Closing Statements
Overall I enjoyed the blog assignment because it allowed me to research topics within the week that I may have never heard of or may have questions about. Even though I found the assignment helpful overall, I can't see myself blogging outside of school requirements. I do believe that blogging was helpful to me in my current job because it allowed me to learn more about commands and techniques that I was not aware of before. I do not believe that a blog would be a tool for obtaining a new position, but I do feel like some of the things I have learned will come in handy when interviewing in the future.
Tuesday, May 31, 2016
Week Twelve
The troubleshooting theory is a set of mental steps that you
can use to diagnose and fix a computer. The troubleshooting theory includes
talking to the users to determine how/when the problem took place, determining
a cause, testing, verification, and documentation.
The following are the steps of the troubleshooting theory:
·
Identify the problem
o
Question the user and identify user changes to
computer. Perform backups before making any changes.
·
Establish a theory of probable cause (question
the obvious)
o
Localize the issue based on the symptoms
o
Look for clues outside of the computer case
before opening it
·
Test the theory to determine the cause
o
Once theory is confirmed, determine the steps required
to resolve the problem
o
If the theory is not confirmed, re-establish new
theory or escalate if necessary.
·
Establish a plan of action to resolve the
problem and implement the solution
·
Verify full functionality and if applicable
implement preventative measures
o
Ensure the user is happy
·
Document all findings, actions, and outcomes
Source:
Meyers, M. (2012). All-in-one CompTIA A certification exam guide: (exams 220-801 & 220-802). New York: McGraw-Hill.
Monday, May 23, 2016
Week Eleven
Spam
Spam is unsolicited email that comes into your Inbox from a source that is not a friend, family member, or colleague, and that you did not ask for, flooding the Internet with many copies of the same message. Spam can be from a legitimate business trying to sell products or scammers who are trying to make a profit. Hoaxes, pornography, and get-rich-quick schemes all are classified as spam. They waste time and can easily offend users.
There are many different ways to deal with spam. The first is to avoid posting your email address on the Internet. One study found that over 97% of spam messages were sent to users that had posted their email address online. Filters and filtering software can also help block spam at the mail server. Google Mail, for example, has blocking schemes that can drop the number of spam messages received by users by 90%.
A lot of spam messages will contain malware or point to dangerous websites. It is important that if you receive a spam message that you never click any links or open a message from someone that you do not recognize. Spam can also be in the form of phishing, sending an email that looks legitimate, hoping that you will enter personal information. If you receive an email asking for personal information, it is important to verify the sender before proceeding.
The best things you can do to combat spam include: never responding to it, filtering it out of your e-mail, and complaining to providers about it.
Source:
Hazen Mueller, S. (n.d.). How can I help make a difference? Retrieved May 23, 2016, from http://spam.abuse.net/bits/makeadifference.shtml
Meyers, M. (2012). All-in-one CompTIA A certification exam guide: (exams 220-801 & 220-802). New York: McGraw-Hill.
Spam is unsolicited email that comes into your Inbox from a source that is not a friend, family member, or colleague, and that you did not ask for, flooding the Internet with many copies of the same message. Spam can be from a legitimate business trying to sell products or scammers who are trying to make a profit. Hoaxes, pornography, and get-rich-quick schemes all are classified as spam. They waste time and can easily offend users.
There are many different ways to deal with spam. The first is to avoid posting your email address on the Internet. One study found that over 97% of spam messages were sent to users that had posted their email address online. Filters and filtering software can also help block spam at the mail server. Google Mail, for example, has blocking schemes that can drop the number of spam messages received by users by 90%.
A lot of spam messages will contain malware or point to dangerous websites. It is important that if you receive a spam message that you never click any links or open a message from someone that you do not recognize. Spam can also be in the form of phishing, sending an email that looks legitimate, hoping that you will enter personal information. If you receive an email asking for personal information, it is important to verify the sender before proceeding.
The best things you can do to combat spam include: never responding to it, filtering it out of your e-mail, and complaining to providers about it.
Source:
Hazen Mueller, S. (n.d.). How can I help make a difference? Retrieved May 23, 2016, from http://spam.abuse.net/bits/makeadifference.shtml
Meyers, M. (2012). All-in-one CompTIA A certification exam guide: (exams 220-801 & 220-802). New York: McGraw-Hill.
