Professional Documents
Culture Documents
Dot Matrix
Dot matrix printers can use either a friction feed or a tractor feed
system to move paper through the printing assembly.
4.
5.
6.
Fusing: Fuser roller heats the toner and then melts it. Pressure
roller presses onto paper permanently.
Bubble jet printers print by heating the ink and squirting it through
tiny nozzles in the print head and onto the paper.
Ink jet printers feed single cut sheets of paper, from a feed tray,
by clamping them between rollers and advancing them one print
line at a time, from top to bottom, and then placing the newly
printed paper into a tray, other than the feed tray.
Laser
2.
3.
Writing: Writing is done with a laser beam striking the drum, then
forming the image.
The print head heats and passes over the film, causing the dye to
vaporize and soak into the film paper.
Solid ink printers melt ink onto the print head (which is as wide as
the paper). The head jets the melted ink onto the paper as the
Thermal
The paper must make one pass for each application of a different
colour.
Language
Description
Escape Codes
Printer Control
Language (PCL)
PostScript
Troubleshooting Printers
If the printer prints, but the printout quality is poor, check the following:
For newer laser and inkjet printers, calibrate the printer (perform a
self test). Calibration fixes blurry text or incorrect colours.
If the text appears garbled, make sure the proper printer driver is
used.
If the page only prints part way through (and the rest of the page
is blank), you might need to upgrade the memory on the printer or
check the print server settings.
Check the pickup rollers; if paper is not being fed through the
printer properly.
Scanners
Nibble
Compatibility
BYTE
EPP
ECP
Printer Languages
Description
Serial Connector
Parallel Connectors
PS/2 Connectors
PCMCIA dimensions, excluding thickness, are the same for each type
of card and each card type has a 68-pin connector.
Type 1 PC Cards generally contain computer memory, Type 2 PC
Cards are used for network adapters and Type 3 cards generally
contain disk storage.
USB
Version
Speed
1.0
1.1
2.0
Low
Full
High
RAID 3 & RAID 4: striped set (min 3 disks) w/ dedicated parity. This
mechanism provides an improved performance and fault tolerance
similar to RAID 5, but with a dedicated parity disk rather than rotated
parity stripes.
RAID 5: striped set (min 3 disks) w/ distributed parity. Distributed
parity requires all but one drive to be present to operate; drive failure
requires replacement but the array is not destroyed by a single drive
failure.
RAID 6: striped set (min 4 disks) w/ dual distributed parity. Provides
fault tolerance from two drive failures; array continues to operate with
up to two failed drives.
PC Card Types
Note: You can connect up to 127 USB devices to a single USB port.
USB Connectors
Connector
Description
A Connector
B Connector
D-shaped connector that plugs into a hub,
printer, or other peripheral device to connect
the device to the computer.
Most USB cables have an A connector on
one end (to connect to the computer or hub)
and a B connector on the other end (to
connect to the device)
Mini Connector (4 pin)
Self Powered
Devices that rely on their own power supply (in other words, you plug
them into an AC outlet) are called self-powered devices. All devices
that draw more than 500 mA of power are required to be self-powered.
Bus Powered
USB cables have wires to carry both power and data. Bus-powered
devices get their power from the USB cable. Bus-powered devices are
classified as low-powered or high-powered devices depending on the
amount of power they draw from the USB bus.
Cabling
10Base5 Thicknet
10Base2 Thinet
10BaseT Star Bus
100BaseTX Star Bus
10BaseF
100BaseF
Coax Thick
Coax Thin
Twisted Pair
Twisted Pair
Fiber Optic
Fiber Optic
Speed
Mbps
10
10
10
100
10
100
Type
Digital
Digital
Digital
Digital
Digital
Digital
Max
Length
500 M
185 M
100 M
Varies
Varies
Varies
802.11a
5.75-5.85 GHz
54 Mbps
150 ft.
NA
Standard
802.11b
2.4-2.4835 GHz
11 Mbps
300 ft.
No
802.11g
2.4-2.4835 GHz
54 Mbps
300 ft.
With 802.11b
Wireless Architecture
Ad Hoc:
Uses a physical star topology and can easily add hosts without
increasing administrative efforts (scalable)
Service Set Identification (SSID): The SSID identifies a network and
logically groups all devices onto a single network. The SSID is
commonly referred to as the network name.
