... bidirectional parallel port has one important advantage over a standard
parallel port: It can both transmit and receive data. These parallel ports are capable of interfac-
ing with such devices as external ... and Characteristics
of Adapter Cards
An adapter card (also known as an expansion card) is simply a circuit board you install into
a computer to increase the capabilities of that computer. Adapter ... multithreading (SMT). SMT takes advantage of a modern CPU’s super-
scalar architecture. Superscalar processors are able to have multiple instructions operating on
separate data in parallel.
HTT-capable...
... aspects and importance of safety and environmental issues
Identify potential safety hazards and take preventative action
Use Material Safety Data Sheets (MSDS) or equivalent documentation and ... you’ll find sample exams
for each of the A+ exams. Take these practice exams just as if you were actually taking the A+
exams (without any reference material).
Depending on what edition of ... upgrade and optimize hardware, software and data security for example:
BIOS
Smart cards
Authentication technologies
Malicious software protection
Data access (basic local security...
...
commonsense approach: They designed their handhelds to use standard AA batteries.
Most notebook computers can also use AC power with a special adapter (called an AC
adapter) that converts AC power into ... examining some preventative maintenance recommen-
dations and issues.
Exam Essentials
Know how many pins an IDE/PATA/ATA-5/ATA-6 cable has. A cable for use with these
technologies has 40 pins. You’re ... Another primary concern is heat. Restricted space means less airflow, meaning parts
can heat up and overheat faster.
To overcome space limitations, laptop parts are physically much smaller and lighter,...
... you make
a backup, ensure that you can read from it. If you’ve just backed up a small amount of data,
restore it to an alternate location and make sure you can read it. If you are backing up ... HAL, or the Hardware Abstraction Layer, is the translator between the hardware and the
operating system.
20. B. Task Manager will show you a list of running processes and applications and allow ... the administrator.
3. If updates are available, they are downloaded automatically in the background.
4. Once the updates are downloaded, Windows Update notifies you that the download is
complete...
... and wide area. Local wireless is usually available
within a particular room or building only. Once you leave that area, it is no longer available. Local
wireless has an operating range of around ... through a layer, the layer tacks its information
TABLE 8.1 Topologies—Advantages and Disadvantages
Topology Advantages Disadvantages
Bus Cheap. Easy to install. Difficult to reconfigure. Break in ... data, and controls the flow of data. It can also receive and translate data
into bytes for the CPU to understand. It communicates at the Physical layer of the OSI model and
comes in many shapes...
... potential safety hazards and take preventative
action
Use Material Safety Data Sheets (MSDSs) or equivalent
documentation and appropriate equipment documentation
Use appropriate repair ... body and
keeps it at a zero charge. Figure 10.3 shows the proper way to attach an anti-static strap. There
are several varieties of wrist straps available. The one in Figure 10.3 uses a banana ... in any way for exercising their rights
under the Occupational Safety and Health Act.
Safety Plans
It’s recommended that your company create and follow a workplace safety plan. Having a
safety...
... were all the rage a few years ago and are still popular today. Also readily
available are infrared keyboards and printers. Perhaps some of the most useful infrared
devices are keyboards for PDAs. ... occur and the
device is unavailable.
Certain DMA channels are assigned to standard AT devices. DMA is no longer as pop-
ular as it once was, because of advances in hardware technology, but it is ... access (DMA) allows a device to bypass the CPU and place data directly into
RAM. To accomplish this, the device must have a DMA channel devoted to its use.
All DMA transfers use a special area of...
... several years ago.
Calibrating Scanners
Scanners may need to be color calibrated with the monitor so that what scans in is accurate to
what’s on screen. Many include a test pattern that can be ... active partition. Often this is also a primary partition
and the first partition created on a hard drive.
4. D. A logical partition is any partition that has a drive letter. It can be primary, active, ... fixed easily, or the fix may result
in only a temporary solution. Usually such a case calls for acomplete formatting and reinstalla-
tion of the OS and applications, and restoration of data. However,...
... threat. Fortunately, these attacks require fairly
sophisticated software and are harder to engineer than a DoS attack, such as a TCP SYN attack.
UDP Attacks
A UDP attack attacks either a maintenance ... social engineering attack, an attacker might pretend to be a company technician, call
an employee, and ask her to reveal her username and password. Knowing what to say and what
not to say will ... creates an entrance for an attacker. The program may allow a certain user ID to
log on without a password or to gain administrative privileges.
Such an attack is usually used as either an access...
...
Research Triangle Park, North Carolina, USAã
Halifax, Nova Scotia, Canadaã
Chatswood, NSW, Australiaã
Brussels, Belgiumã
Beijing, Chinaã
Sao Paulo, Brazilã
Bangalore, Indiaã
Seoul, Koreaã
Tokyo, ... combination written as CTRL^X).
The escape character can be changed to any ASCII value with the terminal escape−character command.
Each line on the terminal server can have a different escape character; ... locations. The exams are standardized among sites, and selecting the location is a matter of
geographical preference.
CCIE Routing and Switching Lab Locations
San Jose, California, USAã
Research...