General Definitions: WINDOWS Flashcards

1
Q

What Branch of Information Technology are Systems Administrators in?

A

Infrastructure Support Branch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an URL ?

A

Uniform Resource Locator also known as a weblink

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Web Application?

A

IT IS A
• PROGRAM
• DESIGNED TO ACCOMPLISH A SPECIFIC TASK OR USE AND
• MUST BE INSTALLED ON AN OPERATING SYSTEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Web Browser?

A

It is a • computer application
• used to search or browse the internet
• such as Google Chrome, Internet Explorer, Safari, FireFox, Microsoft Edge, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Etc:

A

Pronounced “Itsy” Directory in LINUX & UNIX systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the computer term(s) used for the USERNAME/PASSWORD?

A

Login credentials or authentication information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Data?

A

Data is information that is stored in a file or text that is stored in a file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

WIFI

A

Wireless Fidelity
Uses Radiowaves to transmit data between different systems within a LAN
Uses Radiowaves to transmit data from mobile devices through router to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A COMPUTER IS

A

A device that creates, stores, manages and processes data by receiving input which it processes and then delivers an output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Other computer Names

A

Personal Computer (PC); a box, a unit, or a Machine eg LINUX Machine,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Network?

A
It is two or more computers or systems that 
share information and 
computer resources, 
exchange files and
 allow electronic communication, 

The computers on a network may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a LAN?

A

It stands for Local Area Network. It is a group of networks that

  1. share information,
  2. share computer resources and
  3. communicate with one another and

that span a small geographic area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an APPLICATION?

A

It is a program designed to accomplish specific task(s) eg; Google Chrome – designed to browse internet, Word -word processor, VMware – build systems); It must be installed onto an Operating System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

WINDOWS

A

It is an Operating system built by Microsoft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Windows Operating System

A

It is an operating system that uses JAVA and Visual basic, Easily compromised, virus-prone,

It is a More usable friendly, more compatible with other systems, companies pay a lot of money to secure these systems called system hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an Operating System?

A

It is the main software or program running on a computer or the first software or program that loads when you turn on a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Software?

A

It is the virtual, intangible part of a computer, eg. Operating system, files, folders, apps, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Hardware?

A

It is the physical or tangible part of a computer eg. Keyboard, mouse, CD,DVD ROM, monitor etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a Server?

A

It is a super computer that has extra processing power designed for business use,
It is a supercomputer that has different components and parts for business use, eg. Windows Server 2008 or 2019; Solaris or AIX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does a PC Technician (Windows Desktop Support) do?

A

o Troubleshoots and Fixes computer related issues eg. Virus, software, performance issues)
o Fix computer software and hardware issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does a Windows Server or Domain Administrator do?

A

o Sets up Domain
o Sets up Active Directory (mainly for Microsoft)
o Sets up Server – Server Administration – build from scratch from installing operating system
o Troubleshoots and Fixes computer related issues eg. Virus, software, performance issues)
o Fix computer software and hardware issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a DOMAIN?

A

It is a group of systems that are connected together that share common information (eg. Printer, folders, files, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a Systems Administrator?

A

It is an expert in different operating systems such as Windows, LINUX, UNIX, Microsoft Azure, AWS, DevOps, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a Systems Administrator?

A

It is an expert in different operating systems such as Windows, LINUX, UNIX, Microsoft Azure, AWS, DevOps, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is UNIX?

A

It is a group of operating systems that have a similar kernel built by Bell Labs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is a UNIX Kernel?

A

It is the core or heart of the UNIX operating system or foundation of the UNIX operating system. Built by Ken Thomson (Applications Developer) and Dennis Ritchie (C++ Language programmer) in 1969.

It is also Freeware – free software, and

It is Opensource – code used to build the kernel is open to the public;

It is secure, stable, No virus, good and agile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Name some UNIX Operating systems

A

Sun Microsystems which became ORACLE”s SOLARIS, IBM’s AIX, HP’s HP-UX; and Apple’s MAC-OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is INFORMATION TECHNOLOGY (IT)?

A

It is the use of technology (machines, software or networks) to create and manage data (information) ; data management business; manage a Network for data to flow

It is the use of technology to share information across systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is an IT Professional?

A

It is person who works as and is able to

a) build and manage systems,
b) store and secure and transfer data,
c) user access security
d) ensure data is always available, and
e) Backup creation or clustering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

List 4 UNIX Flavors

A
  1. *SOLARIS – We will learn Solaris in Class – Owned by ORACLE (Sun Microsystems)
  2. *HP-UX – Owned by HP
  3. AIX– Owned by IBM
  4. MAC-OS– Owned by Apple
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

LIST 6 LINUX Flavors & Distributions

A
  1. *RHEL - We will learn RHEL in Class. Owned by Red Hat Company (vendor)
  2. *CENTOS - We will learn CENTOS in Class. Sponsored but not supported by Red Hat Company. Open to community. Freesource. Inspires innovation that helps Red Hat.
  3. *UBUNTU - We will learn UBUNTU in Class. A community sponsored project
  4. FEDORA – Community Sponsored
  5. ANDROID
  6. IOS – Owned by Apple (sells the Hardware)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is LINUX?

A

A modified UNIX Kernel based operating system created by Linus Torvald from Helsinki to make UNIX more user friendly; Easier than UNIX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is VMware?

A

It is software used to build virtual systems; Stands for Virtual Machine Ware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is a hypervisor?

