Full Transcript

SKILLCERTPRO CompTIA A+ Master Cheat Sheet How to Prepare for Questions about Hardware on the CompTIA A+ Core Series 1001 Test General Information Test 1001 of the CompTIA A+ Core Series contains questions about five topics and one of them is Hardware. Thes...

SKILLCERTPRO CompTIA A+ Master Cheat Sheet How to Prepare for Questions about Hardware on the CompTIA A+ Core Series 1001 Test General Information Test 1001 of the CompTIA A+ Core Series contains questions about five topics and one of them is Hardware. These questions will occupy about 27% of the 1001 test and about two- thirds of them will begin with the description of a scenario you could encounter in real life. Then, you’ll be asked to choose a solution. We’ve noted in which topics this might happen with the designation (of scenario) below. Cables You must be able to describe different cable types and their characteristics and uses. Network Cables Network cables connect devices to the network. The most common types are Ethernet, fiber, and coaxial cable. Ethernet Ethernet cables use twisted pairs of copper wire. It may be shielded or unshielded. Each category of cable has specific physical characteristics and a maximum data rate. Ethernet cables have a maximum length of 100 meters. Cat 5—Category 5 cable supports data rates up to 100 Mbps. Cat 5e—Category 5e cable supports data rates up to 1 Gbps. Cat 6—Category 6 cable supports data rates up to 10 Gbps up to 55 meters and 1 Gbps up to 100 meters. Plenum—Plenum cable is used in the plenum space of a building. Any space that handles air circulation in an HVAC system is plenum space, typically above a drop ceiling or below a raised floor. Plenum cable uses low-smoke and low-flame materials for fire prevention. Shielded twisted pair—STP Ethernet cable uses two or four pairs of copper wire. It uses a foil or braided shield to reduce electromagnetic interference. Depending on the type of cable, each twisted pair may be shielded or a single shield covers all twisted pairs. 1|Page SKILLCERTPRO Unshielded twisted pair—UTP Ethernet cable uses two or four pairs of copper wire. The twist in the wires reduces electromagnetic interference. 568A/B—Ethernet cables are terminated with RJ-45 connectors. The pin-out (which wire connects to which pin) of those connectors is defined in the EIA/TIA 568A & 568B Standards. The difference between 568A and 568B is that the transmit and receive pairs are reversed. This allows for two types of cables, straight-through and crossover. Straight-through is used to connect a device to the network via a switch or hub. It uses the same pin-out on both ends, whether 568A or 568B. A crossover cable is used to connect one device directly to another, such as two computers, without a switch or hub between them. Crossover cables use 568A on one end and 568B on the other. Fiber Fiber optic cable uses light pulses to transmit data through a glass or plastic core. The cable consists of four layers. The core is surrounded by a cladding that refracts light back into the core. The other two layers are the outer sheath, the part you see, and a strength member or buffer to protect the fiber. Fiber is not subject to electromagnetic interference, since it uses light to transmit data. Transmission distances are longer and data rates are higher on fiber than they are on copper cable. There are two basic types of fiber, single-mode and multimode. Single-mode fiber carries only one light path, typically sourced by a laser. Multimode carries multiple light paths and is sourced by an LED. Single-mode has a much longer transmission distance than multimode. Coaxial Coaxial cable is used primarily for cable Internet service and audio/video applications such as cable TV. It has a single copper conductor core surrounded by a dielectric insulator and one or more layers of shielding. The shielding reduces electromagnetic interference. The two most common types of coaxial cable are RG-6 for data and RG-59 for audio/video. Speed and Transmission Limitations Each type of network has speed and distance limitations.  Category 5 cable supports data rates up to 100 Mbps.  Category 5e cable supports data rates up to 1 Gbps.  Category 6 cable supports data rates up to 10 Gbps up to 55 meters and 1 Gbps up to 100 meters.  The most commonly used fiber is multimode and supports data rates up to 100 Mbps up to 2000 meters, 1 Gbps up to 550 meters, and 10 Gbps up to 300 meters. Video Cables 2|Page SKILLCERTPRO Video cables connect a specific type of video port on a computer to a display. Each has its own connector type and cable pin-out. VGA— VGA cables connect older analog Video Graphics Adapters to a display. It uses a 15- pin connector arranged in three rows of five pins. HDMI—HDMI cables connect a High Definition Multimedia Interface to a display. It uses a 19-pin connector arranged in two rows. There are different types of HDMI cables. The most commonly used is type A but is usually just referred to as an HDMI cable with no type designation. Mini-HDMI—HDMI type C is usually referred to as mini-HDMI. It uses a 19-pin connector arranged in two rows, like the HDMI type A cable, but it is smaller and the pin-out is different. DisplayPort—DisplayPort cables connect a DisplayPort interface to a display. It uses a 20- pin connector arranged in two rows of ten pins. DVI (DVI-D/DVI-I)—DVI cables connect a Digital Visual Interface interface to a display. DVI-D (-D for digital) supports only digital signals. DVI-I (-I for integrated) supports digital and analog signals. There are single-link and dual-link DVI cables. Single-link DVI supports 3.7 Gbps HDTV at 60 frames per second. Dual-link DVI supports 7.4 Gbps HDTV at 85 frames per second. Multipurpose Cables Connecting devices directly together without a network connection can be done with these cables. Lightning—Lightning cables are proprietary to Apple™. They are used to connect Apple™ devices to USB ports. The cable has eight wires and is terminated with a USB connector on one end and a Lightning connector on the other. It can carry both data and power to charge the device. The Lightning connector is reversible, so it can be plugged into the device without regard to which side is up. Thunderbolt—Thunderbolt is another Apple™-proprietary cable. It comes as either copper or optical cable. The maximum length is 3 meters for copper and 60 meters for optical cable. The connectors are based on the Mini DisplayPort standard, except Thunderbolt version 3 uses a USB-C connector on the peripheral end. It provides both data and power to peripheral devices, most commonly storage and display devices. There are three versions of Thunderbolt. Total throughput for Thunderbolt 1 and 2 is 20 Gbps and Thunderbolt 3 is 40 Gbps. USB—Universal Serial Bus cables connect to a wide variety of peripheral devices. USB 1.1 was the first version in common use. It uses a type-A connector on the PC side and a type-B connector on the peripheral side. There are also mini and micro connectors for smaller devices such as cell phones and cameras. It supports two speeds. Low speed supports data transfer rate of 1.5 Mbps at lengths up to 3 meters. Full speed supports data transfer rates of 12 Mbps at lengths up to 5 meters. It provides power, as well. USB-C—USB-C is a connector type that is used on USB 3.0 and newer cables. 3|Page SKILLCERTPRO USB 2.0—USB 2.0 maintains the characteristics of USB 1.1 and adds a high-speed data transfer rate of 480 Mbps at lengths up to 5 meters. USB 3.0—USB 3.0 maintains the characteristics of USB 2.0 and adds SuperSpeed data transfer rate of 5 Gbps at lengths up to 3 meters. The connectors are a bit different, adding pins to some connectors to support the higher transfer rate, as well as adding the type-C connector. Other Cable Types Connections to serial ports and hard drives are done with specific cables discussed in this section. In some instances, adapters can be used to connect to devices. Peripheral Cables Peripheral cables are used to connect a PC to other devices. Serial—While there are many types of serial cables, the term “serial cable” usually refers to a specific type of cable that confirms to the RS-232 specification. Serial cables are most often used to connect a laptop to the console or management port of a network device, such as a switch, router, or firewall. Hard Drive Cables Hard drive cables connect a hard drive to a motherboard or controller card. The same cables may also be used to connect optical drives and older floppy drives. SATA—The Serial Advanced Technology Attachment (SATA) cable is the most commonly used hard drive cable. There are different SATA revisions. They all allow a maximum cable length of one meter. SATA revisions 1.0, 2.0, 3.0, and 3.2 support speeds of 1.5 Gbps, 3 Gbps, 6 Gbps, and 16 Gbps, respectively. IDE—Integrated Drive Electronics is an older interface. The IDE cable is a 40-wire (34-wire for floppy drives) ribbon cable that is connected from the motherboard on one end to one or two drives on the other end. SCSI—Small Computer System Interface was designed to support a wide variety of device types, so there are different types of SCSI cables. They may be ribbon cables or standard round cables of 50, 68, or 80 wires. Up to 16 devices, including the motherboard or SCSI controller card, may be connected to one SCSI cable or daisy-chained together. Adapters Adapters may be used to connect a device to a port that is different from the connector on the device. They are most often used to connect to a display or a network. DVI to HDMI—This connects a DVI port to an HDMI display. DVI does not carry audio, so a separate connection is needed to carry audio to the display. 4|Page SKILLCERTPRO USB to Ethernet—This connects a USB port on a computer to an Ethernet port on a network device. DVI to VGA—This connects a DVI port to a VGA display. Connectors You must be able to identify different connectors that are commonly used to connect to computers, peripherals, and network devices. RJ-11—RJ-11 is the plain old telephone system connector. It is a single-row 6- pin rectangular connector to connect to a phone system or modem. RJ-45—Often referred to as an Ethernet connector, this single-row 8-pin rectangular connector is used for Ethernet connections. RS-232—RS-232 is actually a specification for serial communications that uses either a DB-9 or DB-25 connector. It has a trapezoid shape. The DB-9 is a 9-pin connector arranged in two rows of four and five pins. The DB-25 is a 25-pin connector arranged in two rows of 12 and 13 pins. RS-232 is most commonly used to connect to network devices’ console or management ports. BNC—BNC connectors are used to terminate DS3 coaxial cables, used for wide area network connections. An older type of Ethernet network known as 10Base2 or Thinnet also used coaxial cable terminated with BNC connectors. It is a cylindrical connector with a twist- lock end to make a secure connection. RG-59—Cable TV coaxial cables are terminated with RG-59 connectors, cylindrical connectors with a threaded end to make a secure connection. RG-6—Cable Internet coaxial cables are terminated with RG-6 connectors, cylindrical connectors with a threaded end to make a secure connection. USB—The Type-A USB connector is a rectangular 4-pin connector that connects to a computer. The Type-B USB connector is a 4-pin connector that connects to a peripheral device. It is basically square, but two corners are cut at an angle. Micro-USB—The micro-USB connector is a 5-pin connector that connects to a peripheral device. It is basically rectangular, but two corners are cut at an angle. Mini-USB—The mini-USB connector is a 5-pin connector that connects to a peripheral device. It is basically rectangular, but two corners are cut at an angle on one side, and two tabs are on the other side. USB-C—The USB-C connector is an oval 24-pin connector that connects to either a computer or peripheral device. It is reversible, meaning that it may be inserted with either side up. It has two rows of 12 pins. Each row carries the same set of signals. DB-9—The DB-9 is a trapezoid-shaped 9-pin connector arranged in two rows of four and five pins. It is used for serial connections to network devices’ console or management ports. 