CompTIA A+ Notes

Expansion cards.

Such as sound- , video- ,network- ,wireless- , modem- , storage-, tv tuner-, video capture cards.These cards are installed into expansion slots(PCI, AGC). These cards require drivers(software) to communicate to the operation system. [view]

By: frostyfrost | Related Lesson: Install & Configure Expansion Cards | Modified: June 14, 2016


S-Password – Supervisor password U-Password – Can be limited access given by the supervisor.  Lojac – Tracking device like for a stolen car.  Software Installed on the Operating system, but in the BIOS is the persistence module. [view]

By: illinimike | Related Lesson: Security | Modified: June 14, 2016


SIMM- Single in-line memory module.DIMM- Dual in-line memory module. SIMM- One group independently accessed memory that is working together.DIMM- Two groups of memory that can be accessed independently. The RAM speed needs to match up with the mothe [view]

By: frostyfrost | Related Lesson: DIMM vs SIMM | Modified: June 14, 2016

RAM error checking.

The last bit of the RAM is used for error checking.2 types of error checking:1.Parody-9 bits of memory where 8 bits are used for memory and the 9th bit is used for error checking. The ninth bit is called the parody bit. The sum of all the bit-s must [view]

By: frostyfrost | Related Lesson: Error Checking | Modified: June 14, 2016


POST – Power on Self Test = performs a series of tests in order on computer.  Each step if it fails, the computer will stop and not boot up. 1) CPU & post BIOS RAM  2) System Timer 3) Video card – allow us to see output, can’t [view]

By: illinimike | Related Lesson: Diagnostics | Modified: June 14, 2016

5-4-3 rule

The 5–4–3 rule also referred to as the IEEE way (contrary to the Ethernet way) is a design guideline for Ethernet computer networks covering the number of repeaters and segments on shared-access Ethernet backbones in a tree topology. It m [view]

By: bigikes | Related Lesson: Coaxial Cables | Modified: June 14, 2016

BOIS configurations

PXE booting – network booting.  Tech support for a big company trying to connect it out to the network to reimage it from a server which hosts imaging files.  Turn on/turn off I/O Devices (input/output) WOL (wake on lan) – remotely acce [view]

By: illinimike | Related Lesson: Configurations | Modified: June 14, 2016


WOL : wake on LAN. needs to be enabled in the bios. [view]

By: comee3 | Related Lesson: Configurations | Modified: June 14, 2016

Security 1.1

Supervisor and User Passwords Lock down the BIOS Supervisor can make all the changes to the BIOS they deem necessary. User is given certain permissions by the Supervisor on what they can or can not change. Setting can be set in advanced in case of co [view]

By: TNTyler13 | Related Lesson: Security | Modified: June 14, 2016


Computers communicate through electronic signals defined by specific sets of rules and guidelines that map out when, where, how that communication takes place, that is the purpose and function the TCP/IP protocols provide [view]

By: bigikes | Related Lesson: TCP/IP Configurations (part 1) | Modified: July 11, 2016

« First ‹ Previous 1 12298 12388 12396 12397 12398 12399 12400 12408 Next › Last »

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?