FC: Guide to PC maintenance | By Jason, LaShay & Glenn
1: Table of Contents | Page 2. . . . . . . . .Hardware Page 3. . . Wireless Page 6. . . Networking Page 8. . .Software Pave 10. . .Commands Page 12. . .Safety Page13. . .Netiquette Page 14. . .Security Page 16. . .Updates
2: ? :What should you were to avoid ESD(electrostatic discharge)? ?: Lashay finds out her optical(DVD) drive isn't being recognized ?: What should Jason do to make sure that his CPU doesn't overheat? ?: How would Lashay get her optical drive to be recognized ? ?: Glenn buys an old expansion card that supports EISA but his motherboard supports PCI A CPU with one core disabled is a. . . ?:What is the cause if the Motherboard beeps 2 or 3 times? 10 beeps? ?:-10 Beeps? ?:An integrated component in a laptop motherboard is broken, what should be LaShay’s next action? ?;What should Glenn do to if he wants to add expansion capabilities to his Laptop ?:If Glenn wants write to a Disk that can hold 25 GB of data? ?:Which formats should Glenn use if he write to a type of optical media? 12-Jason’s sees a message that the wireless NIC is not working but he knows he installed it to his motherboard?
3: A:An antistatic wrist strap. A:Connect the SATA or Molex connecter. A:Apply thermal paste and a Heat Sink. A:Connect the SATA connector from the optical drive to the Motherboard. A:He should buy an Expansion card that is supported buy his motherboard. A:Bad memory. A:Bad motherboard. A:Most likely replace the Motherboard. A:Use a PC Express Card. A:BD-RE – BD rewritable format for HD video recording and PC data storage.CD-R(one time), CD-RW, DVD-RAM, DVD+/-R(one time), DVD+/-RW, BD-RE. A:the driver is missing.
4: Wireless -LaShay needs to access files form the beach(vacation) what type of network should she have access to? -In an enterprise environment what wireless encryption method should the Network administrator consider? - If there is a host that is unwanted on the wireless network how do you keep that host out? -What is another thing Glen can do make sure people do not have easy or unauthorized network access? Note: it’s simple. -Which device can you use to connect two wired networks with a wireless link. -Jason needs a wireless router with an 802.11 standard that supports a wider range and a bigger data through put. -Glen wants to make a defense against hackers because his network has been hacked before what should be his course of action for securing his wireless network. -Jason wants a router that operates in two bands(2.4 Ghz&5Ghz) -If LaSahy wants to use a mouse in that is wireless in the 2.4 Ghz band and not use USB port witch technology should she consider? -Glen wants to make sure that hackers don’t see his network what should he do? -Jason wants to create a Wireless network in the 5Ghz band what standard should he use? -What happens when someone cannot connect to wireless network?
5: -A problem with the AP (Access Point) -Disable SSID Broadcast -A Bluetooth mouse -A dual band router. -Encryption and Authentication -802.11n -A VPN- Virtual Private Network that connects her to the network. -Change the default password. Hackers and other types of network intruders know the default router or network passwords. (e.g. admin, 1234, password, user, default(company name)) some routers don’t even have a default password -Mac Address filtering. -WPA2 for enterprise. -A Wireless Bridge
6: NETWORKING -Glenn wants to have a dynamic IP address instead of a Static IP what can he use? DHCP- Dynamic Host Configuration Protocol -If one wants to connect to a small (10 host or less) network with no centralized administration? A peer to peer network. -Jason wants his video game console to be the top priority in his network in terms of band-with Set the QOS to the highest -LaShay wants to create a network where she has access to a server She needs a client/server network. -Glen is planning on making a small business network what class of IP addresses A class B Address (two octets for the network and two for the host) -Glen has just added a new host to his network what should happen if he is using DHCP. The host should get an IP address, Subnet Mask, and default gateway automatically. -A cable needs to be used in the enterprise environment that is not effected EMI or RFI Fiber-optic cabling. -LaShay is working on a networking problem it requires the electrical aspect of it what part of the OSI model is she most likely to interface with? The Physical layer. -Jason notices when he connects the Ethernet patch cable to the NIC but the LED indicator lights don’t show. The cable is to faulty. -LaShay wants to change the MAC Address of a host how can she do this? Every device has its own MAC Address by the manufacturer and it cannot be changed. -What type of subscription should one sign up for multiple bandwidth capabilities and fast downstream capabilities? ADSL -Jason’s computer and the others on the network are being flooded by enormous amounts of random request. This a denial of service (DOS)
