Term
File Transfer Protocol (FTP)—Data connection
File Transfer Protocol (FTP)—Control connection |
|
Definition
TCP/20 Make files available for download across a network (data connection port)
TCP/21 Make files available for download across a network (control connection port) |
|
|
Term
|
Definition
is the principal means of obtaining secure remote access to UNIX and Linux servers and to most types of network appliances (switches, routers, and firewalls).
SSH server listens on port TCP/22. |
|
|
Term
|
Definition
TCP/22
Make a secure connection to the command-line interface of a server |
|
|
Term
|
Definition
TCP/23 Make an unsecured connection to the command-line interface of a server |
|
|
Term
Simple Mail Transfer Protocol (SMTP) |
|
Definition
TCP/25
for server-to-server transport Transfer email messages across a network |
|
|
Term
|
Definition
TCP/UDP/53
Facilitate identification of hosts by name alongside IP addressing |
|
|
Term
Dynamic Host Configuration Protocol (DHCP) Server
DHCP Client |
|
Definition
UDP/67 Provision an IP address configuration to clients
UDP/68 Request a dynamic IP address configuration from a server |
|
|
Term
HyperText Transfer Protocol (HTTP) |
|
Definition
TCP/80
Provision unsecure websites and web services |
|
|
Term
Post Office Protocol (POP) |
|
Definition
TCP/110 TCP/995 (secure)
Retrieve email messages from a server mailbox |
|
|
Term
|
Definition
Support networking features of legacy Windows versions
TCP/IP ports UDP/137 and TCP/139 |
|
|
Term
Internet Mail Access Protocol (IMAP) |
|
Definition
TCP/143 and TCP/993 (secure).
Read and manage mail messages on a server mailbox |
|
|
Term
Simple Network Management Protocol (SNMP) |
|
Definition
UDP/161
Query status information from network devices |
|
|
Term
Simple Network Management Protocol (SNMP) |
|
Definition
SNMP device queries take place over port UDP/161; traps are communicated over port UDP/162.
The Simple Network Management Protocol (SNMP) is a framework for management and monitoring network devices. SNMP consists of a management system and agents. The agent is a process running on a switch, router, server, or other SNMP-compatible network device. This agent maintains a database called a management information base (MIB) that holds statistics relating to the activity of the device. An example of such a statistic is the number of frames per second handled by a switch. |
|
|
Term
|
Definition
UDP/162
Report status information to a management server |
|
|
Term
Lightweight Directory Access Protocol (LDAP) |
|
Definition
TCP/389
Query information about network users and resources/directory services.
The Lightweight Directory Access Protocol (LDAP) is a TCP/IP protocol used to query and update an X.500 directory. LDAP uses TCP and UDP port 389 by default. |
|
|
Term
|
Definition
TCP/443
Provision secure websites and services. |
|
|
Term
Server Message Block (SMB) |
|
Definition
TCP/445
Implement Windows-compatible file and printer sharing services on a local network (also sometimes referred to as Common Internet File System [CIFS]) |
|
|
Term
|
Definition
port UDP/514
Syslog is an example of a protocol and supporting software that facilitates log collection. It has become a de facto standard for logging events from distributed systems. For example, syslog messages can be generated by routers and switches, as well as UNIX or Linux servers and workstations. |
|
|
Term
|
Definition
port UDP/514
Syslog is an example of a protocol and supporting software that facilitates log collection. It has become a de facto standard for logging events from distributed systems. For example, syslog messages can be generated by routers and switches, as well as UNIX or Linux servers and workstations. |
|
|
Term
Remote Desktop Protocol (RDP) |
|
Definition
TCP/3389
Make a secure connection to the graphical desktop of a computer |
|
|
Term
Remote Desktop Protocol (RDP) |
|
Definition
is Microsoft's protocol for operating remote GUI connections to a Windows machine. RDP uses port TCP/3389. |
|
|
Term
|
Definition
A proxy server can usually operate either as a transparent service, in which case, the client requires no special configuration, or as nontransparent. For a nontransparent proxy, the client must be configured with the IP address and service port (often 8080 by convention) of the proxy server.
A proxy server does not just translate IP addresses. It takes a whole HTTP request from a client, checks it, then forwards it to the destination server on the Internet. When the reply comes back, it checks it and then shuttles it back to the LAN computer. A proxy can be used for other types of traffic too (email, for instance).