Tuesday, May 17, 2016
Week Ten
Components of a Laser Printer
- Toner Cartridge - Supplies the toner that creates the image on the page.
- Photosensitive Drum - An aluminum cylinder coated with particles of photosensitive compounds.
- Erase Lamp - Exposes the entire service of the photosensitive drum to light, making the photosensitive coating conductive.
- Primary Corona/Charge Roller - Charged with an extremely high voltage, causing an electric field enabling voltage to pass to the drum and charge the photosensitive particles on the service.
- Laser - The writing mechanism of the printer. Any particle on the drum struck by the laser becomes conductive and its charge is drained away in o the grounded core of the drum.
- Toner - A fine powder made up of plastic particles bonded to iron particles. Particles of toner are attracted to the areas of the photosensitive drum that have been hit b the laser.
- Transfer Corona/Transfer Roller - To transfer the image from the photosensitive drum to the paper, the paper must be given a charge that will attract the toner particles off of the drum and on to the paper. Newer printers use a transfer roller that draws the toner onto the paper.
- Fuser Assembly - Two rollers, a pressure roller and a heated roller, are used to fuse the toner to the paper. The pressure roller presses against the bottom of a page, while the heated roller presses on the top to melt the toner into the paper.
- Power Supplies - All laser printers have at least two power supplies. One provides power to the motors that move the paper, the laser, and the transfer corona/roller. The high voltage supply provides power only to the primary corona/roller.
- Turning Gears - Used to pick up the paper, turn the photosensitive roller, evenly distribute the toner, and activate the fuser assembly. In most laser printers gear systems are packed together in units called gear packs. Most laser printers have two or three gear packs.
- System Board - On each electronic board is a processor, the printer's ROM, and the RAM used to store the image before it is printed. Many printers divide these components among two or three boards.
- Ozone Filter - Special filter to catch ozone. Needs to be vacuumed or replaced periodically.
- Sensors and Switches - Spread throughout the printer. The sensors detect issues such as paper jams or low toner levels.
Source:
Meyers, M. (2012). All-in-one CompTIA A certification exam guide: (exams 220-801 & 220-802). New York: McGraw-Hill.
Wednesday, May 11, 2016
Week Nine
Troubleshooting Sound
Having sound problems in Windows can be a frustrating experience. Either it is simple to fix, or seemingly impossible. Sound problems tend to fall within three groups: hardware, configuration, and application problems.
1. Hardware - Many sound problems are caused by hardware that isn't set up properly.
Having sound problems in Windows can be a frustrating experience. Either it is simple to fix, or seemingly impossible. Sound problems tend to fall within three groups: hardware, configuration, and application problems.
1. Hardware - Many sound problems are caused by hardware that isn't set up properly.
- The first thing to check when sound dies is the volume controls. Volume can typically be set in two areas: in software, and on the speakers.
- The second thing to check is the speakers. Make sure they are turned on and are getting power. Also check if they are plugged in to the sound card.
2. Configuration Problems - Configuration errors can occur when the sound card is physically good but a setting has not been properly configured. These errors typically occur at installation but can also appear on a working system.
- First place to check is the device manager. If the driver has a problem it will be displayed.
- Second place to check is the Sound applet for configuration errors.
3. Application Problems - Application problems are the hardest to fix and tend to occur when it was previously playing sounds without trouble.
- First, look for an error message. If an error code occurs, this can be researched online.
- Second - Try playing the sound file with a different application.
- Third - Try reinstalling the application.
Source:
Meyers, M. (2012). All-in-one CompTIA A certification exam guide: (exams 220-801 & 220-802). New York: McGraw-Hill.
Meyers, M. (2012). All-in-one CompTIA A certification exam guide: (exams 220-801 & 220-802). New York: McGraw-Hill.
Friday, May 6, 2016
Week Eight
Configuring Internet Explorer
On most web browsers you can set the default font size, choose whether to display graphics, and adjust many other settings. Using Internet Explorer (IE) you will find configuration tools under Internet Options in the Control Panel or under the Tools menu on Internet Explorer. When the Internet Options applet is launched there are seven tabs along the top: General, Security, Privacy, Content, Connections, Programs, and Advanced.
