You are on page 1of 12

Study Notes Power Supplies Black 0v (BOWRBY colored wires coming from the PSU.) Orange +3.

.3v (Certain video & motherboard) White -5v (ISA or AT Bus adapter cards) Red +5v Blue -12v (Older network adapters & serial ports) Yellow +12v (Newer CD/DVD Drives, Hard Drives, & Pentium 4 & Athlon processors) Grey Power good (+5v) Purple +5v Standby Green PS_On (Power Supply on signal) -5 & +5 is for data transfer -12 & +12 is for electric motors running CD-Drive, DVD, etc. 3.3 is for the processor Even less is for more recent motherboards, CPUs **better for lower heat AT = two 6-pin connectors: P8 and P9, P1 and P2. ATX = one 20-pin connector **Converts AC power into DC power. **High-pitched noise from the fan mounted inside the power supply replace power supply. **When replacing: look for a replacement that fits the form factor of the computer first, then look for rated output capacity in watts. Electrical Current 1 Ampere High 5 Milliamperes = 5 thousands of 1 ampere 10 microamperes = 10 millionths of 1 ampere 200 picoamperes = 200 millionth of 1 ampere Low Cable Lengths Standard IDE = 18 inches PATA = 18 inches SATA = 40 inches Serial = 50 feet (15.2m) Parallel = 15 feet (4.5m) USB 1.1 = 3m USB 2.0 = 5m Addressing IDE/ATA Drives Conventional Addressing referring to a cylinder, head and sector number (Street Address, City, State) LBA - Logical Block Addressing each sector is assigned a unique sector number (Every house given a unique #) **If not set to LBA, large drives (DMLF) will show as small size. IDE Bus There are two IDE buses: the primary and the secondary. Each bus can support 2 devices. On a single bus, one device must be set to master, then 2nd device must be set to slave. **If not set properly, the PC wont boot from either hard drive. Common Connectors IDE Cable 40-pin Floppy Cable 34 pin Internal Narrow SCSI cable 50-pin Internal Wide SCSI cable 68-pin S-Video 4, 7, or 9 (Analog video connectors that can transfer video signals to other devices.) DB-15 joysticks (DB-15 ports are often included on sound cards two rows: 1 row of 8 pins, 1 row of 7 pins VGA 15-pin Video Graphics Array 3 rows of pins, 5 pins in each row. **Known as Sub-D 15 Pin High Density connector. USB available on most all PCs now, also available on PCI expansion cards. DB-9 serial connection for devices, such as serial mouse, a modem, or a serial printer. IEEE 1394 Centronics-36 ports found on parallel printers. A printer cable connects the Centronics-36 printer port to a female DB-25 port on the computer. USB (Interface) Transmits Data USB 1.1 12 Mbps (& 1.5 Mbps) USB 2.0 480 Mbps USB is hot-swappable USB up to 127 devices on a single bus USB requires only 1 interrupt request (IRQ) for all USB divices connected to it, regardless of the type or number of devices. USB how many hubs can be daisy chained? Up to 4. IEEE 1394 (Firewire) (Interface)

Transmits data 400 MBps *IEEE 1394b = 800 MBps IEEE 1394 up to 63 devices on single bus Bluetooth (Interface) Wireless protocol used to connect a variety of devices over short distances. S/PDIF (Interface) Sony/Philips Digital Interface Format used only for digital audio signals. 2-3 Mbps. Boot Files 9x & ME: IO.SYS, MSDOC.SYS, WIN.COM, COMMAND.COM, HIMEM.SYS NT, 2000 & XP: NTLDR, BOOT.INI, NTDETECT.COM, HAL.DLL & WIN.COM BIOS Use the System Summary folder (msinfo32.exe) in the System Information MMC snap-in to view the version of BIOS that is install in the 2000 computer. It also displays info about OS, System name, Processor Type, and installed RAM. BIOS Password Modern Computers use two passwords to restrict access to the BIOS and CMOS settings: Supervisor password restricts access to BIOS settings to ensure that unauthorized users are unable to change settings. User password used to restrict access to the computer Boot Sequences -Windows 9x -POST Power On Self Test Bios is checking for all devices. -CMOS finds boot sector MBR -IO.SYS loads -WIN.COM allows you to access while finish loading. -Virtual Device Drivers -Windows NT/2000/XP (NT Kernel) - POST Power On Self Test Bios is checking for all devices. -NTLDR find the boot.ini -BOOT.INI loads OS -NTDETECT.COM finds all devices/hardware in system -WIN.COM allows you to access while finish loading