After booting, a computer will load an operating system for graphical interface

Components

Power Supply Unit

r

The PSU is in charge of providing electrical charge to all of the components of the computer, especially the motherboard.It has various cables with different types of connectors that'll go on different components

Wattage Rating

PSU Connectors

Cooling System

r

A computer needs to be at all times under optimal temperature at, because all the components generate heat, a cooling system is required to maintain a moderate temperature so that the computer doesn't overheat.

Fans

Heat Sinks

Fans

Liquid

Tubes

Water

Motherboard

r

The motherboard is the heart of a computer, it has attached all of the components and runs. These processing and storage components are connected by bus interfaces implemented on the motherboard. The instructions and data are stored using transistors and capacitors and transmitted between components over the bus using electrical signals.Motherboard Form Factors are:ATXMicro-ATXSFFMini-ITX

Sockets

r

Such as the CPU socket.There are only two CPU manufacturers: Intel and AMD.Intel uses the LGA socketAMD uses the PGA socket

Slots

r

Like the RAM slots and adapter card slots.Adapter connector slots:PCI, PCIe

Connectors

r

Like as powering the motherboard itself and where components obtain their power like the fans and disk drives.Storage Connectors are:SATA, eSATAM.2Power Connectors are:Front panelP19-pin USBAudio headers

BIOS/UEFI

r

Boot optionsBoot passwords and secure bootTrusted Platform Module (TPM)

Ports

r

Input/Output Ports examples:HDMIDVISATAUSBRJ-45 NetworkAudio PortsThunderboltLightning

Cables

r

Power cables that go directly into the motherboard are:20 or 24-pin connector

CPU

r

The central processing unit (CPU), or simply the processor, executes program instruction code. When a software program runs (whether it be system firmware, an operating system, antivirus utility, or word-processing application), it is assembled into instructions utilizing the fundamental instruction set of the CPU platform and loaded into system memory. The CPU then performs the following basic operations on each instruction:The control unit fetches the next instruction in sequence from system memory to the pipeline.The control unit decodes each instruction in turn and either executes it itself or passes it to the arithmetic logic unit (ALU) or floating-point unit (FPU) for execution.The result of the executed instruction is written back to a register, to cache, or to system memory.A register is a temporary storage area available to the different units within the CPU working at the same clock speed as the CPU.Cache is a small block of memory that works at the speed of the CPU or close to it, depending on the cache level. Cache enhances performance by storing instructions and data that the CPU is using regularly.There exist different architectures like:x86 (32 bits)x64 (64 bits)ARM (mobile devices)

Multithreading

r

CPU architecture that exposes two or more logical processors to the OS, delivering performance benefits similar to multicore and multi socket to threaded applications.

Multicore

Virtualization

Video Card

r

The component that is in charge of providing a signal to the monitor or projector.Many motherboards contain an embedded video card, but often they are not powerful enough.Most commonly a video card will contain a GPU capability and graphics memory alongside video ports such as HDMI, Displayport, and Thunderbolt.

Capture Card

RAM

r

If there is not enough system RAM, the memory space can be extended by using disk storage. This is referred to as a pagefile or swap space. The total amount of addressable memory (system RAM plus swap space) is referred to as virtual memory or virtual RAM . With virtual memory, the OS assigns memory locations to processes in 4 kilobyte chunks called pages. The memory controller moves inactive pages of memory to the swap space to free up physical RAM and retrieves pages from the swap space to physical RAM when required by process execution. An excessive amount of such paging activity will slow the computer down because disk transfer rates are slower than RAM transfer rates.Types of RAM:DDR3DDR4DDR5Each DDR generation sets an upper limit on the maximum possible capacity. DDR for desktop system memory is packaged in a form factor called dual inline memory module (DIMM). The notches (keys) on the module’s edge connector identify the DDR generation (DDR3/DDR4/DDR5) and prevent it from being inserted into an incompatible slot or inserted the wrong way around. DDR DIMMs typically feature heat sinks, due to the use of high clock speeds.Modules:SODIMMECC RAM

Storage

r

SSD or HDD.Removable storage devices:Flash drivesSDCD

RAID

r

RAID 0 (Striping without parity) is when data is spread across two disks, this is not fault-tolerant.RAID 1 (Mirroring) is when data is replicated between two disks, this is more fault-tolerant as if one disk fails the other has the exact data.RAID 5 (Striping with Distributed Parity) is similar to RAID 0 however, the three disks share a parity so if one disk fails it will allow to reconstruct of data from the parity.RAID 10 (Stripe of mirrors) is when you combine RAID 1 but with more disks as at least four disks are required as two arrays are mirrored between two disks, so it provides the best fault-tolerance.

Sound Card

r

The component in charge of providing an audio signal to a speaker or headphones. They contain audio jack ports to connect both in and out signal

Network Interface Card

r

Although the motherboard already has an Ethernet port, additional ports may be needed. The NIC provides just that.

The CompTIA A+ Journey

We are now entering the Mobile Device world

Troubleshooting

r

For more details, visit the Troubleshooting Mind Map

m

Identify the Problem

r

Gather Information from the UserThe first report of a problem will typically come from a user or another technician, and this person will be one of the best sources of information if you can ask the right questions. Before you begin examining settings in Windows or taking the PC apart, spend some time gathering information from the user about the problem. Ensure you ask the user to describe all the circumstances and symptoms. Some good questions to ask include:What are the exact error messages appearing on the screen or coming from the speaker?Is anyone else experiencing the same problem?How long has the problem been occurring?What changes have been made recently to the system? Were these changes initiated by you or via another support request?The latest change to a system is very often the cause of the problem. If something worked previously, then excepting mechanical failures, it is likely that the problem has arisen because of some user-initiated change or some environmental or infrastructure change. If something has never worked, a different approach is required.Has anything been tried to solve the problem?Perform BackupsConsider the importance of data stored on the local computer when you open a support case. Check when a backup was last made. If a backup has not been made, perform one before changing the system configuration, if possible.

