Source: Adopted From www.computerhope.com Find how much RAM is installed and available in Windows 8 and 10
Posts By: gol
CompTIA A+ | Microsoft MTA O/S: Why is my online game so slow?
Source: Adopted From www.computerhope.com A game’s online performance can be attributed to many factors. Below is a listing of some of the different causes of why an online game may be slow or laggy.
CompTIA A+ | Microsoft MTA O/S: How Can I Fix My Slow Computer?
Source: Adopted From www.computerhope.com [bs_icon name=”glyphicon glyphicon-exclamation-sign”]Tip: This page only covers an overall slow computer and not a computer that has a slow boot up or slow Internet.
CompTIA A+ | Microsoft MTA O/S: Why is my Internet connection so slow?
Source: Adopted From www.computerhope.com A slow Internet connection can be caused by any number of reasons. Below is a short list of some of the more common reasons your Internet connection may be slow.
CompTIA A+ | Microsoft MTA O/S: My Windows computer boots up slow
Source: Adopted From www.computerhope.com A slow Microsoft Windows boot up can be caused by a number of different issues. The following document contains various suggestions and tips that can help improve the overall speed of your computer’s startup.
CompTIA A+ | Microsoft MTA O/S: Testing my computer motherboard and CPU for failures?
A bad computer motherboard or CPU can cause an assortment of different issues on your computer. Below are just a few of the possible issues you may encounter. It is important to remember that the issues below can also be caused by more than just a bad motherboard and CPU.
CompTIA A+ | Microsoft MTA O/S: Heat sink
A heat sink is an electronic device that incorporates either a fan or a peltier device to keep a hot component such as a processor cool.
CompTIA A+| Microsoft MTA O/S: Fan

A hardware device that keeps the overall computer or a computer device cool by circulating air to or from the computer or component. The picture is an example of a fan on a heat sink.
CompTIA A+ | Microsoft MTA O/S: Chipset

A chipset is a group of microchips that are designed to work with one or more related functions that were first introduced in 1986 when Chips and Technologies introduced the 82C206.
CompTIA A+ | Microsoft MTA O/S: What is the difference between BIOS and CMOS?

The BIOS and CMOS are often times thought to be the same thing, but they are not.
CompTIA A+ | Microsoft MTA O/S: Northbridge and Southbridge

Southbridge The southbridge is an IC on the motherboard responsible for the hard drivecontroller, I/O controller and integrated hardware. Integrated hardware can include the sound card and video card if on the motherboard, USB, PCI, ISA, IDE, BIOS, andEthernet.
CompTIA A+ | Microsoft MTA O/S: Super I/O

Short for super input/output or Super I/O, SIO is anintegrated circuit on a computer motherboard that handles the slower and less prominent input/output devices shown below.
CompTIA A+ | Microsoft MTA O/S: Parallel port

Less commonly referred to as the Centronics interface or Centronics connectorafter the company that originally designed it, the port was later developed by Epson.
CompTIA A+ | Microsoft MTA O/S: Game control adapter
Originally known as the Analog-to-Digital port (A-to-D port), the as a game port, joystick port, or game control adapter is a 15-pin connector port first found onIBM computers in 1981.
CompTIA A+ | Microsoft MTA O/S: How to replace the CMOS Battery

If your computer is losing its time or date settings, or you are receiving a messageCMOS Read Error, CMOS Checksum Error, or CMOS Battery Failure, the CMOS battery needs to be replaced. To do this, follow the steps below.
CompTIA A+ | Microsoft MTA O/S: What is CMOS Battery?

