetooth devices.
88
RFID
RFID uses frequencies within the 125 MHz to 960 MHz range to uniquely identify items, such as in a shipping department.
89
NFC
NFC uses frequencies 13.56 MHz and is a subset of the RFID standards. NFC is designed to be a secure method to complete transactions.
90
Zigbee
Zigbee uses low-power digital radios based on IEEE 802.15.4 wireless standard for low-rate wireless personal area networks that is meant to be used by low-cost, low-speed devices.
91
Z-Wave
Z-Wave technology is a proprietary standard that is now owned by Silicon Labs. However a public version of the interoperability layer of Z-Wave was open sourced in 2016.
92
The Smart Home Market
The market for smart home products continues to grow. In 2018 the number of smart homes was 34.8 million.
93
File Transfer Protocol Secure (FTPS)
An FTP client can request the file transfer session be encrypted. The file server can accept or deny the request.
94
SSH File Transfer Protocol (SFTP)
As an extension to Secure Shell protocol, SFTP can be used to establish a secure file transfer session.
95
Secure Copy (SCP)
SCP also uses SSH to secure file transfers.
96
Repeater
Regenerating weak signals is the primary purpose of a repeater.
97
Hub
Hubs receive data on one port and then send it out to all other ports.
98
Bridge
Bridges were introduced to divide LAN’s into segments. Bridges keep a record of all the devices on each segment.
99
Switch Operation
Every device on a network has a unique media access control address. This address is hardcoded by the manufacturer of the NIC.
100
Single-Mode Fiber (SMF)
Consist of a very small core and uses laser technology to send a single ray of light.
101
IP Address
Identifies the device on the network.
102
Subnet Mask
Is used to identify the network on which this device is connected.
103
Default Gateway
Identifies the router that this device uses to access the internet or another network.
104
Optional Values
Such as the preferred Domain Name System (DNS) server address and the alternate DNS server address.
105
Network Components
Includes wired and wireless network interface cards (NIC) and network devices such as switches, wireless access points (APs), routers, multipurpose devices,and more.
106
Network Design
Involves knowing how networks and interconnected to support the needs of a buisness.
107
0db8
Can be represented as db8, in the first IPv6 address
108
0123
Can be represented as 123
109
0001
Can be represented as 1
110
IPv4 Link-Local Address
If your windows computer cannot communicate with a DHCP server to obtain an IPv4 address, then Windows automatically assigns an Automatic Private IP Addressing address.
111
What are MAC addresses?
They are the physical addresses of the computer system. They do not change and are integrated into the NIC. MAC stands for Media Access Control.
112
What are the 6 digits of a MAC address
They are the OUI
113
How are MAC addresses typically represented
In Hexadecimal
114
Can routers have multiple NICs
Yes. They connect to multiple networks and thus require multiple NIC’s
115
What are Subnet Mask
They are 32 bit addresses, represented as decimal.
116
How do you physically install a NIC?
You must install it into the IPCE slot and configure the antenna. The antenna may be attached or must be manually attached with a cable.
117
What is ICMP?
Internet Control Message Protocal
118
What is ICMP used for?
It is used to send or control error messages.
119
How do you configure a NIC
Windows is already dynamic so this is not a concern
120
How do you update a NIC
New drivers may be published, this is what the update will entail.
121
Smartwatches
Smartwatches are a type of wearable that includes a microprocessor, a special operating systems, and apps.
122
Fitness Trackers
Fitness trackers are similar to smartwatches but are limited to monitoring the body such as physical activity, sleep, and exercise.
123
E-Reader
Special purpose device with 6” or larger black and white display optimized for reading text.
124
Smartphone
Uses a special mobile OS. Small screen sizes averaging 5”. Touch screens with no physical keyboard. Wi-Fi, Bluetooth, and cellular compatibility. Software apps are downloadable from app stores.
125
Laptop
Can run on battery or be plugged in. Usually runs a full OS and can run desktop software. CPU power, RAM resources, and fixed disk storage are similar to desktop computers. RAM and storage units are upgradable.
126
LCD
This uses a fluorescent backlight to illuminate the display.
127
OLED
This uses individually lit pixels
128
Digitizer
This converts the touch actions into a digital signal
129
Inverter
This converts direct current to alternating current
130
Wi-Fi Components
Wi-Fi antennas transmit and receive data carried over radio waves.