Port Assignments FTP: 20, 21 Telnet: 23 SMTP: 25 HTTP: 80 POP3: 110 NNTP: 119 IMAP: 143 Secure HTTP (HTTPS): 443 Citrix ICA: 1494 Remote Desktop: 3389 **In firewall, in order to be able to connect to all types of Websites, open port 80 & 443. POST Error Codes 100 Series (100-199): System Board or Motherboard 200 Series (200-299): Memory or RAM 300 Series (300-399): Keyboard 400 Series (400-499): Monochrome Video 500 Series (500-599): Color Video 600 Series (600-699): Floppy Drive 1700 Series (1700-1799): Hard Drive **Beep after POST means it was successful **Wont beep if no speaker or BIOS option is disabled Slot/Socket Assignments Slot 1: Pentium II, Pentium III and Celeron Slot 2: Pentium II Xeon and Pentium III Xeon Slot A: AMD Athlon Socket 370: Pentium III, there is only one 300 series socket Socket 603/604: Intel Xeon processors only. They are the only 600 series socket Socket A: AMD Athlon, Duron, Athlon XP, Athlon XP-M, Athlon MP, and Sempron Socket Types - CPU LIF Low-Insertion Force ZIF Zero-Insertion Force LGA Land Grid Array PGA Pin Grid Array square shape, white color. CPUs: Pentium vs. AMD I none

II none III Athlon III Celeron Duron IV Athlon XP 64 (server processor) Athlon 64 **Pentium IV 2.8 or higher support HyperThreading (HT) CPU Fails Signs: if you cant enter setup screen on boot up. To check the CPU speed of a computer: Start, Run, Msinfo32, OK, System Summary & Right-click My Computer, Properties, General tab. CPU Technology Dual-core technology - contains two processor cores in a single processor package and provides almost all of the advantages of a multi-processor computer. Hyper-Threading technology allows a single processor to handle two independent sets of instructions at the same time. CPU throttling feature that protects a CPU from heat damage. Slows down clock rate when overheating. MMX technology improves video compression/decompression, image manipulation, encryption, and I/O processing. Overclocking can be done to the processor and system bus. CPU Upgrade 1.) Check Motherboard vendor about compatibility 2.) Physically install CPU 3.) Update motherboards firmware Memory **DIMMs do not have to be installed in pairs DIMMs =168 pins **Do not have to be installed in pairs** SoDIMMs = 72 or 144 pins SIPPs = 30 pins SIMMs = 30 OR 72 pins DIPPs = 16 pins **DDR SDRAM Double-data rate SDRAM video RAM installed on video cards. Transfers data at speeds twice as fast as SDRAM by transferring data on both the rising and the falling parts of the processing clock cycle. **SDRAM Synchronous DRAM runs in synch with memory bus. **Located parallel to IDE connectors on ATX motherboard. **Located on right angle to all expansion slots on ATX, including PCI, ISA, or AGP. Hard Disk Terminology TRACK concentric circles on hard platter (102 tracks on 1 platter, numbered from 0 to 1023 SECTOR smallest part of a track 512kb CLUSTER combo of 2 or more sectors CYLINDER A collection of the same track # from all recordable platters **Non-SCSI hard drives there are two types: Serial ATA & IDE/EIDE Thumb Drive -Flash Memory -Small Spinning Platter -USB Port -No installation for later versions of Windows -Contain their own CPU Floppy Drive When boot up PC, if the green light comes on and stays on: Reverse the data cable Data cables are commonly installed improperly Pin 1 colored stripe on cable CD Drive - Troubleshooting Media cannot be read - cost-effective actions to first resolve this problem Clean CD, Clean optics drive. Mouse Touchpad mouse comes built-in with portable computer Trackball mouse opto-mechanical mouse with a rolling ball under your palm Optical mouse senses movements with LED on the underside. **Drawing Tablet input device that allows you to draw images on a flat surface using a tablet pen. Expansion Slots -PCMCIA (PC Cards) Type I 3.3mm thick (old memory cards RAM) Type II 5/5.5mm thick (most common modem, network adapter, or other comm. device) Type III 10.5mm thick (hard drives) Can also accommodate Type I & II. Type IV 16mm (allows for thick hard drives) introduced by Toshiba, not official yet. **Type I can only hold one Type I card **Type II can hold one Type II card, or 1 Type I card **Type III can hold one Type III card, or any combo of two Type I or II cards.