The General tab controls the most basic features of Internet Explorer: the home page, browsing history, and tab settings. The Security tab enables you to set how severely IE safeguards your Web browsing. Each setting can be adjusted for a particular zone: Internet, Local intranet, Trusted sites, and Restricted zones. Once you have picked a zone to control, you can set IE's security level.
The Privacy tab controls privacy matters such as cookies and pop-ups. You can choose to block everything on the highest setting, or block nothing on the lowest setting.
The Content tab controls what your browser will and will not display. It uses a Content Advisor which uses ratings that consider language, gambling, and more. You can also adjust the AutoComplete feature which fills in web addresses under this tab.
The Connections tab allows you to set up your connection to the internet, connect to a VPN, configure a proxy server, or adjust LAN settings.
The Programs tab contains settings for your default web browser, any add-ons you may use, and how other programs deal with HTML files and email messages.
The Advanced tab contains a lot of different options that you can check or uncheck with a box, including: accessibility, browsing, international, and security settings.
Source:
Meyers, M. (2012). All-in-one CompTIA A certification exam guide: (exams 220-801 & 220-802). New York: McGraw-Hill.
On most web browsers you can set the default font size, choose whether to display graphics, and adjust many other settings. Using Internet Explorer (IE) you will find configuration tools under Internet Options in the Control Panel or under the Tools menu on Internet Explorer. When the Internet Options applet is launched there are seven tabs along the top: General, Security, Privacy, Content, Connections, Programs, and Advanced.
The General tab controls the most basic features of Internet Explorer: the home page, browsing history, and tab settings. The Security tab enables you to set how severely IE safeguards your Web browsing. Each setting can be adjusted for a particular zone: Internet, Local intranet, Trusted sites, and Restricted zones. Once you have picked a zone to control, you can set IE's security level.
The Privacy tab controls privacy matters such as cookies and pop-ups. You can choose to block everything on the highest setting, or block nothing on the lowest setting.
The Content tab controls what your browser will and will not display. It uses a Content Advisor which uses ratings that consider language, gambling, and more. You can also adjust the AutoComplete feature which fills in web addresses under this tab.
The Connections tab allows you to set up your connection to the internet, connect to a VPN, configure a proxy server, or adjust LAN settings.
The Programs tab contains settings for your default web browser, any add-ons you may use, and how other programs deal with HTML files and email messages.
The Advanced tab contains a lot of different options that you can check or uncheck with a box, including: accessibility, browsing, international, and security settings.
Source:
Meyers, M. (2012). All-in-one CompTIA A certification exam guide: (exams 220-801 & 220-802). New York: McGraw-Hill.
Thursday, April 28, 2016
Week Seven
Biometric Devices
Biometric devices scan and remember unique aspects of various body parts. This can include your iris, head image, or fingerprint. This information is used as a key to prevent unauthorized users from accessing whatever the biometric device is securing. There are many different types of biometric devices, such as:
Biometric devices scan and remember unique aspects of various body parts. This can include your iris, head image, or fingerprint. This information is used as a key to prevent unauthorized users from accessing whatever the biometric device is securing. There are many different types of biometric devices, such as:
- Fingerprint USB thumb drive: has a tiny fingerprint scanner. You slide your finger over the drive to unlock the contents of the thumb drive.
- Microsoft fingerprint scanner: replaces the standard username and password authentication. When a web site asks for a username and password you simply press your finger against the fingerprint scanner. It will then confirm your identity with special software.
- Fingerprint scanners: Used to gain access to a specific area, such as a data center. Can be troublesome if a user's fingerprint is damaged or altered.
- Iris and retinal scans: considered to be more secure form of biometric authentication.
Implementation of biometric systems can be tricky and sometimes expensive. Because of this, biometrics should only be considered for extremely sensitive data.
Sources:
Biometric authentication know-how: Devices, systems and implementation. (n.d.). Retrieved April 28, 2016, from http://searchsecurity.techtarget.com/tip/Biometric-authentication-know-how-Devices-systems-and-implementation
Meyers, M. (2012). All-in-one CompTIA A certification exam guide: (exams 220-801 & 220-802). New York: McGraw-Hill.
