Document Details

IndustriousFrancium2889

Uploaded by IndustriousFrancium2889

Tags

computer technology personal computer hardware ICT

Summary

These notes provide an introduction to computer technology, focusing on personal computer hardware and components. Topics covered include PC components like cases, power supplies, connectors, and motherboards, along with memory types, storage devices, and video ports. The notes also cover electrical safety and ESD precautions.

Full Transcript

IDP00504 INTRODUCTION TO COMPUTER TECHNOLOGY 1 TABLE OF CONTENTS Num Chapter Page 1 CHAPTER 1: Introduction to Personal Computer 3 2 CHAPTER 2: PC Assembly 30 3 CHAPTER 4: Preventives...

IDP00504 INTRODUCTION TO COMPUTER TECHNOLOGY 1 TABLE OF CONTENTS Num Chapter Page 1 CHAPTER 1: Introduction to Personal Computer 3 2 CHAPTER 2: PC Assembly 30 3 CHAPTER 4: Preventives Maintenance & Troubleshoot 47 4 CHAPTER 5: Windows Installation 54 5 CHAPTER 6: Introduction to Productivity Tools 65 6 CHAPTER 7: Networking Concepts 66 7 CHAPTER 8: Basic System Administration 78 2 CHAPTER 1 - Introduction to Personal Computer & HardwareFile 1.1 Personal Computer 1.12 Electrical Safety Electrical devices have certain power requirements. AC adapters are manufactured for specific laptops. Exchanging AC adapters with a different type of laptop or device may cause damage to both the AC adapter and the laptop. Some printer parts, such as power supplies, contain high voltage. Check the printer manual for the location of high-voltage components. Follow electrical safety guidelines to prevent electrical fires, injuries, and fatalities. 1.13 ESD Electrostatic discharge (ESD) can occur when there is a buildup of an electric charge that exists on a surface which comes into contact with another differently charged surface. ESD can cause damage to computer equipment if not discharged properly. At least 3,000 volts of static electricity must build up before a person can feel ESD. Follow these recommendations to help prevent ESD damage: Keep all components in antistatic bags until you are ready to install them. Use grounded mats on workbenches. Use grounded floor mats in work areas. Use antistatic wrist straps when working inside computers. 3 1.2 PC Components 1.21 Cases The case houses the internal components such as the power supply, motherboard, central processing unit (CPU), memory, disk drives, and assorted adapter cards. The term form factor refers to the physical design and look of a case. Common desktop computers are available in form factors including: Horizontal case Full-Size Tower Compact Tower All-in-one 1.22 Power Supplies Computers use a power supply to convert AC power into a lower voltage DC power required by internal components. Desktop computer power supply form factors include: Advanced Technology (AT) – original power supply for legacy computer systems AT Extended (ATX) – updated version of the AT ATX12V – the most common power supply on the market today EPS12V – originally designed for network servers but is now commonly used in high-end desktop models. 1.23 Connectors A power supply includes several different connectors. They are used to power various internal components such as the motherboard and disk drives. Some examples are: 20-pin or 24-pin slotted connector SATA keyed connector Molex keyed connector Berg keyed connector 4-pin to 8-pin auxiliary power connector 6/8-pin PCIe power connector 1.24 Power Supply Voltage The different connectors in a power supply also provide different voltages. The most common voltages supplied are 3.3 volts, 5 volts, and 12 volts. 4 The 3.3 volt and 5 volt supplies are typically used by digital circuits, while the 12 volt supply is used to run motors in disk drives and fans. Power supplies can also be single rail, dual rail, or multi rail. A rail is the printed circuit board (PCB) inside the power supply to which the external cables are connected. A computer can tolerate slight fluctuations in power, but a significant deviation can cause the power supply to fail. 1.25 Motherboard The motherboard is the backbone of the computer. It is a printed circuit board (PCB) that contains buses, or electrical pathways, that interconnect electronic components. These components may be soldered directly to the motherboard, or added using sockets, expansion slots, and ports. 1.26 Motherboard components Major components on a motherboard include: Central Processing Unit (CPU) Random Access Memory (RAM) Expansion slots Chipset Basic input/output system (BIOS) chip and Unified Extensible Firmware Interface (UEFI) chip SATA connectors Internal USB connector 5 1.27 Motherboard Form Factors The form factor of motherboards pertains to the size and shape of the board. There are three common motherboard form factors: Advanced Technology eXtended (ATX), Micro-ATX, and ITX. The choice of motherboard form factor determines how individual components attach to it, the type of power supply required, and the shape of the computer case. 1.28 CPU 6 The central processing unit (CPU) is responsible for interpreting and executing commands. The CPU is a small microchip that resides within a CPU package. The CPU socket is the connection between the motherboard and the processor. 1.29 Cooling Systems Computer components perform better when kept cool. Computers are kept cool using active and passive cooling solutions. Active solutions require power while passive solutions do not. Passive solutions for cooling usually involve reducing the speed at which a component is operating or adding heat sinks to computer chips. A case fan is considered as active cooling. 7 1.210 Types of Memory A computer might use different types of memory chips. All memory chips store data in the form of bytes. A byte is a block of eight bits stored as either 0 or 1 in the memory chip. Read-Only Memory (ROM) – such as ROM chip. Random Access Memory (RAM) is the temporary working storage for data and programs that are being accessed by the CPU. RAM is volatile memory. Adding more RAM in a computer enhances the system performance. However, the maximum amount of RAM that can be installed is limited by the motherboard. 1.211 Types of ROM Types of Read-only Memory (ROM) include: ROM chips. PROM chips. EPROM chips EEPROM chips. 8 1.212 Types of RAM Types of Random Access Memory (RAM) include: Dynamic RAM (DRAM) Static RAM (SRAM) Synchronous Dynamic RAM (SDRAM) Double Data Rate Synchronous Dynamic RAM (DDR SDRAM) DDR2 Synchronous Dynamic RAM (DDR2 SDRAM) DDR3 Synchronous Dynamic RAM (DDR3 SDRAM) DDR4 Synchronous Dynamic RAM (DDR4 SDRAM) GDDR Synchronous Dynamic RAM (GDDR SDRAM) 1.213 Memory Modules Memory chips are soldered to a circuit board to create a memory module which is placed into a memory slot on the motherboard. Different types of memory modules include: DIP, SIMM, DIMM memory, and SODIMM. The speed of memory has a direct impact on how much data a processor can process in a given period of time. The fastest memory is typically static RAM (SRAM) which is used as cache memory 1.214 Adapter Cards Adapter cards increase the functionality of a computer by adding controllers for specific devices or by replacing malfunctioning ports. Common adapter cards include: Sound adapter Network Interface Card (NIC) Wireless NIC Video adapter or display adapter Capture card 9 TV tuner card Universal Serial Bus (USB) controller card eSATA card Computers have expansion slots on the motherboard to install adapter cards. The type of adapter card connector must match the expansion slot. Common expansion slots include: Peripheral Component Interconnect (PCI) Mini-PCI PCI eXtended (PCI-X) PCI Express (PCIe) Riser card Accelerated Graphics Port (AGP) 1.215 Types of Storage Devices Data drives provide non-volatile storage of data. Some drives have fixed media, and other drives have removable media. Data storage devices can be classified according to the media on which the data is stored: 10 Magnetic – like hard disk drive and tape drive Solid state – like solid state drive Optical – like CD and DVD 1.216 Magnetic Media Storage This type of storage represents binary values as magnetized or non-magnetized physical areas of magnetic media. Common types of magnetic media storage drives: Hard Disk Drive (HDD) – the traditional magnetic disk devices with storage capacity ranging from gigabytes (GBs) to terabytes (TBs). Tape Drive – most often used for archiving data. Tape drives use a magnetic read/write head and removable tape cartridge. Common tape storage capacities vary between a few GBs to many TBs. 11 1.217 Semiconductor Storage Solid-state drives (SSD) store data as electrical charges in semiconductor flash memory. This makes SSDs much faster than magnetic HDDs. SSDs have no moving parts, make no noise, are more energy efficient, and produce less heat than HDDs. SSDs come in three form factors: Disc drive form factor – similar to an HDD Expansion cards – plugs directly into the motherboard and mounts in the computer case like other expansion cards mSata or M.2 modules – these packages may use a special socket. M.2 is a standard for computer expansion cards. 