5|Page SKILLCERTPRO Lightning—The Lightning connector is a rectangular 8-pin connector that connects to either a peripheral device. It is reversible, meaning that it may be inserted with either side up. It has a single row of 8 pins that are exposed on both sides of the connector. SCSI—There are different types of SCSI connectors. The most common are rectangular or trapezoidal with 50 or 68 pins arranged in two rows. eSATA—The external SATA (eSATA) connector is a 7-pin connector that connects to an external SATA drive. It has basically a rectangular shape with tabs on the ends. Molex—The most common Molex connector is a single-row 4-pin connector used to provide power to disk drives. It has a basically rectangular shape with two corners cut at an angle. RAM (scenario) You need to understand the different types of random-access memory and how to install them. RAM Types SODIMM Small Outline Dual Inline Memory Modules are commonly found in laptops and come in 100-, 144-, 200-, 204-, and 260-pin configurations. SODIMM defines the physical form factor of the module. DDR2 Double data rate (DDR) refers to the speed of data transfer. DDR2 and has less power consumption and is faster than the original DDR RAM. It comes in 240-pin DIMM and 200- pin SODIMM. DDR3 DDR3 is faster than DDR2 and has 30% less power consumption. It comes in 240-pin DIMM and 204-pin SODIMM. DDR4 DDR4 is faster than DDR3 and has less power consumption. It comes in 288-pin DIMM and 260-pin SODIMM. Single Channel A single channel RAM architecture moves data on a single data bus, typically 64-bits at a time. 6|Page SKILLCERTPRO Dual Channel A dual channel RAM architecture moves data on two data buses, typically 128-bits at a time. Triple Channel A triple channel RAM architecture moves data on three data buses, typically 192-bits at a time. Error Correcting Error Checking and Correcting (ECC) memory has logic built in to detect and correct single- bit memory errors. For each byte (eight bits) of memory, a parity bit is set that will allow the logic to detect and correct an error in a single bit of each byte. The logic would not correct an error in any byte with more than one bad bit. Parity vs. Non-Parity Memory with parity has logic built in to detect single-bit memory errors. For each byte (eight bits) of memory, a parity bit is set that will allow the logic to detect an error in a single bit of each byte. The logic may or may not detect an error in any byte with more than one bad bit. While parity allows for the detection of memory errors, it does not correct those errors. Additional logic, such as ECC, would be needed for error correction. Storage Devices (scenario) You should be well-versed with the various types of storage devices and be comfortable with the selection, installation, and configuration procedures for each. Optical Drives Optical drives use a laser to read and/or write data to an optical disk. CD-ROM/CD-RW—Compact disc-read only memory (CD-ROM) stores data, but you cannot write to it. CD-RW is rewritable, so you can write data to it multiple times. CDs store up to 700 MB of data. DVD-ROM/DVD-RW/DVD-RW DL—Digital versatile disc-read only memory (DVD-ROM) stores data, but you cannot write to it. DVD-RW is rewritable, so you can write data to it multiple times. DVD-ROM and DVD-RW have a capacity of 4.7 GB. DVD-RW DL is a dual- layer version of DVD-RW, nearly doubling the capacity to 8.5 GB. BD-R—Blu-ray disc-recordable (BD-R) is a Blu-ray disc that you can write to only once. It has a capacity of 25 GB. BD-RE—Blu-ray disc - rewritable (BD-RE) is a Blu-ray disc that you can write to multiple times. It has a capacity of 25 GB. 7|Page SKILLCERTPRO Solid-State Drives Solid-state drives (SSD) use non-volatile RAM to store data. There is no disk and no moving parts, so SSD tends to be more reliable than disk drives. Access times are faster than disk drives. M.2 drives—M.2 is a form factor for SSD. It is 22 mm wide and can vary in length. The most common lengths are 80 mm and 60 mm. It is referred to as “gumstick memory” because its size is similar to a stick of gum. M.2 drives plug into an M.2 slot on a motherboard. NVME—Non-volatile memory express is a form of memory that uses the M.2 form factor. It is the fastest SSD available today. SATA 2.5—The SATA 2.5 SSD is designed to** replace a 2.5-inch magnetic hard drive**. It is solid-state memory in the same size case as a 2.5 inch magnetic hard drive. Magnetic Hard Drives Magnetic hard drives use magnetic media on rotating platters to store data. Speeds vary among different drives, but generally, the faster the rpm, the faster response time in reading and retrieving data. Common speeds for hard drives are: * 5,400 rpm * 7,200 rpm * 10,000 rpm * 15,000 rpm Sizes—Magnetic hard drives come in different sizes, sometimes referred to as form factor. A 2.5-inch form factor means that the disc inside the drive has a diameter of 2.5 inches. The most common sizes are 2.5 and 3.5 inches. Hybrid Drives Hybrid drives combine magnetic disk and SSD drives in one hard drive case. It uses the disk for high capacity storage and the SSD for lower capacity fast access, providing the best of both storage types. Flash Flash memory is a form of nonvolatile read/write memory. Nonvolatile memory retains data when power is removed. Flash erases data in blocks, rather than at the byte level. This makes it less expensive but slower than other forms of nonvolatile memory. SD card—Secure Digital cards are designed for use in portable devices. They are able to withstand higher impact without damage than other types of memory cards. CompactFlash—CompactFlash or CF cards are primarily used in cameras, but are being replaced by SD cards. Micro-SD card—Micro-SD is a smaller form factor SD card. Mini-SD card—Mini-SD is a smaller form factor SD card that has been made obsolete by micro-SD. 8|Page SKILLCERTPRO xD—xD card, also referred to as xD-picture cards, is a proprietary memory card for Olympus and Fujifilm cameras. It is now obsolete, as both brands now use SD cards. Configurations Storage devices can be configured for high availability so that if one disk in an array of disks fails, data is not lost. The most common configuration is known as Redundant Array of Inexpensive Disks (RAID). RAID 0, 1, 5, 10—There are different RAID configurations that provide different levels of data protection. Striping is a method of storing part of the data on each drive in an array. Mirroring is keeping a full copy of a disk on another disk.  RAID 0: offers striping of data only; no redundancy; good performance  RAID 1: offers mirroring of data only; requires more storage space to store full copies of data  RAID 5: offers striping with parity; minimum of three drives; ability to calculate missing data and rebuild  RAID 10: offers striping and mirroring for full redundancy; minimum of four drives HOT swappable—Hot swappable drives can be inserted or removed in real time while the system is powered on. A common type of drive of this type is a USB flash drive. Disks in a RAID array are often hot swappable. Motherboards, CPUs, and Add-on Cards (scenario) The motherboard provides the circuitry by which all parts of a computer communicate with each other, from the processor to the power supply. Every part of a computer interacts with the motherboard in some fashion. You should be able to install and configure motherboards, as well as the CPUs and add-on cards you plug into them, in a given scenario. Motherboard Form Factor The form factor describes the physical characteristics of the motherboard. ATX—ATX stands for Advanced Technology Extended. Older ATX variants contain a 20-pin Molex power connection, while newer models contain the 24-pin Molex power connection. mATX—Micro-ATX is a little bit smaller than the ATX and does not have as much expansion ability. ITX—ITX is a series of significantly smaller form factor boards that were created by VIA Technologies™. The most common one is the mini-ITX. mITX—Mini-ITX is the largest of the ITX form factors, with a size of 6.7 by 6.7 inches. It is also the most popular. Motherboard Connector Types Motherboards have a variety of connectors that determine what can be connected to it. 9|Page SKILLCERTPRO PCI—Peripheral Component Interconnect was introduced by Intel™ in the 1990s. This replaced older 8- and 16-bit expansion slots with a 32-bit slot. PCIe—PCI express sends data in a serial stream at higher speeds than conventional PCI. It has superseded PCI. Riser card—A riser card plugs into an existing connector and contains more connectors of the same type. It increases the number of cards you can add. It also changes the orientation of the connectors 90 degrees so that cards can fit into a smaller case. Socket types—CPUs plug into sockets. Two common socket types are zero insertion force (ZIF) and land grid array (LGA). ZIF has holes that CPU pins slide into. LGA has pins that CPU contacts sit on top of. The CPU is held in place by a lever that keeps pressure on the CPU to hold it in place. SATA—The Serial ATA connector is used to connect a hard drive or optical drive. IDE—IDE connectors are another hard drive connection point. It has been largely replaced by SATA. Front panel connector—The front panel has components on it that need to connect back to the motherboard. Each computer is different, but front panel components may include LEDs, USB ports, the power switch, a reset button, and audio connections. There may be multiple connections between the front panel and motherboard. Internal USB connector—An internal USB connector allows you to add USB ports. They would typically be mounted in an open expansion slot. BIOS/UEFI settings The BIOS is, arguably, one of the most important aspects of a computer. You need to have a good understanding of system BIOS and how to modify the settings. Understand the importance of selecting the proper boot sequence and how BIOS provides low-level drivers that allow the operating system to interact with various hardware components. Comprehend the various stages in the boot sequence, the system POST, and the role BIOS plays in loading the operating system. The CompTIA A+ questions about BIOS require that you assess a scenario to be able to choose the best answer. Boot Options You can set the sequence of devices to boot from in the boot option settings. You usually boot from the hard drive, but you may want to boot from an optical drive or flash drive. The boot sequence tells the BIOS where to look to load the operating system. It will proceed down the list in the order configured until it finds an operating system to load. Firmware Updates Always check the version of the BIOS you are using before doing an upgrade. This can be found in your system information utility, or by typing msinfo32 into the cmd prompt. Most manufacturers offer BIOS upgrades directly from their website, as a simple download, and it 10 | P a g e SKILLCERTPRO is a very straightforward process. Just download the correct file, based on the type of system you have, and run the update to begin the installation. This entire procedure is known as flashing the BIOS. Security Settings You are able to secure access to the BIOS, or to the operating system, by setting certain passwords from within the BIOS. These security measures require a password at startup to load the operating system or make changes to the BIOS. Interface Configurations This provides settings specific to interface categories or individual interfaces such as PCIe or SATA. Security Security settings control access to the BIOS and set security features. Passwords—The supervisor or admin password, if enabled, requires a password to view and set all BIOS settings. The user or system password allows minor changes such as time and date or boot options to be set. Drive encryption—An encryption key can be set to access an encrypted hard drive. If set, that key must be used for decryption, even if the drive is moved to another computer.  