A

It Is a type of VMware Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

List 2 Types of Hypervisor

A
  1. Hosted Hypervisor

2. Baremetal Hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is a Hosted Hypervisor?

A

It is an application type of Hypervisor; i.e. Must be installed on an Operating system eg Oracle Virtual Box
A hosted hypervisor is installed on a host computer, which already has an operating system installed. It runs as an application like other software on the computer. Most hosted hypervisors can manage and run multiple VMs at one time.
It requires you to install an operating system before deploying the hypervisor, meaning the hypervisor doesn’t have direct access to hardware resources. These kinds of hypervisors are often cheaper than bare-metal, so they’re well-suited for small data centers or test and development environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is a Baremetal Hypervisor?

A

It is an OS Type of Hypervisor i,e. must be installed on a physical system eg. VMware Esxi.
Most companies use this one.
It is virtualization software that is installed on hardware directly. At its core, the hypervisor is the host or operating system.

It is structured to allow for the virtualization of underlying hardware components to function as if they have direct access to the hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is cloud Computing?

A

It is storing and accessing data and programs over the Internet instead of your computer’s hard drive.
Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. The term is generally used to describe data centers available to many users over the Internet.
Difficult to hack systems on a cloud, are hardened systems, safer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

A Network is

A

Two or more computers that are linked in order to share resources, exchange files, or allow electronic communications. The computers on a network may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams. Enables the movement of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

A switch is

A

A device that connects systems in a Network together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

A router is

A

A device that connect Networks together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

A modem is

A

A device that is a PRIMITIVE ROUTER USED TO TRANSMIT DATA OVER PHONELINES ; UPDATED TO ROUTERS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

AP

A

AP (Wireless Access Point)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

ISP

A

Internet Service Provider

It is a company that provides internet to your network eg. Verizon Fios, Comcast. Comcast, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

WAN

A

– Wide Area Network

b. It is a group of networks connected together sharing information spanning a wide geographical area (usually correspond to a company’s networks)
c. Combination of LANs to form WANs
d. Combination of LANs spanning a wide network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

MAN

A

Metro or Metropolitan Area Network

e. It is a group of systems connected together sharing information spanning a metro area
f. It is a network spanning a metro area
g. METRO AREA: IT IS A GROUP OF NEIGHBORING STATES THAT DO BUSINESS TOGETHER DESIGNATED BY THE GOVERNMENT SUCH AS DC METRO (MD, DC, VA) NY METRO (NY, NJ, PA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Troubleshooting:

If Router is not working, it could be issues with:

A
  • IP Address
  • Cable
  • OS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

An IP Address is

A

A number that is assigned by the DHCP to each system in a network so that systems can communicate with each other within a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is a Vmware Host?

A

It is a system that has a hypervisor installed on it that is used to host guest systems or virtual systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What is a Networked System?

A

A Networked System is an operating system designed to primarily support workstations and personal computers on a local area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What is a CRT?

A

Cathode Ray Tube - A machine (eg TV) that transmits electrons through cathode ray tube in order to display an image. It displays analog signal (Has Maximum Picture Resolution less than 720 p;)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What is a LED?

A

Light Emitting Diode – Image is displayed by variations in light emitted by diode as light hits it and projects images on screen, It has better picture quality and displays a digital signal. (Has Maximum Picture Resolution about 4000 p – High definition resolution)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What is a LCD?

A

Liquid Crystal Display – Image is displayed on the screen by the light emitted when fluorescent light hits the display screen and displays a digital signal. (Has Maximum Picture Resolution about 1080 p – High definition resolution)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What is a Blade Server?

A

A Blade Server is a server that is used in most large business settings that is a rectangular server with about 9 hard drives installed in it. It is usually stored in racks enabling greater processing power to handle large amounts of data needed by big businesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What is a Systems Engineer?

A

Systems Engineer
• Is able to design and build a network from scratch
• Is an expert in 2 or more operating system servers such as Windows, LINUX, or UNIX
• Is able to do all the tasks performed by a Systems Admin, Network Tech and PC Tech.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What is a Network Administrator?

A

Network Administrator:
• Is an expert in one operation system server as Windows, LINUX, or UNIX
• Is able to do all the tasks performed by a Network Tech and PC Tech.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What is a Systems Administrator?

A

A Systems Admin:
• Is an expert in at least 2 operating system servers such as Windows, LINUX, or UNIX
• Is able to do all the tasks performed by a Network admin, Network Tech and PC Tech.

58
Q

How is a Systems Admin different from a Network Admin and a Systems Engineer

A

A Systems Admin:
• Is an expert in at least 2 operating system servers such as Windows, LINUX, or UNIX
• Is able to do all the tasks performed by a Network admin, Network Tech and PC Tech.

And A

Network Administrator:
• Is an expert in one operation system server as Windows, LINUX, or UNIX
• Is able to do all the tasks performed by a Network Tech and PC Tech.

59
Q

What is HTML?

A

. html: It stands for Hypertext Markup Language and is a language that is used to convert a private LAN resource into a public internet resource. It creates static web sites with just information or text

60
Q

What is HTTP?

A

It stands for Hypertext Transmission Protocol, and is used to transport or transmit web pages

It transfers clear text over internet. This data transmission is not secure and can be easily read and stolen if intercepted

61
Q

What is HTTPS?

A

It stands for Hypertext Transmission Protocol Secure, and is used to transmit Transfers encrypted data or webpages over internet in a secure
manner. Converts Human Readable information to Non Human readable information

62
Q

What is WWW?

A

It stands for World Wide Web, and it is a combination of internet resources made available to the public. It is the world wide web of internet resources.

63
Q

How is Internet different from WWW?

