Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

CHAPTER 7 Summary

Laptops and Other Mobile Devices

Mobility
Mobility in information technology means the ability to access information electronically from different locations outside of the home or office.
Mobile connectivity is limited only by the availability of cellular or data networks. Mobile devices have self-contained power in the form of
rechargeable batteries, are generally small and lightweight, and do not rely on other connected peripheral devices, such as a mouse and
keyboard, to operate.

Laptops
Laptops are portable computers. They usually run full versions of operating systems such as Microsoft Windows, MacOS or Linux

Smartphone Characteristics
Smartphones differ from laptops in that they run special operating systems that are designed for mobile devices. Examples of these operating
systems are Google's Android and Apple's iOS. Smartphones may have limited OS

Smartphone Features
An additional feature of smartphones is location services. Most phones include global positioning system (GPS) functionality. A GPS receiver
in the phone uses satellites to determine the geographic location of the device

Tablets and E-Readers


Tablets are similar to smartphones in that they use special mobile operating systems like Android or iOS. However, most tablets do not have
the ability to access cellular networks. Some higher-end models do allow access to cellular services.

Smartwatches
Smartwatches are a type of wearable that includes a microprocessor, a special operating systems, and apps. Sensors in the smartwatch can
gather data about various aspects of the body, such as heart rate, and use Bluetooth to report this information back to another device, such
as a smartphone

Fitness Trackers
Fitness trackers are similar to smartwatches but are limited to monitoring the body such as physical activity, sleep, and exercise. FitBit is a
popular example that monitors heart rate and the number of steps taken

Laptop Motherboards

Wireless adapter types


Mini PCI
It has 124 pins and are capable of 802.11a, 802.11b and 802.11g wireless LAN Connection standards

Mini PCIe
It has 54 Pins and support the same standards as Mini PCI with the addition of 802.11n and 802.11ac wireless LAN Standards

PCI Express Micro


It has 54 Pins and support the same standards as Mini PCIe
CHAPTER 8 Summary
Printers
Printers produce paper copies of electronic files. Government regulations and business policies often require that physical records be kept.
This makes paper copies of digital documents as important today as they were when the paperless revolution began several years ago

Speed and Quality


Printer speed is a factor to consider when selecting a printer. The speed of a printer is measured in pages per minute (PPM)

Color
The color printing process uses the primary colors cyan, magenta, and yellow, White (CMY)

Document Feeder

Printer Connection types

Inkjet Printer Characteristics


Inkjet printers are easy to use and usually less expensive than laser printers
Some advantages of an inkjet printer are initial low cost, high resolution, and they are quick to warm up

Laser Printer Characteristics


A laser printer is a high-quality, fast printer that uses a laser beam to create an image.
Some advantages of a laser printer are low cost per page, high ppm, high capacity, and prints come out dry. Some disadvantages of a laser
printer are high cost of startup, and that toner cartridges can be expensive

Thermal Printer Characteristics


Many retail cash register, and some older fax machines contain thermal printers. Thermal paper is chemically treated and has a waxy quality.
Thermal paper becomes black when heated. After a roll of thermal paper is loaded

Impact Printer Characteristics


Impact printers have print heads that strike an inked ribbon, causing characters to be imprinted on the paper. Dot matrix and daisy wheel are
examples of impact printers

Cloud Printing
Cloud printing is sending a print job to a remote printer. The printer could be at any location within your organization’s network. Some printing
companies provide software that you can install and then send print jobs to their closest location for processing

Hardware Optimization
Some printers can be upgraded to print faster and to accommodate more print jobs by adding hardware. The hardware may include
additional paper trays, sheet feeders, network cards, and expansion memory

Configuring Printer Sharing


Windows allows computer users to share their printers with other users on the network
CHAPTER 9 Summary
Cloud Computing and Virtualization
We use virtualization when we access the cloud or web servers
A special program called the hypervisor is used to manage the computer resources and various VMs.
It provides VMs access to all of the hardware of the physical machine such as CPUs, memory, disk
controllers, and NICs. Each of these VMs runs a complete and separate operating system.

Advantages of VMS
Manageability: The ability to move, copy and isolate VMS
Sustainability: Energy saving by the way of less hardware and electricity
Availability: The ability to snapshot, clone, and run redundant VMS
Security: Isolation of VMs and application

Type 1 (Bare Metal) hypervisor


bare-metal hypervisor and typically used with server virtualization. It runs directly on the hardware of a host and manages the allocation of
system resources to virtual operating systems. (KVM (Redhat, linux), Hyper V (Microsoft) Xen, ESXI

Type 2 (Native/Hosted) hypervisor


This is hosted by an OS and is commonly used with client-side virtualization. Virtualization software such as VirtualBox, and VMware
Cloud Computing

• Virtualization We need an admin who has to take care of creation of server and its management on the other end don’t need such
admin in cloud, anyone can create and manage as it if fully automated

• Virtualization is a technology that enables a single computer to host multiple virtual computers that share the same host computer
hardware