131
Wi-Fi Antenna Connectors
Wi-Fi antennas in laptops are typically located above the screen.
132
Wi-Fi Antenna Leads
The Wi-Fi antenna is connected to a wireless card by an antenna wire and antenna leads.
133
Wi-Fi Antenna Wire Guides
The wires are fastened to the display unit by wire guides which are located on the sides of the screen.
134
Near Field Communication (NFC)
NFC enables mobile devices to establish radio communications with other devices by placing the devices close together or by touching together.
135
Infrared (IR)
If a mobile device is IR enabled, it can be used to control other IR controlled devices remotely, such as a TV, set top box, or audio equipment.
136
Bluetooth
This wireless technology allows data exchange over a short distance between two bluetooth-enabled devices or connect to other bluetooth-enabled peripheral devices, such as speakers or headphones.
137
Tether
This uses your cellular phone as a modem for another device, such as a tablet or laptop. The connection is made over a USB cable or Bluetooth.
138
Mobile Hotspot
A hotspot is where devices connect using Wi-Fi to share a cellular data connection.
139
Flash Card Readers
Most modern laptops feature a flash card reader for Secure Digital (SD) and Secure Digital High Capacity (SDHC) flash cards.
140
Contact
This type of reader requires a physical connection to the card, made by inserting the card into the reader.
141
Warranty
Identify what is covered within the warranty.
142
Scheduled Servicing
Servicing is based on expected usage. Using information is the documentation or on the manufacturer’s website.
143
Mean Time Between Failures (MTBF)
The printer should work without failing for an average length of time. This information is the documentation or on the manufacturer's website.
144
Imaging Drum
Used by laser printers to create the image.
145
DPI
Refers to the quality of the image resolution.
146
CMYK
The colors of ink used in color printing.
147
Electrostatic Spray
Used by inkjet printers to create the image.
148
PPM
Rate at which the printer can output pages.
149
ADF
Refers to the feature of some laser and inkjet printers which also have copy machine capabilities.
150
Print Head
This is located on the carriage, which is attached to a belt and motor.
151
Ink Cartridges
Inkjet printers use these to spray ink onto a page.
152
Piezoelectric crystals
These are located in the ink reservoir at the back of each nozzle. A charge is applied to cause them to vibrate. This vibration controls the flow of ink onto the paper.
153
Carriage
As rollers pull paper in from the feeder, the belt moves this back and forth across the paper to spray ink onto the page.
154
Nozzles
These are tiny holes in the print head.
155
Thermal
A pulse of electrical current is applied to heating chambers around the nozzles. The heat creates a bubble of steam in the chamber. The steam forces inl out through the nozzle and onto the paper.
156
Duplexing Assembly
Turns the page that is already printed on one side so that it can be printed on the other side.
157
Fuser Assembly
This is made up of hot rollers, which melt the toner into the paper.
158
Pickup Rollers
These move the sheet of paper out the tray or cassette, then through the printer during the printing process.
159
Toner Cartridge
This is one of the primary consumable items in a laser printer.
160
Transfer Roller
This assist in transferring the toner from the imaging drum to the paper.
161
Wasted Resources
This occurs when dedicated servers sit idle for long periods waiting until they are needed to deliver their specific resource. Meanwhile, these servers waste energy.
162
Single-Point Failure
This occurs when a dedicated server fails or goes offline. There are no backup servers to handle the failure.
163
Host Computer
This is the physical computer controlled by an user. VMs use the system resources of the host machine to boot and run an OS.
164
Host Operating System
This is the operating system of the host computer. Users can use a virtualization emulator on the host OS to create and manage VMs.
165
Guest Operating System
This is the OS that is running in the VM. Drivers are required to run the different OS version.
166
Processor support
Processors, such as Intel VT and AMD-V, were specifically designed to support virtualization. The virtualization feature on these processors may need to be enabled. Processors with multiple cores are also recommended as the additional cores increase speed and responsiveness when running multiple VMs.
167
Memory Support
Consider that you need memory for your host OS and will now need enough RAN to meet the requirements of each VM and their guest OS.
168
Storage
Each VM creates very large files to store operating systems, applications, and all of the VM data. You must also factor in that an active VM will require a few GB of storage space.
169
Network Requirements
Depends on the type of VM. Some VMs do not require outside connections while others do.
170
Server Sprawl
This occurs when an organization does not have adequate space to physically house underutilized servers. The servers take up more space than is warranted by the services that they provide.