TPM—The Trusted Platform Module is a security chip that stores cryptographic keys.  LoJack—A feature that enables a stolen device to be tracked, locked, and/or wiped.  Secure boot—Secure boot ensures that the operating system and drivers are authorized versions without malicious code before loading them. CMOS Battery The CMOS (complementary metal oxide semiconductor) battery was originally used to maintain system settings stored in CMOS RAM since it was volatile. It is also used to power the systems real-time clock. Over the years, CMOS RAM has been replaced by flash memory that does not require a battery to maintain data; however, the real-time clock still requires a battery. As a preparation for this test, you should know how to locate and replace the CMOS battery. CPU Features There are several important features of CPUs that are important to consider. You need to understand the different features and their impact on performance. Single-Core 11 | P a g e SKILLCERTPRO A core is the part of the CPU that reads and executes instructions. As the name implies, a single-core CPU has one core. Most of today’s CPUs have multiple cores. Multicore A core is the part of the CPU that reads and executes instructions. Multicore CPUs have more than one core. This allows different threads of instructions to be run simultaneously, with each core running one thread, resulting in faster performance. A dual-core processor will run faster than a single core, but not quite twice as fast. There are also quad-core, eight core, and other types of multicore processors. Virtualization Some CPUs have features to support virtual machines (VMs), running multiple operating systems on a single machine. They offload some of the work that VM software would have to do, improving VM performance. Intel™ calls theirs Intel™ Virtualization Technology. AMD™ calls theirs AMD-V. Hyperthreading Hyperthreading, or multithreading, leverages virtual cores to run applications 15 to 30 percent faster. Speeds CPU speed, typically measured ingigahertz, is a measure of how fast a processor can read and execute instructions. Overclocking Overclocking is running the CPU at a speed higher than it was designed to operate. Some CPUs allow this while others do not. It will improve the performance of the CPU but generate more heat, so added cooling may be needed to prevent damage to the CPU. Integrated GPU An integrated GPU is a graphics processing unit embedded with the CPU. It is not as powerful as a stand-alone GPU, but it is commonly used in laptops to save space. Compatibility CPUs need to be installed in motherboards that have CPU sockets and chipsets that they are compatible with. AMD Specific AMD CPUs must run with specific AMD chipsets. The motherboard manufacturers may vary. 12 | P a g e SKILLCERTPRO Intel™ Specific Intel™ CPUs must run with specific Intel™ chipsets. The motherboard manufacturers may vary. Cooling Mechanism Components on motherboards and add-on cards generate heat, especially CPUs and GPUs. There are several types of cooling mechanisms to remove heat from a computer. Fans Fans are used to move air through a computer to remove heat. Fans are positioned in the case to allow air to pass between the inside of the case and the outside. Fans are also used on individual components to provide extra cooling. They are sometimes integrated with a heat sink. Heat Sink Heat sinks are devices that conduct heat and have the effect of increasing the surface area of a component. This removes heat from the component more quickly than fans alone. Some heat sinks have fans built into them. Liquid For high-performance computers, air cooling may not be enough. Liquid cooling is more effective at transferring heat away from components. Distilled water is the most commonly used liquid. Liquid cooling systems include a tank for the liquid, a radiator, a water pump, and a cooling block that attaches to the component being cooled. These components may be in the computer or outside in a separate unit that connects to the computer. Thermal Paste The quality of contact between a component to be cooled and the heat sink used to cool it will impact how effectively it is cooled. Thermal paste conducts heat and is used between the component and heat sink to make the best thermal-conductive connection. Expansion Cards Expansion cards add additional functionality to your PC. You must use expansion cards that are compatible with the expansion slots available. You should understand how to install and configure expansion cards. Video Cards Video cards control the graphics that are displayed. This function may be provided by an add-on card or it may be on-board, meaning built into the motherboard. 13 | P a g e SKILLCERTPRO On-board—On-board video cards typically provide good graphics features and specifications. It serves the purpose for most users, but some users, like gamers or graphic designers, may need better graphics. Add-on card—Add-on video cards have their own GPU (graphics processing unit). They are used to improve the graphics capabilities beyond what the on-board video provides. Sound Cards Add-on sound cards are used to improve the sound capabilities beyond the motherboard’s sound capabilities. A musician, composer, or audiophile may choose to upgrade their computer’s sound with an add-on card. Network Interface Card A network interface card (NIC) is built into almost all motherboards today. An add-on card would typically only be necessary if you wanted a different interface or to connect to a second network. USB Expansion Card A USB expansion card is used to add USB ports to the computer. It may also be used to add newer version USB ports. eSATA Card An eSATA card is used to connect to external SATA storage devices. Peripherals The PC uses several peripheral devices to interact with other hardware, like a keyboard or mouse. You should understand the purpose and use of these peripherals. Printer Printers provide hard copy (paper) output. All-in-one printers include other functions such as fax, scanner, and copier. Printers may connect via WiFi, USB, Ethernet, Bluetooth, or infrared connections. Operating systems have generic printer drivers, but better printer control and features can usually be obtained by loading the printer’s own drivers. ADF/Flatbed Scanner A scanner creates a digital image of a paper document and stores it in an image file or Portable Document Format (PDF) file. The original document can be input using a flatbed or an automatic document feeder (ADF). Flatbed scanners provide a glass bed onto which you place the document. This allows you to scan either one-page documents or pages from a book. An ADF feeds paper, one sheet at a time, from a stack of separate sheets of paper. 14 | P a g e SKILLCERTPRO Barcode Scanner/QR Scanner Barcode and quick response (QR) code scanners read barcode and QR codes, often using the same application. Barcodes are usually used to represent a machine-readable number, such as a product’s universal price code (UPC). QR codes are most often used to represent a machine-readable link to a website that provides more information. Monitors Monitors, also called displays, allow users to see the video output of a computer. They connect through various types of video output, such as HDMI, DVI, or DisplayPort. VR Headset A Virtual Reality (VR) headset completely blocks the user’s view of his or her actual surroundings and replaces it with what is on the screen in the headset. The user can interact with the virtual reality they are viewing and hearing in a number of ways with various input devices. Input devices range from simple game-controller-type devices to sensor-embedded suits and multi-directional treadmills. The most common use is currently gaming, but VR headsets are also used for training, design, architecture, medical applications, and more. Optical Drive Types Optical drives are used to read CDs, DVDs, and Blu-ray discs. They are often built into desktops and larger laptops. Slimmer laptops cannot accommodate an optical drive, so they use peripheral optical drives. They are typically connected via USB. Mouse A mouse is an input device that provides point-and-click capability for computers. Mouse devices connect to today’s computers via USB or Bluetooth. Older computers used the PS/2 connector. Keyboard A keyboard is an input device used to enter alphanumeric characters and other symbols into the computer. Keyboards connect to today’s computers via USB or Bluetooth. Older computers used the PS/2 connector. Touchpad A touchpad is an input device that provides point-and-click capabilities similar to a mouse. It is built into laptops but also available as a peripheral device that connects via USB or Bluetooth. Signature Pad 15 | P a g e SKILLCERTPRO A signature pad is an input device that has a surface you can “write” on, but rather than writing in ink, the pressure on the pad is detected, displayed on the screen and/or stored in a file. It is used to capture a signature during a transaction. It connects via USB. Game Controllers Game controllers are input devices that allow a user to interact with a video game. It is available in the form of a gamepad, joystick, steering wheel, gun, or anything to simulate whatever is used in the game. Camera/Webcam Cameras and webcams are input devices used to capture photos or videos. Webcams are also used for interactive communications such as video conferencing. Webcams may be built into devices or separate peripheral webcams are connected to the computer when in use. Digital cameras are used when disconnected from the computer to take photos and videos that are stored as files in the camera. The camera can then be connected to a computer, usually via USB, to transfer the files to the computer. Microphone Microphones are audio input devices. They are used to record audio or for interactive communications such as Internet phone calls or video conferencing. Microphones may be built into a computer or connected as a peripheral via USB, Bluetooth, or a tip/ring/sleeve (TSR) audio input jack. Speakers Speakers are audio output devices. They are used to play audio or for interactive communications such as Internet phone calls or video conferencing. Speakers may be built into a computer or connected as a peripheral via USB, Bluetooth, or a tip/ring/sleeve (TSR) audio input jack. Headset A headset is a microphone and headphones combined in one unit. Like microphones and speakers, they are used to play audio or for interactive communications such as Internet phone calls or video conferencing. They connect via USB, Bluetooth, or tip/ring/sleeve (TSR) audio jacks. There may be two audio jacks, one for the microphone and another for the headphones, or it may be a single combined jack. Projector A projector is a video output device that projects the video output onto a screen or whatever you happen to point it at. It is most often used to do presentations or to show 16 | P a g e SKILLCERTPRO photos or videos. The projector must put out bright enough light so that the projected image is clearly visible. How much brightness is needed is determined by distance and ambient light. Brightness is measured in lumens (lm). The bulb in a projector will have a specific lumen value. Projectors connect to computers using the same types of connections as any other