Wireless Equivalent Privacy (WEP): WEP is an encryption mechanism
designed to provide wireless networks the same type of protection that
cables provide on a wired network. Only users with the correct WEP
key are allowed to authenticate.
Wi-Fi Protected Access (WPA): WPA is a security mechanism that
attempts to address the weaknesses of WEP by assigning unique keys
to each host and changing the dynamic keys periodically. WPA offers
greater protection than WEP.
Infrared (IrDA)
Is a line-of-sight medium.
601: Floppy
7xx: Math Coprocessor
9xx: Parallel Port
11xx: Serial Port
17xx: Hard Disk
HTTP: 80
POP3: 110
IMAP: 143
HTTPS: 443
Remote Desktop: 3389
Protocols
Protocol
Description
HyperText
Transfer
Protocol
(HTTP)
HyperText
Transfer
Protocol over
HTTPS is a secure form of HTTP that uses SSL as a
Secure Socket
sub layer for security.
Layer or HTTP
over SSL
(HTTPS)
HyperText
Markup
Language
(HTML)
Secure
Sockets Layer
(SSL)
Internet
Message
Access
Protocol
(IMAP)
Post Office
Protocol 3
(POP3)
Remote
Terminal
Emulation
(Telnet)
Secure Shell
(SSH)
Dynamic Host
Configuration
Protocol
(DHCP)
IPX/SPX
AppleTalk
NetBIOS
Windows
Internet Name
Service
(WINS)
1.0.0.0 to 126.255.255.255
128.0.0.0 to 191.255.255.255
255.255.0.0
192.0.0.0 to 223.255.255.255
255.255.255.0
224.0.0.0 to 239.255.255.255
Multicast
240.0.0.0 to 255.255.255.255
Reserved
Cant contact
169.254.0.1 to 169.254.255.254 DHCP server, 255.255.0.0
APIPA
127.0.0.1 is a special purpose address reserved for use on each
computer. 127.0.0.1 is conventionally a computer's loopback address.
Network software and utilities can use 127.0.0.1 to access a local
computer's TCP/IP network resources. Messages sent to loopback IP
addresses like 127.0.0.1 do not reach outside to the local area network
(LAN) but instead are automatically re-routed by the computer's own
network adapter back to the receiving end of the TCP/IP stack.
UTP Cable Types
Type
Connector Description
Phone
cable
RJ-11
Cat 3
RJ-45
Cat 5
RJ-45
Cat 5e
RJ-45
Cat 6
RJ-45
Supports
high-bandwidth,
communications.
broadband
Description
RJ-11
RJ-45
F-Type
Networking Utilities
NSLOOKUP.EXE: enables you to verify entries on a DNS server.
255.0.0.0
BNC
Has 4 connectors
Supports up to 2 pairs of wires
Uses a locking tab to keep
connector secure in outlet
Used primarily for telephone wiring
Has 8 connectors
Supports up to 4 pairs of wires
Uses a locking tab to keep
connector secure in outlet
Used for Ethernet and some token
ring connections
Twisted onto the cable
Used to create cable and satellite
TV connections
Used to hook a cable modem to a
broadband cable connection
Molded onto the cable
Used in 10Base2 Ethernet networks
AUI
process, it is necessary to
polish the exposed fiber
tip
Uses
Resistance
Rating
RG-58
50 ohms
LC Connector
RG-59
75 ohms
RG-6
Satellite TV
75 ohms
RG-8
50 ohms
The cladding maintains the signal in the center of the core as the
cable bends.
MT-RJ Connector
Multi-mode and single mode fiber cables are distinct from each other
and not interchangeable. The table below describes multi-mode and
single mode fiber cables.
Type
Multimode
Description
Single
Mode
Method
Description
PSTN (Public
Switched
Telephone
Network)
DSL (Digital
Subscriber
Line)
ISDN
(Integrated
Services
Digital
Network)
Description
ST Connector
SC Connector
Internet Connectivity
Supports
most
upper-level
protocols
(communication protocols allow all media types to
transmit over the same line at high speeds).
Levels of service include:
BRI (Basic Rate Interface):
o
2 64-Kbps bearer (B) channels can transfer
data up to 128 Kbps (data compression
increases the data transfer rate). Only one B
channel is used during phone use reducing
maximum speed to 64 Kbps.
o
1 16-Kbps delta (D) channel for connection
control.
o
Often called 2B + 1D.
o
Suitable for periodic bursts of data.