A
  • Internet: It is the combination of LANs connected together spanning the globe. It is connected by ISPs using routers and switches.
  • WWW: It stands for World Wide Web, and it is a combination of internet resources made available to the public. It is the world wide web of internet resources.
64
Q

What is the Internet?

A

It is the combination of LANs connected together spanning the globe. It is connected by ISPs using routers and switches.

65
Q

What is a Operating System?

A

The main software or program that runs on a computer

66
Q

Operating Systems we will learn in class are:

A
Windows
LINUX
UNIX
Cloud Computing eg Amazon AWs, Microsoft Azure
DevOps
VMware
67
Q

What is Computer Software?

A

Computer Software: The virtual or intangible parts of a computer eg. Files, or apps,

68
Q

What is Computer Hardware?

A

Computer Hardware: The physical or tangible parts of a computer eg. Keyboard or mouse

69
Q

Who are the founding Fathers of UNIX?

A

The founders of UNIX are Ken Thomson (Developer) and Dennis Ritchie (C++ Language Programmer)

70
Q

What is the difference between computer memory and storage?

A

Computer memory is any physical device in the computer that temporarily stores information that makes it readily available for immediate use, and

Computer storage is a physical device, such as a hard disk drive or solid state drive, where data is recorded and can stay indefinitely, to be recalled as needed.

71
Q

What is MEMORY?

A

MEMORY:

  1. IT HOLDS SOFTWARE AND IS USED TO TEMPORARILY LOAD SOFTWARE
  2. SOFTWARE IS LOADED ONTO RAM OR MEMORY CACHE IN ORDER TO LOAD
  3. CANNOT OPEN OS IF RAM IS NOT WORKING
    WHEN RAM IS DEFECTIVE COMPUTER SCREEN IS BLANK OR COMPUTER DOES NOT LOAD
72
Q

What is NON- HUMAN READABLE DATA (NON- ASCII DATA)?

A

NON- HUMAN READABLE DATA (NON- ASCII DATA)

a. Files like picture files -
b. Files like video files -
c. Files like audio files -
d. Files like System files - - executable files

73
Q

What is HUMAN READABLE DATA (ASCII DATA)?

A

HUMAN READABLE DATA (ASCII DATA)

a. Files like word files -
b. Files like PDF files -
c. Files like excel files -
d. Files like powerpoint files -

74
Q

What are the 2 types of Data?

A
  1. NON- HUMAN READABLE DATA (NON- ASCII DATA)

2. HUMAN READABLE DATA (ASCII DATA)

75
Q

Power Button turned on then….

A

Power Button turned on —-OS Stored in the Hard Drive (HD) loads from Hard drive to RAM then it shows up on the monitor when you choose Chrome —Mr. CPU will send signals to Chrome to load on OS

76
Q

What is RAM?

A

RAM:

Stands for RANDOM ACCESS MEMORY

77
Q

What does the CACHE do?

A

CACHE: HOLDS SOFTWARE

78
Q

What does the Storage (Hard-drive) do?

A

STORAGE (HARD DRIVE): IT IS USED TO PERMANENTLY STORE SOFTWARE

79
Q

Name the types of RAM?

A

TYPES OF MEMORY:

  1. RAM - Random Access Memory
  2. ROM - Read Only Memory
  3. SWAP -
80
Q

What is Ransomware?

A

It is a Virus that holds your system hostage

81
Q

What is Zero Day Attack?

A

Zero Day attack:

Brand new malware; Unknown attack – attack that has not been seen before or admins do not know about

82
Q

What is a PC Technician?

A

A PC Technician works to fix problems related to PC

83
Q

What is a Network Technician?

A

A Network Technician fixes network related issues

and does everything that a PC Technician does

84
Q

What are Dynamic Webpages?

A

Dynamic Webpages are Websites with media eg. Videos eg php, PHP, MySQL (pronounced my sequel)

85
Q

What is Clear Text?

A

Clear Text: Information that can be read by others over internet: Human readable

86
Q

What is Encrypted text?

A

Encrypted text: Non Human readable text; Information that cannot be read by other humans over the internet:

87
Q

What is a Secure Shell?

A

Secure Shell is a LINUX and UNIX system login

88
Q

What is an ISP?

A

An ISP is an Internet Service Provider

89
Q

What is an ISO?

A

An ISO image file is a snapshot of the data and layout of a CD or DVD,
saved in ISO-9660 format.
ISO image files are widely used for storing CD content.
ISO is a common CD image format for DOS, Windows (Joliet ISO extension), Linux (RockRidge ISO extension), and other operating systems.

90
Q

What is Bandwidth?

A

It is the maximum amount of data that can flow through a medium per second

91
Q

WHAT IS A COMPUTER?

A

It is a machine that manages and processes data

It is an electronic device that receives input, processes that input, and release an output

92
Q

What is an expandable system?

A

It is a system with room so that specs can be added eg. hard drives, CPUs, or power supply units

93
Q

What is a CPU?

A

It stands for Central Processing Unit. It is the brain of the computer where most calculations take place

CPU Manufacturers:

  1. Intel
  2. AMD
94
Q

What is a Desktop Computer?

A

It is a computer designed for the desktop and comes with separate components such as a monitor, keyboard, mouse, speakers and system unit

95
Q

What are laptops?

A

It a computer designed for the lap that comes with components attached to each other

96
Q

What is a Server Computer?

A

It is a Supercomputer with extra processing power which is expandable and mainly used for business

97
Q

What are Mobile Computers?

A

Mobile Computers are small electronic devices designed to create and manage data eg. Smart phone, Smart TV, Refrigerator, Car, watches, Ipads, tablets, etc

98
Q

What is a domain controller?