display, such as HDMI, DVI, or USB. External Storage Drives External hard drives, solid state drives (SSD), and optical drives store data outside of the computer itself. They are usually not the primary drive but are used to back up data or increase overall storage capacity. They connect via USB, eSATA, or Thunderbolt connections. KVM Keyboard, video, mouse (KVM) switches are typically used in data centers with many servers. Rather than each server having its own keyboard, video monitor, and mouse, KVMs connect a single keyboard, monitor, and mouse, to multiple servers. The user at the KVM can then select which server they are controlling. Magnetic Reader/Chip Reader Credit cards and debit cards are read with either a magnetic reader or chip reader. The magnetic reader is what you swipe the card through, as it reads the data on the magnetic strip on the card. The chip reader is used to read the chip on newer cards. Aside from bank cards, they are used to read other types of cards as well. One example is access cards for opening doors to secure areas. They often connect to point-of-sale (POS) systems. With the POS services available today, a POS system can be anything from a computer at a store checkout to a tablet to a mobile phone in a kiosk. So, there are many possible connection types, including USB, Lightning, and even the headphone jack on a phone. NFC/Tap Pay Device Near field communication (NFC) is a form of contactless communication. Two devices must be within a few centimeters of each other to communicate. It is most commonly used for tap pay systems that allow you to place a mobile phone or contactless credit card near the tap pay device to pay. NFC is also used for transfer photos or files between smartphones. There are other applications for NFC and more are being created. Smart Card Reader Smart cards are similar in form factor to credit cards, but their main purpose is to securely store data. Smart card readers come in different forms. They may be built into laptops that 17 | P a g e SKILLCERTPRO the card is inserted into. They may be contactless so that the card can be read if it is within a few centimeters of the reader. The most common use for smart cards is to authenticate a user to a system. In addition to a username and password, it serves as a second factor of authentication. Power Supplies Power supplies convert AC power to the DC power that computer components run on. There are different types of power supplies to fit different types of computers. Each power supply has specific features related to capacity and connectors. You must be able to select the proper power supply type and features needed in any given scenario. Input 115V vs. 220V The input to a power supply is provided by the power company. This is the power available at a wall outlet. In North America and some other parts of the world, 110 volts AC - 120 volts AC is supplied. Other countries supply 220 volts AC - 240 volts AC. So, power supplies are designed to accept either or both of these inputs. You may find power supplies that accept only one or the other voltage, but most accept both. Some have a switch to set for the correct input. Others accept either input without having to set a switch. Output 5V vs. 12V The power supply converts the AC power input to DC power that supplies the computer’s components. Most power supplies provide +5V and +12V. Others may also provide -12V, - 5V, and +3.3V. You may see more than one connector for a specific output. For example, you may see two +12V outputs, each with its own connector. Each output is called a rail, so in this example, there would be two +12V rails. 24-Pin Motherboard Adapter Most power supplies provide DC output power on a standard 24-pin connector, also called the ATX power connector, which plugs into the motherboard. The connector is keyed so that it can only plug in one way, ensuring that the proper voltages are supplied to the right pins. Specific pins are designated to supply +5V, +12V, -12V, and 3.3V. Wattage Rating Wattage rating, or power rating, is the total capacity of the power supply. This must be high enough to meet the total power demands of all components in the computer. Number of Devices/Types of Devices to Be Powered The number and types of devices or components in any given computer determine what wattage rating is needed for the power supply. It also determines what types of connectors are needed to ensure that you can connect the power supply to each device. 18 | P a g e SKILLCERTPRO The type of case the computer is in also needs to be considered to ensure that the power supply physically fits properly. To determine the wattage requirement of the power supply, add all of the wattage ratings of the individual components. Your power supply’s wattage must meet or preferably exceed that total value. The connectors needed are determined by the connector types used on the devices to be powered. For example, if you have an older ATX motherboard, it has a 20-pin power connection, while newer models contain the 24-pin Molex power connection. The power supply you select obviously must physically fit into the case. It also needs long enough cables from the power supply to reach the components. Custom PC Configuration (scenario) You should be able to select the proper components to configure a custom PC to meet the requirements for specific types of customers. Graphic/CAD/DAM Design Workstation Graphic design workstations require a lot of fast memory and powerful graphics processing capabilities. SSD—A magnetic drive may be too slow to meet the demands of graphics design workstations. A solid state drive with faster access times should be selected. High-end video—A powerful graphics card with a dedicated graphics processing unit is essential. Maximum RAM—High-end graphics work with large chunks of data at a time. RAM is working memory, so the more you have, the better the performance will be. Audio/Video Editing Workstation Audio/video editing workstations perform best if they have an expansion card dedicated to editing. This may be in the form of two separate cards, a video card and a sound card, or one card that handles both video and sound. Editors work with large files, so a lot of storage space is needed. Dual monitors allow editors to do editing on one monitor and review the video on the other. Specialized audio and video card—Editing requires more processing power than is available on some motherboard CPUs. Specialized video and/or audio cards provide added processing power. Large, fast hard drive—Editing often involves working with large files, so a large, fast hard drive is needed. It is also helpful to have an additional solid state drive that can move large working files quickly. Dual monitors—Video editing software has a lot of controls that are presented in separate Windows™. Dual monitors allow editors to spread these controls across different monitors. A separate monitor to review the edited video is another use of dual monitors. 19 | P a g e SKILLCERTPRO Virtualization Workstation Virtualization workstations are designed to run multiple virtual machines (VMs) on a single computer. Each VM needs CPU power and memory, so you need to maximize CPU cores and RAM. The more CPU cores and memory you have, the more VMs you will be able to run. Gaming PC Gaming PCs are among the most demanding custom PC types. They require the fastest audio and video processing, so a solid state drive (SSD), high-end graphical processing unit (GPU), and high-definition sound card are needed. SSD—Video games cannot load completely into RAM, so they need to load from disk at times during game play. That can cause a momentary pause in the game if not done fast enough. To minimize the chances of such delays, SSD is preferred over a magnetic disk drive. *High-end video/specialized GPU—A **dedicated GPU is required to provide the high-end video that gamers demand. The video is constantly being updated and even the slightest lag can take the enjoyment out of a game. *High-definition sound card**—Sound plays a major role in some games, so a high- definition sound card is essential. *High-end cooling—Multiple high-end components, especially the GPUs and CPUs, generate a lot of heat, so high-end cooling is a must. In some cases, **liquid cooling is necessary. Network Attached Storage Device Network attached storage (NAS) devices have a dedicated purpose of storing and providing access to files. Files can be stored on a NAS device so that they are available to all users on the network, without each user needing to have a local copy. Media streaming—NAS devices provide streaming capabilities so that users can watch videos or listen to music without downloading files. File sharing—NAS devices allow users to download files to their local PC or device. Gigabit NIC—The throughput demand on a NAS server can be significant because multiple users may be streaming or transferring large files simultaneously. A gigabit network interface card (NIC) should be used to minimize the risk of the NIC becoming a bottleneck. RAID array—NAS devices often store important files, whether business documents or treasured photos. So it is important to protect those files with redundancy. A redundant array of inexpensive disks (RAID) provides redundancy in NAS devices. RAID uses an array of disk drives that, depending on the configuration, may employ parity checking and error correction to ensure that data is not lost. Hard drive—NAS devices usually store large quantities of files, so hard drives are used to meet the demand for high-capacity storage. 20 | P a g e SKILLCERTPRO Standard Thick Client A standard thick client is what most people think of (and use) as a PC. It stores and runs the operating system and applications locally. Desktop applications—Thick clients store and run applications locally, so they need to meet all of the applications’ requirements. This includes storage space for the applications’ files, processing power to run the applications, and working memory space. Meets recommended requirements for selected OS—Operating systems typically provide specifications to meet both minimum and recommended requirements. Thick clients do all processing locally, so they should exceed the minimum requirements for the operating system. They should have the processing power, memory, and other requirements to meet or exceed the recommended requirements. Thin Client Thin clients rely on servers to store applications and do some of the processing for them. So, they do not need as much processing power and memory as a thick client. Basic Applications—The only applications run locally on thin clients are the basic applications needed to access the servers and remote applications they use. Meets minimum requirements for selected OS—Operating systems typically provide specifications to meet both minimum and recommended requirements. Since thin clients rely on servers to store applications and do some of the processing for them, they need to only meet the minimum requirements for the operating system. Network connectivity—Since thin clients rely on communications with servers, they need high-speed network connectivity. Other Common Devices (scenario) Common devices such as desktops and laptops are essential to any business or home user. In any given scenario, you must know how to install and configure desktops and laptops. Desktop Desktop computers fall into two categories: thin clients and thick clients. Installation and configuration will vary for each. Thin Client Thin client installation and configuration is a simple process, since thin clients do not run applications locally. They connect to servers that store and run applications. They often do not store data locally, using servers for storage as well. There is usually a minimal operating system pre-installed and a network