12 1.218 Types of Optical Storage Devices Optical drives are removable media storage devices that use lasers to read and write data on optical media. They were developed to overcome the storage capacity limitations of removable magnetic media such as floppy discs. There are three types of optical drives: Compact Disc (CD) - audio and data Digital Versatile Disc (DVD) - digital video and data Blu-ray Disc (BD) - HD digital video and data 1.219 Video Ports and Cables A video port connects a monitor to a computer using a cable. Video ports and monitor cables transfer analog signals, digital signals, or both. Video ports and cables include: Digital Visual Interface (DVI) DisplayPort High-Definition Multimedia Interface (HDMI) Thunderbolt 1 or 2 Thunderbolt 3 Video Graphics Array (VGA) 13 Radio Corporation of America (RCA) 1.220 Other Ports and Cables Input/output (I/O) ports on a computer connect peripheral devices, such as printers, scanners, and portable drives. A computer may have other ports: Personal System 2 (PS/2) Audio and game port Network Serial AT Attachment (SATA) Integrated Drive Electronics (IDE) The Universal Serial Bus (USB) 14 1.221 Adapters and Converters There are many connection standards in use today. These components are called adapters and converters: Converter – performing the same function as an adapter but also translates the signals from one technology to the other. Adapter – physically connecting one technology to another Example of adapters include: DVI to VGA Adapter USB to Ethernet adapter USB to PS/2 adapter DVI to HDMI adapter Molex to SATA adapter HDMI to VGA converter 15 1.222 The Original Input Devices Input devices all the user to communicate with a computer. Some of the first input devices include: Keyboard and Mouse – these are the two most commonly used input devices ADF / Flatbed Scanner – these devices digitize an image or document Joystick and Gamepad – these devices are used for playing games KVM Switch – a hardware device that can be used to control more than one computer while using a single keyboard, monitor, and mouse 1.223 New Input Devices Some new input devices include touch screen, stylus, magnetic strip reader, and barcode scanner: Touch screen – input devices with touch or pressure sensitive screens Stylus – a type of digitizer that allows a designer or artist to create artwork by using a pen-like tool Magnetic strip reader – a device that reads information magnetically encoded on the back of plastic cards Barcode scanner – a device that reads the information contained in the barcodes affixed to products A few newer input devices: Digital camera – devices that capture digital images and videos Webcams – video cameras that can be integrated into a computer Signature pad– a device that electronically captures a person’s signature Smart card reader – a device used on a computer to authenticate the user. A smart card may be the size of a credit card with an embedded microprocessor that is typically under a gold contact pad on one side of the card. Microphone – a device that allows a user to speak into a computer and have their voice digitized 16 1.224 Most Recent Input Devices The newest input devices include NFC devices and terminals, facial recognition scanners, fingerprint scanners, voice recognition scanners, and virtual reality headsets: NFC devices and terminals – Near Field Communication (NFC) tap to pay devices Facial recognition scanners – devices identifying a user based on unique facial features Fingerprint scanners – devices identifying a user based on unique fingerprint Voice recognition scanners – devices identifying a user based on unique voice Virtual reality headset – used with computer games, simulators, and training applications with virtual reality functionalities. 1.225 Output Devices An output device takes binary information from the computer and converts it into a form that is easily understood by the user. Examples of output devices include monitors, projectors, VR headsets, printers, speakers, and headphones. 17 1.226 Monitors and Projectors Most monitors use one of three types of technology: Liquid crystal display (LCD) Light-emitting diode (LED) Organic LED (OLED) Most video projectors use LCD or DLP technology. DLP stands for Digital Light Processing Different projectors have different numbers of lumens, which affects the level of brightness of the projected image. 18 1.227 VR and AR Headsets Virtual Reality (VR) uses computer technology to create a simulated, three-dimensional environment. A VR headset completely encases the upper portion of users’ faces, not allowing in any ambient light from their surroundings. Augmented Reality (AR) uses similar technology but superimposes images and audio over the real world in real time. AR can provide users with immediate access to information about their real surroundings. An AR headset usually does not close off ambient light to users, allowing them to see their real life surroundings. 1.228 Printers Printers are output devices that create hard copies of files. A hard copy might be a on a sheet of paper. It could also be a plastic form created from a 3D printer. Different types of printers: Inkjet, impact, thermal, laser, and 3D printers Printers use wired or wireless connections All printers require printing material (such as ink, toner, liquid plastic, etc.) 19 Printers use a driver to communicate with OS 1.229 Speakers and Headphones Speakers are a type of auditory output device. Most computers and mobile devices have audio support either integrated into the motherboard or on an adapter card. Headphones, earbuds, and the earphones found in headsets are all auditory output devices. These may be wired or wireless. Some are Wi-Fi or Bluetooth-enabled. 20 1.3 Laptops and Other Mobile Devices Characteristics of Laptops and Other Mobile Devices 1.31 Mobility Mobility in information technology means the ability to access information electronically from different locations outside of the home or office. Mobile connectivity is limited only by the availability of cellular or data networks. Mobile devices: have self-contained power (rechargeable batteries) are generally small and lightweight do not rely on other connected peripheral devices to operate. 1.32 Laptops Laptops are portable computers that usually run full versions of operating systems such as Microsoft Windows, iOS or Linux. Laptops can have the same computing power and memory resources as desktop computers. Laptops integrate a screen, keyboard, and a pointing device, such as a touchpad, in one portable device. Laptops can be run from an internal battery or from an electrical outlet. They offer connectivity options such as wired or wireless Ethernet networking and Bluetooth. Laptops offer device connection options such as USB and HDMI, but may lack the expansion capability of desktops. In order to make laptops more portable, some peripheral connection options may require additional hardware, such as a dock or port replicator. 1.33 Smartphone Characteristics Smartphones run special operating systems that are designed for mobile devices. Smartphones may have limited OS upgradability and can require the purchase of a new model to take advantage of the latest OS features and apps. Software for smartphones is usually limited to apps that can be downloaded from stores such as Google Play or the Apple App Store. Smartphones use cellular connectivity options for voice, text, and data services. Other data connections include Bluetooth and Wi-Fi. 1.34 Smartphone Features Most smartphones include global positioning system (GPS) functionality. A GPS receiver in the phone uses satellites to determine the geographic location of the device. Some apps allow a smartphone to act as a navigational GPS that provides guidance for driving, biking, or walking. Devices without a GPS service can still determine the location, in a less precise way, by using info coming from nearby mobile service antennas or nearby Wi-Fi access points. 21 Another feature of some smartphones is the ability to "tether", or share, the cellular data connection with other devices. 1.35 Tablets and E-Readers Tablets are similar to smartphones in that they use special mobile operating systems like Android or iOS. Tablets usually offer Wi-Fi and Bluetooth connectivity and most have USB and audio ports. Most of the apps that work on phones are also available for tablets. Unlike smartphones, tablets normally have larger touch-screen displays. Most tablets do not have the ability to access cellular networks and they usually do not include GPS receivers. E-readers, such as the Amazon Kindle, are special purpose devices with black and white displays that have been optimized for reading text. Although they resemble tablets, they lack many of the features and functions that tablets provide. Many have touch displays that make it easy to turn pages, change settings, and access eBooks online. For connectivity, some offer free cellular data connections for downloading books from a specific store, but most rely on Wi-Fi. E-reader battery life is usually longer than tablets 1.36 Wearables: Smartwatches and Fitness Trackers Wearables are smart devices that are meant to be worn on the body or attached to clothing. Smartwatches are a type of wearable that includes a microprocessor, a special operating system, and apps. Sensors in the smartwatch can gather data about various aspects of the body and use Bluetooth to report this information back to another device Some smartwatches can connect directly to a cellular network, utilize GPS location services, provide convenient displays for notifications from apps, and store and play music and playlists. Fitness trackers are similar to smartwatches but are limited to monitoring the body such as physical activity, sleep, and exercise. 1.37 Wearables: Augmented and Virtual Realities In Augmented Reality (AR), computer graphics are integrated with what is seen in the real world. The graphics overlays can range from cartoon characters in a game application to information for emergency management training for first responders. In Virtual Reality (VR), a user wears a special headset which displays graphics from a separate computer. The graphics are immersive 3D and create very realistic worlds. 22 The VR user's motions are detected by sensors which allow the user to interact with and move around in the virtual environment. 1.38 Motherboard The compact nature of laptops requires a number of internal components to fit in a small amount of space. The size restrictions result in a variety of form factors for a number of laptop components, such as the motherboard, RAM, CPU, and storage devices. Some laptop components, such as the CPU, may be designed to use less power. Desktop motherboards have standard form factors. The standard size and shape allow motherboards from different manufacturers to fit into common desktop cases. Laptop motherboards vary by manufacturer and are proprietary. 1.39 Internal Components Laptop internal components are designed to fit into the confined spaces of the laptop form factor: RAM – Laptops use Small Outline Dual In-line Memory Modules (SODIMM) CPUs – Laptop processors are designed to use less power and create less heat than desktop CPUs SATA drives- Laptop storage devices are typically 1.8in or 2.5in in width. Solid-state drives – Laptops use SSD drives for high performance, small size, and low power consumption. 