Display Options XGA 1024x768 (Extended Graphics Array) SXGA 1280x1024 (Super Extended Graphics Array) SXGA+ - larger than 1400x1050 UXGA 1600x1200 (Ultra Extended Graphics Array) WXGA 1366x768 (Wide Extended Graphics Array) WUXGA 1920x1200 QXGA 2048x1536 (Quad Extended Graphics Array) **Pixel is a picture element. It is the smallest complete sample of a picture. Display - LCD Mounted on inverter or backlight assembly to backlight display flourescencse tubes used for back lighting (inverter) Light dispersed to plastic plate Diffuser on top- takes points of light and uniformly spread over the entire area Display - CRT Degauss if rainbow and blurry happens when magnets get near Keystone adjust top and bottom separately Pincushion middle adjust due to bow Phosphorus in broken screen cannot be used Lead content present Network Connections Netsh.exe or go to Network Connections to make changes to DHCP/Static, WINS, DNS, etc. To access a shared drive in 2000 My Network Places and My Computer **Network Neighborhood in 9x Network Device Definitions -Hub Network connector, a repeater. OSI model device, the simplest possible. -Bridge No protocols, it forwards data depending on the destination address in the data packet. Uses MAC address, not the IP address. OSI Layer 2 -Switch Same as bridges, but have multiple ports with the same flavor connection. -Router forward data packets from one place to another, depending on the Network address, not the Hardware address (MAC Address). For TCP/IP networks, this means the IP address of the network interface. OSI Layer 3. Network Terminology DHCP Dynamic Host Control Protocol a standards-based networking protocol that is used to automate the assignment of IP addresses. DNS Domain Name System a network service that is used to resolve host names to IP addresses. Used extensively on the internet. WINS Windows Internet Naming Service a network service that can be used to resolve NetBIOS names to IP addresses. NetBIOS names are also known as Windows computer names. IPCONFIG verify IP address of Windows-based computer. Network Cables -Twisted pair UTP Unsheilded Twisted Pair pairs are twisted to prevent cross-talk. -Category 1 (voice only) -Category 2 (4 Mbps) IBM token ring only -Category 3 (10 Mbps) -Category 4 (16 Mbps) IBM token ring only -Category 5 (100 Mbps) most prevalent for building a couple years old -Category 5e (1Gbps) most new installations -Category 6 (2 Gbps) most new installations or use fiber -Coaxial Cable RG-58 (50-ohm cable) used for networking, thin RG-59 (75-ohm cable) used for TV RG-6 (Used for satellite TV and High Grade cable) RG-8 (50-ohm cable-used for 10Base5 Thicknet) Used for backbone **Cable-modem based Internet Connections use coax. **Coax is capable of transmitting multiple frequencies, the same cable can be used for TV and Int. -Fiber Optic ST & SC look like audio connector, screw on ends, arent made to move. MT-RJ looks like Registered Jack, made to move. Mini-BNC uses traditional style BNC. Single mode vs. Multi Mode Single mode cables rean betwee bulidings, 1 light pulse (SC) Multi mode cables used in buildings, goes in diff directions (ST, MT-RJ) **Carries signals in the form of modulated pulses of light. Pulses instead of electric signes, so its virtually impossible to intercept the signal without interrupting it and thus being detected. **Fiber is not susceptible to interference EMI. **A center glass core that is surrounded by protective materials. **Plenum cable is flame retardant. Ethernet Networks

10Base2, 10BaseT, 10BaseTX BASE Baseband signaling method for communicating over network Network Topologies -Bus computers all in a row, have to be terminated at both ends. -Star Most popular everything goes back to a central hub or switch. -Ring Used a device that looks like a hub, but actually a logical ring within it. The computers could communicate on the networking based on what was going on in that ring. -Mesh connecting computers to other computers, then back. X*(x-1). The largest Partial Mesh in existence is the Internet. Network Topology Distance 10BaseF (10BaseFL) 10 Mbps long cable length with max distance of 2,000 (m) or 2 (km) - Fiber 10BaseFX identical to 10BaseFL, except the network speed is 100 Mbps rather than 10 Mbps. Fiber 10Base2 max cable length is 185 m. 10Base5 max cable length of 500 m. 10BaseT and 100BaseT max distance of 100 m between two devices. *Single-mode fiber 20 miles or more. *Coaxial/RG-58 used in 10Base2 (ThinNet) up to 185 meters *Coaxial/RG-8 used in 10Base5 (ThickNet) up to 500 meters *Multi-mode fiber 3,000 feet *UTP or STP up to 100 meters or 328 feet Network Protocols -TCP/IP Series of 4 numbers between 0 and 255, separated by periods, HTTP, POP, SMTP = Sends, if doesnt receive, sends again. (routable) Classful Subnetting Private Network Saved Block by IANA A 1-126 255.0.0.0 10.0.0.0-10.255.255.255 B 128-191 255.255.0.0 172.16.0.0-172.31.255.255 C 192-223 255.255.255.0 (Private) 192.168.0.0-192.168.255.255 D 224-239 255.255.255.255 **To remember Classes: A 1.0.0.0 127.0.0.0 ~~ (127) 1-127 = 126/2 = 63 (Skip 127) B 128.0.0.0 191.0.0.0 ~~ (63) 128-191 = 63/2 = 31 C 192.0.0.0 223.0.0.0 ~~ (31) 192-223 = 31/2 = 15 D 224.0.0.0 239.0.0.0 ~~ (15) 224-239 = 15 ** IANA Internet Assigned Numbers Authority saved 3 blocks for private networks. **127 is missing, it is used for diagnostic purposes. 