Establish a Theory

r

Conduct ResearchYou cannot always rely on the user to describe the problem accurately or comprehensively. You may need to use research techniques to identify or clarify symptoms and possible causes. One of the most useful troubleshooting skills is being able to perform research to find information quickly. Learn to use web and database search tools so that you can locate information that is relevant and useful. Identify different knowledge sources available to you. When you research a problem, be aware of both internal documentation and information and external support resources, such as vendor support or forums.Make a physical inspection—look and listen. You may be able to see or hear a fault (scorched motherboard, "sick"-sounding disk drive, no fan noise, and so on).If the symptoms of the problem are no longer apparent, a basic technique is to reproduce the problem—that is, repeat the exact circumstances that produced the failure or error. Some problems are intermittent, though, which means that they cannot be repeated reliably. Issues that are transitory or difficult to reproduce are often the hardest to troubleshoot.Check the system documentation, installation and event logs, and diagnostic tools for useful information.Consult other technicians who might have worked on the system recently or might be working now on some related issue. Consider that environmental or infrastructure changes might have been instigated by a different group within the company. Perhaps you are responsible for application support and the network infrastructure group has made some changes without issuing proper notice.Consult vendor documentation and use web search and forum resources to see if the issue is well-known and has an existing fix.Question the ObviousAs you identify symptoms and diagnose causes, take care not to overlook the obvious—sometimes seemingly intractable problems are caused by the simplest things. Diagnosis requires both attention to detail and a willingness to be systematic.One way to consider a computer problem systematically is to step through what should happen, either by performing the steps yourself or by observing the user. Hopefully, this will identify the exact point at which there is a failure or error.If this approach does not work, break the troubleshooting process into compartments or categories, such as power, hardware components, drivers/firmware, software, network, and user actions. If you can isolate your investigation to a particular subsystem by eliminating "non-causes," you can troubleshoot the problem more quickly. For example, when troubleshooting a PC, you might work as follows:Decide whether the problem is hardware or software related (Hardware).Decide which hardware subsystem is affected (Disk).Decide whether the problem is in the disk unit or connectors and cabling (Connectors).Test your theory.

Establish a New Theory or Escalate

r

If you cannot solve a problem yourself, it is better to escalate it than to waste a lot of time trying to come up with an answer. Formal escalation routes depend on the type of support service you are operating and the terms of any warranties or service contracts that apply. Some generic escalation routes include:Senior technical and administrative staff, subject matter experts (SMEs), and developers/programmers within your company.Suppliers and manufacturers via warranty and support contracts and helplines or web contact portals.Other support contractors/consultants, websites, and social media.Choosing whether to escalate a problem is complex because you must balance the need to resolve a problem in a timely fashion against the possibility of incurring additional costs or adding to the burdens/priorities that senior staff are already coping with. You should be guided by policies and practices in the company you work for. When you escalate a problem, make sure that what you have found out or attempted so far is documented. After that, describe the problem clearly to whoever is taking over or providing you with assistance.

Establish a Plan of Action

r

There are typically three generic approaches to resolving an IT problem:Repair—You need to determine whether the cost of repair makes this the best option.Replace—Often more expensive and may be time-consuming if a part is not available. There may also be an opportunity to upgrade the part or software.Workaround—Not all problems are critical. If neither repair nor replacement is cost-effective, it may be best either to find a workaround or just to document the issue and move on.Establish a Plan of ActionWhen you determined the best solution, you must devise a plan of action to put the solution in place. You have to assess the resources, time, and cost required. Another consideration is potential impacts on the rest of the system that your plan of action may have. A typical example is applying a software patch, which might fix a given problem but cause other programs not to work.An effective change and configuration management system will help you to understand how different systems are interconnected. You must seek the proper authorization for your plan and conduct all remedial activities within the constraints of corporate policies and procedures.Implement the SolutionIf you do not have authorization to implement a solution, you will need to escalate the problem to more senior personnel. If applying the solution is disruptive to the wider network or business, you also need to consider the most appropriate time to schedule the reconfiguration work and plan how to notify other network users.When you make a change to the system as part of implementing a solution, test after each change. If the change does not fix the problem, reverse it, and then try something else. If you make a series of changes without recording what you have done, you could find yourself in a tricky position.Refer to Vendor InstructionsIf you are completing troubleshooting steps under instruction from another technician—the vendor's support service, for instance—make sure you properly understand the steps you are being asked to take, especially if it requires disassembly of a component or reconfiguration of software that you are not familiar with.

Verify and Document

r

Implement Preventive MeasuresTo fully solve a problem, you should implement preventive measures. This means eliminating any factors that could cause the problem to reoccur. For example, if the power cable on a PC blows a fuse, you should not only replace the fuse, but also check to see if there are any power problems in the building that may have caused the fuse to blow in the first place. If a computer is infected with a virus, ensure that the antivirus software is updating itself regularly and users are trained to avoid malware risks.Document Findings, Actions, and OutcomesMost troubleshooting takes place within the context of a ticket system. This shows who is responsible for any particular problem and what its status is. This gives you the opportunity to add a complete description of the problem and its solution (findings, actions, and outcomes).This is very useful for future troubleshooting, as problems fitting into the same category can be reviewed to see if the same solution applies. Troubleshooting steps can be gathered into a "Knowledge Base" or Frequently Asked Questions (FAQ) of support articles. It also helps to analyze IT infrastructure by gathering statistics on what types of problems occur and how frequently.The other value of a log is that it demonstrates what the support department is doing to help the business. This is particularly important for third-party support companies, who need to prove the value achieved in service contracts. When you complete a problem log, remember that people other than you may come to rely on it. Also, logs may be presented to customers as proof of troubleshooting activity. Write clearly and concisely, checking for spelling and grammar errors.

You press the Power button and the computer starts

Networking

802.3 Ethernet

r

Standards developed as the IEEE 802.3 series describing media types, access methods, data rates, and distance limitations at OSI layers 1 and 2 using xBASE-y designations.