1.310 Special Function Keys The purpose of the Function (Fn) key is to activate a second function on a dual-purpose key. The feature that is accessed by pressing the Fn key in combination with another key is printed on the key in a smaller font or different color or with an icon. Some examples of functions that can be accessed: Dual displays Volume settings Media options such as fast forward or rewind Keyboard backlight Screen orientation Screen brightness WiFi, cellular, and Bluetooth on or off 23 Media options such as play or rewind Touchpad on or off GPS on or off Airplane mode 1.311 Laptop Display Features Some common laptop display features include: Detachable screens – Some laptops permit the touchscreen to be used like a tablet when the display is detached. Touch screens – Laptops with touchscreens have a special glass attached to the front of the screen known as a digitizer. Cutoff switches – A cutoff switch helps conserve power by turning off the display. 1.312 Wi-fi Antenna Connectors Wi-Fi components include: Wi-Fi antenna connectors – Wi-Fi antennas in laptops are typically located above the screen. Wi-Fi antenna leads – The Wi-Fi antenna is connected to a wireless card by an antenna wire and antenna leads. Wi-Fi antenna wire guides – The wires are fastened to the display unit by wire guides located on the sides of the screen. 1.313 Webcam and Microphone Most laptops today have a webcam and microphone built-in. The webcam is normally positioned at the top, center of the display. The internal microphone can often be found next to the webcam. Some manufacturers may place the microphone next to the keyboard, or on the side of the laptop. 1.314 Bluetooth The Bluetooth technical specification is described by the Institute of Electrical and Electronics Engineers (IEEE) 802.15 standard. Bluetooth devices are capable of handling voice, music, videos, and data. The distance of a Bluetooth personal area network (PAN) is limited by the amount of power used by the devices in the PAN The most common Bluetooth technology has a range of approximately 33 ft (10 m). Security measures are included in the Bluetooth standard. The first time that a Bluetooth device connects, the device is authenticated using a PIN. This is known as pairing. Bluetooth supports both 128-bit encryption and PIN authentication. 1.315 Bluetooth Laptop Connections Windows activates connections to Bluetooth devices by default. 24 If the connection is not active, look for a switch on the front face or on the side of the laptop. Some laptops may have a special function key on the keyboard to enable the connection. If a laptop does not include Bluetooth technology, you can purchase a Bluetooth adapter that plugs into a USB port. Before installing and configuring a device: Make sure that Bluetooth is enabled in the BIOS. Turn on the device and make it discoverable. Use the Bluetooth Wizard to search and discover Bluetooth devices that are in discoverable mode. 1.316 Cellular WAN Laptops with integrated cellular WAN capabilities require no software installation and no additional antenna or accessories. Some laptops may use a special function key on the keyboard to enable the connection or a physical switch on the front or side of the laptop. Many cell phones provide the ability to connect other devices to the Internet. This connection, known as tethering, can be made using Wi-Fi, Bluetooth, or by using a USB cable. When a cellular phone allows Wi-Fi devices to connect and use the mobile data network, this is called a hotspot. You can also access a cellular network by using a cellular hotspot device. 1.317 Wi-Fi Laptops usually access the Internet by using wireless adapters. Wireless adapters can be built-in or attached through a USB or expansion port Mini-PCI cards are capable of 802.11a, 802.11b, and 802.11g wireless LAN connections. Mini-PCIe and PCI Express Micro cards support the above standards and 802.11n and 802.11ac. Mini-PCI 25 Mini-PCIe PCI Express Micro 26 1.4 Other Mobile Device Hardware 1.41 Cell Phone Parts The cell phone contains one or more of these field replaceable parts: Memory, a SIM card, and a battery. A SIM card contains information used to authenticate a device to mobile telephone and data providers. The card can also hold user data such as personal contacts and text messages. A Secure Digital (SD) card is used to add memory to many mobile devices. When a mobile device malfunctions, it is usually sent to the manufacturer for repair or replacement. 1.42 Wired Connectivity A mini-USB cable is used to connect a mobile device to an electrical outlet charger or to another device in order to charge and/or transfer data. A USB-C cable and port can be plugged in either direction and are used on mobile devices to connect to an electrical outlet charger or to another device in order to charge and/or transfer data. A micro-USB cable is used to connect a mobile device to an electrical outlet charger or to another device in order to charge and/or transfer data. A Lightning cable and port is used to connect Apple devices to host computers and other peripherals such as USB battery chargers, monitors, and cameras. 1.43 Wireless Connections and Shared Internet Connections Besides Wi-Fi, mobile devices also use the following wireless connections: Near field communication (NFC) – NFC enables mobile devices to establish radio communications with other devices by placing the devices close together or by touching them together. Infrared (IR) – If a mobile device is IR enabled, it can be used to control other IR controlled devices remotely, such as a TV, set top box, or audio equipment. Bluetooth – This allows data exchange over a short distance between two Bluetooth-enabled devices or connect to other Bluetooth-enabled peripheral devices, such as speakers or headphone A smartphone’s internet connection can be shared with other devices. Tether – This uses your cellular phone as a modem for another device, such as a tablet or laptop. Mobile hotspot – A hotspot is where devices connect using Wi-Fi to share a cellular data connection 27 1.44 Wearable Devices Wearable devices are clothing or accessories that have miniature computing devices. Smartwatches, fitness monitors, and smart headsets are some examples. Fitness monitors measure and collect activity data and can connect with other Internet-connected devices to upload the data for later review. VR headsets provide the wearer with a complete immersion experience shutting out the physical world. Augmented reality (AR) headsets overlay digital elements to a live view of the physical world often using the camera of a smartphone. 28 1.5 Network Connectivity and Email 1.51 Wireless Data Networks The ability of a laptop, tablet, or cell phone to wirelessly connect to the internet has provided people with the freedom to work, learn, communicate, and play wherever they want. Mobile devices typically have two wireless internet connectivity options: Wi-Fi - Wireless network connection is provided using local Wi-Fi settings. Cellular - Wireless network connection is provided for a fee using cellular data. Cellular networks require cellular towers and satellites to create a mesh of global coverage. Wi-Fi is usually preferred over a cellular connection because it is usually free and Wi-Fi radios use less battery power than cellular radios. Many businesses, organizations, and locations now also offer free Wi-Fi connections to attract customers. It is important to take precautions and secure home Wi-Fi networks. Use the highest Wi-Fi security framework possible and use encryption such as a VPN connection. 29 CHAPTER 2 - PC Assembly 2.1 Assemble the Computer Video Explanation – General and Fire Safety In this video explanation, you will learn about the general and fire safety precautions while working in a computer: Remove watches or jewelry Turn off and unplug equipment Remove clutter from workspace Cover sharp edges inside the computer Wear safety goggles Proper lifting procedures Fire extinguisher availability, rating, and use 2.12 Open the Case and Connect the Power Supply Video Demonstration – Install the Power Supply This is a video demonstration about installing the power supply: Step 1: Open the computer case Step 2: Align the screw holes on the power supply with the mount on the computer case. Step 3: screw the power supply into place. 2.13 Select the Case and Fans Model Type – The motherboard determines the type of case you can use. The size and shape must match. Size – A computer with many components will need more room for airflow to keep the system cool. Power Supply – Match the power supply rating and connection type to the motherboard. Appearance – There are many case designs to choose from. Status Display – LEDs mounted on outside of case tell you if the system has power, when the hard drive is in use, and when the computer is in sleep or hibernate mode. Vents – All cases have a vent on the power supply, and some have a vent in the back to draw air out of into the system. Some cases have even more vents. 30 2.14 Select a Power Supply 2.15 Video Demonstration – Install the CPU This is a video demonstration about installing the CPU: Step 1: Orient the CPU to the CPU slot. Step 2: Press the CPU into the CPU slot. Step 3: Lock the CPU into place. Step 4: Apply thermal paste to the CPU. Step 5: Install the heatsink. Step 6: Secure the heatsink. 2.16 Video Demonstration – Install the RAM This is a video demonstration about installing the RAM: Step 1: Open the RAM slot levers. Step 2: Orient the RAM chip to the motherboard slot. Step 3: Lower the RAM chip into the slot. Step 4: Press down firmly to lock the RAM chip. 31 2.17 Video Demonstration – Install the Motherboard This is a video demonstration about installing the motherboard: Step 1: Align the motherboard in the correct direction. Step 2: Locate the standoffs. Step 3: Install standoffs in the computer case. Step 4: Align I/O plate to back of computer case. Step 5: Lower motherboard into place. Step 6: Install the screws into the standoffs. 