PRI (Primary Rate Interface):
Cable
Satellite
Wireless
Availability is increasing
Cellular WAN
Voice-OverInternet
Protocol
(VoIP)
Firewalls
A firewall is a network device installed on the border of secured
networks that acts as a barrier between your computer or private
network and another network such as the Internet. The firewall
examines incoming traffic and allows only the traffic that meets
predetermined criteria.
Network Firewall: A network firewall monitors and filters the activity of
all computers hooked up to a network.
Application Layer 7:
Responsible for providing network serviceslike file services, print
services, and messaging services (not applications like word
processing or spreadsheets, as the layer's name might lead you to
believe).
Network Component:
Gateway
Presentation Layer 6:
Responsible for the presentation of data (for example, the translation
of character setse.g., ASCII to EBCDIC).
Network Component:
Gateway, Redirector
Session Layer 5:
Responsible for establishing and maintaining a communications
session. IP and IPX operate at this layer.
Network Component:
Gateway
Transport Layer 4:
Responsible for providing reliable end-to-end communications.
Includes most of the error control and flow control. TCP and SPX
operate at this layer.
Network Component:
Gateway, Brouter
Network Layer 3:
Responsible for translating logical network addressing and their names
to their physical address. Some error control and flow control is
performed at this level. DNS, FTP, SNMP, SMTP and Telnet operate
at this layer.
Network Component:
Gateway, Advanced Cable Tester, Brouter, Router
Data Link Layer, Layer 2:
This layer really has two separate layers; Logical Link Control & Media
Access Control. Responsible for the logical topology and logical
(MAC) addressing. Individual network card addresses also function at
this level.
Network Component:
Bridge, Switch, ISDN Router, Intelligent Hub, NIC
Physical Layer 1:
Responsible for placing the network data on the wire, by changing
binary data into electrical pulses on the physical medium. The physical
topology is defined at this level.
Network Component:
Hubs (Passive, Active), Transceivers, Amplifiers
Network Components
Repeaters: allow a cabling system to extend beyond its maximum
allowed length by amplifying the network voltages so they travel
farther. Repeaters are nothing more than amplifiers and, as such, are
very inexpensive.
Hubs: are devices used to link several computers together. There are
two types of hubs: active and passive. Passive hubs connect all ports
together electrically and are usually not powered. Active hubs use
electronics to amplify and clean up the signal before it is broadcast to
the other ports. In the category of active hubs, there is also a class
called intelligent hubs, which are hubs that can be remotely managed
on the network.
xcopy
edit
ipconfig
convert C: /fs:ntfs
cd
Memory Types
72-pin SIMM
dir
md
mkdir
rd
copy
240-pin DDR-2
Shadow Mask: consists of a metal screen full of holes that are aligned
with each dot. The screen shields the electron beam from illuminating
between dots and leaves an outline around each pixel.
Aperture Grill: consists of a screen of ultra thin vertical and horizontal
wires. This configuration allows more electrons through resulting in a
richer colour display. On an aperture grill monitor you might be able to
see two horizontal lines running across the display. These lines are the
wires that are used to dynamically change the grill opening.
144-pin SODIMM
200-pin SODIMM
Note: CRT monitors have a 4:3 aspect ratio which matches the display
ration of a television set.
Description
ROM (Read-only
Memory)
PROM
(Programmable
Read-only Memory)
EPROM (Erasable
Programmable Read-
only Memory)
EEPROM (Electrically
Erasable
Programmable Readonly Memory; also
known as Flash
Memory)
Dynamic RAM
(DRAM)
Are more expensive but have a higher image quality (this applies
to flat-panel and laptop displays).
Have two groups of transistors; a row across the top with one
transistor for each column and a row down the left side with one
transistor for each row.
Send power down the vertical and horizontal transistors, and the
interconnecting wire to a converging point, darkening the pixel at
that particular location
Female port
DMS-59
Video Connectors
Interface
Female port
Description
D-sub
Cable
Composite video
Female port
Cable
DVI-D
Female port
DVI-I
Is typically included on
slimline video cards that
can have only a single
port.
Sends out two separate
DVI-I signals through the
single connector.
Cable
DVI-A
Female port
A composite video
connection on a video
card provides analog,
video-only TV output.