interface card or WiFi to connect to the network. Input/output devices such as the keyboard, mouse, and monitor may need to be configured. For example, you may configure language and keyboard layout 21 | P a g e SKILLCERTPRO settings. Network parameters may also need to be configured. DHCP may handle the network connection, but you may need to configure the initial server connection. Thick Client A thick client is a standard computer that** runs applications and stores data locally**. Thus, the operating system, applications, and peripherals need to be installed and configured. Network settings may be set by DHCP or need to be configured manually. Account Setup/Settings Account setup on a thin client is minimal. User accounts will typically be set up by an administrator on a directory server. The thin client can log in to an account previously configured on the network. Users do not typically log in to the thin client itself. The thick client will have a local login, since it runs applications locally and stores data that needs to be protected. It should have a local administrator account, as well as a user account. Laptop Laptops share some of the items that need to be installed and configured with desktops, but they have additional items such as touchpads and touchscreens not typically found on desktops. Touchpad Configuration Touchpads usually work well with the default configuration but can be tuned to user preferences for sensitivity, multi-finger gestures, tapping, and clicking. Touchscreen Configuration The touchscreen may need to be calibrated to ensure that it properly recognizes the point being touched on the screen. This only needs to be done if accurately selecting objects on the screen is a problem. Application Installations/Configurations Laptops may not be as powerful as desktops, so you need to be sure that the laptop will support the requirements of an application before you install it. Check CPU, RAM, and storage requirements. Synchronization Settings Depending on the operating system, you can synchronize certain settings between devices. This gives you the same look and feel as you move from one device to another. You can also synchronize data, including files, photos, and music. The methods to do so vary for different operating systems and applications. 22 | P a g e SKILLCERTPRO Account Setup/Settings Laptops require strong account settings, since they are used in public spaces and more likely to be lost or stolen. A user account with minimal access should be set up as the default user account to minimize the risk if a malicious actor gets access to the laptop. Wireless Settings Laptops are mobile devices, so they often connect to different networks. To be able to join different networks, the wireless configuration should use DHCP rather than a manual IP configuration. This allows it to acquire its IP address and other settings from whatever access point it connects to. SOHO Devices and Printers (scenario) Multifunction devices and printers are suitable for small office home office (SOHO) use. They save cost and take up less space by combining multiple functions into a single device. You should be familiar with configuring these types of devices. Use Appropriate Drivers for a Given Operating System To get the most out of a multifunction device, the proper drivers for that device should be loaded. The device may work using the default drivers included with the operating system, but you may not get the full functionality that the device-specific driver provides. The drivers are specific not only to the device but to the operating system, as well. You also need to select the proper driver for either 32-bit or 64-bit systems. Duplex Enabling duplex mode causes the printer to print on both sides of the paper. Collate Collate or collation settings determine the order in which pages are printed. If set to collate, the printer will print the complete document before printing the next copy. Orientation There are two options for orientation, portrait or landscape. In portrait mode, the top of the page is the shorter dimension. This is how pages are typically printed. In landscape mode, the top of the page is the longer dimension. Spreadsheets and slides are often printed in landscape mode. Quality Print quality settings control resolution and color. Resolution is expressed dots per inch. Higher resolutions provide better quality printouts. Color settings control how vivid the color output is. 23 | P a g e SKILLCERTPRO Device Sharing Devices can be shared by multiple users, over wired or wireless connections. Users can connect directly to a printer or through a print server or cloud printing service. Wired Wired connections to printers may be made via USB, serial, or Ethernet. USB—USB is the most common way to connect a printer to a computer. When connected, that computer can be configured to make that printer shareable. Serial—Serial is an older connection method using a serial cable with a DB-9 or DB-25 connector. It is unlikely that you would see this type of connection today. Ethernet—Printers that are designed to work on a network will have an RJ-45 Ethernet connector. They connect to the network with an Ethernet cable, just as a computer would. They are easily shared, since the are connected directly to the network. Wireless Wireless connections to printers may be made via Bluetooth, 802.11, or a direct ad hoc connection. Bluetooth—Bluetooth connections can be used to print from devices within 10 meters (about 30 feet) of the printer. Mobile devices can use Bluetooth to send documents directly to a printer. 802.11 (a, b, g, n, ac)—Printers may use the 802.11 wireless protocol to make WiFi connections to networks. Any device on the network can then use that printer. A device may also connect directly to a printer using 802.11. ** Infrastructure vs. ad hoc—When the device and the printer use the network **WiFi infrastructure to communicate, it is referred to as infrastructure mode. Another mode of 802.11 communications is ad hoc mode. In ad hoc mode, a device connects directly to the printer over 802.11. Integrated Print Server (Hardware) A print server sits on the network and handles printing requests from users. It can spool (temporarily store) requests for printers that are busy, allow prioritization of print jobs, and delete jobs after they’ve been sent. Print servers may be separate devices or integrated into the printer. Cloud Printing/Remote Printing Cloud printing is a service that allows you to print from anywhere you have Internet access to a printer that has been configured for use with that service. Not all printers are compatible with all cloud print services, so you must check for compatibility. 24 | P a g e SKILLCERTPRO Public/Shared Devices SOHO devices can be made available and shared with anyone on a network. This is true for devices that are connected directly to the network or connected to a computer. If a printer is connected to a computer, then the operating system must be configured to make the printer available to users on the network. Giving access to users over the network raises concerns over data privacy. Steps must be taken to ensure that users cannot read other users’ print jobs. Sharing Local/Networked Device Different operating systems have their own mechanisms for sharing printers. Windows™ provides a means to configure printers with Control Panel, where it may be set as shareable. Users can then access the printer over transmission control protocol (TCP) and user datagram protocol (UDP) by identifying the IP address of the computer and the TCP/UDP ports. The ports used for network printing are TCP 139, TCP 445, UDP 137, and UDP 138. Apple™ computers share printers using the Bonjour™ protocol. Any Apple™ device can discover printers connected via Bonjour™. Windows™ users would have to install iTunes™ to access Bonjour™ printers. Apple™ mobile devices running iOS™ use AirPrint™ to print to shared printers over WiFi. Data Privacy To ensure data privacy of print jobs, you need to manage user authentication and hard drive caching of print jobs, also known as spooling. User authentication—Users can be required to authenticate to print servers. They typically authenticate at one of two security levels: user or administrator. Users are limited to printing and managing their own print jobs. This prevents other users from seeing or interfering with other users’ print jobs. Administrators can manage all print jobs. Hard drive caching—Hard drive caching of print jobs is called spooling. It allows print jobs to be stored on a hard drive or other storage device until the printer is ready to print it. The print job sits in a file until it is printed, and then it should be automatically deleted. However, automatic deletion may fail. In that case, the file can be manually deleted by an administrator. Other Print Technologies (scenario) There is a variety of print technologies such as laser, inkjet, thermal, impact, and 3D printers. There are also virtual print options to print to a text, PDF, XPS, or image file. You need to be able to install and maintain each of these print technologies for any given scenario. Laser 25 | P a g e SKILLCERTPRO Laser printers create high quality printouts using a complex process. The component that actually “draws” the image is a laser. It works with other components to transfer that image to the paper. ** Imaging drum, fuser assembly, transfer belt, transfer roller, pickup rollers, separate pads, duplexing assembly**—  Imaging drum: The laser “draws” the page image onto the imaging drum.  Fuser assembly: The fuser assembly applies pressure and heat to bond the toner to the paper.  Transfer belt: Used in color laser printers, the transfer belt transfers the page image from the imaging drum to the paper.  Transfer roller: Used in black-and-white laser printers, the transfer roller transfers the page image from the imaging drum to the paper.  Pickup rollers: Rubber pickup rollers feed paper from the paper tray through the printer.  Separate pads: To ensure that only one page is fed at a time, separate pads separate the page begin fed from the pages underneath it.  Duplexing assembly: To print on both sides of the paper, the duplexing assembly will flip the paper over. ** Imaging process: processing, charging, exposing, developing, transferring, fusing, and cleaning**—  Processing: Before any actual printing is done, the image of the full page in placed into memory.  Charging: A high negative charge is applied to the imaging drum.  Exposing: The laser “draws” the image of the page onto the imaging drum by exposing it to the laser light. The tightly focused laser light removes the negative charge from (neutralizes) the imaging drum, leaving the rest of the drum negatively charged.  Developing: The negatively charged toner is transferred to the imaging drum. Since the drum is also negatively charged, the toner will only stick to the areas that have been neutralized by the laser.  Transferring: The transfer roller or transfer belt transfers the toner from the drum to the paper.  Fusing: A fusing roller users heat and pressure to bond the toner to the paper.  Cleaning: Any residual toner is cleaned off of the imaging drum. Maintenance: Replace toner, apply maintenance kit, calibrate, clean— Laser printers tend to be expensive, so regular maintenance must be done to keep them running well for a long time. Manufacturers make this fairly easy for common maintenance tasks like replacing toner. Other tasks require more knowledge and skill.  Replace toner: Toner is used for each print job, so it must periodically be replaced. Toner comes in a toner cartridge that is easily replaced by the user.  Apply maintenance kit: Printer manufacturers recommend replacing certain parts periodically. They provide these parts in maintenance kits. They may include the fuser assembly, transfer belt, transfer roller, pickup rollers, and/or separate pads.  