A

It is a server that responds to
authentication requests and
verifies users on computer networks.

99
Q

What Interface does Windows OS use?

What Interface do LINUX/UNIX use?

A

Windows is a mostly GUI (Gooey) based OS but also has a TUI. The TUI of Windows is the Command Prompt

UNIX & LINUX come with GUI and TUI (Tooey) based OS

100
Q

What is a TUI BASED OPERATING SYSTEM?

A

TUI BASED OPERATING SYSTEM
TUI: - Text User Interface:- OS is made using text or command lines
or
CLI: - Command Line Interface: - OS is made using command lines

TUI & CLI are the same

101
Q

What is a GUI BASED OPERATING SYSTEM?

A

GUI BASED OPERATING SYSTEM
GUI: - Graphical User Interface: - OS is made using graphics and colors; very user friendly
Interface: - It is a platform that allows a user to interact with the system (OS)

102
Q

Name the 2 Types of Operating System Interfaces

A
  1. GUI Based operating system

2. TUI or CLI based operating system

103
Q

What is a Folder?

A

Folder: - It is a container or holder of the folders and files

104
Q

What is a Subfolder?

A

Subfolder: - It is a folder within another folder (parent folder)

105
Q

What is a Directory?

A

Directory: - It is folder in LINUX and UNIX systems
File: - It is a container of text or information (either Human readable or Non Human readable files)

106
Q

What is a Icon?

A

Icon: - It is a graphical or pictorial representation of an application or an operating system tool or component eg. Google chrome

107
Q

What is a folder?

A

Folder: - It is a container or holder of the folders and files

108
Q

What is a file?

A

Files: - It is a container of text or information (either Human readable or Non Human readable files)

109
Q

Expound on what a User Profile is?

A

Profile:

  1. It is the environmental set up of a user account.
  2. It is associated or linked to one account only.
  3. A new user profile account is only created when a user logs into the new account for the very first time and not before.
  4. A profile is named after your account.
  5. Admin can delete any user profile they want.
  6. A profile can be replaced
110
Q

What is a Taskbar?

A

Taskbar: - It is a horizontal bar located at the bottom of the OS desktop by default used to store icons and stage running applications

111
Q

What is a Control Panel?

A

Control Panel: - It stores tools used to change the configuration of the operating system
How to access the Control Panel:
Windows Search bar/type Control Panel

112
Q

What is Malware?

A

Malware: - It is a malicious software or bad software that is bad to the system if introduced into the system

113
Q

What is a Firewall?

A

Firewall: - It is hardware or software used to prevent unauthorized access to a system

114
Q

What is an OS Desktop?

A

OS Desktop:- It is the main platform or interface of the OS that allows a user to interact with the OS

115
Q

Name 3 Types of Malware?

A

TYPES OF MALWARE (Malicious Software)

  1. Trojan or Virus:
  2. Spyware:
  3. Adware:
116
Q

HOW TO UNINSTALL ANTIMALWARE

A

HOW TO UNINSTALL ANTIMALWARE
Go to:
Search bar/type Control Panel/ Programs/Uninstall Programs/ Select McAfee/Right click uninstall
Install new antimalware software

117
Q

HOW TO FIND OUT IF YOU HAVE ANTIMALWARE ON A SYSTEM

A

HOW TO FIND OUT IF YOU HAVE ANTIMALWARE ON A SYSTEM
Go to:
Search bar/type Control Panel/System Security/Windows Defender Firewall/

If Green - no third-party antimalware

If Red/Green – Have a 3rd party Antimalware on the system, eg McAfee;

Have to uninstall antimalware to install another

118
Q

NAME 6 POPULAR ANTIMALWARE APPLICATIONS

A
  1. Norton Security Suite
  2. McAfee Security Suite
  3. Pc Cillin Security Suite
  4. Kapersky Security Suite (Russian)
  5. Webroot Security Suite
  6. Malwarebytes*** - Lightweight application with low RAM & CPU
119
Q

List Advantages of Malwarebytes Malware

A

Besides Malwarebytes
- Others use a lot of CPU and RAM and slow down system sometimes to a halt
- Others may be oversensitive
- Or highjack browsers or scans everything
- Only 1 anti-malware per computer
Uninstalling these anti-malwares may require installing a tool to remove the antimalware

120
Q

What is AntiMalware?

A

Antimalware is set up to detect and prevent zero day virus attack from happening

121
Q

What is a Zero Day virus?

A

Zero Day virus:- It is a virus that has not been studied and there is no software antidote available for it. Some

122
Q

What is a Firewall?

A

Firewall: - It is a software that prevents unauthorized access from an individual into your system

123
Q

What are Anti Malware Applications?

A
  1. ANTIMALWARE APPLICATIONS
    Antimalware: - It is an application used to
  2. deter or
  3. prevent malware
  4. and can also be used to remove malware from an infected system
124
Q

What are Anti Malware Suites?

A

Antimalware suites:- It is a combination of applications eg Microsoft Office instead of just one application

For Example:
Takes Care OF: Type of Malware
Norton Anti-Virus Norton Security Suite (Bundle)
Bad Software Anti-Virus Yes Yes
Bad Software Anti-Spyware No Yes
Bad Software Anti- Adware No Yes
Defends Firewall No Yes

125
Q

What is Spyware?

A

Spyware:

a. It is designed to steal personal information from a system
b. It is the most dangerous malware.
c. It sits on the system and waits for you to log into account and transmits information to spyware developer.
d. It gets into contacts and sends contacts messages acting as the user.
e. You don’t know it’s there until damage is done

OS

126
Q

What is a Trojan or a Virus?