127.0.0.1 = local address (Home). **Loopback Address ping to ensure local TCP/IP is working properly** **PING ICMP Echo must be enabled in firewall** -IPX/SPX Novell proprietary protocol, User MAC addresses as part of address (Microsofts equivalent is NWLink, so that Microsoft products can communicate with Novell. (routable) -AppleTalk From Apple Users CSMA/CA (collision avoidance) -NetBEUI/NetBIOS **NetBIOS is a service that Microsoft clients and servers use to identify themselves on the network. Its got its own protocol = NetBEUI **NetBEUI is used with the early versions of Windows 98 non-routable protocol that operates at the network and transport layer. (Can only be used on the same network segments or on segments that are connected by bridges. **NAT Network Address Translation the process of modifying network address information in datagram packet headers while in transit across a traffic routing devide for the purpose of remapping a given address space into another. Network Architectures -Ethernet CSMA/CD (STP) Coaxial cable to UTP, to Fiber Optic. CSMA/CD Carrier Sense Multiple Access with Collision Detection Carrier looks at the wire and tried to determine if there is anything on that wire, if not, it will send the signal. If two deviced dont sense something at the same time, and both send at the same time, then the CD detects it, it will stop transmitting to avoid a second collision, then clears it up. -Token Ring Token passing token passed until 1 PC grabs it, no collisions are possible. -AppleTalk CSMA/CA Carrier Sense Multiple Access with Collision Avoidance If detects another signal, stops sending and transmits a jamming signal, then waits a random time an dstarts sending again. Wireless Networking -WEP Wired Equivalent Privacy less secure, but protects against eaves dropping and altered packets **802.11b -WPA Wireless Access Point must have a key. More secure. Used to browse the Internet through mobile devices. -Access Point AP Base Station connect wireless network to wired network. -802.11b and 802.11g g is faster than b. B is 11 Mbps. G is up to 54 Mbps. -CSMA/CA like AppleTalk since its Wireless, make sure we have connection before sending info -Infrastructure mode allows wireless computers to connect to a LAN, WAN or Internet. -Ad Hoc allows configuration easier, but harder to manage. **Ad Hoc For this purpose Decentralized Wireless Networks Wireless Vulnerabilities

3 conditions that affect the external vulnerabilities: Antenna selection (use directional versus omnidirectional), Antenna placement (far away from exterior walls), the power of access points (adjust to a level just strong enough for operation of the network. OSI Model Open Systems Interconnection Reference Model An abstract description for layered communications & computer network protocol design. Layer 1 Physical Layer (Hub) connects multiple computer in a network Layer 2 Data Link Layer (Bridge) connects computers in network (Switch) also on 1) WAN Protocol Architecture Layer 2 conn. computers in network enhances 2) IEEE 802 LAN Architecture network conn. & perf. Reduces traffic by when compared to hub by only forwarding packets to destination point. Layer 3 Network Layer ROUTING(Router) can connect dissimilar networks. Layer 4 Transport layer Layer 5 Session Layer Layer 6 Presentation layer Layer 7 Application Layer **A Gateway supports protocol translation between dissimilar networks at different OSI layers. E.G.: a gateway would be used to connect an Ethernet network with an IBM network. Encryption methods -Public Key cryptography is a method for secret communication between two parties without requiring an initial exchange of secret keys. It can also be used to create digital signatures. It is also known as asymmetric key cryptography because the key used to encrypt a message differs from the key used to decrypt it. In public key cryptography, a user has a pair of cryptographic keys a public key and a private key. The private key is kept secret, while the public key may be widely distributed -Symmetric Key Symmetric cryptography uses a single secret key for both encryption and decryption. To use a symmetric encryption scheme, the sender and receiver must share a key in advance. -SSH Secure Shell Linux & Unix data exchanged using a secure channel. (HTTPS -S/MIME or PGP encryption for email SCSI -SCSI 1 chain, maximum 7 devices -SCSI bus up to 16 devices (including host) -SCSI must have terminations on both ends -Each device assigned a unique id & gives priority weighting. -Can be daisy chained together -7 wire cable single interface -usually set to ID7 higher # means higher priority -Example 8-bit SCSI device assign Host Bus Adapter (HBA) the # 7 since range is from 0 to 7 **The first boot device is set to the # 0, when bus is initialized, it scans starting at 0this ensures the boot device will be recognized. -Non-standard SCSI boot disk for 2000 NTLDR (NT Loader), NTDETECT.COM, BOOT.INI, NTBOOTDD.SYS. PCI Peripheral Component Interconnect I/O Bus supports 64 or 32-bit data paths. (New 132 MBps) **Audio Modem Riser (AMR) slot is located beside the AGP slot in the middle of the motherboard. **Advanced Communication Riser (ACR) slot is a PCI slot rotated 180 degrees. **Communication and Network Riser (CNR) slot is located near the last PCi slot on the end of the motherboard. **All three slots have the same goal: to allow host signal processing (HSP) devices to connect to the computer. ISA 8 & 16 bit data transfers Addresses MAC Address - Media Access Control 48-bits IPv4 32-bits Ipv6 128-bits Logical Addresses = 16, 32, 16 Media Access Control (MAC) Hardware vendor assigns a MAC address to a physical device, or hardware. Assigned to NICs. No two computers on a network can have the same MAC address. Example is 00-AA-00-62-A1-09. Ethernet 10BaseT, 100BaseT & 1000BaseT Ethernet UTP Maximum Distance 100 meters/328 feet -can increase using repeaters Frequency Band 2.4 GHz to 2.485 GHz Bluetooth 125 KHz to 134 KHz LF RFID 13.56 MHz HF RFID