Composite video
connectors are RCA
connectors (typically
yellow). Composite
signals combine three
qualities of video into a
single signal:
The Y channel is for
brightness or luminance
U and V channels
provide colour
information
S-video
Cable
Female port
HDTV (Component)
Female port
HDMI
S-video (separate-video,
Y/C, or S-VHS)
connections are present
on many video cards and
supply analog, video-only
TV output. The s-video
connector is a 4-pin minidin connector that has
two separate channels,
one for Y (luminance)
and one for UV (colour).
S-video can easily be
converted to composite
video by combining the Y
and UV channels into a
single signal.
An HDTV connector
supplies analog, videoonly TV output in three
separate channels: R
(red), G (green), and B
(blue). The HDTV
connector uses a 7-pin
mini-din cable. Video
cards with HDTV output
typically include a
conversion cable that
converts the 7-pin
connector into three RCA
cables for connecting to
an HDTV device.
High-Definition
Multimedia Interface
(HDMI) is a digital video
and audio connector
Cable connector
Cable TV (BNC)
Cable
Missing colours
Female port
Video Troubleshooting
Problem
Description
Colours not
correct
Colours are not
smooth
Blurry images,
strange colour
tints
The resolution
Video files or
DVD video does
not play, audio
plays but no
video
Note: If you change video settings in operating system and then the
monitor is unreadable or blank, reboot into Safe Mode, adjust the video
settings, and reboot.
Sound Card Connections
Port
Description
TRS
Cable
TRS ports on
the sound
card accept
1/4" plugs for
analog audio
input and
output.
Female ports
Toslink
Cable
Female port
A Toslink
connector is
used with
digital optical
input or output
for S/PDIF
audio.
RCA
Cable
An RCA
connector on
a sound card
is usually
used for
coaxial digital
input or output
for S/PDIF
audio.
Cache Memory: After reading a sector of data from the hard disk, the
likelihood is high that the hard drive will also need to read the next
sector. For this reason, some hard disk drives read ahead to other
sectors and store the data in a disk cache. When the next sector is
ready to be processed, the hard drive can take it from the cache rather
than reading the data from the hard disk.
A DB-15
connector on
a sound card
is used to
connect to
MIDI devices
or game
joysticks.
File Systems
The data transfer rate at the inner zone ranges from 44.2 MB/s to 74.5
MB/s, while the transfer rate at the outer zone ranges from 74.0 MB/s
to 111.4 MB/s. A HDD's random access time ranges from 5 ms to 15
ms.
Female port
DB-15
Cable
Partition size
File name length
File size
Cable
Female port
Hard Drives
NTFS
256 terabytes
8.3
(8 characters)
Unicode
(255
characters,
anything but /)
4 gigabytes
16 terabytes
65,517
268,435,437
4,294,967,295
Volume size
2 or 4
gigabytes
2 terabytes
256 terabytes
Windows 95a
Windows
95b/98/ME
Windows NT 4.0
Windows
2000/XP/2003
Female port
Some sound
cards include
one or more
Firewire ports.
These ports
function as
normal
Firewire ports
for connecting
a variety of
devices.
FAT32
2 terabytes
2 gigabytes
Amount of files
Firewire
FAT16
2 gigabytes
X
X
X
File
Function
Seek Time: time taken for a read-write head to reach a particular item
of data on a disk track.
Master Boot
Code
Volume Boot
Code
NTLDR
1.
2.
3.
4.
BOOT.INI
Registry
In
Windows
XP,
it
is
saved
in
WINDOWS\SYSTEM32\CONFIG
Services
7.
Partitions
Partition: A partition is a logical division of a storage device associated
with a hard disk drive. Multiple partitions can be assigned to a single
device in which case a drive letter is assigned to represent each
partition. Multiple letters do not always mean that there are multiple
devices, just multiple partitions. Some reasons why you may consider
partitioning your hard drive are:
Can be formatted.
A basic disk has a limit of four partitions, only one of which can be
an extended partition.
Male
Female
Permission
Allowed Actions
Read
Write
List Folder
Contents
Read &
Execute
Modify
Power Supplies
Power supplies provide +/- 5 volts and +/- 12 volts (DC power). ATX
power supplies also provide + 3.3 volts.
Full Control
Connector
Male
Female
Description
AT
ATX
Description
IDC
Male
DB
Male
Female
Centronics
Male
AMD Athlon 64 X2
Ground both yourself and the computer to the same ground. This
provides a single path for the flow of electrical potential.
Spyware: monitors the actions you take on your machine and sends
the information back to its originating source.