A
  1. Trojan or Virus:

a. It is a malware designed to detroy software eg attack and destroy profiles, slows system, error messages etc

127
Q

What is Adware?

A
  1. Adware:

a. It is designed to deceive you into going to fake websites and spending money eg via western Union
b. Ransomware: - Is a type of trojan or adware

i. It takes over your browser,
ii. Then changes the configuration of the OS and
iii. takes system ransom (asks user to pay for system to be released)
Problem fixed by doing a recovery

128
Q

System recovery after Adware attack?

A

Problem fixed by doing a recovery

  1. Shut down computer
  2. Copy onto new system
  3. Reconfigure
  4. Scan and remove malware
  5. Is still unstable, have to rebuild OS
129
Q

HOW TO CONVERT LOCAL USER ACCOUNT TO ADMIN ACCOUNT

A

Search bar/type Control Panel/User Accounts/User Accounts/Display user accounts already on system/click on local account user26/change account type/Select Administrator Account
• Only an Admin can change the account type of a standard local account

130
Q

List 2 Types of User Accounts in Windows

A

Types of User Profile Accounts
1. Standard Local User Account: - It is a basic user profile account that has no admin rights and no unrestricted access to the system privileges

  1. Local Admin Account: - It is a user profile account that has unrestricted access to the system
    HOW TO CONVERT LOCAL USER ACCOUNT TO ADMIN ACCOUNT
    Search bar/type Control Panel/User Accounts/User Accounts/Display user accounts already on system/click on local account user26/change account type/Select Administrator Account
    • Only an Admin can change the account type of a standard local account
131
Q

PROVISIONING A SYSTEM

A

Creating Standard User Accounts

132
Q

HOW TO CREATE STANDARD USER ACCOUNTS

A

Search bar/type Control Panel/User Accounts/User Accounts/Display user accounts already on system/Manage another account/ Add a new user on this PC setting/ Add someone else to this PC/ I don’t have this person’s sign in info/Add user without Microsoft account/Who’s going to use this PC/Type in “User26”/pw: “school1/In case you forget your password for User26 ( pw: Q1:school Trinitech, Q2: City born: Beltsville Q3: Pet name: Trini
New profile stored in users folder of C:- drive

Types of User Profile Accounts
1. Standard Local User Account: - It is a basic user profile account that has no admin rights and no unrestricted access to the system privileges

  1. Local Admin Account: - It is a user profile account that has unrestricted access to the system
    HOW TO CONVERT LOCAL USER ACCOUNT TO ADMIN ACCOUNT
    Search bar/type Control Panel/User Accounts/User Accounts/Display user accounts already on system/click on local account user26/change account type/Select Administrator Account
    • Only an Admin can change the account type of a standard local account
    HOW TO CHECK IF WE HAVE A PROFILE FOR THIS ACCOUNT
    File Explorer/This PC/ Windows C:-/Users

HOW TO LOG INTO A NEW USER ACCOUNT
Start bar/Right Click/Logout/ Log into new account
Or
Start bar/click on Profile icon/Select New User Account/Login
Or
File Explorer/This PC/ Windows C:-/Users/ Find user

HOW TO LOG OUT OF A NEW ACCOUNT
Start bar/Right Click/Shut down or sign out

Operating System Desktop: -

10. PUTTY (a terminal emulator)
It is an application or tool used to connect to a LINUX or UNIX system from another system such as Windows
Enables you to sit in your office in front of your Windows 10 computer and connect to your LINUX or UNIX server computer
System Admins use Putty 80% of the time
IMAGES
IMAGES
Local Server: - It is a server that is proximal to you
Remote server: It is a server that is far away from you
Host Name: It is a label assigned to a system by an Admin
IP Address: It is a unique number assigned to a network that enables it to talk (transfer data or information) with other systems within a network (LAN – Local Area Network)
Your system will not be able to talk to other systems without an IP Address

WHAT IS REQUIRED TO LOGIN TO REMOTE SYSTEMS
1.	Hostname
2.	Or IP Address
 
PUTTY
 

USE PUTTY TO CONNECT TO REMOTE LINUX SYTEM IN GERMANTOWN EXERCISE
***Linux and Unix are case sensitive
Download http://web.trinitechglobal.com:81/school/pluginfile.php/11727/mod_assign/introattachment/0/Putty.exe?forcedownload=1
1. Open Putty.exe
2. Enter Hostname (or IP Address)

Hostname: web.trinitechglobal.com
Username or login name: class26
PW: school1

  1. Putty Warning Alert: Click Yes

UNIVERSAL COMMANDS USED IN LINUX OR UNIX

  1. Display your current location in the LINUX filesystem
    pwd: - Stands for Present Working Directory
    Command line: $pwd
    Result /home/class26
  2. Display the content of your pwd (what is in your current folder/directory)
    Command line: - $ls (list command – lists all files in folder)
  3. Create a file called in your pwd
    Command line: - $touch thabi (creates new file with that name)
    Command line: - $ls (lists all files so you can see if created)
  4. Clear the interface
    Command line: - $clear (clears screen but saves command thread)
  5. Display the date and time of the system
    Command line: - $date
  6. Display the calendar of the month
    Command line: $cal
    Command line: $cal 2020 ( will display the calendar of that year)
    Comand lineL $cal 03 1977 (will display calendar of March 1977) Born on Saturday

To restart – Right click on top bar of putty (interface bar)/Click Restart
To copy command thread – Right click interface bar/copy (can paste on word on windows)
Other commands – Right click top interface bar