Alternatively referred to as a Real-Time Clock (RTC), Non-Volatile RAM (NVRAM) or CMOS RAM, CMOS is short for Complementary Metal-Oxide Semiconductor.
CompTIA A+ | Microsoft MTA O/S: How do I install an expansion card?
There are many types of expansion cards that can be installed in a computer, including sound, video, modem, network, interface card, and a number of others. In many cases, these expansion cards will fit in a slot in the computer called a PCI slot.
CompTIA A+ | Microsoft MTA O/S: PC Expansion Slots
Alternatively referred to as a bus slot or expansion port, an expansion slot is connection or port located inside a computer on the motherboard or riser board that allows a computer hardware expansion card to be connected.
CompTIA A+ | Microsoft MTA O/S: Power Devices and Supplies
Power Supplies Okay, now that we’ve tested our AC outlet and put some protective power devices into play, let’s go ahead and talk power supplies.
CompTIA A+ | Microsoft MTA O/S: CPU sockets
You may not typically handle the insides of your computers, but if your business requires knowledge of Central Processing Units (CPU), then you’ll also need to learn about CPU sockets
CompTIA A+ | Microsoft MTA O/S: Ports
Computer port In computer hardware, a port serves as an interface between the computer and other computers or peripheral devices.
CompTIA A+ | Microsoft MTA O/S: Hard Drives
What does a hard drive do? Storage is the hard drive’s responsibility. Everything you keep on your computer is on a hard drive.
CompTIA A+ | Microsoft MTA O/S: Notebook and Desktop Memory
What Is Memory, or RAM? System memory, frequently called main memory or RAM (Random Access Memory), is a type of computer memory that can be accessed randomly.
CISSP Security & Risk Management-Risk Analysis
Quantitative Analysis (ALE=SLE x ARO) ALE = Annualized Loss Expectancy (A dollar amount that estimates the loss potential from a risk in a span of year) SLE = Single Loss Expectancy (A dollar amount that is assigned to a single event that represents the company’s potential loss) ARO = Annualized Rate of Occurrence (Frequency of… Read more »
CISSP Security & Risk Management-The After-Action Review
After-action review (AAR): a detailed examination of events that occurred from incident detection to recovery Identify areas of the BC/DR plans that worked, didn’t work, or need improvement AAR’s are conducted with all participants in attendance AAR is recorded for use as a training case AAR brings the BCP/DRP teams’ actions to a close
CISSP Security & Risk Management-Results from the BIA
Result contains: Identified critical functions and required resources
CISSP Security & Risk Management-Business Impact Analysis (BIA)
Identify organization’s critical business functions
CISSP Security & Risk Management-Disaster Recovery (DR)
Review the BIA BIA contains the prioritized list of critical business functions Should be reviewed for compatibility with the BC plan
CISSP Security & Risk Management- Business Continuity (BC) & Disaster Recovery (DR) Requirements
Project Initiation and Management Develop and Document Project Scope and Plan
CISSP Security & Risk Management- Global Legal and Regulatory Issues
Computer/Cyber Crime CryptoLocker Ransomware – Spreads via email and propagates rapidly. Encrypts various file types and then a pop-up window appears to inform user about the actions performed on computer and, therefore demand a monetary payment for files to be decrypted.
CISSP Security & Risk Management- Computer Crimes
Computer as incidental to other crimes Involves crimes where computers are not really necessary for such crimes to be committed. Instead computers facilitate these crimes and make them difficult to detect. Examples of crimes in this category may include money laundering and unlawful activities on bulletin board systems.
CISSP Security & Risk Management-The Complete & Effective Security Program
Oversight Committee Representation
CISSP Security & Risk Management-Security Governance
Organizational or corporate governance has existed since time immemorial to ensure the efficient running via control structures.
CISSP Telecommunications and Network-Wireless Technologies
Wireless Communications WAP (Wireless Applications Protocol) –Developed for wireless (PDA’s, mobile phones, pagers, etc. devices to communicate)
CISSP Telecommunications and Network-Tunneling Protocols
Tunneling is a method of transferring data from one network to another by encapsulating the packets in an additional header. The additional header provides routing information so that the encapsulating payload traverse the intermediate networks.
CISSP Telecommunications and Network Security-IPSec
IPSec IPSec is an architecture or framework for security services for IP networks. It works at the Network Layer of the OSI Model. It is actually a standard for secure data transmission. It provides mechanisms for authentication and encryption. Defined by RFC 4301 and carries a set of functions, it is mandatory in IPv6. IPSec… Read more »
CISSP Telecommunications and Network Security
Open Systems Interconnect (OSI) Model
CISSP WANS and Their Components
WANS and Their Components Wide area networks (WANs) are considerably different than LANs. Organizations usually own their own LANs, but WAN services are typically leased; it’s not feasible to have your network guy run a cable from New York to Dallas.
Exin ITIL Continual Service Improvement
[bs_icon name=”glyphicon glyphicon-chevron-right”] The Role of Measurement Measurement plays a critical role within ITIL®, both as a part of Continual Service Improvement, but also within Service Level Management and as an essential part of all processes. Measurements can be used for four basic purposes as shown below:
Exin ITIL Service Operation Processes
[bs_icon name=”glyphicon glyphicon-chevron-right”] Incident Management Incident Management is concerned with the rapid restoration of services and with minimization of impact to the business.
Exin ITIL Service Operation
Service Operation [bs_icon name=”glyphicon glyphicon-chevron-right”] Overview The Service Operation phase of the Service Lifecycle is concerned with ensuring that services operate within agreed parameters. When service interruptions do occur, Service Operation is charged with restoring service as quickly as possible and with minimizing the impact to the business. [bs_icon name=”glyphicon glyphicon-chevron-right”] Business Value… Read more »
Exin ITIL Change Management
Service Transition Processes [bs_icon name=”glyphicon glyphicon-chevron-right”] Change Management Change Management is concerned with recording, evaluating, approving, testing, and reviewing changes to services, systems, and other Configuration Items.
Exin ITIL Concepts and Models
[bs_icon name=”glyphicon glyphicon-chevron-right”] Change Authority In ITIL® the entity charged with approval of a Request for Change is called the Change Authority.
Exin ITIL IT Security Management
IT Security Management is the process concerned with the protection of IT assets (including services) from security threats.
Exin ITIL Concepts and Models – Change Types
[bs_icon name=”glyphicon glyphicon-chevron-right”] Normal Changes are changes which meet predefined criteria that qualify them for handling via the Normal Change Management process.
Exin ITIL The Four P’s of Service Design
The ‘Four P’s of Service Design’ represent areas which should be taken into consideration when designing a service.
Exin ITIL Capacity Management

Capacity Management is concerned with ensuring that cost-effective capacity exists at all times which meets or exceeds the agreed needs of the business as established in Service Level Agreements.
Exin ITIL The RACI Model
ITIL also utilizes the RACI model as a generic tool for reviewing and assigning four key roles to any important task or activity.
Exin ITIL Foundation Service Desk
The Service Desk provides a single point of contact between users and the IT organization.
CompTIA Network+ | Microsoft MTA Networking: Common Security Threats
Source mc mcse Certification Resources DoS (Denial of Service) – A DoS attack is a common type of attack in which false requests to a server overload it to the point that it is unable to handle valid requests, cause it to reset, or shut it down completely.