2.18 Select the Motherboard When selecting a replacement motherboard, make sure that it supports or accommodates: CPU RAM Video adapter, other adapter cards Socket and chipset on motherboard are compatible with the CPU The existing heat sink and fan assembly when reusing the CPU The number/type of expansion slots. They must match the existing adapter cards and allow for new cards The existing power supply connections must fit the new motherboard. New motherboard must fit into the current computer case. 2.19 Select the CPU and CPU Cooling 32 2.110 Select the RAM New RAM may be needed when an application locks up or the computer displays frequent error messages. To determine if the problem is the RAM, execute the RAM test in the BIOS. The speed of the new RAM must be supported by the chipset. Memory may also be categorized as unbuffered or buffered: Unbuffered memory – This is regular memory for computers. The computer reads data directly from the memory banks making it faster than buffered memory. Buffered memory – Specialized memory for servers and high-end workstations that use a large amount of RAM. These have a control chip built into the module that assists the memory controller in managing large quantities of RAM. 2.111 Install the Motherboard in a Computer In this lab, you will install a CPU, a heat sink/fan assembly, and RAM module(s) on the motherboard. You will then install the motherboard into the computer case. 2.112 Video Demonstration - Install the Drives This is a video demonstration about installing the Drives: Hard Drive Step 1: Position the HDD so that it aligns with the drive ay opening. The power and interface connectors should be facing out towards the motherboard. Step 2: Insert the HDD into the drive bay so that the screw holes in the drive line up with the screw holes in the case. 33 Step 3: Secure the HDD to the case using the proper screws. This is a video demonstration about installing the Drives: Optical Drive Step 1: From the front of the case, choose the drive bay that you want to hold the drive. Remove the faceplate from that bay if necessary. Step 2: Position the optical drive so that it aligns with the 5.25 inch (13.34 cm) drive bay opening at the front of the case. Step 3: Insert the optical drive into the drive bay so that the optical drive screw holes align with the screw holes in the case. Step 4: Secure the optical 2.113 Select Hard Drives 2.114 Select Optical Drives 34 2.115 Install the Hard Drive 35 2.116 Install the Optical Drive Step 1. From the front of the case, choose the drive bay that you want to hold the drive. Remove the faceplate from that bay if necessary. Step 2: Position the optical drive so that it aligns with the 5.25 inch (13.34 cm.) drive bay opening at the front of the case, as shown in the figure. Step 3. Insert the optical drive into the drive bay so that the optical drive screw holes align with the screw holes in the case. Step 4. Secure the optical drive to the case using the proper screws. Installation Tip: Slightly hand-tighten all the screws before tightening any of them with a screw driver. This will make it easier to tighten the last two screws. 2.117 Video Demonstration – Install the Adapter Cards This is a video demonstration about installing the Adapter Cards: Step 1: Find an empty PCIe x16 slot on the case and remove the small metal cover. Step 2: Align the video adapter card to the appropriate expansion slot on the motherboard. Step 3: Press down gently on the video adapter card until it is fully seated. Step 4: Secure the video adapter card mounting bracket to the case with the appropriate screw. 36 2.118 Select Adapter Cards Adapter cards are designed for a specific task and add extra functionality to a computer. There are a variety of adapter cards: Graphics Sound Storage Controller I/O NIC Capture Adapter cards are inserted into two types of expansion slots on a motherboard: Peripheral Component Interconnect (PCI) PCI Express (PCIe) – PCIe has four types of slots; x1, x4, x8, and x16. PCI PCIe x1 37 PCIe x16 2.119 Other Factors for Adapter Card Selection 2.120 Install the Adapter Cards Expansion cards are installed into an appropriate slot on the motherboard. Installation Tip: Research the length of the video card. Longer cards may not be compatible with certain motherboards. Some adapter cards may come with mounting brackets of different heights to accommodate these cases. Installation Tip: Some cases have small slots at the bottom of the hole where the cover was removed. Slide the bottom of the mounting bracket into this slot before seating the card. 2.121 Select a Media Reader Several media card formats have been developed over the years including: Secure digital (SD 38 MicroSD MiniSD CompactFlash Memory Stick Choose a media reader based on current and future needs. 2.122 Select External Storage External USB flash drives, sometimes called thumb drives, are commonly used as removable external storage. External storage devices connect to an external port using USB, eSATA, or Thunderbolt ports. Choose the correct type of external storage for your customer’s needs. For example, if your customer needs to transfer a small amount of data, such as a single presentation, an external flash drive is a good choice. If your customer needs to back up or transfer large amounts of data, choose an external hard drive. 39 2.123 Video Demonstration – Connect the Internal Power Cables This is a video demonstration about connecting the internal power cables: Step 1: Align the 24-pin ATX power connector to the socket on the motherboard. Step 2: Gently press down on the connector until the clip clicks into place. Step 3: Align the 4-pin auxiliary power connector to the socket on the motherboard. Step 4: Gently press down on the connector until the clip clicks into place. Step 5: Align the CPU fan power connector to the socket on the motherboard. Step 6: Gently press down on the connector until the clip clicks into place. 2.124 Video Demonstration – Connect the Internal Data Cables This is a video demonstration about connecting the internal data cables: Step 1: Align the SATA cable and plug one end into the motherboard socket. Step 2: Align the other end of the SATA cable and plug it into the smaller SATA port on the drive. 2.125 Video Demonstration – Install the Front Panel Cables This is a video demonstration about connecting the front panel cables: Step 1: Plug the power cable into the system panel connector in the location marked PWR_SW. Step 2: Plug the reset cable into the system panel connector in the location marked RESET. Step 3: Plug the power LED cable into the system panel connector in the location marked PWR_LED. Step 4: Plug the drive activity LED into the system panel connector in the location marked HDD_LED. Step 5: Plug the speaker cable into the system panel connector in the location marked SPEAKER. Step 6: Plug the USB cable into the USB connector. Step 7: Plug the audio cable into the audio connector. 40 2.126 Install the Front Panel Cables A computer case typically has a power button and visible activity lights on the front of the case. The case will include front panel cables that must be connected to a common system panel connector on a motherboard. Writing on the motherboard near the system panel connector shows where each cable is connected. Front Panel Connectors 41 System Panel Connectors System panel connectors include: Power Button Reset Button Power LED Drive Activity LEDs System Speaker Audio System panel connectors are not keyed. However, each front panel cable usually has a small arrow indicating pin 1, and each pair of LED pins on the motherboard system panel connector has pin 1 marked with a plus sign (+). 42 Pin 1 Arrow Indicator System Panel Connector Pin 1 Indicator New cases and motherboards have USB 3.0 or USB 3.1 capabilities. USB connector cables are often 9 or 10 pins arranged in two rows. These cables connect to USB motherboard connectors. This arrangement allows for two USB connections, so USB 43 connectors are often in pairs. Sometimes the two connectors are together in one piece and can be connected to the entire USB motherboard connector. USB Motherboard Connectors Internal USB Connector 44 2.127 Video Demonstration – Complete the Computer Assembly This is a video demonstration about completing the computer assembly: Step 1: Reattach the front panel (if necessary). Step 2: Plug the power cable into the power supply. Step 3: Orient and connect USB cables to USB ports. Step 4: Orient and connect the video cable to the video port on the video adapter. Step 5: Tighten the video cable screws to the video adapter. Step 6: Connect the network cable to the Ethernet port. Step 7: Connect the audio cables to the audio ports. Step 8: Place the side panel cover onto the case and slide it closed. Step 9: Tighten any screws to secure the side panel cover. 2.128 New Terms and Commands 45 46 CHAPTER 4 - Preventives Maintenance & TroubleshootingFile 4.1 Preventive Maintenance Benefits to Preventive Maintenance Preventive maintenance plans are developed based on at least two factors: Computer location or environment - Dusty environments, such as construction sites, requires more attention than an office environment. Computer use - High-traffic networks, such as a school network, might require additional scanning and removal of malicious software and unwanted files. 4.12 Preventive Maintenance - Dust Use a cloth or a duster to clean the outside of the computer case. If using a cleaning product, put a small amount onto a cleaning cloth and then wipe the outside of the case. Dust on the outside of a computer can travel through cooling fans to the inside. Accumulated dust prevents the flow of air and reduces the cooling of components. Hot computer components are more likely to break down. Remove dust from the inside of a computer using a combination of compressed air, a low-air-flow ESD vacuum cleaner, and a small lint-free cloth. 4.13 Preventive Maintenance – Internal Components A basic checklist of components to inspect for dust and damage includes: CPU heat sink and fan assembly RAM modules Storage devices Adapter cards Cables Power devices Keyboard and mouse 4.14 Preventive Maintenance – Environmental Concerns An optimal operating environment for a computer is clean, free of potential contaminants, and within the temperature and humidity range specified by the manufacturer 4.15 Preventive Maintenance – Software Verify that installed software is current. Follow the policies of the organization when installing security updates, operating system, and program updates. Create a software maintenance schedule to: Review and install the appropriate security, software, and driver updates. Update the virus definition files and scan for viruses and spyware. Remove unwanted or unused programs. Scan hard drives for errors and defragment hard drives. 