11. WINSCP – Windows Secure Copy
It is a tool used to transfer data from a Windows system to a LINUX or UNIX system and vice versa

IMAGES
IMAGES

What tool do you use to connect to a remote server?
Putty
What tool have you used to transfer data between UNIX and LINUX?
WinSCP

Log into WinSCP
See Windows file directory on one side and LINUX on the other
IMAGES
IMAGES
Create Windows folder
File Explorer/Documents/New Folder (name folder)
To Transfer folder to LINUX System
Go to bottom of LINUX window in WinSCP/Drag new folder from Windows side to LINUX directory/Select copy/See folder in LINUX side (and vice versa)

12. TEAMVIEWER
It is an application used to connect to a remote system or host online meetings
It is an app that can be loaded onto a phone, computer etc
What system do you use for remote support?
Teamviewer
Open Teamviewer/Enter other person’s ID/Enter password of the other person
Should be able to see other person’s screen on your monitor


COMPUTER HARDWARE & COMPONENTS
Go to Introduction to Computer Hardware and Components pdf for details

IMAGES
IMAGES
1. MOTHERBOARD
Motherboard: It is the main hardware component in a system that connects all other components together. Everything in your system is connected to the motherboard. It is the backbone of the computer. A Desktop motherboard can be replaced. A Laptop motherboard is harder to replace
A system driver: It is a software that enables the OS to connect to hardware. Each hardware component in the computer has a driver
Device Manager: It is an application that enables user to view and manage system hardware and contains a list of hardware that are operating and communicating with the OS. When a piece of hardware is not working, the offending hardware is highlighted in the Device Manager app for the user to deal with.
Go to: - Right click Start/Select Device Manager
Hard Drive Vendors:
1. ST Seagate
2. Intel
3. WDC – Western Digital Company
4. Toshiba
FRU (Field Replaceable Unit): -It is a computer hardware component that can easily be replaced in the field by a technician
Other Names for a Motherboard:
1. MB
2. Mobo (most commonly used name)
3. System board
4. Logic Board
Motherboard Manufacturers
1. ASUS
2. ASRock
3. Intel
4. ABIT
5. MSI
6. Gigabyte
7. Bioster
Motherboard Peripheral Ports or Connectors: Side ports on computer
USB (Universal Serial Bus ): - It is used to
1. connect external storage or
2. input and output devices to the system or
3. power small electronic devices

2. PORT INVENTORY
Go to Introduction to Computer Hardware and Components pdf for details
SOP (Standard Operating Procedure): - It is a set of step-by-step instructions compiled by an organization to help workers carry out complex routine operations. SOPs aim to achieve efficiency, quality output and uniformity of performance, while reducing miscommunication and failure to comply with industry regulations.
USB (Universal Serial Bus): - It is used to
1. Connect external storage or
2. Input and output devices to the system or
3. Power small electronic devices

Port Connectors – Male components - Fit into the female components
Ports – Female components – Receive the male components

Peripheral port: - Side port
IMAGES
IMAGES
Port Connectors – Male components
Ports – Female components

DIFFERENT PORTS
TYPES OF PORTS
TYPES	“Shape”	
Type A	Rectangular	
Type B	Square	
Type C	Oblong	
Apple Lightning ports		
Mini- A	Rectangular	
Mini- B	Square	

USB PORTS
ARE PLUG AND PLAY PORTS
USB Versions
USB Version Max Speed Color Ports/Misc
USB V1 12 mbps Black Obsolete
USB V2 480 mbps Black Type A, B, Mini-B, Micro-B
USB V3 5000 mbps or 5gbps Black or blue Type A, B, C, Micro-B, Apple Lightning

USB IMAGE 1

IMAGES
IMAGES

TYPE C IMAGE 2

USB Technology and Max Speed
USB Type A Port Details

    Power	     Data	Data	  Grounding Pin
    Pin (5Volts)

How many volts of electricity can you get from a USB port?
5 Volts
Grounding pin: Conducts an overflow of electricity to the earth: Earthing

ESD Mart: Electrostatic Discharge – portable work area used for earthing while working on harddrives; comes with a wristband for grounding; Can use shoes with rubber soles or rubber gloves

Power Cable connector has a grounding pin – 3rd round pin on outlet
One USB can be connect to as many as 127 devices
USB HUB – USB expansion device that gives you more USB ports
Daisy chain Hubs – connecting several USB hubs together to enable you to have access to more ports
IMAGES
IMAGES

ETHERNET PORTS
Also known as Network port or Network Connector or Network Controller or Network Interface Card (NIC)
Ethernet: - It is the term used to describe LAN and WAN wired technology eg, cables, switches, routers etc
Internet: - It is a combination of LANS connected together sharing information spanning the globe
IMAGES
IMAGES
A bit: - It is a binary unit; It is the smallest unit of data stored on a computer
A byte: - It is the smallest unit of data that can store 1 ASCII character eg “h”
Computer Data Storage Units
Unit (Data Storage units) Conversion Unit
8 bits 1 Byte
1000 bytes 1 kb
1000 kilobytes 1 mb
1000 megabytes 1 gb
1000 gigabytes 1 Tb

Ethernet Technology and Max Speed
What is the maximum speed of Ethernet? 10 gbps
Ethernet Technology Maximum Speed Notes:
10 base T 10 mbps Megabyte Ethernet; Obsolete
100 base T 100 mbps Megabyte Ethernet
1000 base T 1gbps – 10gbps Gigabyte Ethernet