SAN

r

Network dedicated to provisioning storage resources, typically consisting of storage devices and servers connected to switches via host bus adapters.A SAN is isolated from the main network. It is only accessed by servers, not by client PCs and laptops. SAN clients are servers running databases or applications. Provisioning a shared storage pool as a SAN is more flexible and reliable than using local disks on each server machine. SANs use connectivity technologies such as Fiber Channel and Internet SCSI (iSCSI).

Servers

LAN

r

A local area network (LAN) is a group of computers connected by cabling and one or more network switches that are all installed at a single geographical location. A LAN might span a single floor in a building, a whole building, or multiple nearby buildings (a campus). Any network where the nodes are within about 1 or 2 km (or about 1 mile) of one another can be thought of as "local." LAN cabling and devices are typically owned and managed by the organization that uses the network.

100BASE-T

10GBASE-T

1000BASE-T

MAN

r

Can be used to mean a specific network type covering an area equivalent to a city or other municipality. It could mean a company with multiple connected networks within the same metropolitan area—so, larger than a LAN but smaller than a WAN.

WAN

r

Network scope that spans a large geographical area, incorporating more than one site and often a mix of different media types and protocols plus the use of public telecommunications networks.

ISP

802.11 Standard

WLAN
(WI-FI)

r

Network scope and type that uses wireless radio communications based on some variant of the 802.11 (Wi-Fi) standard series.

SSID

PAN

Bluetooth

NFC

Internet

SOHO

Router

VPN/
Firewall

Workgroup
Switch

Switch

Network
Servers

Printers

Patch Panel

Wall Ports

Desktops

Access Point

Laptops

Mobile devices

Spam Gateways and
Unified Threat Management

Proxy Server

Load Balancer

Networking Hardware

Cables

Copper

STP

UTP

CAT Standards

5

5e

6

6A

Optic Fiber

Single Mode Fiber

r

Has a small core (8–10 microns) and is designed to carry a long wavelength (1,310 or 1,550 nm) infrared signal, generated by a high-power, highly coherent laser diode. Single-mode cables support data rates up to 10 Gbps or better and cable runs of many kilometers, depending on the quality of the cable and optics.

Straight Tip

Subscriber Connector

Lucent Connector

Multi Mode Fiber

r

Has a larger core (62.5 or 50 microns) and is designed to carry a shorter wavelength infrared light (850 nm or 1,300 nm). MMF uses less expensive and less coherent LEDs or vertical cavity surface emitting lasers (VCSELs) and consequently is less expensive to deploy than SMF. However, MMF does not support such high signaling speeds or long distances as single-mode and so is more suitable for LANs than WANs.

Coaxial

F-Type

Physical Connection

NIC

Ports

MAC
Address

Patch Panels

Hub

Switch

Managed

PoE

r

Not all switches support PoE.If so, there are power injectors that will make it possible.

802.3af

13 W

802.3at
(PoE+)

25 W

802.3bt

51 W

Unmanaged

Wireless Connection

Access Points

BSSID

Frequency Bands

2.4 GTz

Channels
(14)
Spaced at
5 MHz

802.11b

802.11g

5 GTz

Channels
(23)
Spaced at
20 MHz

Dynamic Frecuency Selection

802.11a

Channel Bonding

802.11n
(WI-FI 4)

MIMO

802.11ax
(WI-FI 6)

OFDMA

r

Feature of Wi-Fi 6 allowing an access point to serve multiple client stations simultaneously.

802.11ac
(WI-FI 5)

MU-MIMO

r

Use of spatial multiplexing to allow a wireless access point to support multiple client stations simultaneously.

WI-FI Analyzers

dB

Signal-to-noise-ratio

Long-range fixed wireless

Licensed

FCC

Unlicensed

900 MHz

2.4 GHz

5 GHz

Short range connections

Bluetooth

NFC

RFID

Connection Types

Public Switched Telephone Network

Digital Line Subscriber

Asymmetrical

DSL Modem

Splitter
(if applicable)

RJ11

RJ45

Cable Modem

Data Over Cable
Service Interface
Specification

F-Type

RJ45

Symmetrical

Fiber Optic

Fiber to the Curb

r

Retains some sort of copper wiring to the customer premises while extending the fiber link from the point of presence to a communications cabinet servicing multiple subscribers.

Fiber to the Premesis

r

Is run all the way to the customer’s building. This full fiber connection type is implemented as a passive optical network (PON)

Optical Network
Terminal

Plain Old Telephone System

Low Earth Orbital Satellite Internet Access

Low Orbit Satellite

Geostationary Orbital Satellite Internet Access

Very small aperture terminal satellite

Round Trip Time

Wireless Internet Service Provider

long-range fixed access wireless

WI-FI

Cellular

3G

Global System for Mobile Communication

r

Standard for cellular radio communications and data transfer. GSM phones use a SIM card to identify the subscriber and network provider. 4G and later data standards are developed for GSM.

SIM Card

Code Division Multiple Access

r

Method of multiplexing a communications channel using a code to key the modulation of a particular signal. CDMA is associated with Sprint and Verizon cellular phone networks.

4G

5G

If the computer faces operation failure, we need to ensure to find the problem cause and solve it.

Network Addressing

TCP/IP

Link / Network
Interface

Ethernet Wi-FI

Internet

IP

IPv4

Network Number

Public IP Address

r

Facilitated by an ISP

Private IP Address

Class A

r

10.0.0.0 to 10.255.255.255

Class B

r

172.16.0.0 to 172.31.255.255

Class C

r

192.168.0.0 to 192.168.255.255

Host Number

Subnet Mask

Default Gateway

Network Address Translation

Domain Name System

IPv6

Network ID

StateLess Address Auto Configuration

Interface ID

Transport

TCP

UDP

Application

DHCP

HTTP

IMAP

POP3

Network Protocols

Transmission Control Protocol

SYN/ACK

User Datagram Protocol

Dynamic Host Configuration Protocol

Scope

Leases

Reservations

Domain Name System

Fully Qualified Domain Name

A

IPv4

AAAA

IPv6

Mail Exchange

TXT Record

Sender Policy Framework

DomainKeys Identified Mail

Domain-Based Message
Authentication, Reporting,
and Conformance

Virtual LAN

VPN

LAN Servers

Router/
Firewall

VPN Gateway

AAA

Supplicant

Netowrk Access Server

RADIUS

File Transfer Protocol

SFTP

SSH

Telnet

FTPS

Simple Message Block

SMB1
(Common Internet File System)