4.2 Troubleshooting Process 47 4.21 Introduction to Troubleshooting Troubleshooting requires an organized and logical approach to problems with computers and other components. Troubleshooting is a skill refined over time. Before you begin troubleshooting problems, always follow the necessary precautions to protect data on a computer. 4.21 Troubleshooting Process Steps 4.22 Identify the Problem 48 4.23 Establish a Theory of Probable Cause 4.24 Test the Theory to Determine the Cause 4.25 Establish a Plan of Action to Resolve the Problem and Implement the Solution 49 4.26 Verify Full Functionality and, If Applicable, Implement Preventive Measures 4.27 Document Findings, Actions, and Outcomes 4.28 PC Common Problems and Solutions Computer problems can be attributed to hardware, software, networks, or some combination of the three. These are some common hardware problems: Storage Device - Storage device problems are often related to loose, or incorrect cable connections, incorrect drive and media formats, and incorrect jumper and BIOS settings. Motherboard and Internal Components - These problems are often caused by incorrect or loose cables, failed components, incorrect drivers, and corrupted updates. Power Supply - Power problems are often caused by a faulty power supply, loose connections, and inadequate wattage. 50 CPU and Memory - Processor and memory problems are often caused by faulty installations, incorrect BIOS settings, inadequate cooling and ventilation, and compatibility issues. Displays – Display problems are often caused by incorrect settings, loose connections, and incorrect or corrupted drivers. 4.29 Common Problems and Solutions for Storage Devices 4.210 Common Problems and Solutions for Motherboards and Internal Components 51 4.211 Common Problems and Solutions for Power Supplies 4.212 Common Problems and Solutions for CPUs and Memory 4.213 Common Problems and Solutions for Displays 52 4.214 Personal Reference Tools Personal reference tools include troubleshooting guides, manufacturer manuals, quick reference guides, and repair journals. In addition to an invoice, a technician keeps a journal of upgrades and repairs: Notes - Make notes as you go through the troubleshooting and repair process. Refer to these notes to avoid repeating steps and to determine what needs to be done next. Journal - Include descriptions of the problem, possible solutions that have been tried to correct the problem, and the steps taken to repair the problem. Note any configuration changes made to the equipment and any replacement parts used in the repair. Your journal, along with your notes, can be valuable when you encounter similar situations in the future. History of repairs - Make a detailed list of problems and repairs, including the date, replacement parts, and customer information. The history allows a technician to determine what work has been performed on a specific computer in the past. 4.215 Internet Reference Tools The Internet is an excellent source of information about specific hardware problems and possible solutions: Internet search engines News groups Manufacturer FAQs Online computer manuals Online forums and chat Technical websites 4.216 Advanced Problems and Solutions for Hardware 53 CHAPTER 5 - Windows Installation 5.1 Modern Operating Systems 5.12 Terms The following terms are often used when describing an operating system (OS): Multi-user - Two or more users have individual accounts that allow them to work with programs and peripheral devices at the same time. Multitasking - The computer is capable of operating multiple applications at the same time. Multiprocessing - The operating system can support two or more CPUs. Multithreading - A program can be broken into smaller parts that are loaded as needed by the operating system. Multithreading allows different parts of a program to be run at the same time. The OS boots the computer and manages the file system. Operating systems can support more than one user, task, or CPU. 5.13 Basic Functions of an Operating System The OS manages the interaction between the applications and the hardware. The OS creates a file structure on the hard disk drive to store data. The OS enables the user to interact with the software and hardware. The OS locates and application and loads it into the RAM of the computer. 5.14 Windows Operating Systems Windows 10 is an update from the previous version of Windows designed for PCs, tablets, embedded devices, and Internet of Things devices. This version integrated the Cortana virtual assistant, combined the Windows 7 style start menu, the Windows 8 live tiles in desktop mode, and included the new Microsoft Edge Web browser. There are twelve different editions of Windows 10 with varying feature sets and use cases to meet the needs of consumer, business, and education environments. Like Windows 10, Windows 11 is an upgrade from the previous version. Most of the changes are superficial, like smaller taskbar icons that are placed in the center. There are also other visual additions such as a better dark mode, transparency changes, and animation changes, among others. Widgets have been expanded and are now more personalized. The settings application has been redesigned with a menu on the left, making navigation easier. There are also minor convenience additions for Windows tablets running Windows 11, including better spacing of taskbar icons and a three-finger swipe to customize actions. Windows 11 is more energy efficient, yet usually performs faster than previous versions. Finally, all versions of Windows 11 are 64-bit only, so it will not install on older, 32-bit computers. 54 5.15 Compatible System Software and Hardware Requirements To make an OS recommendation, a technician must review budget constraints, learn how the computer will be used, determine which types of applications will be installed, and whether a new computer may be purchased. These are some guidelines to help determine the best OS for a customer: Does the customer use off-the-shelf applications for this computer? Off-the-shelf applications specify a list of compatible operating systems on the application package. Does the customer use customized applications that were programmed specifically for the customer? If the customer is using a customized application, the programmer of that application specifies which OS to use. 5.16 Minimum Hardware Requirements and Compatibility with OS 55 5.17 32-bit vs. 64-bit Processor Architecture 5.18 Checking OS Compatibility An OS must be upgraded periodically to remain compatible with the latest hardware and software. It is also necessary to upgrade an OS when a manufacturer stops supporting it. Upgrading an OS can increase performance. New hardware products often require that the latest OS version be installed to operate correctly. While upgrading an OS may be expensive, you can gain enhanced functionality through new features and support for newer hardware. Before upgrading the operating system, check the minimum hardware requirements of the new OS to ensure that it can be installed successfully on the computer. Note: When newer versions of an OS are released, support for older versions is eventually withdrawn. 5.19 Windows OS Upgrades The version of an OS determines available upgrade options. For example, a 32-bit OS cannot be upgraded to a 64-bit OS. Windows 7 and Windows 8 can be upgraded to Windows 10, but Windows Vista and Windows XP cannot. To upgrade Windows 7 or Windows 8 to Windows 10, use the Windows 10 Update Assistant available on the Download Windows 10 website. It walks you through all the steps in the Windows 10 setup process. Computers running Windows XP or Windows Vista do not have an upgrade path to Windows 10 and require a clean installation. 56 Windows 10 installation media can be created using the Create Windows 10 installation media tool. 5.110 Data Migration When a new OS installation is needed, user data must be migrated from the old OS to the new one. The User State Migration Tool (USMT) is a command line utility to simplify user state migration. Use Windows Easy Transfer when switching from an old computer to a new one. PCmover Express is a tool for transferring selected files, folders, profiles and applications from an old Windows PC to a Windows 10 PC. 57 5.2 Disk Management 5.21 Storage Devices Types The two most common types of data storage devices used today are hard disk drives and flash memory-based drives such as solid-state hard drives and USB drives. When the storage device type has been chosen, it must be prepared to receive the new operating system. Modern operating systems ship with an installer program. Installers usually prepare the disk to receive the operating system, but it is crucial for a technician to understand the terms and methods involved in this preparation. 5.22 Hard Drive Partitioning Finding and launching the operating system is one of the responsibilities of computer firmware, which needs to know the partition scheme. Two partition scheme standards are master boot record (MBR) and globally unique identifier (GUID) partition table (GPT). Master Boot Record - It contains information on how the hard drive partitions are organized. It is 512 bytes long and contains the boot loader, an executable program that allows a user to choose from multiple operating systems. It is commonly used in computers with BIOS-based firmware. GUID Partition Table - Also designed as a partition table scheme standard for hard drives, the GPT makes use of a number of modern techniques to expand on the older MBR partitioning scheme. GPT is commonly used in computers with UEFI firmware. 58 5.23 Partitions and Logical Drives The primary partition contains the OS files and is usually the first partition. On MBR disks, the active partition is used to store and boot an OS. If more than 4 partitions are needed on an MBR disk, one partition can be designated an extended partition. A logical drive is a section of an extended partition, used to separate information for administrative purposes. A basic disk (the default) contains partitions such as primary and extended, as well as logical drives which are formatted for data storage. A dynamic disk can create volumes that span across more than one disk. Formatting creates a file system on a partition for file storage. 