Base T: - Baseband Signaling that only ethernet technology carries
IMAGES
IMAGES

Ethernet Connectors and Technology
Cable Max Speed Ethernet Technology
Cat 5 100mbps 10 base T (Max speed 10mbps)
100 base T (Max speed 100mbps)
Cat 5e 1gbps 10 base T (Max speed 10mbps)
100 base T (Max speed 100mbps)
1000 base T (Max speed 10gbps)
Only uses up to 1gbps of 1000 base T
Cat 6 & 7 10gbps 10 base T (Max speed 10mbps)
100 base T (Max speed 100mbps)
1000 base T (Max speed 10gbps) Mainly used for transmitting greater than 1 gb Base T
IMAGES
IMAGES
IMAGES
How do you tell if it is a Megabyte NIC or a Gigabyte NIC?
Right click Start bar/Device Manager/Network adapters/click arrow
Adapter will have a GBE in name or FE
FE – Fast Ethernet – 100mb – Megabyte NIC
GBE – Gigabyte Ethernet – Gigabyte – Gigabyte NIC
Cat 7 – uses different alloy from Cat 6 which transmits more electricity
What is the maximum range of ethernet cables? 100m (328 ft)
This is the longest cable for ethernet technology, Can use a repeater to extend the range
Repeater: - extends the range for wifi or ethernet by boosting signal another 100 m (for ethernet); also know as a signal booster or range extender
Ethernet Versus Phone Technology
Ethernet Phone
Connector (ports) RJ45 RJ11
Cables Cat 5, 5e, 6 & 7 Cat 3
IMAGES
IMAGES
For ethernet technology, Data is transmitted through electrical signals through copper wires
Medium of Ethernet Technology: Copper Wires;
Medium: - material used to transmit data
Mode of Ethernet Technology: Electrical Signals
Mode: It Is the form that the data is transmitted in through the cables
Ethernet NIC – located on the side of the computer
IMAGES
IMAGES
Range: - It is how far the data can travel from the system

WIFI PORT OR CONNECTOR OR ADAPTOR
Wifi: _ Wireless Fidelity
WLAN – Wireless LAN Port – term used to refer to wifi at work; It is found inside your system. It is responsible for transmitting data to and from the system via radiowaves
Medium of WLAN Technology: radiowaves;
Mode of WLAN Technology: Radiowaves
TYPES OF WIFI OR WLAN NIC
Wireless NIC
USB to WLAN Adapter NIC
W9 PCI Card
You can replace a wireless NIC in 5 minutes, Not so for a hardwired NIC.
In Desktop, Ethernet NIC is hardwired to the motherboard
If a problem with NIC in this system occurs, you have to replace motherboard because if a hardwired NIC is not working due to circuit issues it may spread to the rest of the motherboard in no time affecting the CPU and RAM and causing the server to shut down. Most companies would rather get a new motherboard
Before your could use a PCI card slot (only fits PCI slots) and can fix NIC by replacing with a PCI card slot. But now have to replace whole motherboard
Hardwired: - Permanently attached to the motherboard
Downtime: not working and still paid (due to network crash etc)
TROUBLESHOOTING OF WIFI OR WLAN NIC

IMAGES
IMAGES
How can you troubleshoot a defective NIC?
System is not connecting to network
1. Check if it is a software related problem: Check Driver and OS
2. Go to the NIC vendor and reinstall driver from the vendor
3. CHECK if it is a hardware problem (defective cable, port or NIC) Check if it is a defective cable problem – unplug CAT NIC cable and connect it to another system, and if it works then the cable has no problem
4. Check if it is a defective port issue – Unplug cable from port and connect into another port, if it is working then it is not the port
5. Check if the NIC is defective – Use USB to RJ45 adapter and connect CAT to a new USB port if it works (and you’ve checked all other possibilities outlined above) then its likely the NIC is defective
WLAN PROPERTIES: TECHNOLOGY AND MAXIMUM SPEED
WLAN Technology Maximum Speed
802.11b 11mbps
802.11 a/g 54mbps
802.11 n 600 mbps
802.11 ac 5gbps
Internet speed has to do with bandwidth provided by ISP (Internet Service Provider)
This WLAN Maximum Speed is the maximum speed that WIFI data can be transmitted within your network
For superspeed in home use AC technology for everything
HOW DO WE VERIFY WHICH WLAN TECHNOLOGY WE HAVE IN THE SYSTEM

Go to
Right click Start bar/Device Manager/Network Adapters/Click Arrow
Displays list of wireless adapters
Check if you can see AC (802.11 ac), C (802.11 ac), N (802.11 n), BGN (802.11 n

IMAGES
IMAGES

WLAN FREQUENCY AND RANGE

WIFI FREQUENCY MAX RANGE NOTES
2.4 ghz 46 meters Slower data transmission rate
Longer transmission range
Weaker wavelength
5 ghz 15.4 meters Faster transmission of data (faster rate)
Shorter transmission Range
Stronger wavelength

WIFI has a repeater than can extend the range (doubles the range capacity of whatever WIFI frequency is being used 5ghz wifi with a repeater will extent to 30.8 meters)
HOME ROUTER
IMAGES
IMAGES

MAXIMUM SPEED OF WLAN: 5ghz for 802.11 ac
MAXIMUM RANGE OF WLAN: 46 meters for 2.4 ghz and 15.4 m for 5ghz
MEDIUM OF WLAN TRANSMISSION: Radiowaves
MODE OF WLAN TRANSMISSSION: Radiowaves

WIRELESS SECURITY

WEP Wired Equivalent Privacy • Least secure
• Easy to hack
• Obsolete
WPA Wifi Protected Access • More Secure
WPA2 WIFI Protected Access Version 2 • Most Secure

Password Policy: Set parameters to minimize password security breaches, eg.