860 MHz to 930 MHz UHF Fiber Single-Fiber Mode 30 miles or more Multi-Mode 3,000 feet TDR Time-Domain Reflectometer measure length of a cable based on time down and back. Bluetooth -Class 2 10m/30ft -Class 1 100m/300ft -Class 3 1m/3ft Configuring Power Management -BIOS-ACPI (Advanced Configuration Power Interface) - Setup hardware profiles. -Suspend everything goes to sleep, waiting for the next thing to happen. -Standby most things go to sleep, touch any key, wakes back up. Turns off LCD & Hard disk. -Hibernate information that is in RAM, copy to a place on the hard drive, then computer completely shut down. **Hibernation: configure. Sets aside space on the hard drvie for saving data to hibernate. Start, Control Panel, Power Options. Tab that says Hibernation. Shows Free disk space & space required to hibernate. Disk space required to hibernate is equal to the amount of RAM. Here you can enable hibernation, or turn it off if you need to free up some disk space.if you dont want to use hibernate at all. **ACPI Right-click My Computer, go to Manage, Computer Management, Device Manager, Expand the Computer mode, here it shows whether or not you have ACPI. **Start, Control Panel, Power Options: Power Schemes, Alarms, Meter, Advanced, Hibernate. **Power icon in the lower-right hand corner, gives status of power, and you can click on and it will give you the option of changing power schemes. Laptop -Normal operating temperature of laptops is 35-40 degrees Celsius. -Active matrix monitor LCD TFT -Max Monitors in XP = 10 -L1 cache built into processor -Serial ATA uses 8B/10B encoding scheme to encode & decode data -SoDimm & MicroDimm memory is used in laptops -To find the capacity of a laptop battery: Wattage = Output Voltage x Output Amperage -Types of batteries Nickel Cadmium (NiCad) Nickel cadmium is rarely used today. They have a shorter life and are sensitive to improper charging and discharging. They hold a charge very well when charged, but their life can be severely shortened if the batter is not fully discharged before recharging, or if it is overcharged. || Moderate energy density & moderate self-discharge rate. Nickel Metal-Hydride (NiMH) NiMH batteries have a slightly longer life than NiCad (about 50%) and are less sensitive to improper charging and discharging. They are more expensive, dont store charge as well as NiCads, and they usually cannot be recharged as many times before needing to be replaced. || Highest density & high self-discharge rate. Lithium-Ion (Li-Ion) Li-Ion batteries cannot be overcharged. They hold a charge well when not in use, and have a longer life than the earlier two types of rechargeable batteries. They are also proficient at handlng the heavy-duty power requirements of todays high-end protables. It is the most expensive of the three battery technologies. || Highest Energy density while maintaing lowest self-discharge rate. Lithium Polymer Battery Lithium Polymer batteries can be formed into thin, flat sheets and installed behind the LCD panel. They provide approximately 40% more battery life while adding far less weight to the system. Some of the features of the Lithium Polymer battery are: Faster charge times. Thinner and lighter with a high energy density. Flexible size/shape design. **Dualview feature Plug a second monitor into video port on laptop, then select monitor on the Settings tab of the Display Properties dialog box, and select the Extend my Windows desktop onto this monitor check box. XP Power Schemes Home/Office use while running a portable computer while plugged into AC outlet. Portable/Laptop minimizes use of power to conserve battery, meets most processing needs without sacrificing perf. Presentation computer remains active, even if portable computer running on battery, does not turn off monitor. Max Battery makes conserving battery power the highest priority affects the computers processing needs. Types of Printing Dot Matrix: Impact, Continuous Feed, Line Ink Jet: Non-Impact, Sheet feed, Line Laser Jet: Non-impact, Sheet feed, Page Laser Printing Process