SMB3

Network Basic Input/Output System

HyperText Transfer Protocol

URL

FQDN

HTTPS

TLS

Simple Mail Transfer Protocol

MX

A/AAAA

Post Office Protocol

Internet Message Access Protocol

Lightweight Directory Access Protocol

Remote Desktop Protocol

Simple Network Management Protocol

Syslog

Ports

TCP

File Transfer Protocol
Data connection

20

File Transfer Protocol
Control connection

21

Secure Shell

22

Telnet

23

Simple Mail Transfer Protocol

25

587

Domain Name System

53

HyperText Transfer Protocoll

80

Post Office Protocol

110

995

NetBIOS

137

Internet Mail Access Protocol

143

993

Lightweight Directory Access Protocol

389

HTTP Secure

443

Server Message Block

445

Remote Desktop Protocol

3389

UDP

Domain Name System

53

Dynamic Host Configuration Protocol

67

DHCP Client

68

NetBIOS

139

Simple Network Management Protocol

161

SNMP trap operation

162

Syslog

514

Embbeded System

Industrial Control System

Programmable Logic Controllers

Human Machine Interface

Operational Technology

Supervisory Control and Data Acquisition

Internet of Things

Hub/ Control System

Smart Devices

Cloud Computing

Resource Requirements

CPU Virtualization Extensions

Intel

VT-x

Extended Page Table

AMD

AMD-V

Rapid Virtualization Indexing

System Memory

r

Each guest OS requires more memory than the host OS, for example if one Windows machine requires 2GB of RAM, then at least 4GB are required for it to be able to run both the host and guest OS, and it can add up quickly if more VM's are running.

Mass Storage

r

Although VM's run on image files, they require a lot of storage, especially if snapshots are wanting to be created so that you can roll back to a specific settings in a particular session. However, in large enterprises, this usually isn't an issue as SAN's are available to use.

Networking

Security Requirements

Hypervisors

Virtualization

r

Computing environment where multiple independent operating systems can be installed to a single hardware platform and run simultaneously.

OS

Purposes

Client-Side Virtualization

r

Refers to any solution designed to run on "ordinary" desktops or workstations. Each user will be interacting with the virtualization host directly. Desktop virtual platforms, usually based on some sort of guest OS hypervisor, are typically used for testing and development

Sandbox

r

An environment where safe testing and development can occur as the host OS and the VM cannot communicate to each other, making malware impenetrable to the host OS.

Support Legacy software and OS's

r

Some applications are no longer supported in later OS versions, this allows the possibility for those programs to still execute by running on a VM an older OS version.

Cross-Platform Virtualization

r

This allows for testing and development for applications to run on different OS's, this feature allows you to test that in one single machine.

Training

Server-Side Virtualization

r

This means running a server role machine as a VM, since servers use for about 10% of hardware resources, this allows for up to 9 programs to be running on a single server with the same performance.

Application Virtualization

r

This is where applications are running on a server and streamed to a client OS, as this allows for clients to always have the latest version.

Container Virtualization

Server

Host OS

Docker Engine

Applications

Virtual Machine

Type 1 Hypervisor
(Bare Metal)

Hardware

Hypervisor

Virutal Machine Manager

Guest OS

Type 2 Hypervisor

Hardware

Guest OS

Hypervisor

VM Workstation

Oracle Virtual Box

Parallels Workstation

Cloud Characteristics

r

Computing architecture where on-demand resources provisioned with the attributes of high availability, scalability, and elasticity are billed to customers on the basis of metered utilization.

Metered Utilization

r

Feature of cloud service models that allows customers to track and pay for precise compute, storage, and network resource units.

Elasticity

Deployment Models

Public

Private

Community

Hybrid

Service Models

Infrastructure as a Service

r

Provides the network and physical resources to the client, such as servers, load balancers, SAN's, etc.

Microsoft Azure

AWS

OpenStack

Platform as a Service

r

Provides in between IaaS and SaaS, meaning it provisions application and database services. A typical PaaS solution would deploy servers and storage network infrastructure (as per IaaS) but also provide a multi-tier web application/database platform on top.

Oracle Database

Microsoft Azure SQL

Google Engine App

Software as a Service

r

Provides fully developed applications, rather than paying for a number of licenses, you can obtain the software running on the cloud servers and paying as you go.

Microsoft Office 365

Salesforce

Google Workspace

High Availability

r

The service guarantees that it'll run at high performance for the most part and experiences very little downtime.

Scalability

r

The cost for maintaining more users is linear, meaning that if the number of users double, then the cost would also double.

Common Services

Virtual Desktop Infrastructure

File Storage

Software-Defining Networking

A computer needs a means of being able to communicate with other computers

On the internet, there needs to be an order and standards for all computers to work properly and communicate efficiently

Inside those standards, a computer needs to be told where exactly that data will be stored and sent to

As technology grows, computers are now able to emulate and work remotely, many services now work over the Internet and not depend much on local infrastructure