Monday, April 18, 2016
Week Six
Command-Line Interface
The command-line interface (CLI) is like having an Instant Message conversation with your computer. The computer displays a prompt when it is ready to receive a message. Once a command is entered the computer executes the command, and when it is finished displays a new prompt and information about what it did. To access the CLI you can go to Start, Run and type cmd or command, or on newer versions of Windows type cmd or command in the search box on the Start menu. It can also be found in the Start menu under Programs, Accessories.
Common CLI Commands
dir - Shows you the contents of the directory where the prompt is focused.
cd (or chdir) - change the focus of the command prompt to a different directory.
md (or mkdir) - create a directory.
rd (rmdir) - removing a subdirecory.
ren (or rename) - rename a file.
del (or erase) - delete a file.
Sources:
Meyers, M. (2012). All-in-one CompTIA A certification exam guide: (exams 220-801 & 220-802). New York: McGraw-Hill.
The command-line interface (CLI) is like having an Instant Message conversation with your computer. The computer displays a prompt when it is ready to receive a message. Once a command is entered the computer executes the command, and when it is finished displays a new prompt and information about what it did. To access the CLI you can go to Start, Run and type cmd or command, or on newer versions of Windows type cmd or command in the search box on the Start menu. It can also be found in the Start menu under Programs, Accessories.
Common CLI Commands
dir - Shows you the contents of the directory where the prompt is focused.
cd (or chdir) - change the focus of the command prompt to a different directory.
md (or mkdir) - create a directory.
rd (rmdir) - removing a subdirecory.
ren (or rename) - rename a file.
del (or erase) - delete a file.
Sources:
Meyers, M. (2012). All-in-one CompTIA A certification exam guide: (exams 220-801 & 220-802). New York: McGraw-Hill.
Thursday, April 14, 2016
Week Five
Windows Registry
The Windows Registry contains information, settings, options, and other values for programs and hardware installed on the Microsoft Windows operating system. Every version of Windows stores the Registry files, known as hives, in the System32\config folder and each user account folder. When a new program is installed a new subkey is created in the Registry. This includes the program's location, it's version, and how to start the program.
Accessing the Registry
The Registry can be accessed directly using a Registry editor. To access the Registry editor you can enter either regedit or regedt32 at a command prompt, or by using the Start, Run dialog box. Either command will bring up the same program.
Before Editing the Registry
The Windows Registry should rarely be edited, unless there is no other option. By making changes in the registry you risk breaking things in Windows. For example:
The Windows Registry contains information, settings, options, and other values for programs and hardware installed on the Microsoft Windows operating system. Every version of Windows stores the Registry files, known as hives, in the System32\config folder and each user account folder. When a new program is installed a new subkey is created in the Registry. This includes the program's location, it's version, and how to start the program.
Accessing the Registry
The Registry can be accessed directly using a Registry editor. To access the Registry editor you can enter either regedit or regedt32 at a command prompt, or by using the Start, Run dialog box. Either command will bring up the same program.
Before Editing the Registry
The Windows Registry should rarely be edited, unless there is no other option. By making changes in the registry you risk breaking things in Windows. For example:
- Programs may not start
- Utilities may not work
- The computer may not boot
To prevent these problems a backup of the Registry may need to be taken before anything is modified.
Sources:
Fisher, T. (2015, November 05). What is the Windows Registry? Retrieved April 14, 2016, from http://pcsupport.about.com/od/termsr/p/registrywindows.htm
Meyers, M. (2012). All-in-one CompTIA A certification exam guide: (exams 220-801 & 220-802). New York: McGraw-Hill.
Thursday, April 7, 2016
Week Four
Device Drivers
Hoffman, C. (2013, July 07). How to Use the Windows Device Manager for Troubleshooting. Retrieved April 07, 2016, from http://www.howtogeek.com/167094/how-to-use-the-windows-device-manager-for-troubleshooting/
What is device driver? (n.d.). Retrieved April 07, 2016, from http://www.computerhope.com/jargon/d/driver.htm
A device driver, also known as a hardware driver, is a group
of files that enable one or more hardware devices to communicate with the
operating system. Device drivers are used for devices such as a printer or an
external hard drive. Device drivers communicate with software. A software
program explains what it wants a piece of hardware to do and the device driver
takes the information and fulfills the request with the hardware. Device
drivers are usually installed automatically. Sometimes it is necessary to
troubleshoot device drivers, which can be done through the Device Manager on
Windows. The Device Manager allows you to view installed hardware, and is
sorted by category. Sometimes the Device Manager will show which devices are
not working properly by displaying a yellow triangle with an exclamation point
over a device's icon. From the device manager you are also able to perform maintenance
by updating, disabling, rolling back, or uninstalling a driver.