5.24 File Systems File systems differ in properties of speed, flexibility, security, size and more. Here are five common file systems: File Allocation Table, 32 bit (FAT32) - Supports partition sizes up to 2 TB or 2,048 GB. Used by Windows XP and earlier OS versions. New Technology File System (NTFS) - Supports partition sizes up to 16 exabytes, in theory. NTFS incorporates file system security features and extended attributes. exFAT (FAT 64) - Created to address some of the limitations of FAT, FAT32, and NTFS when formatting USB flash drives, such as file size and directory size. One of the primary advantages of exFAT is that it can support files larger than 4GB. Compact Disc File System (CDFS) - Created specifically for optical disk media. NFS (Network File System) - NFS is a network-based file system that allows file access over the network. NFS is an open standard which allows anyone to implement it. 59 5.3 Install Windows 5.31 Account Creation Authentication is when users enter a username and password to access a user account. Windows uses Single-Sign On (SSO) authentication, which allows users to log in once to access all system resources. User accounts allow multiple users to share a single computer using their own files and settings. Windows 10 offers two account types: Administrator and Standard User. Administrator accounts have complete control over a computer. Users with this type of account can change settings globally and install programs. Standard user accounts have limited control over a computer. Users with this type of account can run applications, but they cannot install programs 5.32 Finalize the Installation Windows Update To update the OS after the initial installation, Microsoft Windows Update is used to scan for new software and install service packs and patches. Device Manager After installation, verify that all hardware is installed correctly. The Device Manager is used to locate device problems and install the correct or updated drivers in Windows. The figure shows the Windows Update and Device Manager utilities on Windows 10. 60 5.33 Disk Cloning Installing an OS on multiple computers takes time. To simplify, administrators usually elect a computer to act as a base system and go through the regular operating system installation process. After the OS is installed in the base computer, a specific program is used to duplicate all the information on its disk, sector by sector, to another disk. This new disk, usually an external device, now contains a fully deployed operating system and can be used to quickly deploy a fresh copy of the base operating system and any installed applications and data. If an undesirable setting is accidentally included during the base installation, an administrator can use Microsoft’s System Preparation (Sysprep) tool to remove it before creating the final image. 61 5.34 Other Installation Methods Windows has several different types of custom installations: Network Installation – This includes Preboot Execution Environment (PXE) Installation, Unattended Installation, and Remote Installation. Image-based Internal partition Installation - This is a Windows image stored on an internal (often hidden) partition that can be used to restore Windows to its original state when it was shipped from the factory. Other Types of Custom Installations – This includes Windows Advanced Startup Options, Refresh your PC (Windows 8.x only), System Restore, Upgrade, Repair installation, Remote network installation, Recovery partition, and Refresh/restore. 5.35 Remote Network Installation With remote network installation, the OS installation files are stored on a server. The client computer can access the files remotely. A software package such as Remote Installation Services (RIS) communicates with the client, stores the setup files, and provides the necessary instructions for the client to access the setup files, download them, and begin the OS installation. Because the client computer does not have an OS installed, a special environment must be used to boot the computer, connect to the network, and communicate with the server to begin the installation process. This special environment is known as the Preboot eXecution Environment (PXE). 5.36 Recovery Partition Some Windows computers contain a section of the disk that is inaccessible to the user. This partition, called a recovery partition, contains an image that can be used to restore the computer to its original configuration. The recovery partition is often hidden to prevent it from being used for anything other than restoration. 62 To restore the computer using the recovery partition, you often must use a special key or key combination when the computer is starting. Sometimes, the option to restore from the factory recovery partition is located in the BIOS or found in Windows. 5.37 Windows Boot Sequence After POST, the BIOS locates and reads the configuration settings stored in the CMOS memory. The boot device priority is the order in which devices are checked to locate the bootable partition. The BIOS boots the computer using the first drive that contains a valid boot sector. This sector contains the Master Boot Record (MBR). The MBR identifies the Volume Boot Record (VBR) which loads the boot manager, which for Windows is bootmgr.exe. Hard drives, network drives, USB drives, and even removable media can be used in the boot order, depending on the capabilities of the motherboard. 63 New Terms and Commands 64 CHAPTER 6: Introduction to Productivity Tools 6.1 Productivity A measure of output from a production process, per unit of input. May be conceived of as a metric of the technical or engineering efficiency of production. Productivity tools can be software that help employer increase their business productivity: a few examples might be project management software, to do lists, cost management software, employee monitoring software, print manager software and so on 6.2 Productivity tools for Teachers Learning communities websites for teachers Lesson plans websites Online courses Multimedia resources Software resource 6.3 Widely used Productivity Tools Microsoft Office E.g: Word/Excel/Powerpoint/Project/Outlook Open Office E.g: Writer/Calc/Impress Google docs E.g: Online document/spreadsheet/presentation Google Calendar 65 CHAPTER 7: Networking Concepts 7.1 Network Components and Types 7.11 Network Icons 7.12 Network Topologies and Description PAN (personal area network) – Commonly uses Bluetooth to connect mice, keyboards, phones, and tablets. LAN (local area network) – A wired network consisting of a switch and network devices in a limited geographical area. VLAN (virtual LAN) – Extends beyond a traditional LAN and groups users based on administratively defined boundaries such as department or floor. WLAN (wireless LAN) – Connects multiple wireless devices and uses an access point. WMN (wireless mesh network) – Connects multiple wireless access points together to expand the wireless network. MAN (metropolitan area network) – A network that spans a city. WAN (wide area network) – A network that spans a large geographical area. 66 VPN (virtual private network) – A method of connecting to a network such as a company network across an unsecure network. 7.13 VLANs They provide segmentation and organizational flexibility in a switched network. A group of devices within a VLAN communicate as if each device was attached to the same switch. VLANs are based on logical connections, instead of physical connections, and they can be segmented based on factors such as function, team, or application. For example, a faculty member computer (PC1) is connected to S2 on VLAN 10. PC1 could communicate with another faculty member using PC4 connected to S3. Notice how both hosts are configured on network address 192.168.10.0/24. By default, all switch ports are assigned to VLAN 1. However, you can assign the PCs to different VLANs by configuring their interconnecting port. 7.14 Brief History of Connection Technologies Analog telephone access (dialup) – uses an analog modem to call another modem. ISDN (Integrated Services Digital Network) – more bandwidth than dialup. Can carry voice, video, and data. Broadband – uses different frequencies to send multiple signals over media. 67 7.15 DSL, Cable, and Fiber DSL (digital subscriber line) – always on technology that uses phone lines; voice and data carried on different frequencies; requires a filter on the port that connects to a phone. Very high-speed DSL (VDSL) attains much higher bit rates than DSL. A symmetric link can carry as much as 26 Mbps in both directions while an asymmetric link can carry as much as 52 Mbps download and 6 Mbps upload. VDSL2 can carry as much as 100 Mbps in both directions. Cable – Uses a cable modem to connect to a traditional cable TV network; shares the network with multiple subscribers. Fiber – High bandwidth connection used in backbone networks, large enterprise environments, large data centers, and now part of some home internet connections. In the figure, the cable connection includes a HFC network in which fiber is used in the last mile to the user’s home, and at the user’s home the network switches back to copper coaxial cable (FTTC). Fiber to the premises (FTTP) brings the fiber to the customer’s building. 68 7.16 Line of Sight Wireless Internet Service Line of site wireless – always on technology that uses radio signals for connecting to the internet. Clear path required Weather affects signal strength and performance 7.17 Satellite Satellite – broadband technology for remote areas Uses a satellite dish Not a good solution for time-sensitive applications like gaming, Voice over Internet Protocol (VoIP), and video conferencing Low Earth Orbit (LEO) – far more satellites orbiting the Earth in low Earth orbit Can support up to approximately 100 Mbps Much lower latency than standard satellite, between 100 and 200 ms 69 7.18 Cellular Cellular– relies on cell towers to create a network used by cell phones and connectivity to the internet 7.19 Mobile Hotspot and Tethering Cell phone option that allows another device to connect to the internet using Wi-Fi, Bluetooth, or USB cable The other device is using the phone’s cellular connection to connect to the internet Called tethering or a hotspot A mobile hotspot is when a cell phone allows Wi-Fi devices to connect and use the mobile data network. 