A proxy can perform a security function by acting as a content filter to block access to sites deemed inappropriate. It can also apply rules to access requests, such as restricting overall time limits or imposing time-of-day restrictions. As well as managing and filtering outgoing access requests, a proxy can be configured to cache content to improve performance and reduce bandwidth consumption. |
|
|
Term
Unified Threat Management (UTM) |
|
Definition
A unified threat management (UTM) appliance is one that enforces a variety of security policies and controls, combining the work of multiple security functions. A UTM centralizes the threat management service, providing simpler configuration and reporting compared to isolated applications spread across several servers or devices. |
|
|
Term
|
Definition
A load balancer can be deployed to distribute client requests across server nodes in a farm or pool. You can use a load balancer in any situation where you have multiple servers providing the same function. Examples include web servers, email servers, web conferencing servers, and streaming media servers. The load balancer is placed in front of the server network and distributes requests from the client network or Internet to the application servers. The service address is advertised to clients as a virtual server. This is used to provision high-availability services that can scale from light to heavy loads. |
|
|
Term
|
Definition
A legacy system is one that is no longer directly supported by its vendor. This might be because the vendor has gone out of business or formally deprecated use of the product. A product that is no longer supported is referred to as end of life (EOL). |
|
|
Term
|
Definition
An embedded system is an electronic device that is designed to perform a specific, dedicated function. |
|
|
Term
industrial control system (ICS) |
|
Definition
provides mechanisms for workflow and process automation. An ICS controls machinery used in critical infrastructure, such as power suppliers, water suppliers, health services, telecommunications, and national security services. |
|
|
Term
supervisory control and data acquisition (SCADA) |
|
Definition
A supervisory control and data acquisition (SCADA) system takes the place of a control server in large-scale, multiple-site ICSs. SCADAs typically run as software on ordinary computers, gathering data from and managing plant devices and equipment with embedded PLCs, referred to as "field devices." These embedded systems typically use WAN communications, such as cellular or satellite, to link the SCADA server to field devices. |
|
|
Term
|
Definition
The term Internet of Things (IoT) is used to describe the global network of wearable technology, home appliances, home control systems, vehicles, and other items that have been equipped with sensors, software, and network connectivity. |
|
|
Term
|
Definition
Intermittent connectivity might manifest as port flapping , which means that the NIC or switch interface transitions continually between up and down states. This is often caused by bad cabling or external interference or a faulty NIC at the host end. You can use the switch configuration interface to report how long a port remains in the up state. |
|
|
Term
|
Definition
Latency is the time it takes for a signal to reach the recipient, measured in milliseconds (ms). Latency increases with distance and can be made worse by processing delays at intermediate systems, such as routers. VoIP can support a maximum one-way latency of about 150 ms. Round trip time (RTT) or two-way latency is the time taken for a host to receive a response to a probe. |
|
|
Term
|
Definition
Jitter is the amount of variation in delay over time and is measured by sampling the elapsed time between packets arriving. VoIP can use buffering to tolerate jitter of up to around 30 ms without severe impact on call quality. Jitter is typically caused by network congestion affecting packet processing on routers and switches. |
|
|
Term
Platform as a service (PaaS) |
|
Definition
(PaaS) would deploy servers and storage network infrastructure (as per IaaS) but also provide a multi-tier web application/database platform on top. MICROSOFT AZURE, AWS ELASTIC BEANSTALK. CONSUMER IS RESPONSIBLE FOR: APPLICATIONS & DATA |
|
|
Term
Software as a service (SaaS) |
|
Definition
provisions software licenses for a given number of seats so that a business would access software hosted on a supplier's servers on a pay-as-you-go arrangement.
CSP maintains responsibility for all aspects of the cloud solution stack. GOOGLE APPS, DROPBOX, SALESFORCE. |
|
|
Term
Infrastructure as a service (IaaS) |
|
Definition
is a means of provisioning IT resources, such as servers, load balancers, and storage area network (SAN) components, quickly. CONSUMER IS RESPONSIBLE FOR:APPS, DATA, OS, Middleware, RUNTIME. RACKSPACE & DIGITALOCEAN. |
|
|
Term
desktop as a service (DaaS) |
|
Definition
Provisioning virtual desktop infrastructure (VDI) as a cloud service is known as desktop as a service (DaaS) . |
|
|
Term
|
Definition
STRIPING Minimum of 2 disks. No fault tolerance or redundancy. If one disk fails, data is unrecoverable from the remaining data on the surviving disk. |
|
|
Term
|
Definition
A minimum of 2 disks that work together as exact copies. RAID 1 provides fault tolerance & redundancy. No increases in read/write capabilities. |
|
|
Term
|
Definition
Provides redundancy, fault tolerance, & speed with striping of data across disk, in addition to parity bit. The parity bit allows the reconstruction of data in the event of a total loss of a disk. RAID 5 minimum req. is 3 disks but can be configured with more. |
|
|
Term
|
Definition
Combines both striping & mirroring. Min. required 4 disks. The first pair are mirrors of each other and second pair are mirror copies of each other. The two pairs are striped together. RAID 1+0 provides redundancy & fault tolerance. |
|
|
Term
CDP - Cloud Deployment Models PRIVATE |
|
Definition
Operated solely for a single organization. |
|
|
Term
CDP - Cloud Deployment Models COMMUNITY |
|
Definition
Shared by several entities with a common purpose. |
|
|
Term
CDP - Cloud Deployment Models PUBLIC |
|
Definition
