A+ certification develops PC hardware and software troubleshooting skills. Professionals in the information technology industry may find A+ certification to be an advantage when searching for jobs. Technicians that have the certification tend to earn 5 to 15 percent more than those that don’t. Some employers require A+ certification for entry-level technical support positions. IT… Read more »
Posts Categorized: CompTIA A+
Identify the Common Connector Types A+ certification develops PC hardware and software troubleshooting skills. Professionals in the information technology industry may find A+ certification to be an advantage when searching for jobs. Technicians that have the certification tend to earn 5 to 15 percent more than those that don’t. Some employers require A+ certification for… Read more »
Given a scenario configure MS windows network on a client/desktop Network sharing is a feature that allows resources such as files, documents, folders, media, etc., to be shared over a network. These resources are made accessible to other users/computers over a network. In this post, we will describe how you can manage administrative shares in… Read more »
Given a scenario configure MS windows network on a client/desktop Network sharing is a feature that allows resources such as files, documents, folders, media, etc., to be shared over a network. These resources are made accessible to other users/computers over a network. In this post, we will describe how you can enable a user account… Read more »
Analyze Potential Indicators Associated With : Domain Name Systems (DNS) Attacks – Part 1 Domain Name Server (DNS) is a standard protocol that helps Internet users discover websites using human readable addresses. Like a phonebook which lets you look up the name of a person and discover their number, DNS lets you type the address… Read more »
MSConfig MSConfig is a system utility to troubleshoot the Microsoft Windows startup process. It can disable or re-enable software, device drivers and Windows services that run at startup, or change boot parameters. Windows includes all sorts of hidden little utilities that you can use to configure and change system settings that are normally not visible… Read more »
CompTIA A+ Core 2 -Chap 2.2 | Security+ Chap 6.3 Protocols and Encryption WEP WEP – (wired equivalent privacy) is a standard network protocol that adds security to Wi-Fi and other 802.11 wireless networks. WEP was designed to give wireless networks the same level of privacy protection as a comparable wired network, but technical flaws… Read more »
Type of Installations Unattended Installations An Unattended Installation is an automated installation technology that you can use to install with no user intervention. Unattended installation is typically used during large-scale rollouts when it would be too slow and costly to have administrators or technicians interactively install the Operating System/ Software on individual computers. An example… Read more »
CompTIA A+ Core 1 Objective 2.2 What is a Router? A router is another network infrastructure device that directs packets through the network based on information from Network Layer (Layer 3) of OSI model. A router uses a combination of hardware and software to “route” data from its source to its destination. A router can… Read more »
Establishing Network Connections Configure Microsoft Windows Networking on a Client/Desktop CompTIA A+ Core 2 Section 1.8 VPN Active reconnaissance is a type of computer attack in which an intruder engages with the targeted system to gather information about vulnerabilities. This may be through automated scanning or manual testing using various tools like ping, traceroute, netcat… Read more »
CompTIA A+ Objective 1.1 The terms “32-bit” and “64-bit” are commonly seen in system requirements and other technical literature, but few people actually know what these terms mean. Do they refer to hardware or software specifications? Up until 2006, all Windows operating systems have been written using 32-bit architecture. 32-bits is simply the “width” of… Read more »
Basic Command Line Tools CompTIA Security+ Objectives 2.2 – CompTIA A+ Objectives Core 2 – 1.4 Ping Ping is a command used to measure the latency between two devices on a network. The ping command is available on every operating systems and is a measure of the latency we feel in everything we do online,… Read more »
Comparison of IPv4 and IPv6 Basic Comparison Description IPv4 IPv6 Address 32 bits long (4 bytes). Address is composed of a network and a host portion, which depend on address class. Various address classes are defined: A, B, C, D, or E depending on initial few bits. The total number of IPv4 addresses is 4… Read more »
Follow @ASM_Educational Security Settings CompTIA A+ Exam objectives 2.6 (Compare and contrast the differences of basic Microsoft Windows OS security settings) User and Groups There are different levels of user accounts built into the Windows operating system. There are administrators, guests, and standard users. An administrator is the super-user of the Windows operating… Read more »