Clean a rubber cleaning blade removes any toner left on the photoreceptor drum & a discharge lamp neutralizes the charge on the drum. 0 volts Charge the primary/charge corona applies a uniform negative charge to the photoreceptor drum -600 to -1000 volts. Write The modulated laser beam writes an electrostatic image on the rotating drum -100 volts. (Writes opposite of image.) Develop Toner is transferred from the toner cartridge to the photoreceptor drum. Transfer The transfer corona charges the paper so that the toner on the photoreceptor drum is attracted to the paper as the drum rotates the paper and drum come into close proximity. Fuse A fusing roller, heated by a quartz lamp, melts the toner to the paper and the paper exits the printer. **Toner particles are -200 to -500 volts **Failed formatter board receives data from PC if its bad - wavy lines or random dots -other printing garbage wrong printer driver installed or an improperly configured printer. **Before vacuuming remove toner cartridge, or it will cause a mess. Inkjet printing Ink stored in cartridge in liquid form. Dot-Matrix Printers -Pins strike inked ribbon -Array of 9 or 24 pins (24 higher quality) -Use a platen (rubberized roller) holds paper in place, if not holding print lighter across page. -Printhead can be hot Dye Sublimation Printer -They vaporize & diffuse the ink onto the surface of the paper -They use a ribbon compromised of plastic: contains cyan, magenta & yellow -Color densities are easily controlled Phase-change Printing Transforms solid ink into liquid ink Printer Hardware Troubleshooting -Dot-Matrix Printer Problems Ink Ribbon provides ink to page, if faded, change ribbon Pins weird characters, or lines or dots going across the page Jams pin jams and wont go back in Stepper Motor must tear easily, not tear off harshly, so it moves easily, with the Stepper Motor, moves just a little bit, advances just a little. Tear off harshly, motor is turned the other waymotor becomes a generator, sends current back the other direction, into the circuitry of the device, and can burn things up, more current than made for. -Ink Jet Printing Problems All in the Cartridge Printer Quality can clean cartridge with software of printer Paper Jams pickup roller -Laser Printer Problems (new toner cartridge fixes most issues) Paper jams may have to adjust paper assembly, professional Blank pages transfer corona wire not workingit charges paper in order for it to take the toner. All black pages laser is not workingsupposed to write the opposite of whats going to print. Drum was charged, but light didnt write where toner wont stick. **Installed a new inkjet printer, printed test page. Receive call that no users are able to print. First check for paper. Next, verify driver and components. Operating Systems -2000/XP Profiles Roaming, Local, Mandatory -Driver Signing ME, 2000, XP -XP Professional tools for the impaired Magnifier, Narrator, On-Screen Keyboard -XP Professional on Laptop there are multiple hardware profiles availabe: Conservation of Power when on Battery 100% performance with plugged in -XP Files Systems: NTFS, FAT32, FAT -NTFS 2000, XP, Vista -NTFS is required for File Encryption -XP uses Microsoft Login Screen for authentication -Basic Dynamic Disks NT 4.0, 2000, XP ICS Internet Connection Sharing Win. 98 SE & Later .CPL Control Panel Applet -To Upgrade Windows XP 64 bit to Vista must do a clean install, cant do an upgrade -XP must be acrtivated within 30 days. Shortcuts Windows+L Workstation Lock Windows +R Run Window Windows +U Utility Mgr

Windows +E My Computer Task Manager XP Tabs applications, processes, performance, and networking 2000 Tabs minus networking File Systems FAT16 supports various OS, such as older versions of UNIX, Linux, Windows 95/98/Me, OS/2, and Linux. FAT16 supports the original Windows 95 FAT - is compatible with MS-DOS and supports a dual-boot configuration. FAT supports a maximum volume size of 4 GBs. FAT32 is not compatible with UNIX, Linux, and Windows NT. FAT32 is compatible with Windows 95 OSr2, 98, ME, 2000, XP. FAT 32 supports a maximum volume size of 2 TBs. NTFS enhances security of an OS by providing encryption, file compression, and disk quotas. NTFS does not support older versions of UNIX. NTFS is compatible and recommended for use with Windows NT, 2000, XP, Vista, Windows Server 2003, & 2008. NTFS Windows XP will default to NTFS when installing OS NTFS support larger partition sizes than FAT. NTFS supports maximum volume size of 256TBs. **Any volumes larger than 2 TBs must be configured as dynamic, not basic disks. HFS used only with MAC HFS cannot use with Windows-based operating system. CDFS CD File System read-only formatting standard this is now legacy, replaced by UDF Universal Disk Format OS Installation Automatic/Unattended Installation requires use of answer files it provides the OS with answers to all questions prompted during install. Attended Installation does not use answer files because the user is avaialbe to provide the info. Network Installation OS installed from network media. Multi-boot or Dual-boot installation 2nd OS installed boot to either OS. To boot from two different partitions: boot.ini should be edited to include both OS. F6 to install third-party drivers. OS Upgrade 1.) Check system requirements of the new operating system to see if PC can upgrade to the new OS. 2.) Ensure OS version currently running can be upgrade to the new OS. If not, a new, clean install is necessary. 