7.110 Bluetooth, NFC, and RFID Bluetooth Up to 7 devices to create a PAN 802.15.1 2.4 to 2.485 GHz radio frequency range RFID Passive or active tags used to identify items Passive – rely on RFID reader to activate and read Active – have a battery to broadcast the ID up to 100 meters 125 MHz to 960 MHz radio frequency range NFC (Near Field Communication) Devices must be in close proximity to exchange data Used for payments, printing, public parking, etc. 70 7.111 Zigbee and Z-Wave Zigbee Requires a ZigBee Coordinator to manage client devices connected in a wireless mesh network. Devices commonly managed from a cell phone app IEEE 802.15.4 standard 868 MHz to 2.4 GHz range up to 20 meters, 65,000 devices, and data speeds up to 250 kb/s Z-Wave Proprietary standard, but public version available 232 devices can connect to a wireless mesh network with data speeds up to 100 kb/s. 7.112 Cellular Generations 1G/2G – First generation was analog calls only. 2G introduced digital voice, conference calls, and caller ID with speeds less than 9.6 Kb/s 2.5G – supports web browsing, short audio and video clips with speeds up to 237 Kb/s. 3G – full motion video and streaming music at speeds up to 2 Mb/s. 3.5G – supports high-quality streaming video, high-quality video conferencing, and VoIP, at speeds up to 16 Mb/s. 4G - IPv6, IP-based voice, gaming services, high quality multimedia at speeds up to 672 Mb/s. LTE (Long Term Evolution) – means it meets the 4G speed standards and improves connectivity while in motion. Speeds up to 100 Mb/s when mobile and up to 1 Gb/s when stationary. 5G – supports augmented reality (AR), virtual reality (VR), smart homes, smart cars, and data transfer between devices. Download speeds up to 3 Gb/s; upload speeds up to 1.5 Gb/s. 6G – is currently in development. As of late 2022, no standard yet exists. It will support even faster speeds required for AR/VR applications, AI applications, and instantaneous communications. 7.2 Basic Network Devices 7.21 Network Interface Card (NIC) 71 7.22 Repeaters, Bridges, and Hubs Repeaters – Also called extenders because they regenerate the signal so it can be sent further. Hub – Receives data on one port and sends to all other ports. Bridge – Divides a network into two or more segments and tracks which device is on each segment. 72 7.23 Switches Ethernet switches record MAC addresses for each device connected to the switch. Data is sent to a specific device if the MAC address of that device is in the MAC address table. Managed switches are used in a company environment and have additional features. Unmanaged switches are used in home or a small business network. 7.24 Wireless Access Points Wireless access points (APs) – provide access to a wireless network for a limited range. 73 7.25 Routers Routers connect networks. Use an IP address to forward traffic to other networks Can be a multipurpose device (integrated router) that includes switching and wireless capabilities 7.26 Firewalls A firewall protects data and devices connected to a network. Firewalls use access control lists (ACLs) which are rules used to determine whether data is permitted (allowed through) or denied. 7.27 UTMs Universal Threat Management (UTM) is an all-in-one security appliance. Features are vendor-specific, but could include: Firewall services IDS/IPS services Additional security services against Zero Day, Denial of Service (DoS) Distributed Denial of Service (DDoS), and spyware 74 Proxy and email filtering Network access control VPN services 7.28 Endpoint Management Server An endpoint management server monitors end devices such as PCs, laptops, servers, tablets, printers, etc. 7.29 Spam Management The DNS service is commonly abused by threat actors to assist in their SPAM email campaigns. For this reason, DNS servers now use TXT resource records to implement the anti-spam security features detailed in the table. 75 7.210 Legacy and Embedded Systems A legacy system is a device on the network no longer supported, but still in operation. An embedded system is a device built into something else such as an appliance. Embedded microchips are contained in legacy systems and embedded systems. Legacy systems and embedded systems could be a security risk. 7.211 Patch Panel A centralized place where network cables attach to the back. Patch cables are used to make a connection to another patch panel which connects to a different wiring closet, or to a device such as a switch mounted nearby. 7.212 Power over Ethernet and Ethernet over Power PoE devices like PoE switches, PoE injectors, IP cameras, Voice over IP (VoIP) phones, and wireless access points (WAPs) are the top five most popular devices. Power can also be inserted in the middle of a cable run using a PoE injector. There are several IEEE standards for PoE: 76 802.3af – Can supply up to 13 watts as 350mA at 48 volts. 802.3at (PoE+) – Can supply up to 25 watts as 600 mA. 802.3bt (PoE++ or 4PPoE) – Can supply 51 watts (Type 3) or 73 watts (Type 4) 7.213 Cloud-based Network Controller A cloud-based network controller is a remote device used to manage network devices like access points or switches 77 CHAPTER 8: Basic System Administration 8.1 Windows Desktop and File Explorer 8.11 Windows Versions Since 1985 there have been over 25 versions of Windows. Windows comes in 32-bit or 64 bit editions. In the case of Windows 10, twelve editions were developed and released, however, only nine are currently offered. 78 8.12 The Windows 7 Desktop Windows 7 has a default theme named Aero. Windows 7 Versions and above have the following features: Shake – minimize all windows not being used by clicking and shaking the window. Peek - View the desktop icons that are behind open windows by placing your cursor over the Show desktop button found at the right edge of the taskbar. Snap - Resize a window by dragging it to one of the edges of the screen. Users can place Gadgets on the desktop. Gadgets are small applications, such as games, sticky notes, a calendar, or a clock. 8.13 The Windows 8 Desktop 79 Tiles on the Start screen Desktop optimized for mobile devices Revised task manager Ribbon menu on the File Explorer Windows Defender native antivirus Charms bar of five icons, accessed by placing the cursor in the upper-right corner of the screen or swiping your finger in from the right side of the screen on a touchscreen 8.14 The Windows 8.1 Desktop Taskbar Start button Pinned program icons Clicking the Start button displays the Start screen that is very similar to the Windows 8 Start screen. 8.15 Personalizing the Windows Desktop Themes - fastest way to change the look and feel of the Windows GUI Apps Environment - desktop start screen Tiles - click and drag the tiles to rearrange them. Start screen - right-click the desired Windows app and select Pin to Start. Search - start typing the name of the app to auto search. Personalization Window - you can change the desktop appearance, display settings, and sound settings 80 8.16 The Windows Start Menu 81 The Start Menu displays: All of the applications installed on the computer A list of recently opened documents A list of other elements, such as the search feature, Help and Support, and Control Panel To customize the Start Menu in Windows 7 right-click an empty section of the taskbar and choose Properties > Start Menu > Customize 8.17 Windows Task Manager Functions Processes – a set of instructions started by the user, a program, or the OS. Performance – dynamic system performance graphs for a variety of options, including CPU, Memory, Disk, Ethernet, etc. App History – displays historical resource utilization such as CPU time, network data usage, data uploads and downloads. Startup – shows the processes that automatically begin during Windows startup. Users – shows who is currently connected to the PC and the system resources they are using. Details – makes is possible to change the level of COU priority for a given process. Services – shows all available services and their status. 82 8.18 Task Manager in Windows 7 Applications – shows all running applications. You can create, switch to, or close any applications. Processes - this tab shows all running processes. You can end processes or set process priorities. Services - available services, including their operational status. Services identified by their PID. Performance - This tab shows the CPU and page file usage Networking - This tab shows the usage of all network adapters Users - This tab shows all users that are logged on the computer Task Manager Differences in Windows 10: Applications and Processes tabs have been combined in Windows 10. Networking tab is included with the Performance tab in Windows 10. Users tab has been enhanced in Windows 10 to not only show the users that are connected but also the resources that they are using. 8.19 File Explorer File Explorer is used for file management in Window 8 and Windows 10. Windows Explorer is used for file management in Windows 7 and earlier. The Ribbon is used for common tasks, such as copying and moving files and creating new folders. The Tabs at the top change based on what is selected. File Explorer is used to: Navigate the file system Manage files, folders and subfolders Manage applications on storage media Preview some types of files 83 8.110 This PC 8.111 Run as Administrator 8.112 Windows Libraries 84 8.113 Directory Structures 8.114 User and System File Locations 8.115 File Extensions 85 8.116 File Attributes 8.2 Configure Windows with Control Panels 8.21 Windows 10: Settings and Control Panels 8.22 Introduction to Control Panel 86 8.23 Control Panel Views 8.24 Define Control Panel Categories System and Security – View and configure security settings such as Windows Defender Firewall. Network and Internet - Configure, verify, and troubleshoot networking and file sharing. Hardware and Sound - Configure devices such as printers, media devices, power, and mobility. Programs – Change installed programs and Windows updates, including removal. User Accounts – Administer Windows user accounts and user account control (UAC). Ease of Access - Access options that make Windows easier to use, especially for people who require accommodations for physical or perceptual challenges. Clock and Region – Configure time and date settings and formats. Appearance and Personalization – Configure taskbar and navigation, file explorer, and available fonts. 