Available for the general populace and owned by a single organization. |
|
|
Term
CDP - Cloud Deployment Models HYBRID |
|
Definition
Any combination of two or more private, community, or public clouds. |
|
|
Term
|
Definition
Use lasers to draw an image on an electrically charged photosensitive drum. That drum rotates at the same rate as the paper moving through. The toner that adheres to the drum is transferred onto the paper as it moves through the device. If errors occur in the image such as ghost images, they are likely due to a photosensitive drum fault. |
|
|
Term
|
Definition
uses an extruder to draw a filament through to a nozzle. At the nozzle, the filmaent is melted and layered onto the object. This allows the 3-D printer to create 3-D objects out of the filament is melted and layered onto the object. |
|
|
Term
|
Definition
Known as "Dot Matrix Printer" has elements that make contact with an ink-bearing ribbon against the printing stock which leaves marks. In a dot matrix impact printer, print wires strike the ribbon. |
|
|
Term
|
Definition
Use a heated element to create images on the printing stock. Thermal printers can use pins, ribbons with ink, or dye to create the image via the heated element as the printing stock moves through the devices. Thermal print devices require heat-sensitive paper that reacts to heat by changing color as the heating element moves over it, creating images. |
|
|
Term
|
Definition
Comes with 2 IDSs (Ink Delivery Systems) piezoelectric and thermal. In machines with piezoelectric elements, an induced voltage causes the element to change shape, which creates a pumping action to push ink through the nozzle and pull ink from the resevoir. With thermal heads, the nozzle is heated, creating a bubble that sends ink through the nozzle and pulls ink from the reservoir when it bursts. |
|
|
Term
|
Definition
Normal POST- system is OK. Most modern PCs are configured to boot silently, however. |
|
|
Term
|
Definition
POST error- error code shown on screen. |
|
|
Term
|
Definition
Power supply, motherboard problem, or faulty onboard speaker. |
|
|
Term
|
Definition
Problem with system memory modules or memory controller. |
|
|
Term
|
Definition
Power supply fault or motherboard problem. |
|
|
Term
|
Definition
|
|
Term
1 long, 2 or 3 short beeps |
|
Definition
|
|
Term
|
Definition
Keyboard issue (check that a key is not depressed). |
|
|
Term
|
Definition
GREEN/WHITE GREEN ORANGE WHITE BLUE BLUE WHITE ORANGE BROWN WHITE BROWN |
|
|
Term
|
Definition
ORANGE/W[image]HITE ORANGE GREEN WHITE BLUE BLUE/WHITE GREEN BROWN/WHITE BROWN |
|
|
Term
|
Definition
A configuration parameter that identifies the router IP location on the local network that a host can use to communicate with other networks. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Is the basic strength of the radio, measured in (dBm). |
|
|
Term
|
Definition
is the amount that a signal is boosted by directionality—focusing the signal in a single direction rather than spreading it over a wide area. Gain is measured in decibels isotropic (dBi). |
|
|
Term
Effective isotropic radiated power (EIRP) |
|
Definition
is the sum of transmit power and gain, expressed in (dBm). |
|
|
Term
|
Definition
Most cabled local area networks (LANs) are based on the 802.3 Ethernet standards maintained by the Institute of Electrical and Electronics Engineers (IEEE). |
|
|
Term
|
Definition
is a UEFI feature designed to prevent a computer from being hijacked by malware. Under secure boot, the computer firmware is configured with cryptographic keys that can identify trusted code. The system firmware checks the operating system boot loader using the stored keys to ensure that it has been digitally signed by the OS vendor. This prevents a boot loader that has been modified by malware or an OS installed without authorization from being used. |
|
|
Term
Mobile device management (MDM) |
|
Definition
sets device policies for authentication, feature use (camera and microphone), and connectivity. MDM can also allow device resets and remote wipes. |
|
|
Term
Mobile application management (MAM) |
|
Definition
sets policies for apps that can process corporate data and prevents data transfer to personal apps. This type of solution configures an enterprise-managed container or workspace. |
|
|
Term
|
Definition
means that the service experiences very little downtime. |
|
|
Term
|
Definition
means that the costs involved in supplying the service to more users are linear. Scalability can be achieved by adding nodes (horizontal/scaling out) or by adding resources to each node (vertical/scaling up). |
|
|
Term
|
Definition
refers to the system's ability to handle changes to demand in real time. |
|
|
Term
Domain-Based Message Authentication, Reporting, and Conformance (DMARC) |
|
Definition
) framework ensures that SPF and DKIM are being utilized effectively. A DMARC policy is published as a DNS TXT record. DMARC can use SPF or DKIM or both. DMARC specifies a more robust policy mechanism for senders to specify how DMARC authentication failures should be treated (flag, quarantine, or reject), plus mechanisms for recipients to report DMARC authentication failures to the sender. |
|
|
Term
DomainKeys Identified Mail (DKIM) |
|
Definition
uses cryptography to validate the source server for a given email message. This can replace or supplement SPF. To configure DKIM, the organization uploads a public encryption key as a TXT record in the DNS server. Organizations receiving messages can use this key to verify that a message derives from an authentic server. |
|
|
Term
Sender Policy Framework (SPF) |
|
Definition
uses a TXT resource record published via DNS by an organization hosting email service. The SPF record—there must be only one per domain—identifies the hosts authorized to send email from that domain. An SPF can also indicate what to do with mail from servers not on the list, such as rejecting them (-all), flagging them (~all), or accepting them (+all). |
|
|
Term
Laser printer maintenance |
|
Definition
includes replacing and properly disposing of a toner print cartridge |
|
|
Term
USB 3.2 Gen 1 SuperSpeed USB |
|
Definition
Speed Connectors 5 Gbps USB-A, USB-C, USB Micro |
|
|
Term
USB 3.2 Gen 2x1 SuperSpeed USB |
|
Definition