Mobile Devices

Display Types

Liquid Crystal Display

Light Emitting Diodes

Thin Film Transistor

Twisted Nematic

In-Plane Switching

Vertical Alignment

Organic Light Emitting Diodes

Touchscreen

Digitizer

Gyroscope

Accelorometer

Accessories

Touchpad

Touchpen

Microphone

Speaker

Camera

Wireless Connections

WI-FI

Airplane Mode

Cellular Antenna

Global System for
Mobile Communications

SIM Card

Code Division
Multiple Access

Preferred Roaming List

Mobile Hotspot and Tethering

Bluetooth

Near Field Communcation

Wired Connections

Ports

r

USBThunderboltHDMIEthernetUSB-CAudio JackLightning

Replicators

Docking Stations

Account Setup

Microsoft 365

Google Workspace

Data Synchronization

Contacts

Email

Commericial

Corporate

Calendar

Apps

Passwords

iCloud

Enterprise Mobility Management

Mobile Device Management

Subtopic

Mobile Application Management

Two-Factor Authentication

Location Services

Global System Positioning

Indoor Positioning System

Smartphones

Android

Google Play Store

IOS

App Store

Laptops

Form Factors

Battery

AC Adapter

Baseline level on mobile device components and basic features

Print Devices

Connectivity

Ethernet

DHCP

IP

DNS

USB

Type B

Wireless

Infrastructure Mode

WI-FI Direct

Drviers and Page
Description Languages

Scalable Fonts

Vector Graphics

Color Printing

CMYK

Postscript

Printer Control Language

XML

Properties

Updating Drivers

Printing Port selection

Sharing and permissions

Configurations

Duplex unit or
finishing unit

Security

User authentication

Secured print and
badging

Audit logs

Scanner

Optical Character
Recognition

Network Services

Scan to email

SMB

Scan to cloud

When in need to display digital content onto physical paper, a printer will be utilized

Types

Laser

Process

Processing Stage

Charging Stage

Exposing Stage

Developing stage

Transferring Stage

Fusing Stage

Finishing Stage

Maintenence

Paper

r

Use good quality and clean paper.Insert the paper in the correct orientation and do not overload the input tray

Replace toner
when needed

Regular cleaning

r

Wipe exterior dustUse Isopropanol alcohol to clean rollers, however, you need to be very gentle with themFollow manufacturer's instructions

Maintenence kit

Calibrating

Inkjet

Maintenence

Print head alignment

Print head cleaning

Thermal

Process

Thermal paper

Feed assembly

Heating element

Maintenence

Ensure correct paper size
and that it's thermal

Regular cleaning

Impact

Process

Plain paper

Impact paper

Tractor fed

3-D

Fused Filament Fabrication

Filament

Polylactid Acid

Acrylonitrile Butadiene Styrene

Stereolithography

Selective Laser Sintering

Microsoft Windows

Interfaces

Desktop

Settings

OS Settings

Update &
Security Settings

WindowsUpdate.txt

Control Panel

User Account Control

Device Manager

Power Options

Programs and Features

Mail

Network and
Sharing Center

Internet Options

Administrative Tools

r

A Microsoft Management Console (MMC) contains one or more snap-ins that are used to modify advanced settings for a subsystem, such as disks or users. The principal consoles available via Administrative Tools are:Computer Management (compmgmt.msc)—The default management console with multiple snap-ins to schedule tasks and configure local users and groups, disks, services, devices, and so on.Defragment and Optimize Drives (dfrgui.exe)—Maintain disk performance by optimizing file storage patterns.Disk Cleanup (cleanmgr.exe)—Regain disk capacity by deleting unwanted files.Event Viewer (eventvwr.msc)—Review system, security, and application logs.Local Security Policy (secpol.msc)—View and edit the security settings.Resource Monitor (resmon.exe) and Performance Monitoring (perfmon.msc)—View and log performance statistics.Registry Editor (regedit.exe)—Make manual edits to the database of Windows configuration settings.Services console (services.msc)—Start, stop, and pause processes running in the background.Task Scheduler (taskschd.msc)—Run software and scripts according to calendar or event triggers.

Privacy Settings

Desktop Settings

Time and Language

Personalization

Ease of Access

Device Settings

Display and
Sound Settings

Multiple Displays

Resolution

Power Settings

Standby

r

Power-saving mode where power to all compatible components except system memory is cut. Note that systems on standby still consume some electricity.

Hibernate

r

Power-saving state where the contents of memory are saved to hard disk (hiberfil.sys) and the computer is powered off. Restarting the computer restores the desktop.

App Settings

Gaming Settings

Network Settings

Windows Defender Firewall

Shortcuts

File Explorer

C:\

Users

Program Files
(x86)

