Computer Hardware Test
Computer Hardware Test
32 bit mode
64 bit mode
can address 8 bytes at a time; duo-core CPU's can operate 64 bit mode... should run faster than 32 bits
any software package which automatically plays, displays, or downloads advertisements to a computer after the software is installed on it or while the application is being used
adware
adware
reports on browsing habits and reports and sometimes pop up ads and distasteful websites
application management
registry... edit the registry with regedit.exe ... or reg virtual memory; hard drives; temporary files; services; startup; application stand for whta kind of file it is
Areas to optimize an OS
ATTRIB
Batch Files
A group of commands; extension (.bat); contain DOS (command line) can have .bat extensions tom.bat; control c (cancel stops batch file from running)
Virtual PC's ran slower... mouse was slower... b/c we didn't have enough RAM to support (default for vista was 512 and vista wants 2 or 3 gig)
CD
CLS
clear screen
start/run/CMD/enter..... DOS
start/run/cmd
computer virus
a computer program that can copy istelf and infect a computer without the permission or knowledge of the user.
cookies
COPY
provide multiple layers of defense for the computer, back it up!, use strong passwords
higher resolution/pixels, sidebar, a lot of multi-media enhancements, vista business has no games
differences in worm/virus
worm scans for ports and doesn't need a host to replicated whereas a virus does
DIR
Disaster prevention/planning
gives you a chance to get a hard drive ready to accept a new system
EDIT
Hard Disk Drives Maintenance and hazards; how can you extend the hard drives functional life span
don't like smoke; hot/cold; droppage; water or high humidity areas or dust chkdsk; defrag; good clean power; backups
1 hour
unknown :)
IPCONFIG/ALL
KNOW how files, directories, and files structures are created and maintained
1) start/run/CMD 2) tree|more (hierchial file structure, organizational chart) Ubuntu, Mandrake, Red Hat
Linux
Windows 9x; windows xp; windows vista; windows server; future windows products is windows 7
cisco, microsoft
malware
a portmanteau from the words malicious and software, is software designed to infiltrate or damage a computer system without the owner's informed consent
MD
make directory
typically applications... small devices like cell phones... ALT F4 or ALT and the letter.... accessibility option- will end any application in menu)
menu interface
regEdit; pretty much anything you do in windows XP will modify the registry
A way to see what our/how it is configured at set up; shows how the OS is configured at start up and allows temporary modifications; start/run/msConfig
Operational modes
16, 32, 64; Windows XP is in 32 bit limited to 3GB of ram; can run a 64 b/c you can add more ram and run faster; more ram can support more applications and run faster;
PAUSE
PING
if directory is there
preventative maintenances
updates; backup
protected mode
RD
remove directory
Real Mode
provides the application with real access to all memory... this is not good b/c you can get memory interference causing a crash
spyware
spyware
device manager, task manager, windows management console, MSConfig.exe, regedit, event viewer 8 bits in a bite! HIgher end OS can read/understand things faster (exponential in increase)
there are
TOOLS: Device Manager; What system resources are used to manage devices and how do they work
Look up what the drivers are and what resources are assigned to your hardware devices; device manager is where all your devices get managed;
Tracert
troubleshooting
recovery of operating systems; advanced options menu; recognize and resolve common operational problems; recognize and resolve common error messages and codes; use diagnostic utilities and tools to resolve operational problems
txt interface
dir/s
UNIX
virtual memory
What do OS do?
there's a problem!
What does an OS do
manage hardware; provide a user-interface; allow you to install and use applications; manage/save/retrieve files
the root
manages hardware, manages applications, provides an interface for users, manage and save files
virtual memory gets used... VM is memory on the hard drive which is MUCH (1000 x's) slower than RAM
structure capable to contain data, means there is an end of file and digital format. Usually have a 3 character extension. MS office 2007 uses 4 (.docx) characters in its extension
What is a file
What is a folder
What is proprietary?
Real means they have access to everything (memor) causes crashes and problems while protected mode OS protects the one note memory space
right ALT
everything in windows XP is stored here. A big database and everything you do/change/install/configure all happens in the registry the ability to load multiple operating systems on one PC (physical device) and not destroy a different one
What is virtualization
what is virtualization
what is virtualization2
the ability to install an OS w/ out damaging the current (host operating systems); allows companies to install multiple servers on each server computer; saves money
What RAM settings must be changed before installing virtual PC What software doesn't like virtual PC is attempting to do? and how do you fix it? what software protects from malware
1024
symantec software; start/all programs/symantec; from the centralized exceptions select change settings and add; after selecting security risk exceptions navigate to the following to locate the virtual pc executable file; completed!
virtualPC
LINUX... open operating system; provides you the access to the code others do not
why do we use virtual PC to install, configure, and to install an application learn on our computers
Why virtualization
Why would an antivirus application have any problem with using virtual OS applications Why would you want to know about virtualization Will an anti-virus protect you from all adware/spyware?
antivirus protects us from unautorized access and antivirus thought virtual PC was a virus
cheaper for businesses, let's you install a new OS without destroying present one; if you must support older applications can use VM to support older ones
NO
1)close to a dozen OS 2) microsoft->way too slow and bulky 3)apple 4)linux 5)Unix(proprietary)no access to code 6)cell phones have an OS 7)DVR or personal assistant, PDA (uses MAC OS)
worm
does not need to infect any computer to replicate. it can replicate by itself. scans for open ports.