Speed Connectors 10 Gbps USB-A, USB-C, USB Micro |
|
|
Term
USB 3.2 Gen 2x2 SuperSpeed USB |
|
Definition
Speed Connectors 20 Gbps USB-C |
|
|
Term
Laser Printer Print Defects Faded or faint prints |
|
Definition
If a simple cause such as the user choosing an option for low density (draft output) can be discounted, this is most likely to indicate that the toner cartridge needs replacing. |
|
|
Term
Enterprise mobility management (EMM) |
|
Definition
is a class of management software designed to apply security policies to the use of mobile devices and apps in the enterprise |
|
|
Term
POWER OVER ETHERNET(POE) 802.3af |
|
Definition
13 W. Power 48V maximum 100m (328 feet) |
|
|
Term
POWER OVER ETHERNET(POE) 802.3at |
|
Definition
25 W maximum current of 600 mA |
|
|
Term
POWER OVER ETHERNET(POE) 802.3bt |
|
Definition
(PoE++ or 4PPoE) supplies up to about 51 W (Type 3) or 73 W (Type 4) usable power. |
|
|
Term
|
Definition
a long wavelength (1,310 or 1,550 nm) Small core, long distances, long wavelength 10 Gbps or better |
|
|
Term
|
Definition
larger core shorter wavelength shorter distances (850 nm or 1,300 nm) less expensive to deploy than SMF |
|
|
Term
|
Definition
The PSU's output capability is measured as its wattage rating. |
|
|
Term
|
Definition
A proxy can perform a security function by acting as a content filter to block access to sites deemed inappropriate. A non-transparent proxy requires client configuration for the proxy server. |
|
|
Term
Low Earth Orbital Satellite Internet Access |
|
Definition
uses an array of satellites positioned in low Earth orbit (LEO). bandwidth (around 70–100 Mbps) The customer's premises antenna must be provisioned with a motor so that it can periodically realign with the array. The dish construction uses a technology called "phased array" to connect to different satellites as they pass overhead and minimize the amount of mechanical realignment required. |
|
|
Term
|
Definition
dispenses with the idea of a hypervisor and instead enforces resource separation at the OS level. The OS defines isolated containers for each user instance to run in. Each container is allocated CPU and memory resources, but the processes all run through the native OS kernel. |
|
|
Term
Laser Printer Print Defects (Pages that smudge easily) |
|
Definition
Output that smudges easily indicates that the fuser needs replacing. |
|
|
Term
|
Definition
crystals twist or untwist in response to the voltage level. This is the earliest type of TFT technology and might still be found in budget displays. This type of display supports faster response times than other TFT technologies. Fast response time helps to reduce ghosting and motion trail artifacts when the input source uses a high frame rate. |
|
|
Term
|
Definition
uses crystals that rotate rather than twist. The main benefit is to deliver better color reproduction at a wider range of viewing angles. Most IPS panels support 178/178 degree horizontal and vertical viewing angles. The main drawback of early and cheaper IPS screens is slightly worse response times. A high-quality IPS display will usually be the best TFT option for both gaming and graphics/design work, however, as it will be capable of similar response times to TN while retaining better color reproduction and viewing angles. |
|
|
Term
|
Definition
each pixel is generated by a separate LED.The panel does not require a separate backlightThis allows much better contrast ratios and allows the display to be thinner, lighter, and consume less power. Also, OLEDs can be made from plastic with no requirement for a layer of glass. This means that the display can be curved to different shapes.
OLED has two main drawbacks. One is that the maximum brightness may be lower than with LCDs, making the display less clear when used in bright sunlight. An OLED display is also more susceptible to burn-in. |
|
|
Term
How many binary digits in a MAC adress? |
|
Definition
|
|
Term
|
Definition
Ports 137-139 (UDP/TCP) are used for NETBIOS over TCP/IP communications. NETBIOS is used on a modern network to support networking features for legacy versions of Windows. |
|
|
Term
9 pin header on motherboard |
|
Definition
|
|
Term
Chip Level Multiprocessing (CMP). |
|
Definition
A dual-core CPU is essentially two processors combined in the same package. This means that there are two execution units and sets of registers. Each core will also have its own cache plus access to a shared cache. This is referred to as chip level multiprocessing (CMP). |
|
|
Term
The speckling of toner on output |
|
Definition
likely caused by loose toner that may be getting onto the paper. Cleaning the inside of the printer using an approved toner vacuum is helpful. |
|
|
Term
Network Access Server (NAS) Network Access Point (NAP) |
|
Definition
A network access server (NAS) or network access point (NAP) is an access appliance, such as a switch, access point, a firewall, or a VPN gateway. It is the device that a system makes a connection to in order to access a network. |
|
|
Term
What issue does the help desk technician suspect is causing a problem of a mouse cursor moving on its own? |
|
Definition
On a laptop, if touchpad sensitivity is too high, typing can cause vibrations that move the cursor. Examples include the pointer drifting across the screen without any input or a "ghost cursor" jumping about when typing. Install up-to-date drivers and configure input options to suit the user. Many laptops now come with a Fn key to disable the touchpad. |
|
|
Term
Client-Side Virtualization |
|
Definition
Virtualization that refers to any solution designed to run on ordinary desktops or workstations. |
|
|
Term
|
Definition
Malware that is rapidly moving from one virtual machine to another in a live environment. |
|
|
Term
|
Definition
Most systems are now based on the ATX12V version 2 specification. This defines a 24-pin (2x12) P1 form factor to replace the 20-pin one. Some PSUs have a 20+4-pin P1 adapter cable for compatibility with older motherboards with a 20-pin port. |
|
|
Term
|
Definition
The optical network terminal (ONT) installed at the customer's premises converts the optical signal to an electrical one. The ONT is connected to the customer's router using an RJ45 copper wire patch cord.