Windows

System 32

Configurations

Drivers

Options

View

Indexing

Applications

Windows Features

Store Apps

Kernel Files

Drivers

Command-line interface

Help

Navigation

dir

cd

File Management

xcopy

robocopy

md

rmdir

Disk Management

diskpart

format

chkdsk

System Management

shutdown

sfc

winver

Windows Tools

Device Manager

Update and troubleshooting devices

Disabling devices

Disk Management Console

Initializing Disks

Partitioning

Formatting

Repartitioning

Disk Maintenence

Disk Defragmenter

Disk Clean-Up

Task Scheduler

Local Users and Groups

Security Accounts

Default Groups

Standard Accounts

Administrator Accounts

Guest Accounts

Certificate Manager

Group Policy Editor

Registry Editor

Registry Keys

Hives

.LOG file

.SAV file

Microsoft Management Console

Snap-ins

System Information

Event Viewer

Log Files

System logs

Application logs

Security logs

Setup log

Event sources
and severity levels

Audit success/
audit

Information

Warning

Error

Critical

Task Manager

Processes

Details

Set priority

Performance

Monitoring

Users

Services

Startup

Resource Monitor

System Configuration

General

Boot

Safe Mode

Services

Startup

Tools

Operating System Market

Business

Network Operating System

Home

Mobile

MacOS

Top Menu

Network

Dock

Spotlight Search

Terminal

zsh

Mission Control /
Multiple Desktops

System Preferences

Apple Keyboards

Apple/Power Key

Command /
Ctrl

Option /
Alt

Apple Magic Mouse

Displays

Accesibility

Users & Groups

Apple ID

Security & Privacy

Internet Account

Keychain

FileVault

Printers & Scanners

Disk Utility

Remote Disk

Time Machine

Finder

iCloud

App Installation

App Store

Updates

Setup files

.pkg

.dmg

.app

Linux

Shell

Bash

zsh

ksh

Desktop

Xorg

Gnome

KDE

Command Interface

Help

File Editors

Nano^

vi

Navigation

pwd

cd

ls

cat

Search

find

grep

File Management

cp

mv

rm

df

du

User Account

su

sudo

useradd

usermod

userdel

passwd

groupadd

groupmod

groupdel

newgrp

File Permissions

r

w

x

chmod

chown

chgrp

Package Management

get-apt

.deb

yum

.rpm

ClamAV

Process Monitoring

top

ps

Network Management

ifconfig

ip

dig

Samba

Backup and Scheduling

cron

crontab

File System Types

Windows

New Technology File System

r

The New Technology File System (NTFS) is a proprietary file system developed by Microsoft for use with Windows. It provides a 64-bit addressing scheme, allowing for very large volumes and file sizes. In theory, the maximum volume size is 16 Exabytes, but actual implementations of NTFS are limited to between 137 GB and 256 Terabytes, depending on the version of Windows and the allocation unit size. The key NTFS features are:Journaling—When data is written to an NTFS volume, it is re-read, verified, and logged. In the event of a problem, the sector concerned is marked as bad and the data relocated. Journaling makes recovery after power outages and crashes faster and more reliable.Snapshots—This allows the Volume Shadow Copy Service to make read-only copies of files at given points in time even if the file is locked by another process. This file version history allows users to revert changes more easily and also supports backup operations.Security—Features such as file permissions and ownership, file access audit trails, quota management, and encrypting file system (EFS) allow administrators to ensure only authorized users can read/modify file data.POSIX Compliance—To support UNIX/Linux compatibility, Microsoft engineered NTFS to support case-sensitive naming, hard links, and other key features required by UNIX/Linux applications. Although the file system is case-sensitive capable and preserves case, Windows does not insist upon case-sensitive naming.Indexing—The Indexing Service creates a catalog of file and folder locations and properties, speeding up searches.Dynamic Disks—This disk management feature allows space on multiple physical disks to be combined into volumes.

FAT32

r

The FAT file system is a very early type named for its method of organization—the file allocation table. The FAT provides links from one allocation unit to another. FAT32 is a variant of FAT that uses a 32-bit allocation table, nominally supporting volumes up to 2 TB. The maximum file size is 4 GB minus 1 byte.FAT32 does not support any of the reliability or security features of NTFS. It is typically used to format the system partition (the one that holds the boot loader). It is also useful when formatting removable drives and memory cards intended for multiple operating systems and devices.

exFAT

r

64-bit version of FAT designed for use with removable hard drives and flash media. Like NTFS, exFAT supports large volumes (128 petabytes) and file sizes (16 exabytes). There is also support for access permissions but not encryption.

Linux

ext4

Network File System

MacOS

Apple File System

Windows Versions

Home

Pro

Advanced hardware features

Bitlocker

2TB RAM limit

Education

2 way multiprocessing
128 cores

Enterprise

4 way multiprosessing
256 cores

Microsoft DirectAccess

Applocker

Microsoft Desktop Optimization

6 TB RAM Limit

Original Manufacturer Equipment

Retail License

Volume Licensing

Supporting Windows

Installation

Clean install

Image deployment

In-place install

Repair

Recovery partition

Reset Windows

Upgrade

Hardware compatibility

Backup files

Drivers

Feature updates

Boot Method

Optical Media

USB and Flash Drives

Network Boot

Hard Drive

Disk Configuration

Master Boot Record

Globally Unique Identifier Partition Table

Distribution Methods

Windows

.msi

.exe

Apple

.dmg

.pkg

Boot Process

Power-On Self Test

BOOTMGR.EXE

WINLOAD.EXE

NTOSKRNL.EXE

HAL.DLL

GPT

BOOTMGFW.EFI

WINLOAD.EFI

Boot Recovery Tools

Advanced Boot Options

Safe Mode

Windows Recovery

Create Recovery Drive

Startup repair

Windows Recovery Enviornment

Windows Networking

Wired Connection

IPv4

32 bits

IPv6

128 bits

DNS

DHCP

Wireless Connection

Windows Defender Firewall

Virtual Private Network/
Wireless Wide Area Network

Proxy Server

Windows Security

Logical Security Control

Physical

Fences

Doors

Locks

Procedure

Processes

Training programs

Logical

Antivirus

Firewall

Authentication

Access Control List

Least priviledge

Implicit deny

User and Account Groups

Local Account

Microsoft Account

Security Group

Administrators

net user command

Standard

Guest

Power

User Account Control

Authentication

Multifactor

2-step

Soft token

Application

Hard token

Active Directory

Member Server

Security Groups

Organizational Unit

Group Policy Object

gpupdate

gpresult

Login script

Mobile Management

Windows Shares

Workgroup

Network Discovery and File Sharing

Network Browsing and Mapping Drives

net use command

net view command

Printer Sharing

Share Permissions

NTFS

Inheritance

Kernel

Distro

Package Manager

Security

Information Security

Confidentiality

Integrity

Availabilty

Cybersecurity

Vulnerability

Threat

r

Potential for someone or something to exploit a vulnerability and breach security. A threat may be intentional or unintentional.

Theat Actor

Attack Vector

Risk

r

It's the likelihood and impact (or consequence) of a threat actor exercising a vulnerability.

Dangers

Vulnerability

r

Weakness that could be accidentally triggered or intentionally exploited to cause a security breach.

Non-compliant systems

Unprotected system

Zero-Day

r

Vulnerability in software that is unpatched by the developer or an attack that exploits such a vulnerability.