Calibrate: Calibration is done to keep the page image sharp and accurate. This may be done on a periodic basis and when parts are replaced. Each printer will have its own calibration process.  Clean: Toner is a fine powder that will leave residue in the printer. Keeping the inside of the printer clean will keep it running well and prevent loose toner from showing up on printouts. Inkjet 26 | P a g e SKILLCERTPRO Inkjet printers create high-quality printouts, though the resolution can be less than that of laser printers. They are also much less expensive. They create the page image by spraying ink dots onto precise points on the paper. Several components work together to transfer the page image to the paper. ** Ink cartridge, print head, roller, feeder, duplexing assembly, carriage, and belt**—  Ink cartridge: Ink is stored in ink cartridges that supply ink to the print heads. There may be a separate cartridge for each of the standard colors used — cyan, magenta, yellow, and black. Some inkjet printers use a combined color cartridge with cyan, magenta, yellow ink plus a black ink cartridge.  Print head: The print head draws the ink from the cartridge and ejects it onto the paper. Some printers combine the ink cartridge and print head into a single unit.  Roller: Paper is fed through the printer by the roller.  Feeder: Paper may be fed from either a simple paper tray or a feeder. Most feeders have adjustments to allow you to feed papers of varied sizes.  Duplexing assembly: The duplexing assembly flips the paper over so that you can print on both sides. It is not found on all inkjet printers.  Carriage: The carriage holds the print heads and gets moved into position so the print heads can eject the ink onto the proper spot on the paper.  Belt: The belt moves the carriage into position so the print heads can eject the ink onto the proper spot on the paper. Calibrate—Calibration is done to keep the page image sharp and accurate. This may be done on a periodic basis and when parts are replaced. The printer should be calibrated whenever a print head or ink cartridge is replaced. Each printer will have its own calibration process. Maintenance: Clean heads, replace cartridges, calibrate, clear jams—Inkjet printers require minimal maintenance that is easily done using features available using the printer’s menus or software. To determine if maintenance is needed, test pages specifically designed to point out flaws can be printed from the printer’s menus or software.  Clean heads: Printer heads can get clogged over time. Cleaning the heads can be done by selecting a menu option or through the printer’s software. When initiated, the printer will run through a head cleaning process.  Replace cartridges: When the ink in a cartridge has been used up, the cartridge must be replaced. A calibration should be done after replacing a cartridge.  Calibrate: Calibration is done to keep the page image sharp and accurate. This may be done on a periodic basis and when parts are replaced. The printer should be calibrated whenever a print head or ink cartridge is replaced. Each printer will have its own calibration process.  Clear jams: Paper may get jammed in the printer as it is fed through. It may be cleared manually by simply pulling it out. Some printers provide a way to run just the feeder, either manually by turning a wheel or by running the feed motor. Thermal Thermal printers use chemically treated thermal paper that changes color when heated. It is the heat, rather than ink, that transfers the image to the paper. They 27 | P a g e SKILLCERTPRO are simple and inexpensive. Common uses are for receipts and shipping labels. The image printed is sensitive to light and heat, so it will fade over time. Feed assembly, heating element—  Feed assembly: The feed assembly feeds the thermal paper through the printer.  Heating element: The heating element heats specific areas of the thermal paper as it scrolls by. The heated areas darken to create the image. Special thermal paper—Thermal paper is chemically treated paper that changes color when heated. Maintenance: Replace paper, clean heating element, remove debris—Maintaining thermal printers is simpler than other types of printers. There are fewer moving parts and no ink.  Replace paper: Thermal paper comes in rolls of various sizes. Replacing the paper is a simple matter of removing the empty roll and inserting the new roll. There is a button or wheel that can be used to feed the paper into the printer after the new roll is inserted.  Clean heating element: The heating element should be cleaned periodically to ensure proper heat transfer to the paper. Isopropyl alcohol is typically used as the cleaning agent. Some printers come with a pen or pad to make it easier to access the heating element for cleaning.  Remove debris: Paper fragments and dust will accumulate in the printer over time. This debris should be removed as needed. A commonly used method is to blow out the debris with compressed air. Impact Impact printers use a matrix of pins to strike an ink ribbon to transfer ink to the paper. The most common type is the dot-matrix printers. A unique feature of impact printers as compared to other printers is that they can print multiple copies simultaneously using carbonless or NCR (no carbon required) paper. ** Print head, ribbon, tractor feed**—  Print head: The print head is a row or rectangular matrix of metal pins. The pins that strike the ink ribbon form the character to be printed.  Ribbon: The ribbon holds the ink that is transferred to the paper by the print head during printing.  Tractor feed: The tractor feed feeds the paper through the printer. ** Impact paper—Impact paper is simply paper made for impact printers. It may come on a **roll or as fanfold paper in single-ply, duplicate, or triplicate. Duplicate and triplicate paper transfers the image through to all copies simultaneously. Maintenance: Replace ribbon, replace print head, replace paper—There is little maintenance required on impact printers. In most printers, these items can all be replaced by the user.  Replace ribbon: Ribbon replacement is usually a simple task. The new ribbon should be taught, leaving no slack. 28 | P a g e SKILLCERTPRO  Replace print head: The pins in a print head can get bent or broken. So the print head will eventually need to be replaced. The print head does get hot due to the friction or rapidly moving parts, so care must be taken to ensure it cools down before touching it. It is held in by a lever that must be released to remove the old print head.  Replace paper: Paper replacement requires a bit more effort than in other types of printers. The paper has holes along the side that are placed into the tractor feed. These must be aligned so that the paper feeds properly. Also, since the paper is continuous, as opposed to separate sheets, the top of the page must be lined up properly. Virtual A virtual printer is a printer drive that creates a file rather than a paper copy. The file can take the form of a printer file (PRN), portable document format file (PDF), XML Paper Specification file (XPS), or image file. Print to file—Print to file is an option in the Windows™ print dialog. When a file is sent to a printer, the printer driver sends instructions to the printer to control printer functions. The Windows™ print to file option embeds the printer instructions you would select in the print dialog in a file with a.prn extension. The.prn file can then be used to print to that model of printer, even if the application that created the original file and the printer driver are not available. Print to PDF—A Portable Document Format file stores an image of a file that is identical to a printout of that file. This allows it to be shared with other people or computers to be printed regardless of what operating system and application created it. Print to XPS—An XML Paper Specification file is a Microsoft™ file format that, like PDF files, stores an image of a file that is identical to a printout of that file. Microsoft™ provides an XPS Document Writer printer driver to create XPS files. To view or print XPS files, Microsoft™ provides an XPS Viewer. Print to image—Operating systems and graphics applications each have ways to save a file or screen capture to an image file. For example, Windows™ 10 includes a Snipping Tool™ that captures a screen or portion of it and save it as a PNG, GIF, JPEG, or HTML image file. 3D Printers 3D printers create three-dimensional objects from a digital file. 3D printing is also known as additive manufacturing. The model represented in the file is divided into horizontal cross-sections or slices. The bottom slice is laid down using precisely positioned melted plastic. Then the next slice is laid on top of it. This repeats until the full object is formed. Plastic filament—The plastic used for 3D printing comes in the form of plastic filament. The filament is fed from spools through a heated nozzle that melts and positions the plastic. It then cools to a solid to form the object. 29 | P a g e SKILLCERTPRO How to Prepare for Questions about Hardware and Network Troubleshooting on the CompTIA A+ Core Series 1001 Test General Information Over one-fourth (27%) of the CompTIA A+ Core Series 1001 test is devoted to questions about this topic, so you’ll need to know the content well. In addition, all of these questions will relate to a scenario given in the question introduction. So, you’ll need to decide what you would do in that situation, relying on your knowledge of proper procedures and hardware and network concepts. Methodology (scenario) Consider this situation: “After arriving at work and logging in to your system, you start looking over the trouble tickets that are in your queue. While triaging them, you receive a phone call from Mary in accounting. She cannot log in to the system and has a meeting in 15 minutes. She is very irate that she cannot access her files for this meeting and is unable to finish her preparations.” What’s the first thing you tell her? How do you go about troubleshooting this? Ensure that you consider all corporate policies, procedures, and impacts prior to implementing any changes to any system. Identify the Problem While there are numerous avenues that can be taken for the situation above, the onus is on you, the technician, to identify the problem. Always remember, users don’t always tell you everything, especially when emotions are involved and the possibility of not being prepared for their supervisor is a looming possibility. Simply calming the user down a little can move the conversation in the right direction. User Be calm and ask questions to the user while attempting to identify any changes to the computer that might have been performed such as security patches, physical movement, etc. These can be simple to correct and have the user back online in moments. (for example, if the cleaning company physically moved the computer while cleaning, Mary’s network cable might have come unattached and she is no longer physically connected to the network.). Be sure to make a backup of her files prior to attempting any changes on the computer itself just in case there is a larger issue and her system cannot be recovered. Changes 30 | P a g e SKILLCERTPRO Consider all the changes that could affect the user (network, computer, power issues, external connection, user account, etc.) and how those changes can be involved in the problem. As an example, let’s say the Network team worked over the weekend performing an upgrade to the infrastructure (switch replacement) and neglected to plug all the cabling back into the switch (as simple as a cable falling behind the wiring channel and being missed). Mary might have been the one