A+ Hardware Final Key Terms Part 4

Card Set Information

A+ Hardware Final Key Terms Part 4
2014-10-15 10:23:43

Show Answers:

  1. Safely remove hardware icon
    To make sure that data written to a flash drive is properly saved before you remove the flash drive from the PC.
  2. Firmware
    Software that is permanently stored in a chip. The BIOS on a motherboard is an example of firmware.
    • - USB won over firewire.
    • - FireWire uses serial transmissions, and Firewire devices are hot-swappable.
    • - FireWire 800 (1394b) allows for up to 63 FireWire devices to be daisy chained together. FireWire 400 (1394a) allows for up to 16 daisy-chained devices.
    • - FireWire 400 (1394a) supports two types of connectors and cables: a 4-pin connector that does not provide voltage to a device and a 6-pin connector that does. Figure 6-10 shows a cable that plugs into a 6-pin FireWire port to provide a 4-pin connector for a FireWire device.
  4. Touch Screen
    A touch screen is an input device that uses a monitor or LCD panel as the backdrop for input options.
  5. biometric device
    An input device that inputs biological data about a person; the data can identify a person’s fingerprints, hand prints, face, voice, eye,and handwriting.
  6. Chip Creep
    Chips sometimes loosen because of temperature changes; this condition is called chip creep.
  7. Lands and pits
    • - Tiny lands and pits on the surface of a disc represent bits, which a laser beam can read.
    • - This is why they are called optical storage technologies.
  8. Material Safety Data Sheet (MSDS)
    A document that explains how to properly handle substances such as chemical solvents; it includes information such as physical data, toxicity, health effects, first aid, storage, disposal, and spill procedures.
  9. Physically Protect Your Equipment
    • - Don’t move or jar your desktop computer while the hard drive is working.
    • - Protect a computer against dust and other airborne particles.
    • - Allow for good ventilation inside and outside the system
    • - High temperatures and humidity can be dangerous for hard drives
    • - In BIOS setup, disable the ability to write to the boot sector of the hard drive.
    • - Protect your CDs, DVDs, BDs, and other storage media.
    • - Don’t leave a computer turned off for weeks or months at a time.
    • - Don’t unpack and turn on a computer that has just come in from the cold.
    • - Protect electrical equipment from power surges.
  10. Equipment disposal table
  11. Copyrights
    • - The right to copy the work, called a copyright, belongs to the creator of the work or others to whom the creator transfers this right.
    • - Copyrights are intended to legally protect the intellectual property rights of organizations or individuals to creative works, which include books, images, and software
  12. License
    • - When someone purchases software from a software vendor, that person has only purchased a license for the software, which is the right to use it.
    • - The buyer does not legally own the software and, therefore, does not have the right to distribute it.
  13. Preventative maintenance plan
    When you first set up a new computer, start a record book about this computer, using either a file on a removable storage device or a hand written notebook dedicated to this machine.
  14. PAN (Personal Area Network)
    consists of personal devices communicating at close range such as a cell phone and notebook computer. PANs can use wired connections (such as USB or FireWire) or wireless connections (such as Bluetooth or infrared).
  15. LAN (local area network)
    covers a small local area such as a home, office, other building, or small group of buildings. LANs can use wired (most likely Ethernet) or wireless (most likely Wi-Fi, also called 802.11) technologies. A LAN is used for workstations, servers, printers, and other devices to communicate and share resources.
  16. wireless LAN (WLAN)
    covers a limited geographical area, and is popular in places where networking cables are difficult to install, such as outdoors, in public places, and in homes that are not wired for networks. They are also useful in hotel rooms.
  17. MAN (metropolitan area network)
    covers a large campus or city. (A small MAN is sometimes called a CAN or campus area network.) Network technologies used can be wireless (most likely LTE or WiMAX) and/or wired (for example,Ethernet with fiber-optic cabling).
  18. WAN (wide area network)
    covers a large geographical area and is made up of many smaller networks. The best-known WAN is the Internet. Some technologies used to connect a single computer or LAN to the Internet include DSL, cable Internet,satellite, cellular WAN, and fiber optic.
  19. WI-FI (802.11)
    The common name for standards for a local wireless network as defined by IEEE 802.11. Also see 802.11 a/b/g/n.

  20. full duplex
    Communication that happens in two directions at the same time
  21. half duplex
    Communication between two devices whereby transmission takes place in only one direction at a time.
  22. Twisted Pair Cable
    • - Twisted-pair cable is the most popular cabling method for local networks, and uses an RJ-45 connector.
    • - The cable comes in two varieties: unshielded twisted pair (UTP) cable and shielded twisted pair (STP) cable.
    • - UTP cable is the least expensive and is commonly used on LANs.
  23. IP address
    Used to find computers on subnets, an intranet, or on the Internet.
  24. hub
    A network device or box that provides a central location to connect cables and distributes incoming data packets to all other devices connected to it. Compare to switch.
  25. Siwtch
    A device used to connect nodes on a network in a star network topology. It also segments the network to improve network performance by deciding which network segment is to receive a packet, on the basis of the packet’s destination MAC address.
  26. router
    A device that manages traffic between two or more networks and can help find the best path for traffic to get from one network to another.
  27. Subnet Mask
    Used with IPv4 and identifies which part of an IP address is the network portion and which part is the host portion
  28. gateway
    Any device or computer that network traffic can use to leave one network and go to a different network.
  29. default gateway
    The gateway a computer uses to access another network if it does not have a better option.
  30. MAC Address
    • - Every network adapter (including a network card, network port on a motherboard, on board wireless,or wireless NIC) has a 48-bit (6-byte) number hard-coded on the card by its manufacturer that is unique for that device
    • - The number is written in hex, and is called the MAC (Media Access Control) address, hardware address, physical address, adapter address, or Ethernet address.
    • - Part of the MAC address identifies the manufacturer that is responsible for making sure that no two network adapters have the same MAC address.
    • - MAC addresses are used to locate a computer on a local area network (LAN).