Unpatched /
EOL

Bring Your Own Device

Social Engineering

Impersonification

Pretexting

Dumpster Diving

Shoulder Surfing

Tailgating

Piggybacking

Phishing /
Evil Twin

Spear Phishing

Whaling

Vishing

Evil Twin

Threats

Insider Threat

Footprinting

Spoofing

On-path

DoS

DDoS

Botnet

Password related

Dictionary

Brute Force

Website

Cross-Site Scripting

URL

SQL Injection

Encryption

Cryptohgraphic Hashes

Secure Hash Algorithm

Message Digest

Symmetric Encryption

Single Key

Advanced Encryption Standard

Digital Signatures

Asymmetric Encryption

Private Key

Public Key

Key Exchange

Security Protocols

WI-FI Protected Access

WPA 2 Pre-Shared Authentication

CCMP

AES

WPA 3 Personal Authentication

Simultaneous Authentication of Equals Protocol

GCMP

AAA Server

Remote Authentication Dial-in User Service

VPN / Wireless

Terminal Access Controller Access Control System +

Administrative access to Switches, Routers
and Access Points

EAPoW

Kerberos

Single Sign-On

Permissions

Active Directory

Enterprise Authentication Protocols

802.1X

Extensible Authentication Protocol

EAP over Wireless

Authentication, Authorizations and Accounting Server

Master Key

Pairwise Master Key

EAP with Transport Layer Security

Encryption Key Pair

Trusted Platform Module

PIN / Password

Server Handshake

Digital Certificate

SOHO Router Security

Initial Setup

Location / Placement

Network Configuration

RJ45

F-Type

RJ11

Firmware Updates

LAN/WAN Configuration

SSID

Encryption

Guest Access

Channels

Firewall

Inbound /
Outbound Filtering

Port Forwarding

Static IP /
DHCP Reservations

Port mapping

Port triggering

Disable ports

Universal Plug-and-Play

Screened Subnets

Demilitirized zone

Security Measures

Physical Access Control

Perimeter Security

Fencing

Vestibules

Magnometers

Security Guards

Locks

Door Lock

Key operated

Electronic

Badge reader

Biometric

Fingerprint reader

Palmprint

Retina

Equipment

Kesington

Chassis

Lockable rack

Alarms

Circuit

Motion sensor

Proximity

Duress

Video /
CCTV

Lighting

Workstation Security

Passwords

Rules

BIOS / UEFI

End User

Screensavers

Cable locks

Cases

Clean desk policy

Account Management

User permissions

Execution Control

Trusted Software Sources

UAC

Digital Certificates

Windows Defender

Antivirus

Firewall

Encrypting File System

NTFS

Bitlocker /
Bitlocker To Go

TPM

Recovery Key

Browser Security

Extensions

Plug-ins

Apps

Search Engine

Themes

Settings

Data Synchronization

Password Manager

Connections

Transport Layer Security

Digital Certificates

Certificate Authority

Privacy

Pop-up Blockers

Ad Blocekrs

Cache

Incognito Mode

Malware

Viruses

r

Malicious code inserted into an executable file image. The malicious code is executed when the file is run and can deliver a payload, such as attempting to infect other files.

.exe

.msi

.dll

.com

.scr

.jar

Boot Sector Viruses

r

These infect the boot sector code or partition table on a disk drive. When the disk is attached to a computer, the virus attempts to hijack the bootloader process to load itself into memory.

Trojan

r

Malicious software program hidden within an innocuous-seeming piece of software. Usually, the Trojan is used to try to compromise the security of the target computer.This is malware concealed within an installer package for software that appears to be legitimate. The malware will be installed alongside the program and execute with the same privileges. It might be able to add itself to startup locations so that it always runs when the computer starts or the user signs in. This is referred to as persistence.

Worms

r

Type of malware that replicates between processes in system memory and can spread over client/server network connections.These replicate between processes in system memory rather than infecting an executable file stored on disk. Worms can also exploit vulnerable client/server software to spread between hosts in a network.

Fileless

r

Exploit techniques that use the host's scripting environment to create malicious processes. This refers to malicious code that uses the host’s scripting environment, such as Windows PowerShell or PDF JavaScript, to create new malicious processes in memory. As it may be disguised as script instructions or a document file rather than an executable image file, this type of malware can be harder to detect.

Backdoor

r

Mechanism for gaining access to a computer that bypasses or subverts the normal method of authentication.

Remote Access Trojan

DDos

Command and Control

HTTPS

DNS

Spyware

r

Software that records information about a PC and its users, often installed without the user's consent.

DNS Redirection

Keylogger

USB Adapter

Rootkits

r

Class of malware that modifies system files, often at the kernel level, to conceal its presence

Ransomware

r

Malware that tries to extort money from the victim by blocking normal operation of a computer and/or encrypting the victim’s files and demanding payment.

Cryptominer

Malware Removal

Investigate and verify symptoms

Quarantine Infected Systems

Sandbox

Disable System Restore in Windows

Remediate Infected Systems

Update Antivirus

Scanning and removal tools

Safe Mode

Pre-installation enviornment

Recovery Mode

regedit

msconfig

Remove disk

OS Reinstallation

Reformatting disk

Restore files from backup

Schedule Scans and Run Updates

Enable System Restore
and Create a Restore Point

Educate the End User

Passowrd and Account
Best Practices

Education about common
social engineering

Secure use of software

Anti-phish training

Malware Infection Prevention

Configure On-Access Scanning

Schedule scans

Enable System Restore

Create a Restore Point /
Image

Verify DNS configuration

Configure firewall

Mobile OS Security

Screen Locks

Security Software

OS Updates

Antivirus

Firewall

Enterprise Mobility Management

Bring Your Own Device

Corporate Owned, Business Only

Corporate Owned, Personally Enabled

Choose Your Own Device

Mobile Device Management

Profile of security requirements

Data Security

Encryption

Remote Backup Apps

iTunes

MDM

Locator Apps /
Remote Wipe

Device wipe

Enterprise wipe

Internet of Things

Hub / System Control

Mesh Networking

Z-Wave

Zigbee

Regular Audits

Security Awareness Training

Root Access Concerns

Root access

Jailbreaking

Developer Mode

App Source Concerns

App Spoofing

Enterprise Apps

Public Stores

APK Sideloading

Apple Business Manager

Managed Google Play

Bootleg App Stores

Remote Access Tools

Remote Desktop Protocol

IP

FQDN

Advanced Settings

Network Level Authentication

RDP Restricted Admin Mode

Remote Credential Guard

Screen Sharing

Virtual Network Computing

TCP port 5900

XRDP

Microsoft Remote Assstance

Ports 49152 to 65535

Quick Assist

HTTPS/443

Secure Shell

TCP Port 22

Public / Private Encryption Key Pair

Host key fingerprint

Desktop Management

Remote Monitoring and Management

Managed Service Providers

Unified Endopoint Management / MDM

Wake-On LAN

Intel vPRO

AMD PRO

Endpoint Detection and Response

Screen-Sharing

TeamViewer

LogMeIn

Video Conferencing

Microsoft Teams

Zoom

File Transfer

AirDrop

Nearby Sharing

Nearby Share

VPN

Procedures

Backup

Frequency

Backup chains

Full Backup

Full with Incremental

r

The chain starts with a full backup and then runs incremental jobs that select only new files and files modified since the previous job. An incremental job has the lowest time and storage requirement. However, this type of chain has the most recovery complexity as it can involve two or more jobs, each of which might be stored on different media.