missed and now she cannot authenticate to the network, cannot access her files, cannot print to the network printer, and therefore cannot perform her morning functions prior to her meeting. These things happen daily and other teams can be conducting changes without regard to the effect on employees. Logs If Mary’s system is on the network but she cannot authenticate, then there are a variety of methods that can be used to verify and/or troubleshoot her issue remotely (possibly faster than getting to her work space). Obtaining her computer name and opening up her event viewer from your workstation can give a wealth of knowledge into why she cannot authenticate. Obviously, this will not work if she is physically disconnected from the network (first thing that should be checked). By opening the Event Viewer or Computer Management on your workstation, you can choose to “Connect to Another Computer” and enter her computer name (or IP address, if known) to open her event log. From there, choose Windows Logs and peruse the list of log files given. Starting with the Application, look for any errors (noted with a red circle around an exclamation point) or a warning (noted with a yellow triangle around an exclamation point). These are indicators that something is amiss and should be investigated further. Develop a Theory Keep it simple. Always question the obvious and don’t think something isn’t relevant. You might think it is common sense to be plugged into the network, but the user might not know this. Using your questioning ability, develop a theory (or two) regarding what the problem might be. Another point to remember when developing your theory is that someone, somewhere has possibly run into this issue already. The Internet can be your friend or your worst enemy and the ability to decipher what you glean from the Internet is a valuable resource. Test the Theory When you have your theory developed, you need to test it. On a time-sensitive issue, or if you know 100% that the theory is valid, then you can implement it based upon corporate policies and/or procedures. In a perfect world, you would be able to replicate the issue within a testing (or laboratory) environment for verification. This isn’t always the case and you should be ready to test your theory at a moment’s notice. If Theory Is Confirmed Only test one possible solution at a time and only make one change at a time. Sounds like a lengthy process? Yes, but if you implement multiple changes in one process how do you 31 | P a g e SKILLCERTPRO know which one worked and which one didn’t? Remember, keep it simple. If your theory is confirmed, then you can skip to the plan of action to implement your theory. If not, then it’s back to testing again. No worries, proper troubleshooting is an art. If Theory Is Not Confirmed You’ve tested your theory and the problem still exists. Step back and take a look at your theory to see what other avenues are available and develop a working theory regarding the next possible solution. Plan of Action Always remember: Your company’s policies and procedures take precedence and should be in the forefront prior to acting on any plan. The conclusion that you make might possibly affect the whole company, but that might also be needed depending on the breath of the issue. Does correcting the issue require downtime for the company or just a computer? Can that be scheduled around the users workday? Does it need to happen immediately? These are all questions that should be included in your plan of action. Verify When implemented, does your solution fully rectify the problem and return all systems to functionality? Does the user have access to all documents and functions? Is there any way to prevent these issues from arising again? Document Documentation! We can’t express how important it is for issues to be fully documented. Everything that you have done from the moment the user contacted you to the moment the user was back online such as indications, findings, actions, outcomes, scenarios, etc. Your company should have a repository (also known as a knowledge base) to keep this information safe. It should also be possible to share among your peers in the event the same type of issue arises in the future. Motherboards, RAM, CPUs, and Power (scenario) Listed below are some of the more common symptoms of issues in this area. There are many different situations that can arise when these types of hardware components start failing. For example, let’s say Jim from the mailroom calls the help desk and states that his computer is running slow. What are some of the first questions you should ask him? Starting with the specifications of his workstation might be good. If he only has 2 Gb of Random Access Memory installed and is using a memory-intensive program, then that might be a cause for his slowness.  Unexpected shutdowns—These can be caused by hardware that’s failing or by adding new hardware that’s incompatible. 32 | P a g e SKILLCERTPRO  System lockups—They can be caused by something freezing up the operating system, such as a bad system or application process, or by using old software or driver versions. Maxed- out RAM can also cause a lockup.  POST code beeps—Errors in the Power On Self Test are associated with hardware components required to successfully boot the system. The cause of these could be problems with BIOS configuration or hardware.  Blank screen on bootup—BIOS or CMOS battery issues can be the root of this problem. Also check video signals.  BIOS time and setting resets—These indicate a problem with the BIOS CMOS battery.  Attempts to boot to incorrect device—This can be caused by a problem with the boot settings within the BIOS.  Continuous reboots—These could be related to BIOS problems or OS problems. Problems with a bad driver may also be responsible.  No power—Power outlet or power supply issues are usually the cause of this.  Overheating—Problems with the fan, heat sink, dust accumulation, or something blocking the air circulation can all cause a device to overheat.  Loud noise—This can be a result of loose hardware or issues with the hard drive.  Intermittent device failure—Hardware is usually responsible for this, in the form of a bad hardware installation, overheated components, hardware going bad, or hardware not fully connected to motherboard.  Fans spin—no power to other devices—This can be caused by a problem with the motherboard. Also check the power supply.  Indicator lights—Indicator lights can inform you of certain problems going on with computer hardware or tell if there is activity or power coming from a certain connection point. Consult the computer’s documentation for more information about this.  Smoke—Smoke can indicate a blown capacitor.  Burning smell—Again, a bad capacitor or a burned-out hardware piece can be the culprit.  Proprietary crash screens—This could be caused by faults in the OS system files.  Distended capacitors—There could be a defective capacitor from manufacturer or overheating inside the case (bad fan)  Log entries and error messages—Can indicate a variety of issues from improper credentials to failing hardware. Hard Drives and RAID Arrays (scenario) Clicking, grinding, whining, whirring—these are all indications of failing hard drives. You won’t hear much from a Solid State Drive (SSD), but you may on a conventional hard disk drive that spins at an amazing speed (5400 rpm, 7200 rpm, 10000 rpm, and beyond). Below 33 | P a g e SKILLCERTPRO is a small list of indications of a hard drive beginning to fail (or having failed, in some cases). Server hard drives are a little more difficult to detect, as they are normally in a server room with other servers. These rooms can be very noisy. A good practice for server rooms is to turn off the overhead lights and watch the hard drive indicators. If you see an amber light, troubleshoot this server a little further. There are various software platforms that will notify the operator (regarding servers) of the “health” of the hard drive, but nothing compares to physically checking periodically.  Read/write failure— This indicates a dying hard drive and could happen if the read/write head crashes.  Slow performance— This can indicate that a drive has already failed or that there are errors on the drive files. There may also be issues with virtual memory.  Loud clicking noise— This can be caused by a mechanical failure within the drive itself.  Failure to boot— This failure could be a hardware or software issue, depending on what stage the boot process gets to before it happens. Check in BIOS settings for removable devices such as USB drive. Cables and connectors can also cause the problem.  Drive not recognized— Typically, this indicates a hardware issue with one of the drives. This could be a failed component, a data corruption issue, or an error in BIOS settings.  OS not found— This message indicates a software issue with loading the operating system.  RAID not found— This problem could be caused by issues with the RAID controller or the management software.  RAID stops working— This can happen in any RAID array that does not mirror data. It is usually caused by one of the drives failing.  Proprietary crash screens (BSLO/pin wheel)— This is known as the “blue screen of death.” On Windows, this is a stop error, and on Apple, you will get a continuous pinwheel on the screen. This typically indicates a fatal failure, such as a CPU dying or a burned-out part.  S.M.A.R.T. errors— This stands for Self Monitoring Analysis and Reporting Technology, and it includes multiple error categories known as SMART statistics. These can proactively see issues before a drive fails completely. Video, Projector, and Display (scenario) Consider this situation: A call comes in to the help desk, the Chief Financial Officer (CFO) has started a meeting with the “C” level officers (including the Chief Executive Officer, CEO) in your company and the projector won’t power on. This has happened before and will happen again. What’s the next step? Below are some of the more common symptoms to look for. Watch out, those projector bulbs can be hot! 34 | P a g e SKILLCERTPRO  VGA mode— This mode is similar to Safe Mode but for display issues. The PC boots with the minimum video drivers in use, which is helpful for troubleshooting.  No image on screen— This can happen if there is a cabling issue, or a connection is not seated properly.  Overheat shutdown— A shutdown of this sort could be due to problems with the video card or blocked airways for ventilation.  Dead pixels— This issue is typically related to the hardware, or the monitor itself. Replacement of the display is usually necessary to correct it.  Artifacts— These could be caused by problems with the adapter or video drivers.  Incorrect color patterns— Damaged cables or a damaged connection port on the PC may be responsible for this malfunction.  Dim image— This irregularity often has something to do with brightness settings on the display or with adapter issues.  Flickering image— This happens when there are damaged cables or a damaged connection port on the PC.  Distorted image— The system settings on your OS may be responsible for a distorted image. The refresh rate or resolution may be at fault.  Distorted geometry— This variance could be caused by display settings, video card issues, or magnetic interference.  Burn-in— This is caused when images stick on the screen and become permanent parts of the display. It could be caused by stuck pixels.  