Sources:
Fisher, T. (2016, March 16). What is a Device Driver? Retrieved April 07, 2016, from http://pcsupport.about.com/od/termsag/g/term_driver.htm
Hoffman, C. (2013, July 07). How to Use the Windows Device Manager for Troubleshooting. Retrieved April 07, 2016, from http://www.howtogeek.com/167094/how-to-use-the-windows-device-manager-for-troubleshooting/
What is device driver? (n.d.). Retrieved April 07, 2016, from http://www.computerhope.com/jargon/d/driver.htm
Thursday, March 31, 2016
Week Three
ReadyBoost
Introduced with Windows Vista, ReadyBoost is a Windows feature that enables you to use flash media devices, such as a USB thumb drive or memory card, as super fast dedicated virtual memory.
External storage must meet the following requirements for ReadyBoost:
- Capacity of at least 256 MB, with at least 64 kilobytes (KB) of free space.
- At least a 2.5 MB/sec throughput for 4-KB random reads
- At least a 1.75 MB/sec throughput for 1-MB random writes
Some devices are pre-tested to use ReadyBoost. AutoPlay will provide ReadyBoost as an option when the device is connected. If the device is not pre-tested, ReadyBoost can be manually configured by right-clicking the device in Windows Explorer, clicking Properties, and then clicking the ReadyBoost tab.
Windows 7 can handle up to eight flash devices, while Windows Vista can only benefit from one device. Microsoft recommends using 1-3x the amount of system RAM for the ReadyBoost drives to get optimal performance.
Sources:
Meyers, M. (2012). All-in-one CompTIA A certification exam guide: (exams 220-801 & 220-802). New York: McGraw-Hill.
Understand ReadyBoost and whether it will Speed Up your System. (n.d.). Retrieved March 31, 2016, from https://technet.microsoft.com/en-us/magazine/ff356869.aspx
Introduced with Windows Vista, ReadyBoost is a Windows feature that enables you to use flash media devices, such as a USB thumb drive or memory card, as super fast dedicated virtual memory.
External storage must meet the following requirements for ReadyBoost:
- Capacity of at least 256 MB, with at least 64 kilobytes (KB) of free space.
- At least a 2.5 MB/sec throughput for 4-KB random reads
- At least a 1.75 MB/sec throughput for 1-MB random writes
Some devices are pre-tested to use ReadyBoost. AutoPlay will provide ReadyBoost as an option when the device is connected. If the device is not pre-tested, ReadyBoost can be manually configured by right-clicking the device in Windows Explorer, clicking Properties, and then clicking the ReadyBoost tab.
Windows 7 can handle up to eight flash devices, while Windows Vista can only benefit from one device. Microsoft recommends using 1-3x the amount of system RAM for the ReadyBoost drives to get optimal performance.
Sources:
Meyers, M. (2012). All-in-one CompTIA A certification exam guide: (exams 220-801 & 220-802). New York: McGraw-Hill.
Understand ReadyBoost and whether it will Speed Up your System. (n.d.). Retrieved March 31, 2016, from https://technet.microsoft.com/en-us/magazine/ff356869.aspx
Monday, March 21, 2016
Week Two
External Connections
A peripheral, such as a monitor, keyboard, or printer are parts of a complete computer. In order for a peripheral to function it must connect to the computer through one of many types of ports. The back of a computer has many cables running from the computer itself to various peripherals. All connectors have their own naming convention. In this blog I will be discussing a few of the different types of connectors.
USB Connectors - Universal serial bus (USB) is the most general connection for computers. Many devices use a USB connector such as a mouse, keyboard, or printer. USB connections can come in three sizes: A, B, and mini-B. The most common connector is the USB A.
DB Connectors - Have a slight D shape, allowing for only one correct way for insertion. DB connectors can have anywhere from 9 to 37 pins, although under 25 is the most common. DB connectors are the oldest type of connectors. Over the past few years the PC world has moved away from this type of connector, although it is still used normally for video purposes.