[image]
|
|
|
Term
Standard size for a laptop magnetic HDD |
|
Definition
A 2.5-inch drive is the standard size for a laptop magnetic HDD. |
|
|
Term
Universal Asynchronous Receiver Transmitter (UART) |
|
Definition
A Bluetooth wireless radio creates a short-range personal area network (PAN) to share data with a PC, connect to a printer, and even connect to automobiles. A Bluetooth connection does use a UART.
A universal serial bus (USB) connection allows systems to easily use peripherals and more. A USB connection does use a UART. |
|
|
Term
|
Definition
A secured print job is held on the print device until the user authenticates directly with the print device. A PIN entry requires the user to input the correct password via the device control panel.
Secured print mitigates the risk of confidential information being intercepted from the output tray. Badging means the print device is fitted with a smart card reader that enables print output to be retrieved.
|
|
|
Term
|
Definition
In flex mode, memory that is of equal value within each channel can work as dual-channel while the remainder of the memory will work in single-channel mode.
|
|
|
Term
|
Definition
In a modern system, single-channel memory means that there is one 64-bit data bus between the central processing unit (CPU), memory controller, and RAM devices.
|
|
|
Term
Mail Exchange (MX) record |
|
Definition
A Mail Exchange (MX) record is used to identify an email server for the domain so that other servers can send messages to it. In a typical network, multiple servers are installed to provide redundancy, and each one will be represented by an MX record. |
|
|
Term
|
Definition
Adjust brightness/contrast |
|
|
Term
Color glitches. (Purple or green horizontal lines). |
|
Definition
Check or replace cabling. |
|
|
Term
|
Definition
Reactivate the pixels by gently touching them or using special software (most likely you need to replace the display) |
|
|
Term
Image burn-in creating ghosted elements |
|
Definition
May need to replace display To avoid: Use automatic screensavers or turn off display. Mostly only an issue for older CRT or plasma displays |
|
|
Term
Artwork color output is different from than display's |
|
Definition
Calibrate color to output device |
|
|
Term
|
Definition
Verify source in OSD (On-Screen Display) menu |
|
|
Term
|
Definition
VMWare workstation is a type 2 hypervisor that would easily install in the Windows 10 OS. - possible to test software in a sandboxed environment |
|
|
Term
|
Definition
type 2 hypervisor, however, it is software that is installed on a Mac computer to allow the virtualization of a guest operating system such as Windows 10. |
|
|
Term
|
Definition
type 1 hypervisor that is designed for bare-metal install in a server environment. |
|
|
Term
|
Definition
type 1 hypervisor. Hyper-V is available in the Windows 10 operating system. |
|
|
Term
|
Definition
A supplicant device is a device requesting access to a network. This includes a user's PC or laptop, or even a smart device. |
|
|
Term
|
Definition
An authentication, authorization, and accounting (AAA) server is an authentication server that is located in the internal network. A supplicant device authenticates against an AAA server.
|
|
|
Term
Remote Authentication Dial-In User Service (RADIUS). |
|
Definition
An authentication, authorization, and accounting (AAA) server is often implemented using a protocol called Remote Authentication Dial-In User Service (RADIUS).
|
|
|
Term
Server-side virtualization |
|
Definition
Server-side virtualization is the process of deploying a server as a virtual machine. The server virtual machine (VM) can then be accessed from multiple clients for a given purpose.
|
|
|
Term
Application virtualization |
|
Definition
In application virtualization, the client computer will either stream an application from the server for local processing or access an application hosted on a server.
|
|
|
Term
|
Definition
Container virtualization requires resource separation at the OS level.
|
|
|
Term
optical line terminal (OLT) |
|
Definition
An optical line terminal (OLT) is located in a street cabinet. From the OLT, splitters direct each subscriber’s traffic over a short length of fiber to an optical network terminal (ONT) installed at the customer’s premises.
|
|
|
Term
|
Definition
A connection to an internet service provider's (ISP’s) network uses its nearest point of presence (PoP), such as a local telephone exchange.
|
|
|
Term
passive optical network
PON |
|
Definition
A full fiber connection to a customer’s building is implemented as a passive optical network (PON). In a PON, a single fiber cable is run from the point of presence to a street cabinet.
|
|
|
Term
|
Definition
is a technology that is capable of connecting a digital source to an analog display or an analog source to a digital display. A VGA to DVI-I cable will connect your digital computer to an analog monitor. |
|
|
Term
|
Definition
DVI-D is available in both single link and dual link. A DVI-D cable is intended to be used between two digital devices. DVI-D supports only digital. |
|
|
Term
|
Definition
DVI-A supports only analog output . DVI-A is a technology that carries an analog signal to an analog device. This cable along with an adapter for a VGA connector is required. |
|
|
Term
|
Definition
QoS means that switches, access points, and routers are all configured to identify VoIP data and prioritize it over bursty data. configuring quality of service (QoS) on the router to prioritize the port used by VoIP over any other type of protocol. |
|
|
Term
|
Definition
A bare metal virtual platform means that a type 1 hypervisor is installed directly onto the computer and manages access to the host hardware without going through a host OS.