Oversized images and icons— If the resolution of the monitor does not match the system settings, this can be the result. Common Mobile Devices (scenario) Mobile devices are here to stay and are computers just like laptops, desktops, etc. Only difference is they are smaller, much smaller. Compact and portable, mobile devices can be much tougher to troubleshoot than conventional devices. Your company policy will dictate the level of repair you will be required to perform on these. If the device is personally owned, you might not be required to touch it. Common Symptoms Below are some fairly common symptoms and corresponding questions you should ask with regard to mobile devices. Ensure you have a very clean workspace and sufficient lighting prior to undertaking a major repair.  No display— Was the device dropped? Does the device power on (as evidenced by the power indicator, if equipped). Is the device charged? 35 | P a g e SKILLCERTPRO  Dim display— Verify display settings are at factory settings prior to attempting to diagnose this symptom.  Flickering display— Perform a “Hard Reset” (based on the equipment manufacturer). Is the device warm to the touch? Has it been in the sun for an extended period of time?  Sticking keys— Verify that no liquid or sticky food products have come in contact with the device.  Intermittent wireless— Where is this occurring? It could be spotting signals based upon your distance from the tower (or antenna).  Battery not charging— Is it plugged in to a proper power receptacle? Is the cable frayed or damaged any other way? Is it an original manufacturer cable or aftermarket cable?  Ghost cursor/pointer drift— Is cursor drifting when you’re not controlling it? Is there another pointing device connected, like a wireless mouse? Is your mouse or trackpad dirty or physically damaged?  No power— Is the battery charged? Does it work when connected to an AC power supply? Is it stuck in hibernation? Does it respond to a hard reset procedure?  Num lock indicator lights— Is it a problem or a desired function by the user, trying to use the additional number keys? Some portable devices that don’t have full keyboard combine key functions. If you can’t find the Num Lock key, check if there’s a FN key that would allow engaging the Num Lock light. Is Num Lock enabled by default in BIOS settings?  No wireless connectivity— Is the wireless network available and working with another wireless device? Is Wi-Fi enabled on the device? Is Wi-Fi network configured with the right password?  No Bluetooth connectivity— Is Bluetooth enabled on the device? Is Bluetooth set to discoverable mode? Are the devices within range? Is the device paired with the right code? Is the Bluetooth device on and is the battery charged?  Cannot display to external monitor— Is it connecting to the monitor with the cable or wirelessly? Is it a good known cable? Is the external monitor set to show the right source of signal? If it is a wireless connection, are devices paired? If they cannot pair, do devices support the same wireless casting protocols and technologies?  Touchscreen non-responsive— Is the screen dry and clean? Are you using clean, dry fingers, with no gloves on the screen? Does the device react to any other hardware inputs or frozen?  Apps not loading— Are there any error messages when loading the app? Are there enough free system resources to run the app? Is it the latest version of the app? Does reinstalling the app help?  Slow performance— Are there many apps or processes that run at the same time? Are there enough free system resources? Does the hardware meet the system requirements of the software running? 36 | P a g e SKILLCERTPRO  Unable to decrypt email— Is S/MIME enabled on the device? Can this email be successfully decrypted on another device?  Extremely short battery life— Is the battery swollen or very hot? Is the battery old? Is the right charged being used to charge the battery? Are there many apps and processes running on the device?  Overheating— Are there many apps and processes running on the device? Is there dust or debris blocking the cooling vents? Is the device in direct sunlight?  Frozen System— Are there many apps and processes running on the device? Is it low on battery? Is it very hot? Does it respond to a hard reset procedure?  No sound from speakers— Is the volume level set not too low and not muted? Is there a hardware mute switch on the device? Is it paired with a Bluetooth speaker or have headphones connected?  GPS not functioning— Are you located outside a building with a clear view of the sky? Does restarting the device help? Are location services enabled in the device settings?  Swollen battery— Is it an old or low quality replacement battery? Was the right charger used to charge it? To Disassemble Disassembling computer systems, large and small, should be a meticulous undertaking. Documentation is key. Each part has a specific purpose and can be disastrous if not placed back in its original function. The manufacturer normally has diagrams to refer to online.  Document and label— It is important to document what you are doing as you are taking apart a mobile device. You should include locations of all parts, and label any pieces that you remove. These tiny parts are typically very easy to remove, but get complex and confusing when it comes to reassembling everything. You could even take pictures, if it will help you remember exactly where a part goes. When handling small screws, it is best to be on a workbench with a raised lip and part particular attention to screw sizes, as the wrong screw size could crack a display screen.  Organize— Many professionals make use of organization bins to sort and store all of the various parts when disassembling a mobile device. This is another way to help keep you organized and help you remember the location of each part.  Refer to resources— If you have trouble knowing exactly what to take apart, or you would just like some extra information, always feel free to consult the manufacturer’s documentation. This can be paper documentation or gleaned online from their website.  Tools— Mobile devices often have their own specialized set of tools with which to work. These tools are especially important, as they are made specifically for the mobile equipment. Standard tools may not work or they may damage the delicate mobile parts. Printers (scenario) 37 | P a g e SKILLCERTPRO Given a scenario, you’ll need to be able to troubleshoot printers. Although a lot of information is being passed digitally, printers still have their uses in offices and IT professionals need to know their way around troubleshooting and maintaining them. Inkjet and laser are the most common printer types in offices. Other less common printer types are impact and thermal. Printers can be either directly connected to a computer for local use, or shared over a network. Common Symptoms Below are some fairly common symptoms, corresponding troubleshooting steps, and questions you should ask with regard to printers and printing issues.  Streaks— These are usually caused by ink residue. Follow the printer’s cleaning procedure. This may include physical cleaning of internal parts of a printer, or a cleaning process that can be triggered by the printer’s software. Try printing a test page—are there streaks, too? Sometimes streaks may be caused by the scanning part of a copier, not being a printing problem.  Faded prints— Check toner or ink levels. Try replacing the cartridges with new ones, of known good quality. Check printing settings. Are there any ink saving settings enabled that may reduce the amount of ink or toner used?  Ghost images— This may happen only on laser printers due to self-cleaning problem. Try replacing the drum.  Toner not fused to the paper— This may only happen on laser printers due to a fuser problem. Try replacing the fusing roller or the fuser lamp.  Creased paper— Paper gets creased due to a feeding problem. Follow the same troubleshooting steps as for a paper jam.  Paper not feeding— Follow the same troubleshooting steps as for a paper jam.  Paper jam— There are many reasons to frequent or sporadic paper jams. The reasons can be categorized as related to the paper or to the printer hardware. Ensure that the paper size and weight used are as recommended by the printer’s manufacturer. Try using a new, dry pack of good quality paper. Don’t load too much paper at once. Bend the stack of paper to separate sheets before loading. If the problem is not with the paper, then the printer hardware needs to be checked. Check to see if the printer has been maintained per the manufacturer’s recommendations. Some printers have a page counter and recommendations on replacing specific internal parts to prevent paper jams. If the jams are very frequent, check for broken parts in the feeding path.  No connectivity— For a printer that is directly connected to the computer you’re using to print: is it turned on? Is it connected correctly with a good cable? Have the drivers been installed? For a printer on a network: follow network troubleshooting steps. Is the printer connected to the network, can it be reached by other computers on the same network? Have the drivers been installed on the computer? 38 | P a g e SKILLCERTPRO  Garbled characters on paper— This may mean a software or connection issue. Are correct drivers installed? Is the printer connected firmly with a good cable? Is there enough RAM free on the printer?  Vertical lines on page— Similar to streaks troubleshooting, these may be caused by toner or ink residue. Ensure that the internals are clean and the cartridge is not leaking.  Backed-up print queue— Is the printer jammed or doesn’t have paper or ink to print? This may be a spooler issue. Does restarting the printer or the printing computer clear the queue?  Low memory errors— Printer has internal memory to store and manage the print jobs. Is the printing document very large, has a lot of pages, or high-resolution graphics? Try reducing the source file. Some printers may allow increasing memory by adding the hardware RAM internally.  Access denied— Does the computer user have the system permissions to print? Try printing as a different user, and modify the user permissions to allow printing.  Printer will not print— Check printer power, status messages, connectivity. If everything seems right, but it wouldn’t print, check the spooler service on the printing computer. Does restarting the spooler service help? Disable the spooler to print directly to printer.  Color prints in wrong color— Color printers use base colors to create shades of all other colors. Wrong color is usually due to one of the ink or toner cartridges being empty or malfunctioning. Print a test page to rule out software configuration issue. Replace the cartridges with known good ones.  Unable to install printer— Are you using the correct drivers for your operating system? Consult with the printer’s documentation or support website to check for current, compatible drivers.  Error codes— Error codes would direct you to the issue, usually with paper, ink or toner, or memory. Troubleshoot these errors accordingly.  Printing blank pages— This is usually an ink or toner quantity or quality issue. Rule out a software configuration issue by printing a test page. Check if the cartridges are not empty and not dried out due to lack of use. Replace with new, good cartridges.  No image on printer display— Is the printed connected to a good power source and turned on? Try reconnecting the power. If there’s still no display on the printer’s LCD screen, the screen or the printer may be malfunctioning.  Multiple failed jobs in logs— Are there specific errors on these jobs that can direct to the troubleshooting steps (such as toner, paper, access issues)? This may be due to spooler issues. Restart the spooler service. Try disabling spooler and print directly to the printer, with no queueing. Wired and Wireless Networks (scenario) Given a scenario, you will need to troubleshoot common wired and wireless network problems. Networks are in the heart of today’s computing. A failure in network access has a 39 | P a g e

Use Quizgecko on...
Browser
Browser