3.) Check to see if hardware and software is compatible with new OS. 4.) User File Settings and Transfer Wizard to transfer files from and to Windows XP computers only. XP Requirements Minimum processor Pentium 233 MHz or higher (Pentium II 330 MHz recommended) 800x600 video resolution 128 MB of RAM 1.5 GB Free Space XP Professional CD D:\i386\winnt32.exe /cmdcons install Recovery Console /checkupgradeonly test for compatibility with XP /unattend start unattended install of XP /makelocalsource copy install source files to Hard Disk Registry SCANREG /OPT compresses by deleting unused space SCANREG /BACKUP backup/copy SCANREG /FIX scans & fixes errors removes unused space SCANREG /RESTORE displays list of available registry backups overwrites with selection Windows 2000 View registry by using Regedit.exe or Regedt32.exe **Read-only mode offered only by Regedt32.exe Registry Hives HKEY_CURRENT_CONFIG contains info on hardware settings used at startup. HKEY_CURRENT_USER contains info on user that is currently logged on. HKEY_USERS contains info on all users that have account on the computer. HKEY_LOCAL_MACHINE contains config info for the computer. HKEY_CLASSES_ROOT contains application info for all apps installed on the computer. Recovery Console - XP Diskpart verify and manager partitions Fixboot write a new windows boot sector code to system partition Scandisk Scan the disk to detect and repair problems, such as corrupt files and other disk errors FDisk create and configure new partition or configure, delete and view the existing partitions Bootable Floppy Disk - 2000 NTLDR (NT Loader), NTDETECT.COM, BOOT.INI, NTBOOTDD.SYS System Restore

Need at least 200 MB of free space on each hard disk. Paging File By default: 1.5 times the amount of physical RAM & is located on the same hard drive as OS. To improve performance: move the paging file to another hard drive that does not contain OS & increase the size of the paging file. Start Control Panel Double-click System Advanced Tab Performance Settings Advanced Virtual Memory Change Click the drive that contains the paging file that you want to change Under paging file size Custom type new size in MB in the initial size or max size box, then click Set. Click OK. Drivers If you look in Windows Update and notice that there is an updated driver available. The simplest way to install the updated driver into your system is to download from the Windows Update site. Access Methods -MAC (Mandatory Access Control) Based on Clearance Levels, if it isnt clearly permitted or allowed, its denied. Is an access policy determined by the system, not the owner. (Pre-defined Security Policies) Two methods are commonly used for applying MAC. -RBAC (Role-based access controls): This type of control further defines specific conditions for access to a requested object. All MAC-based systems implement a simple form of role-based access control to determine whether access should be granted or denied by matching: An objects sensitivity label. A subjects sensitivity label. -LAC (Lattice-based access controls): There can be used for complex access control decisions involving multiple objects and/or subjects. A lattice model is a mathematical structure that defines greatest lower-bound and least upper-bound values for a pair of elements, such as a subject and an object. -DAC (Discretion Access Control) is an access policy determined by the owner of an object. The owner decides who is allowed to access the object and what privileges they have. Authentication Methods Mutual Authentication checks identity of both ends of connection. It is often referred to as two-way authentication. Biometric Authentication based on some physical quality fingerprint, iris scan, retina scan, etc. Kerberos Authentication centralized management database of all user accounts and resource passwords. RADIUS provides centralized remote user authentication, authorization and accounting. PKI Authentication protects the transmitted data and assists in maintaining the integrity of the data SMART CARDS uses public keys, certificates, for user authentication. Cert assigned to a single user. TACACS used in UNIX networks remote auth. Used by a client to communicate with an auth server. Environmental Concerns for server room -Temperature -Humidity -Noise -EMI -Fire Suppression Server Room Detection Systems Temperature detection system Water detection system Smoke detection system Types of Backups Normal Backs up the selected files and marks them as backed up. Copy Backs up the selected files but does not mark them as backed up. Daily Backs up the files that changed today, but does not mark them as backed up. Differential Backups up the files that have changed or are new, but does not mark them as being backed up. Incremental Backs up those files that have been created or changed since the last normal or incremental backup set was created, and marks them as being backed up. NOTE: Backup systems use the Archive bit to mark files as either backed up or needs backup. An incremental backup clears the Achive bit for files it backs up. Storing Backup Tape off-site -Theft -Vandalism -Localized Natural Disaster Protection Elements -UPS primarily protects against power failure. -Surge Protector protects against spikes, surges & sags in power. -Wear grounding straps, use an anti-static solution, and use rubber mats to protect equipment from electrostatic charge. -Firewall protects against unauthorized users. -Anti-Virus Software protects against viruses. Security Threats Worm replicates itself to PCs on network thru security loop holes.