In a guest OS (or host-based) system, a hypervisor is installed within the operating system of the physical host machine.
|
|
|
Term
First step to resolve a wired "no connectivity" issue |
|
Definition
When troubleshooting connectivity on a wired network, the first thing the technician should check is the Ethernet cable. Ensure that the RJ45 connectors are solidly connected to the cable, there are no obvious wear bends or breaks, and that it is properly connected to the device and the wall jack. |
|
|
Term
What type of connector was initailly used by ATX motherboards to provide power to the entire system including the motherboard, CPU, memory and expansion slots? |
|
Definition
|
|
Term
How can you address print-quality issues caused by printer dirt and clogs? |
|
Definition
Purchase a cleaning or maintenance kit if self-cleaning routines don't suffice. |
|
|
Term
Purpose of the inverter in LCD displays that use fluorescent backlights? |
|
Definition
It supplies power to the backlight. If the inverter fails, the LCD display becomes dim. |
|
|
Term
|
Definition
DNS servers are responsible for translating human-readable domain names (FQDNs) into IP addresses. DNS is used to resolve FQDNs. |
|
|
Term
Which layer of the OSI model deals with signals and is responsible for transmitting raw data bits? |
|
Definition
Physical Layer
*The physical layer of the OSI model is responsible for transmitting raw data bits over the physical medium, such as cables or wireless signals. It deals with the actual electrical, optical, or wireless signals that represent the binary data.* |
|
|
Term
ITX (Information Technology eXtended)
|
|
Definition
ITX motherboard family consists of smaller boards that fit in standard or miniature cases and use less power than their larger counterparts. |
|
|
Term
|
Definition
To transfer heat effectively between the processor and heat sink.
*Thermal paste is used to improve the thermal conductivity between the processor and the heat sink. It fills in the microscopic gaps and imperfections on the surfaces, allowing for better heat transfer. This ensures that heat generated by the processor is efficiently dissipated through the heat sink and then carried away by the attached fan. |
|
|
Term
Components of Inkjet Printers |
|
Definition
Rollers Carriage Belt Duplexing Assembly Printhead Ink Cartridge
LASER PRINTERS USES TONER CARTRIDGES |
|
|
Term
Which of the following is given to a DHCP client from a DHCP servers scope ? |
|
Definition
DEFAULT GATEWAY IP ADRESS DNS SERVER IP ADRESS IP ADRESS |
|
|
Term
How many wires does an RJ45 connector have? |
|
Definition
RJ45 connectors have a total of 8 wires, which are used for transmitting and receiving data signals. They are not used fr transmitting audio or video signals. |
|
|
Term
|
Definition
Reversible, Support High speed data transfer, Compatible with USB 2.0 devices, |
|
|
Term
|
Definition
DNS "AAAA Record" (a.k.a. Quad-A-Record) is a type of DNS record that is used to map a domain name to an IPv6 address. "AAAA Records" are used to associate domain names with IPv6 addresses, in the same way that "A-Records" are used to associate domain names w/ IPv4 addresses. |
|
|
Term
Separation Pads ( Laser Printer)
|
|
Definition
Separation pads are responsible for separating multiple sheets of paper during the feed process in a laser printer. They are located before the pickup rollers and have a rubber or silicon surface that will grip the top sheet of paper and release the bottom sheet allowing to be fed into the printer one at a time. |
|
|
Term
Difference between IPv4 & IPv6 addressing |
|
Definition
- IPv6 addresses are longer than IPv4 addresses.
- IPv4 addresses are 32-bit addresses that are written as four decimal numbers separated by periods, while IPv6 addresses are 128-bit addresses that are written as eight groups of four hexadecimal digits separated by colons.