ESD
Electrostatic Discharge (ESD): Static electricity is the accumulation of
an electric charge (produced by friction) on a non-grounded object.
The static charge on the surface of a non-grounded object can jump
when it contacts the surface of any grounded object.
Adware: monitors the actions of the user that would denote their
personal preferences, then sends pop-ups and ads to the user that
match their tastes.
Is usually passive.
Asking for someone to hold open a door rather than using a key
for entrance.
Audit Policy
User Rights
Assignment
Security
Options
Description
Piggybacking
Masquerading
Eavesdropping
Phishing
Authentication
Threat
Description
Sniffing
Password
cracking
Lurking
Security Settings
Setting
Group
Description
Password
Policy
Account
Lockout
Policy
Smart cards are cards that contain a memory chip with encrypted
authentication information that allows a user access to facilities in
the office. Smart cards can:
o
Require contact such as swiping or they can be contactless.
Fire Extinguishers
Class A extinguishers are for ordinary combustible materials such as
paper, wood, cardboard, and most plastics. The numerical rating on
these types of extinguishers indicates the amount of water it holds and
the amount of fire it can extinguish.
Class B fires involve flammable or combustible liquids such as
gasoline, kerosene, grease and oil. The numerical rating for class B
extinguishers indicates the approximate number of square feet of fire it
can extinguish.
Class C fires involve electrical equipment, such as appliances, wiring,
circuit breakers and outlets. Class C extinguishers do not have a
numerical rating. The C classification means the extinguishing agent is
non-conductive.
Class D fire extinguishers are commonly found in a chemical
laboratory. They are for fires that involve combustible metals, such as
magnesium, titanium, potassium and sodium. These types of
extinguishers also have no numerical rating, nor are they given a multipurpose rating - they are designed for class D fires only.
Professionalism Facts
Good communication skills are essential when communicating with
customers and colleagues. This includes being tactful and using
discretion. Some things to remember about communication skills are:
The more information that is on the drive, the more time it will take
to defragment the drive.
Run defrag at a command prompt in Windows XP to run Disk
Defragmenter in a text mode.
Check Disk: Check Disk is a utility that verifies the file system integrity
of a hard disk. Errors that can be checked and fixed by Check Disk
include:
Lost clusters--series of clusters on the hard disk drive that are not
associated with a specific file.
A cross-linked file occurs when two files claim the same cluster.
Check Disk will identify cross-linked files and correct their cluster
associations.
You can run Check Disk by typing chkdsk at a command prompt. Use
chkdsk with the /f switch to automatically fix errors. Note: Check Disk
replaces the ScanDisk utility that was available in Windows 9x/Me.
SCANREG: allows you to back up and verify the integrity of the
registry.
WINNT32.EXE: The executable you use to re-install or upgrade
Windows 2000 on a computer that already has Windows 95, 98, or NT
installed.
WINNT.EXE: The executable you use to install Windows 2000 on a
computer that does not have a previous version of Windows 95, 98, or
NT installed.
Unsigned driver: install points are made each time before a new driver
is installed or updated. Installing a signed driver will not cause a
restore point to be made.
Manual restore: points are created by the user through the System
restore wizard.
Be aware of the following when using System Restore:
Backs Up
Resets Archive
Bit?
Full
Yes
Incremental
Yes
Differential
Copy
Registry Facts
The registry is a database that holds hardware, software, and user
configuration settings. The registry is composed of the following
components:
Component Description
You don't like the results from a system restore and wish to
cancel the restore that you initiated.
No
Keys and
subkeys
Values
String value
Binary value
D-word value
Multi-string value
Expandable-string value
Hive
HKEY_LOCAL_MACHINE\Security
HKEY_LOCAL_MACHINE\Software
HKEY_LOCAL_MACHINE\System
HKEY_CURRENT_CONFIG
The filenames of the files saved in the registry are:
SAM
Security
Software
System
Default
UserDiff
NTUSER.dat (located in
WINDOWS\SYSTEM32\CONFIG\SYSTEMPPROFIL
E in Windows XP). The User.dat file contains userspecific registry settings.
Clamping voltage - This says what voltage will cause the metal
oxide varistors (MOVs) to conduct electricity to the ground line. A
lower clamping voltage indicates better protection. There are
three levels of protection in the UL rating -- 330 V, 400 V and 500
V. For most purposes, a clamping voltage more than 400 V is too
high.