Full with Differential

r

It means that the chain starts with a full backup and then runs differential jobs that select new files and files modified since the original full job. A differential chain has moderate time and storage requirements and slightly less recovery complexity than incremental as it requires a maximum of two jobs (the full backup plus the differential job).

Synthetic Full Backup

r

Job type that combines incremental backup jobs to synthesize a full backup job. Synthetic full backups have the advantage of being easy to restore from while also being easy on bandwidth across the network as only changes are transmitted.The chain starts with an initial full backup as normal and subsequently makes a series of incremental backups.When the next full backup is scheduled, the backup software makes one more incremental backup. It then synthesizes a new full backup from the previous full and incremental backups.

Retention

Testing

chkdsk

Data Handling

Regulated Data

Personal Identifiable Information

Government Issued Information

Healthcare Data

Credit Card Transactions

Payment Card Industry Data Security Standard

National Institute of Standards and Technology

Prohibited Data

Illegal content

Licenses

End-User License Agreement

License Compliance Monitoring

Open Source

Digital Rights Management

Incident Response

Computer Security Incident Response Team

Data Integrity

Digital Forensics

Documentation of Incident
and Recovery of Evidence

r

Identify the scope of the incident and the host systems and/or removable drives that are likely to contain evidence. If appropriate, these systems should be isolated from the network.Document the scene of the incident using photographs and ideally video and audio. Investigators must record every action they take in identifying, collecting, and handling evidence.If possible, gather any available evidence from a system that is still powered on, using live forensic tools to capture the contents of cache, system memory, and the file system. If live forensic tools are not available, it might be appropriate to video record evidence from the screen.If appropriate, disable encryption or a screen lock and then power off each device.Use a forensic tool to make image copies of fixed disk(s) and any removable disks. A forensic imaging tool uses a write blocker to ensure that no changes occur to the source disk during the imaging process.Make a cryptographic hash of each source disk and its forensic image. This can be used to prove that the digital evidence collected has not been modified subsequent to its collection.Collect physical devices using tamper-evident bags and a chain-of-custody form, and transport to secure storage.

Chain of Custody

Data Destruction

Sanitization

Standard formatting

Erasing / Wiping

Low level formatting

Secure Erase

Instant Secure Erase

Disposal

Shredding

Incenerating

Degaussing

Certificate of Destruction

Drill

Hammer

Scripting

Shell

Scripting Language
(Glue Language)

Interpreter

OS

.sh

Programming Language

Integrated Development Enviornment

Executable File

Constructs

Comments

#

Variables

Branches

else

Loops

For

While

Operators

-eq

-ne

-lt

-gt

-le

-ge

AND

OR

Javascript

HTML

.js

Javascript for Automation

Python

CPython

PyPy

.py

.pyw

Use Cases

Application Programming Interface

Restarting Machines

Remmaping Network Drives

Installation of apps

Initiating Updates

Automated Backups

Gathering of Data

Best Practices

Malware Risks

Access Control

Code scanning

Testing

Inadvertent System Changes

System Crashes

Creating files

Infinite loops

Faulty API

Windows Scripts

Windows Powershell

PowerShell Integrated Scripting Environment

.ps1

VBScript

Visual Basic

.vbs

Batch Files

CMD

.bat

Documentation

Standard Operating Procedure

Ticketing Systems

User information

Device information

Asset ID

Category

Severity

Ticket Management

Escalation Levels

Tier 0

Tier 1

Tier 2

Tier 3

Clear communication

Problem description

Progress notes

Progress resolution

Incident reports

Asset Identification

Database systems

Asset tags

RFID

Barcode

Network topology diagrams

Asset Documentation

Warranty

Assigned Users

Support Documentation

Knowledge Base articles

Change Management

IT Infrastructure Library

Configuration Management

Change Requests

Purpose

Scope

Change Approval

Change Board

Risk Analysis

Quantitative

Qualitative

Test the change plan

End-User Acceptance

UAT

Training and education

Policy Documentation

Acceptable Use Policy

Splash Screen

Professionalism

Professional Support

Proper Documentation

Set expectation and timeline

Meet expectations

Repair and replace options

Follow up

Support Delivery

Be on time

Avoid distractions

Appropriately deal with sensitive matters

Appearance

Formal

Business casual

Formal language

Cultural sensitivity

Communication

Active listening

Questioning

Open ended

Closed

Difficult Situations

Positive attitud

Collaborate on finding
a solution

Not posting on social media

Environmental

Regulations

Health and Safety Laws

OSHA

Building codes

Environmental Regulations

Electrical Safety

Fuses

3A

5A

13A

Equipment Grounding

Power Handling

Disconnecting power

Electrical Fire

Carbon Dioxide Extinguisher

Safety Hazards

Trip

Secure cabling

Secure heavy equipment

Lifting Techniques

Bend knees

Safety Glasses and Masks

Electrostatic Discharge

Work in anti-ESD environment

Touch bare metal

Storage

Antistatic bags

Dissipative packaging

Building Power

Surges

Under-voltage

Power failure

Surge Protectors

Clamping voltage

Joules rating

Amperage

Battery backups

Uninterruptable Power Supply

Volt-amperes rating

Amp hours

Material Handling

Material Safety Data Sheet

Proper Disposal

Battery

Toner

Circuit boards