|
|
|
Term
What component of a laser printer is responsible for transferring the toner particles from the imaging drum to the paper ? |
|
Definition
TRANSFER ROLLER
The transfer roller is responsible for transferring the toner particles from the imaging drum to the paper in a laser printer. It is located near the imaging drum and is in contact with it. The transfer roller is charged with a high voltage, which attracts the toner particles from the drum and transfers them to the paper. |
|
|
Term
Place the correct File System against the OS -MacOS -Windows -Linux |
|
Definition
|
|
Term
|
Definition
If you are able to pin a website by its IP address but not by its name suggests that the DNS resolution is not working properly. Therefore the command ipconfig /flushdns will flush the DNS resolver cache, which may contain outdated or incorrect information. By flushing the cache, the system will have to retrieve the latest DNS information from the DNS server. |
|
|
Term
|
Definition
A toner probe also known as a tone generator and probe is a network tool used to trace network cables and identify the correct port on a patch panel. The tool generates a tone that can be detected by a receiver probe, allowing you to locate the correct port on the patch panel. |
|
|
Term
What memory type is primarily used in laptops? |
|
Definition
SODIMM (Small Outline Dual In-line Memory Module). SODIMM is a smaller form factor of the DIMM used in desktop computers. SODIMMs are available in DDR, DDR2, DDR3, DDR4 DDR5 |
|
|
Term
|
Definition
CAT 5 - 100 Mbps CAT 5e - 1 Gbps CAT 6 - 10 Gbps CAT 6e - 100 Gbps |
|
|
Term
|
Definition
OS saves the contents of RAM to the HDD and then shuts PC down. When PC is turned back on, it reads the saved information from the HDD and restores the system to its previous state, allowing the user to resume working from where they left off. |
|
|
Term
Which of the following standards support MIMO (Multiple Input Multiple Output) technology? |
|
Definition
802.11n standard is a wireless networking standard that supports MIMO technology which allows for multiple streams of data to be transmitted simultaneously. This enables faster wireless speeds and better signal strength in areas with interference. |
|
|
Term
What are the three major components of a Hard Drive Disk System? |
|
Definition
1. Hard Disk - The physical storage device that stores and retrieves digital information. 2.Drive Interface - The connection between the hard disk and the rest of the computer system. 3. Disk Controller - The component that manages the reading and writing of data to and from the hard disk.
A Host Adapter also known as a host bus adapter, is a hardware component that connects a computer system to a storage device, such as a hard disk, but it is not considered one of the three major components of a hard disk drive system. |
|
|
Term
|
Definition
Plenum Cables are specifically designed to be used in air handling spaces, such as drop ceilings, where there is a high risk of fire. The plenum-rates cables are made from flame resistant materials that are able to prevent the spread of fire and smoke. It is a code requirement to use plenum-rated cables when running cables through plenum spaces. [image] |
|
|
Term
|
Definition
A docking station provides a way for laptop users to connect their devices to the corporate LAN, while also providing security to the laptops. Docking stations allow for a variety of removable hardware to be connected, including additional monitors, external hard drives, and other peripherals. Docking stations also typically include a charging port for the laptop making it easy to keep the laptop charged while it is in use. |
|
|
Term
"No Input Signal Detected" |
|
Definition
Changing the connector / input setting on the monitor. |
|
|
Term
|
Definition
DDR - 184 pins DDR2 - 240 pins DDR3 - 240 pins DDR4 - 288 pins DDR5 - 288 pins |
|
|
Term
Near Field Communication (NFC) |
|
Definition
NFC - operates in a frequency range centered on 13.56 MHz and offers a data transmission rate up to 424 kb within approx. 10 centimeters. |
|
|
Term
|
Definition
Jumpers are small connectors on a motherboard that are used to configure the settings for certain components or features of the computer. They allow the user to change the behavior of the system by shorting tow pins together to change the voltage or signal going to a particular component. Some common uses of jumpers include setting the CPU clock speed, configuring the system for a sign or dual-channel memory. and clearing the BIOS settings. However, the use of jumpers vary among different motherboards and users should consult the motherboard manual for specific instructions. |
|
|
Term
|
Definition
A Network Tap is used to intercept signals passing over a cable and send them to a packet or protocol analyzer. |
|
|
Term
|
Definition
TCP/110 TCP/995 (SECURE)
POP3, the messages are typically deleted from the mailbox server when they are downloaded, though some clients have the option to leave messages on the server |
|
|
Term
Storage Area Network (SAN) |
|
Definition
Within an enterprise LAN or datacenter, a storage area network (SAN) provisions access to a configurable pool of storage devices that can be used by application servers. A SAN is isolated from the main network. It is only accessed by servers, not by client PCs and laptops. SAN clients are server running databases or applications.Provisioning a shared storage pool as a SAN is more flexible and reliable than using local disks on each server machine. SANs use connectivitiy technologies such as Fiber Channel and Internet SCSI (iSCSI). |
|
|
Term
|
Definition
Coax is now mostly used for CCTV installations and as patch cable for Cable Access TV (CATV) and broadband cable modems. Coax for CATV installations is typically terminated using a screw-down F-type connector. [image]a
|
|
|
Term
Purpose of a laptop's inverter |
|
Definition
1: It converts DC power into AC power 2: It supplies voltage to backlights in older types of LCD panels. |
|
|
Term
|
Definition
Allows users to overcome keyboard size restrictions on laptops. |
|
|
Term
Question
When printing to a multifunction printer, the printer staples the pages sideways. What type of error is this? |
|
Definition
Incorrect page orientation
Incorrect orientation (portrait or landscape) will cause the output media to print incorrectly. For example, a finishing tray may incorrectly staple, fold, or punch media if the user does not place the pages in the correct orientation.
|
|
|
Term
How is the basic speed of a printer measured? |
|
Definition
Pages per minute (PPM)
The basic speed of a printer is measured in pages per minute (PPM). Different printers may also have varying PPM based on what is printing.