8: SOFTWARE -Glen’s PC has just infected by a virus how can he remove it? Anti-virus software -Lashay needs to change a basic setting in Windows XP Use the control panel. -How dose Jason change the display settings? Start > Control Panel > Display > Settings tab > Advanced (Win XP) -Glen wants to remove an application from his computer. Start > Control Panel > Add or Remove Program -Jason wants to restore his system back to the way it was 3 days ago what should he use? system restore utility. -If one wants to make an account that does not have full privileges in Windows XP what should be his course of action? Create a limited account -Glen had just installed an Antivirus program and he needs to make sure its up to date? Apply updates, virus definitions and signatures. -The default setting for updates on LaShay’s PC is 3AM What should she do if she wants them to run at a different time. Go to the control panel and change to the desired time to do updates
10: -Chkdsk- command used to check the integrity of and folders on a hard by scanning the disk surface for physical errors -Directory-File that organizes other files in hierarchal structure. -Format-Prepare a file system in a partition to store files -Msconfig-Allows user to edit start-up applications and access the boot. INI.,SYSTEM.INI,WIN.INI files. -Tracert- Traces the route that a packet takes from source computer to destination host. -Nslookup- Command that returns IP address for given host. -IPconfig- A DOS command that displays the IP Address -Ping- A troubleshooting tool used to verify network connectivity by sending a packet to specific IP address and waiting for reply. -Netstat- A command line tool that displays incoming and outgoing networking connections
12: SAFETY Use antistatic wrist strap Use antistatic mat both to prevent ESD Cable ties- used to neatly bundle cables in the computer Standby Power Supply (SPS) – Helps protect against potential electrical power problems by providing a backup battery to supply power when the incoming voltage drops below the normal level. Surge suppressor – Helps protect against damage from surges and spikes. Standby Power Supply (SPS) – Helps protect against potential electrical power problems by providing a backup battery to supply power when the incoming voltage drops below the normal level.
13: NETIQUETTE -Etiquette guidelines for proper posting to forums and communicating over the Internet. -Adhere to the same standards of behavior that you follow in real life. -Be forgiving of other people's mistakes. -Do not engage in "flame wars" online. -Don’t say anything that you would not say to the person’s face
14: SECURITY A virus is a program written with malicious intent and sent out by attackers. A worm is a self-replicating program that is harmful to networks. A worm uses the network to duplicate its code to the hosts on a network. A Trojan is technically a worm. The Trojan does not need to be attached to other software. Instead, a Trojan threat is hidden in software that appears to do one thing, and yet behind the scenes it does another. Trojans are often disguised as useful software.
15: - Passwords should expire after a specific period of time. - Passwords should contain a mixture of letters and numbers so that they cannot easily be broken. -Password standards should prevent users from writing down passwords and exposing them to public view. -Encrypting data uses codes and ciphers. Traffic between resources and computers on the network can be protected from attackers monitoring or recording transactions by implementing encryption. It might not be possible to decipher captured data in time to make any use of it. | Password:xxxxxxxxxx
16: UPDATES First create a restore point Update must be downloaded then installed. Updates can help protect your computer for security threats
17: Preventive Maintenance
18: Application Programming Interface (API) Basic Input/Output System (BIOS) Central Processing Unit (CPU) Command Line Interface (CLI) Denial of Service (DoS) direct current (DC) disk operating system (DOS) dots per inch (dpi) dual in-line memory module (DIMM) Electromagnetic Interference (EMI) Electrostatic Discharge (ESD) File Allocation Table (FAT) function key (Fn key) Global System for Mobile Communications (GSM) Graphics Processing Unit(GPU) Hard Disk Drive (HDD) infrared (IR) input/output (I/O) Integrated Drive Electronics (IDE) Keyboard, Video, Mouse (KVM) switch Media Access Control (MAC)
19: Lightweight Extensible Authentication Protocol (LEAP) Network Interface Card (NIC) Open System Interconnection (OSI) model Operating System (OS) Packet Internet Gopher (ping) Parallel Advanced Technology Attachment (PATA) Plug-and-Play (PnP) Power-On Self-Test (POST) Radio Frequency Interference (RFI) Random Access Memory (RAM) Read Only Memory (ROM) Redundant Array of Independent Disks (RAID) service level agreement (SLA) Uninterruptible Power Supply (UPS) Universal Serial Bus (USB) Video Graphics Array (VGA) Voice over IP (VoIP) Wi-Fi Wireless Access Point (WAP) Wi-Fi Protected Access (WPA) (WPA2) Wired Equivalent Privacy (WEP) Zero Insertion Force (ZIF) socket