8.25 User Accounts The User Accounts Control Panel provides options to help you create, change, and delete user accounts. An administrative account is created when Windows is installed. To create a user account, open the User Accounts Control Panel. Standard user accounts can manage most configuration settings that don't affect other users. Standard user accounts can only access their own files and folders. Some features of the User Accounts utility require administrative privileges and will not be accessible with a standard user account 8.26 User Account Control Settings The User Account Control (UAC) monitors programs on the computer and warns users when an action might present a threat to the computer. 87 In Windows versions 7 through 10, you can adjust the level of monitoring that the UAC performs. The default UAC setting for the primary account is "Notify me only when programs try to make changes to my computer“. Adjust the UAC level to change when you are notified about changes that programs may make to your computer. 8.27 Credential Manager Credential Manager helps you to manage passwords that are used for websites and Windows applications. These passwords and usernames are stored in a secure location. You can view, add, edit, or delete the credentials that are stored by Credential Manager. Web credentials are not saved for sites accessed by browsers other than Internet Explorer and Edge. 8.28 Sync Center Sync Center allows files to be edited from multiple Windows devices. Sync Center allows a form of version control. Using Sync Center requires activation of the Offline Files feature. This sets up a local file location that will store the files to be synchronized. It also requires you to set up a sync partnership with the networked file location. Files can be synchronized manually and synchronization can also be scheduled to occur automatically. Microsoft OneDrive offers a similar service. OneDrive is a cloud storage service that is available to Microsoft Windows users. 8.29 Network Settings 88 8.210 Internet Options 89 8.211 Network and Sharing Center 8.212 HomeGroup 8.213 Display Settings and Configuration 90 8.214 Display Features 8.215 Power Options 91 8.215 System Properties 92 8.216 Increasing Performance 8.217 Device Manager 8.218 Devices and Printers 93 8.219 Sound 8.220 Clock 8.221 Region 94 8.222 Language 8.223 Programs 8.224 Windows Features and Updates 95 8.225 Default Programs 8.226 Troubleshooting 8.227 BitLocker Drive Encryption 96 8.228 File Explorer and Folder Options 8.3 System Administration 8.31 Administrative Tools Control Panel Item 8.32 Computer Management 97 8.33 Event Viewer 8.34 Local Users and Groups 8.35 Performance Monitor 98 8.36 Component Services and Data Sources 8.37 Services 8.38 Data Sources 99 8.39 Print Management 8.310 Windows Memory Diagnostics 100 8.311 System Information 8.312 System Configuration System Configuration (MSCONFIG) is a tool used to identify problems that keep Windows from starting correctly: General – Displays Normal startup, Diagnostic startup, and Selective startup. Boot – Choose the OS version to boot if more than one is present, or Safe boot. Services – Lists services that are started with the OS. Allows individual services to not be loaded on boot for troubleshooting purposes. Startup – In 7, it displays a list of all applications the automatically run when Windows starts. In 8.1 and 10, the user is referred to the same settings in Task Manager. Tools – Displays a list of diagnostic tools for help with troubleshooting. 8.313 The Registry 101 8.314 Regedit 8.315 Microsoft Management Console 8.316 DxDiag 102 8.317 Disk Management Utility 8.318 Drive Status 8.319 Mounting a Drive 103 8.320 Adding Arrays 8.321 Disk Optimization 8.322 Disk Error-Checking 104 8.323 System Requirements 8.324 Installation Methods 8.325 Installing An Application 105 8.326 8.327 Uninstalling or Changing a Program 8.328 Security Considerations Allowing users to install software on computers that are owned by a business organization can be a security risk. Users can be tricked into downloading malicious software that can cause data loss, either through theft or destruction. Malicious software, known as malware, can infect all computers that are attached to a network and can cause widespread damage and loss. As a technician, it is important to enforce policies regarding software installation and ensure that antimalware software, such as Windows Defender, is active and up to date. 106 8.4 Command-Line Tools 8.41 PowerShell 8.42 The Command Shell 8.43 Basic Commands help – get information on commands 107 command /? – get help on a specific command cls – clear the screen Up-arrow keys – move through previously entered commands F7 key – display command history in an overlay window Ctrl+C key – exit a running command process or script exit – close the command window 8.44 Command Syntax Conventions 8.45 File System Navigation When working at the command line, there is no File Explorer to help you get to the files and folders that you want to work with. Instead, you need to move through the folder structure using a combination of commands, normally displaying the contents of a drive or directory and changing directories until you find what you are looking for. 8.46 File System Navigation - Commands : – display contents from a different drive like: d: dir – display the contents of the current directory cd – change directory 8.47 Manipulating Folders - Commands md – make directory. Create a new directory rd – remove directory. Delete a directory move – move a file or directory from one directory to another ren – rename a directory or file 8.48 Manipulating Files - Commands > – redirect. Send the output of a command to a file ○ example: dir > directory.txt type – display the contents of a file more – display the contents of a file one screen at a time 108 del – delete a file or folder copy – make a copy of a file xcopy – extended copy. Copy files or entire directory trees robocopy – robust copy. Copy files and entire directory trees move – move a file from a source location to a destination location 8.49 Disk Operations - Commands chkdsk – check disk. Checks a file system for errors, including errors with physical media format – creates a new file system for a disk. May also check for physical disk errors diskpart – starts a separate command interpreter with commands for working with disk partitions 8.410 System CLI Commands tasklist - displays a list of the processes that are currently running on the local or remote computer taskkill - allows a running process to be killed dism - Deployment Image Servicing and Management. Used to work with system images before they are deployed sfc - verifies and repairs Windows system files shutdown - power off a local or remote computer 8.411 Other Useful Commands gpupdate - group policy update /target:computer – force update of another computer /force – force and update even if Group Policy has not changed /boot – restart computer after update gpresult - display Group Policy Resultant Set of Policy (RSoP) information /s – the system to view the result on, name or ip address /r – displays summary data net use - display and connect to network resources net user - display and change information about computer users 109 8.412 Running System Utilities 8.5 Windows Networking 8.51 Domain and Workgroup 8.52 Homegroup 110 8.53 Network Shares and Mapping Drives 8.54 Administrative Shares 8.55 Sharing Local Resources 111 8.56 Printer Sharing vs. Network Printer Mapping 8.57 Configuring Wired Network Interfaces in Windows 10 8.58 Configuring a Wired NIC 112 8.59 Setting a Network Profile 8.510 Verify Connectivity with the Windows GUI 8.511 ipconfig Command 113 8.512 Network CLI Commands The following CLI commands that can be executed from the command prompt to test network connectivity: ping – The command tests basic connectivity between devices by using ICMP echo request and reply messages. tracert – The command traces the route that packets take from your computer to a destination host. At the command prompt, enter tracerthostname. nslookup – The command tests and troubleshoots DNS servers. It queries the DNS server to discover IP addresses or host names. At the command prompt, enter nslookup hostname to return the IP address for the host name entered. A reverse nslookup command, nslookup IP_address returns the host name for the IP address entered. 8.513 Wireless Settings 8.514 VPN Access in Windows 114 8.515 Telnet and SSH 8.6 Common Preventive Maintenance Techniques for Operating Systems 8.61 Preventive Maintenance Plan Contents A preventive maintenance plan provides many benefits to users and organizations such as decreased downtime, improved performance, improved reliability, and lower repair costs. Preventive maintenance plans should prioritize equipment that would affect the organization the most if that equipment fails. Preventive maintenance for an OS includes automating tasks to perform scheduled updates, and installing service packs. Preventive maintenance includes the following important tasks: hard drive error checking, defragmentation, and backup, updates to the operating system, applications, antivirus, and other protective software. 8.62 Windows Updates Windows Update is a website located at update.microsoft.com. The site hosts maintenance updates, critical updates, and security patches as well as optional software and hardware updates for Microsoft Windows versions 7, 8 and 10. Microsoft releases updates on the second Tuesday of each month, unofficially known as Patch Tuesday. Windows 10 automatically downloads and installs updates to make sure your device is secure and up to date. You can manually check for updates in Windows 10 via Settings > Update and Security. 115 8.63 Restore Points 8.64 Hard Drive Backup It is important to establish a backup strategy that includes data recovery of personal files. You can use the Microsoft Backup utility to perform backups as required. It can take a lon

Use Quizgecko on...
Browser
Browser