|
|
|
Term
Inkjet printer is missing lines when printing. What is the correct maintenance step that needs to be performed in the printer? |
|
Definition
Print head cleaning
A blocked or dirty print head nozzle will show on the printed material as a missing line. This can typically be corrected by running a print head cleaning cycle.
|
|
|
Term
Inkjet printer is online but it is making a grinding noise while printing. What type of error is this? |
|
Definition
Carriage mechanism fault
A carriage mechanism holds the ink cartridges in an inkjet printer. Grinding noises during printing are a symptom of a carriage mechanism fault.
|
|
|
Term
A computer is failing POST and displaying a message "DISK BOOT FAILURE" What could be the cause of this issue? |
|
Definition
1:Incorrect Boot Order in BIOS 2:Damaged operating system 3: Corrupted system disk |
|
|
Term
How does cloud computing providers charge for the services they offer? |
|
Definition
|
|
Term
Primary benefit of using PaaS? |
|
Definition
Flexibility
PaaS provides developers with the tools and services they need to build, test, and deploy custom-built applications quickly and efficiently. PaaS allows developers to focus on the application logic and business logic, rather than the underlying infrastructure, this leads to faster time to market and ability to scale the application on-demand. PaaS also offers a range of development tolls and and services, it provides many programming languages, libraries and frameworks that can be used to build applications. |
|
|
Term
What component of a laser printer creates the printed images on the paper? |
|
Definition
The imaging drum is the component of a laser printer that creates the printed images on the paper. It is a cylindrical drum that is coated with a photoconductive material that is sensitive to light. The laser beam "draws" the image on the drum, which then attracts toner particles to create the printed image. |
|
|
Term
What happens if the inverter in a mobile devices with a display fails? |
|
Definition
The display will not turn on
If the inverter in a mobile device with a display fails, the backlight of the display will not receive the AC power it requires in order to function. This will result in the display not turning on or functioning properly. |
|
|
Term
|
Definition
In contrast to the Properties dialog box, the Preferences dialog sets the default print job options, such as the type and orientation of paper or whether to print in color or black and white. These settings can also be changed on a per-job basis by selecting the Properties button in the application's Print dialog. |
|
|
Term
|
Definition
A printer's Properties dialog allows you to manage configuration settings for the printer object and the underlying hardware, such as updating the driver, printing to a different port, sharing and permissions, setting basic device options (such as whether a duplex unit or finisher unit is installed), and configuring default paper types for different feed trays . |
|
|
Term
|
Definition
5 GHz freq. band only - Max data rate of 54 Mbps |
|
|
Term
|
Definition
-2.4 GHz - 11 Mbps - Channels overlap quite considerably
- Interference is a real possibility unless widely spaced channels are chosen : 1,6,11 - 14 channels spaced @ 5 MHz, only 11 allowed in US |
|
|
Term
|
Definition
-54 Mbps (same @ 802.11a) -2.4 GHz band (same as 802.11b & same channel layout) -Backward support w/ 802.11b clients |
|
|
Term
|
Definition
- Both 2.4 & 5 GHz - Dual Band (simultaneous 2.4 GHz & 5 GHz - "Channel Bonding" - MIMO (Multiple Input Multiple Output) Increased reliability & bandwidth -WiFi 4 - Max Speed = 600 Mbps |
|
|
Term
|
Definition
- 5 GHz only
- A single stream over an 80 MHz channel has a nominal rate of 433 Mbps
- A dual band access point can use its 2.4 GHz radio to support clients on legacy standards (802.11g/n). A tri band access point has one 2.4 GHz radio and two 5 GHz radios. . Wi-Fi 5 products partially address this problem using multiuser MIMO (MU-MIMO). In Wi-Fi 5, downlink MU-MIMO (DL MU-MIMO) allows the access point to use its multiple antennas to send data to up to four clients simultaneously
|
|
|
Term
|
Definition
80 MHz channel to 600 Mbps. -As with Wi-Fi 5, products are branded using the combined throughput of all radios. For example, AX6000 claims nominal rates of 1,148 Mbps on the 2.4 GHz radio and 4,804 Mbps over 5 GHz. - Wi-Fi 6 can support up to eight clients, giving it better performance in congested areas. Wi-Fi 6 also adds support for uplink MU-MIMO, which allows MU-MIMO-capable clients to send data to the access point simultaneously.
-Wi-Fi 6 introduces another technology to improve simultaneous connectivity called " orthogonal frequency division multiple access" (OFDMA). OFDMA can work alongside MU-MIMO to improve client density—sustaining high data rates when more stations are connected to the same access point.
|
|
|
Term
Private Address Ranges (IPv4) |
|
Definition
§ 10.0.0.0 to 10.255.255.255 (Class A private address range).
§ 172.16.0.0 to 172.31.255.255 (Class B private address range).
§ 192.168.0.0 to 192.168.255.255 (Class C private address range). |
|
|
Term
CompTIA's A+ troubleshooting model |
|
Definition
1: Identify the problem 2: Establish a theory of probably cause 3: Test a theory to determine the cause 4: Establish a plan of action to resolve the problem and implement the solution 5: Verify full-system functionality and implement preventative measures 6: Document the findings, actions and outcomes |
|
|