Follow @ASM_Educational System Utilities CompTIA A+ Exam objectives 1.5 (Given a scenario, use Microsoft operating system features and tools.) What are system utilities? Utility programs are designed to carry out specific tasks. The tasks to be carried out are not typically performed by the operating system as part of its day to day operating of… Read more »
Follow @ASM_Educational Server Roles CompTIA A+ | Microsoft MTA O/S: Exam objectives 2.5 (Summarize the properties and purposes of services provided by networked hosts.) What do server roles achieve? Server roles allow there to be more convenient or efficient options of doing specific tasks, such as accessing the internet, or using the printer. … Read more »
Follow @ASM_Educational Common Cloud Models CompTIA A+ | Microsoft MTA O/S: Exam objectives 4.1 Introduction to Cloud Computing Simply put, cloud computing is the delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale. You typically pay only for… Read more »
Follow @ASM_Educational What are the Different Motherboard Form Factors? Microsoft MTA O/S | CompTIA A+ Exam objectives 1.2: sizes. Introduction to Motherboards A motherboard (MB), also known as a Mainboard, system board or logic board, is the central or primary circuit board in a Personal Computer (PC). It is an extremely complex electronic… Read more »
Follow @ASM_Educational Backup and recovery procedures protect your data against data loss and reconstruct the data, should loss occur. When searching for a backup solution, you’ll find that there are two main types of backups: “file-level backup” and “image-level backup.” File-Level Backup File-level backups are the most common type of backup. This method has been… Read more »
Follow @ASM_Educational Source by Wikipedia Monitor Connectors: · If you are using a Monochrome / CGA/ EGA monitor, it is a digital monitor and will have a DB-9 Male connector that plugs into a digital adapter. · If you are using a VGA/ SVGA monitor, it will have a male DB-15 connector that plugs into… Read more »
Follow @ASM_Educational Source by Wikipedia A bus is a set of signal pathways that allow information to travel between components inside or outside of a computer. Laptop Buses PCMCIA or PC Card Personal Computer memory card international association is a type of bus use for laptops. There are different types of cards and you primarily… Read more »
Follow @ASM_Educational Source by Wikipedia A bus is a set of signal pathways that allow information to travel between components inside or outside of a computer. Other Types of Bus USB USB or Universal Serial Bus is an external bus that most popular form of bus use today USB is hot swappable USB can daisy-chain… Read more »
Follow @ASM_EducationalSource by Wikipedia A bus is a set of signal pathways that allow information to travel between components inside or outside of a computer. Types of Bus External bus or Expansion bus allows the CPU to talk to the other devices in the computer and vice versa. It is called that because… Read more »
Follow @ASM_Educational ComputerCableStore When talking about cable pinouts we often get questions as to the difference in Straight-through, Crossover, and Rollover wiring of cables and the intended use for each type of cable. These terms are referring to the way the cables are wired (which pin on one end is connected to which pin… Read more »
Follow @ASM_Educational Source Quizlet What are three common problem areas with laptops? Displays Storage devices and RAM Power and input devices What tasks are associated with verifying work order information? Troubleshooting What are the three possible areas that a technician must check for printer errors? The device Cable connection The… Read more »
Follow @ASM_Educational Source Quizlet Most often, what is the reason for a need for advanced troubleshooting? It means that the probable cause is difficult to diagnose What are the six steps of troubleshooting? Identify the problem Establish a theory of probable cause Test the theory to determine the cause Establish a plan… Read more »
Follow @ASM_Educational Source Learning About Computers What are binary numbers? The binary number system is when only two numbers are used – 0 and 1. It is also called base 2. The computer number system is base 2. Our number system is referred to as decimal or base 10 because we use 10 digits… Read more »
Follow @ASM_Educational Source Learning About Computers To install a power supply is really quite easy. It fits in the top back of the case. First, orient the holes on the power supply to those on the case. Then, place the unit in the space provided and slide it in until the screw holes are aligned…. Read more »
Source Computer Hope As you can see in the picture below, your left-hand fingers should be placed over the A, S, D, and F keys and your right-hand fingers should be placed over the J, K, L, and ; keys.