RJ Connectors - This is a plastic plug that is most likely used to connect a telephone into the jack. Recent computers only use two types of RJ jacks, RJ-11 (phone jack) and RJ-45. An RJ-11 is used for a modem, while an RJ-45 is a wider jack used for a network connection.
A computer can have close to 50 different types of connections. Almost all connections can fit into one of six types: DIN, USB, FireWire, RB, RJ, and audio. On modern computers the most common connector is a USB.
Source:
Meyers, M. (2012). All-in-one CompTIA A certification exam guide: (exams 220-801 & 220-802). New York: McGraw-Hill.
A peripheral, such as a monitor, keyboard, or printer are parts of a complete computer. In order for a peripheral to function it must connect to the computer through one of many types of ports. The back of a computer has many cables running from the computer itself to various peripherals. All connectors have their own naming convention. In this blog I will be discussing a few of the different types of connectors.
USB Connectors - Universal serial bus (USB) is the most general connection for computers. Many devices use a USB connector such as a mouse, keyboard, or printer. USB connections can come in three sizes: A, B, and mini-B. The most common connector is the USB A.
DB Connectors - Have a slight D shape, allowing for only one correct way for insertion. DB connectors can have anywhere from 9 to 37 pins, although under 25 is the most common. DB connectors are the oldest type of connectors. Over the past few years the PC world has moved away from this type of connector, although it is still used normally for video purposes.
RJ Connectors - This is a plastic plug that is most likely used to connect a telephone into the jack. Recent computers only use two types of RJ jacks, RJ-11 (phone jack) and RJ-45. An RJ-11 is used for a modem, while an RJ-45 is a wider jack used for a network connection.
A computer can have close to 50 different types of connections. Almost all connections can fit into one of six types: DIN, USB, FireWire, RB, RJ, and audio. On modern computers the most common connector is a USB.
Source:
Meyers, M. (2012). All-in-one CompTIA A certification exam guide: (exams 220-801 & 220-802). New York: McGraw-Hill.
Sunday, March 20, 2016
Week One
Electrostatic Discharge (ESD)
ESD is the passage of static electrical charge from one item to another. A good example of this is when you rub your feet on the carpet and touch something metal. ESD can occur when working on a computer, and is known to be a killer of computer components. ESD can occur even when the user does not feel a shock. ESD only occurs when two objects that store different amounts of static electricity come into contact.
There are many ways to prevent ESD. The first way to prevent ESD is the use of anti-static tools. The first tool is an anti-static wrist strap. This device consists of a wire that connects on one end to an alligator clip and on the other end to a small metal plate that secures to your wrist with an elastic strap. The alligator clip is snapped on to any metal part of the PC. Other anti-static tools include an anti-static mat, which eliminates the risk of picking up static once a component is removed from a PC. Finally, any electrical component not in a PC needs to be stored in an anti-static bag. These are the best ways to reduce the chances of ESD.
Sources:
What is ESD or ElectroStatic Discharge. (n.d.). Retrieved March 20, 2016, from http://www.computerhope.com/esd.htm
Meyers, M. (2012). All-in-one CompTIA A certification exam guide: (exams 220-801 & 220-802). New York: McGraw-Hill.
ESD is the passage of static electrical charge from one item to another. A good example of this is when you rub your feet on the carpet and touch something metal. ESD can occur when working on a computer, and is known to be a killer of computer components. ESD can occur even when the user does not feel a shock. ESD only occurs when two objects that store different amounts of static electricity come into contact.
There are many ways to prevent ESD. The first way to prevent ESD is the use of anti-static tools. The first tool is an anti-static wrist strap. This device consists of a wire that connects on one end to an alligator clip and on the other end to a small metal plate that secures to your wrist with an elastic strap. The alligator clip is snapped on to any metal part of the PC. Other anti-static tools include an anti-static mat, which eliminates the risk of picking up static once a component is removed from a PC. Finally, any electrical component not in a PC needs to be stored in an anti-static bag. These are the best ways to reduce the chances of ESD.
Sources:
What is ESD or ElectroStatic Discharge. (n.d.). Retrieved March 20, 2016, from http://www.computerhope.com/esd.htm
Meyers, M. (2012). All-in-one CompTIA A certification exam guide: (exams 220-801 & 220-802). New York: McGraw-Hill.
Subscribe to:
Posts (Atom)