  1. Enforce a Password Length Rule
  2. Enforce Password Complexity Rule
  3. Enforce a Password Aging Rule (update pw frequency parameter)

3 TYPES OF HACKERS

TYPES DESCRIPTION
WHITE HAT HACKERS • Paid to hack into systems
• Healthcare providers (or companies that use credit cards or have access to lots of private information) must harden their systems yearly and hire white hackers to find vulnerabilities in their system
GREY HAT HACKERS • Not harmful
• Intention just to get into systems and prove they are good
• Not intending to steal or destroy
• As long as you get into an unauthorized system – it is considered a crime
BLACK HAT HACKERS • Harmful
• Intend to harm and steal information and destroy the system

WPS – Device used to allow system connect to devices without using a router; Vulnerable as can easily be hacked into


FIBRE OPTICS PORT
Transmits data into and out of a system using fibre optics technology
It is used for:
• High Speed data Transfer
• Connecting LANS together into a WAN scenario

Properties of Fibre Optics:

MAXIMUM SPEED OF WLAN: 100 tbps
MAXIMUM RANGE OF WLAN: 20 Km (also has repeaters)
MEDIUM OF WLAN TRANSMISSION: Fibre Glass (Glass)
MODE OF WLAN TRANSMISSSION: Light pulses

In comparison:
Ethernet max Speed and Range = 10gbps and 100 m
WIFI Max Speed and Range = 5 gbps and 46 km

Fibre Optic – Is designed to withstand harsh weather as glass is not affected by water; Good for transmitting data outside; Transmits data really fast as the speed of light 3 x 10^8 m/s
Copper – affected by magnets or electromagnetic waves interrupting flow of data; Plastic casing to prevent water from getting in and insulate from electromagnetic waves; prone to corrosion, never have IT equipment in electrical closet (electromagnetic waves)

Lots of companies use fibre for back up backbone – as large amounts data can be transmitted faster so can back up everything for that day and not miss anything

IMAGES
NETWORK STORAGE SOLUTIONS
NAS: Network Attached Storage: - Ethernet connector
SAN: Storage Area Network: - typically a fibre channel connector
Incremental backup: - Back up organizational data in batches (successive copies) that only include data that has been updated since last back up (not full back up)eg back up for that day each day
Full backup: - Back up of organizational data in a single batch backup operation
A differential backup: is a type of data backup that preserves data, saving only the difference in the data since the last full backup.
LOOK AT DIFFERENT CONNECTORS OR ADAPTERS OR PORTS OR CONTROLLERS
Display Adapter or Connector or Controller or Ports
1. VGA Port (Visual Graphical Array)
It is a 15 pin port used to connect a monitor to a system. It was developed in 1987 by IBM and has a resolution of 64x480pixels
IMAGES
IMAGES
Display Port: - It is used to connect a monitor to a system and performs graphic processing

  1. DVI Port (Digital Visual Interface)

IMAGES
It is a video display interface used to connect a monitor to a system
DVI PORT SIGNAL
DVI - A Analog Signals < 720p
DVI - I Integrated; Both analog and Digital signals
DVI-D Digital Signals >720p

DVI VISUAL GUIDE

DVI- D Single Link 9 ______ 9 —— pin
DVI- D Dual Link 9 9 9 —— pin
DVI- I Single Link 9 ______ 9 4 pins
DVI- I Dual Link 9 9 9 4 pins
DVI- A Single Link 8 ______ 4 4 pins

IMAGES

  1. HDMI Port (High Definition Multimedia Interface)
    It is a proprietary audio and video interface for transmitting uncompressed video data and compressed and uncompressed audio data. It is the best display port used to connect a monitor to a system. It transmits both video and audio signals. It transmits digital signals.
    What is the difference between HDMI and DVI-D?
    HDMI – Transmits audio and visual signals
    DVI – Transmits only video
    IMAGES
    IMAGES
    Different Types of HDMI Ports
    Standard
    Mini
    Micro
    See Week 4 Image
    IMAGES
    IMAGes
133
Q

What is a Local Server?

A

Local Server: - It is a server that is proximal to you

134
Q

What is a Remote server?

A

Remote server: It is a server that is far away from you

135
Q

What is a Hostname?

A

Host Name: It is a label assigned to a system by an Admin

136
Q

What is an IP Address?

A

IP Address: It is a unique number assigned to a network that enables it to talk (transfer data or information) with other systems within a network (LAN – Local Area Network)

Your system will not be able to talk to other systems without an IP Address

137
Q

List 2 Types of Hackers

A

3 TYPES OF HACKERS

WHITE HAT HACKERS
GREY HAT HACKERS
BLACK HAT HACKERS

138
Q

What are Black Hackers?

A

What is a Black Hat Hacker?
BLACK HAT HACKERS • Harmful
• Intend to harm and steal information and destroy the system

139
Q

What are Grey Hackers?

A

What is a Grey Hat Hacker?
GREY HAT HACKERS • Not harmful
• Intention just to get into systems and prove they are good
• Not intending to steal or destroy
• As long as you get into an unauthorized system – it is considered a crime

140
Q

What are White Hackers?

A

What is a White Hat Hacker?
WHITE HAT HACKERS • Paid to hack into systems
• Healthcare providers (or companies that use credit cards or have access to lots of private information) must harden their systems yearly and hire white hackers to find vulnerabilities in their system