Boot virus affects hard disk not programs MBR Email Virus spreads thru email continues to replicate itself to recipients who open email or attachment Trojan Horse hidden program that when executed, then damages programs and data. Social Engineering -The gulllibility of people. -The ignorance of people. Confidentiality Identifies sensitive data and ensures that unauthorized entities cannot access it. Digital Signature -Uniquely identifies the sender of transmitted messages. -Ensures that the data received has not been altered. -Pairs a public key with private key. Steps to Troubleshooting Process 1.) Identify the problem Question the user, Identify user changes & perform backups before making changes. 2.) Analyze the problem Estanblished a theory of probably cause 3.) Test components Test the theory to determine the cause. Once the theory is confirmed, determine the next steps to resolve the problem. If the theory is not confirmed, establish a new theory or escalate the problem. Establish a plan of action. Finally, implement the solution. 4.) Evalute the results Verify full system functionality. If applicable, implement preventative measures. 5.) Document finding, actions & outcomes. Troubleshooting Wont boot up at all no power (Power Supply) Unending string of beeps or an error message (Faulty Memory) Reboot randomly (Overheated CPU caused by a bad heat sink or faulty fan) Error message (Hard Disk crash PC will still be on.) Laptop frequently overheats Air vents are open. Dust has accumulated on heat sink fans. Active Listening Participate in the conversation and assure speaker that he/she is being heard. Allow customer to complete his/her points. Do not interrupt. Listen and attempt to understand what the customer is saying. Be able to summarize the customers statement when customer is through to ensure complete understanding. Respond to questions and directions appropriately to let the customer know you are listening. Ensure that distractions have been removed and that you are able to focus on what the customer is saying. Customer Service -Schedule meeting with supervisors instead of actively arguing with a customer. -If emails are sent, respond to everyone thanking for input, ask any other questions, do not get angry. Dealing with an angry customer Remain calm. Never make the situation personal. Let the customer vent. Ask questions about the problem. Request that they repeat details. Be a good listener to avoid further frustration. Do not transfer a customer to a supervisor unless you cannot handle the customers problem. Confidential Data Never divulge a customers confidential data that is learned while fixing a computer at the customers location. It is unethical to disclose any confidential information obtained during a service call in any way. To complete service request Ask customer if they are ready to work on the problem. Ask customer to explain problem. Ask pertinent questions for clarification. Develop all possible troubleshooting steps. Isolate and repair the problem. Verify the repair fixed the problem. Log the problem and solution. Additional request made After finishing the initial service request, the customer asks you to troubleshoot another problem: call your supervisor. MSDS Personal Protection Rating A Goggles B Goggles & Gloves C Goggles, Gloves & Other protective wear

Fire Extinguishers Type C is for electrical (A is for wood & B is for flamable liquids) Fire PC catches fire: First ventilate the room so that the smoke from the fire can escape. (Allows hardful gases to escape.) Contact Security. (Ensures appropriate evacuation procedures are followed. Do not attempt to fight the fire unless it is a small, contained fire. (Could use a dry chemical fire extinguisher.) Do not use water. If fire is too large, proceed to evacuate the building. Basement in Building catches fire Evacuate the building human life is given priority Electrocution Turn off the main switch Remove the persons contact with the electricity source by pulling him or her away. Call for medical help. Cleaning Citrus-based cleaners new type of biodegradable cleaner more effective and economical for cleaning circuit board and contacts Isopropyl alcohol & water to clean laptops LCD screen spray on lint-free/dust-free cloth ESD Minimizing ESD ESD likes warm and dry: Clothing, Carpet, Wrist Strap and ground, Antistatic bags, ESD mats, Relative humidity To Protect from ESD Wear a grounding strap. Do not ground to system board. Do not attach strap to a line voltage source. Unplugging a computer will not protect it from ESD.

You might also like