• Cloud computing is a technology that enables the separation of applications from the hardware

• Virtualization solves these issues by consolidating many virtual servers onto a single physical server, taking advantage of idle
resources and reducing the number of servers required to provide services to users

• Cloud computing provides users with on-demand delivery of computer services over the Internet. Most of us already use these
services when we access online music services or online data storage

What is an API? (Application Programming Interface)


It’s the messenger that takes the request and tells the system what you want to do and then response back to you

Example
Customer / Menu / Waiter and Kitchen
CHAPTER 10 Summary
Windows Installation
An operating system (OS) has a number of functions. One of its main tasks is to act as an interface between the user and the hardware
connected to the computer. (Muti User, Multitasking, Multiprocessing, Multithreading)

Basic Functions of an Operating System


• Control hardware access
• Manage files and folders
• Provide a user interface
• Manage application

Windows Recommendation Minimum System Requirements

32-bit vs. 64-bit Processor Architecture


64 bits can speed up the capacity of the processor performance
This software has been designed and for a new structure
The applications and video games with high performance are taking advance of this structure through the memory

Checking OS Compatibility
• An OS must be upgraded periodically to remain compatible with the latest hardware and software. It is also necessary to upgrade an
OS when a manufacturer stops supporting it.
• Upgrading an OS can increase performance.
• When newer versions of an OS are released, support for older versions is eventually withdrawn.

Storage Device Types


Hard Drive – Flash Drive – Solid State Drive
We might have to perform a clean installation of an OS. Perform a clean install in the following situations:
• When a computer is passed from one employee to another
• When the OS is corrupt
• When the primary hard drive is replaced in a computer

Hard Drive Partitioning


A hard drive is divided into areas called partitions

Master Boot Record


The MBR is 512 bytes long and contains the boot loader, an executable program that allows a user to choose from multiple operating
systems. MBR has become the de facto standard but has limitations that had to be addressed. MBR is commonly used in computers with
BIOS-based firmware.

GUID Partition Table


Also designed as a partition table scheme standard for hard drives, the GPT makes use of a number of modern techniques to expand on the
older MBR partitioning scheme. GPT is commonly used in computers with UEFI firmware. Most modern operating systems now support GPT.
The figure shows a comparison between MBR and GPT.

How to format a computer from Zero


https://www.youtube.com/watch?v=u-v2CNnvwHE&ab_channel=OmarCastaneda

Several tasks
• Account creation
• Windows update
• Device Manager

CHAPTER 11 Summary
Personalizing the Windows Desktop
• Themes – Background
• Desktop Icons
• Task bar
• Display
• Graphis control panel
• Task manager
• File Explorer
• My PC – Properties
• My hard drive – Properties
• Control Panel
• Internet options (home page, etc.)
• Homegroup
• Power options
• Notifications and Actions
• Remote settings/Desktop
• Device and printers
• Sound
• Default programs
• Bit locker
• Event viewer
CHAPTER 13 Summary
Malware
Malware is software developed by cybercriminals to perform malicious acts. In fact, the word malware is an abbreviation of malicious
software.

Sources of Malware

User visiting website


Downloading a free program
Computer infected by another infected host
User has outdated antivirus software
Opening unsolicited email
Exchanging files on file sharing sites
Insert a USB stick that you found in a public area

Different Type of malware

Remediating Infected Systems

When a malware protection program detects that a computer is infected, it removes or quarantines the threat. However, the computer is most
likely still at risk

update your anti-malware software and perform full scans of all your media

When malware is discovered on a business computer, you should remove the computer from the network to prevent other computers from
becoming infected

Protecting Against Network Attacks

There is no one solution to protect against all TCP/IP or zero-day attacks.


One solution is to use a defense-in-depth approach also known as a layered approach to security

Securing Windows Workstation


Securing a Computer
Computers and workstations should be secured from theft. This is a standard practice in a company as computers are typically secured in
locked rooms.

• Bios keep it update


• Login Use always a password (Pin, finger print, Picture password)
• Network Use save and know network

Usernames and Passwords

Firewalls

A software firewall is a program that provides firewall services on a computer to allow or deny traffic to the computer. The software firewall
applies a set of rules to data transmissions through inspection and filtering of data packets

Software firewall features are applied to a network connection. Software firewalls have a standard set of inbound and outbound rules that are
enabled depending on the location of the connected network.

• A firewall protects computers and networks by preventing undesirable traffic from entering internal networks
• A firewall could allow outside users-controlled access to specific services
• Host-based firewall – Using software such as Windows Defender Firewall.
• Small office home office (SOHO) – Network-based solution using a home or small office wireless router. These devices not only
provide routing and WI-FI services, but they also provide NAT, DHCP, and firewall services

Wireless Security
Wi-Fi Configuration Best Practices
Radio waves used to transmit data in wireless networks make it easy for attackers to monitor
and collect data without physically connecting to a network

Firmware Updates
Most wireless routers offer upgradable firmware

You might also like