Source: Adopted From www.computerhope.com 1. A thermal impact printer or electrothermal printer is a printer that uses heated pins to “burn” images onto heat-sensitive paper.
Source: Adopted From www.computerhope.com The most popular printer for home computer users that prints by spraying streams of quick-drying ink on paper. The ink is stored in disposable ink cartridges, often a separate cartridge is used for each of the major colors.
Source: Adopted From www.computerhope.com Similar to a laser printer, LED printers are non-impact but use a light-emitting diode instead of a laser in the printhead.
Source: Adopted From www.computerhope.com First developed at Xerox PARC by Gary Starkweather and released in 1971, a laser printer is a printer that utilizes laser technology to print images on the paper.
Source: Adopted From www.computerhope.com 1. The term Dot matrix refers to the process of using dots to form an image. In a dot matrix image, the image quality is determined by the number of dots per inch.
Source: Adopted From www.computerhope.com Alternatively referred to as a Multifunction printer(MFP), AIO is short for All-In-One. It is used to describe a hardware device such as an all-in-one printerthat is a printer, fax, and scanner all in one device.
Source: Adopted From www.computerhope.com A printer is an external hardware output device responsible for taking electronic data stored on a computer or computing device and generating a hard copy of that data.
Source: Adopted From www.computerhope.com A riser board is a circuit board that gives a computer motherboard the option for additional expansion cards to be added to the computer.
Source: Adopted From www.computerhope.com Almost all laptops can connect to an external display and have the laptop display sent to that external display instead of, or in addition to, the laptop screen. Examples of an external display include a CRT monitor, flat panel display, projector, or TV.
Source: Adopted From www.computerhope.com Unlike a desktop computer, laptops and other portable computers often do not offer many upgrade options. Below is a listing of common laptop upgrade questions and the answers to each of the questions regarding laptop and portable computer upgrades.
Source Computer Hope The word “virus” is often used as a common term for all malicious programs, but technically a virus is a program or code that attaches itself to a legitimate, executable piece of software, and then reproduces itself when that program is run.
Spyware can invade your privacy by recording, passing on and abusing your personal details – including credit card details – all of it behind your back.
An essential guide on computer worms and how they actually work A computer worm is similar to a computer virus, but unlike a virus it does not need to attach itself to an existing program.
Source: Adopted From www.bullguard.com All the information you need on rootkits and how to remove them
Source: Adopted From www.myturbopc.com “Malware” is short for “malicious software” – computer programs designed to infiltrate and damage computers without the users consent.
Source: Adopted From www.computerhope.com Find how much RAM is installed and available in Windows 8 and 10
Source: Adopted From www.computerhope.com A game’s online performance can be attributed to many factors. Below is a listing of some of the different causes of why an online game may be slow or laggy.
Source: Adopted From www.computerhope.com [bs_icon name=”glyphicon glyphicon-exclamation-sign”]Tip: This page only covers an overall slow computer and not a computer that has a slow boot up or slow Internet.
Source: Adopted From www.computerhope.com A slow Internet connection can be caused by any number of reasons. Below is a short list of some of the more common reasons your Internet connection may be slow.
Source: Adopted From www.computerhope.com A slow Microsoft Windows boot up can be caused by a number of different issues. The following document contains various suggestions and tips that can help improve the overall speed of your computer’s startup.
A bad computer motherboard or CPU can cause an assortment of different issues on your computer. Below are just a few of the possible issues you may encounter. It is important to remember that the issues below can also be caused by more than just a bad motherboard and CPU.