A+ 220-1101 Study Guide Success Release 3.0.0.1 A+ 220-1101 Study Guide Success 2 A+ 220-1101 Study Guide Success Product ID: esp-2201101-sg Total Questions: 50 Authorized Reseller: SuperVoucher Copyright Notice: Content Copyright © 2022 Exam Success Pro All rights reserved. No part of this document shall be stored in a retrieval system or transmitted by any means, electronic, mechanical, photocopying, recording, or otherwise, without written permission from Exam Success Pro. No patent liability is assumed with respect to the use of the information contained herein. Warning and Disclaimer Every effort has been made to make this document as complete and as accurate as possible, but no warranty or fitness is implied. Exam Success Pro assumes no responsibility for errors or omissions. The information provided is on an “as is” basis. Exam Success Pro shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this document. A+ 220-1101 Study Guide Success Table of Contents Abstract……………….………………………………..………………………..................4 What To Know………….… …………………………………………...…….…..………...4 Tips…………………………………………………………………....………….................5 Practice Questions………………………………………………….…………................6 Technical Support………..………………………………………….………………....123 3 A+ 220-1101 Study Guide Success 4 Abstract The A+ 220-1101 Study Guide Success is intended to be a reference guide for the A+ 220-1101 Certification Exam. What to Know Candidates are encouraged to use this document to help prepare for CompTIA A+ 220-1101. In order to receive the CompTIA A+ certification, you must pass two exams: 220-1101 and 220-1102. CompTIA A+ 220-1101 measures the necessary skills for an entry-level IT professional. Successful candidates will have the knowledge required to: • Install, configure, and maintain computer equipment, mobile devices, and software for end users • Service components based on customer requirements • Understand networking basics and apply basic cybersecurity methods to mitigate threats • Properly and safely diagnose, resolve, and document common hardware and software issues • Apply troubleshooting skills and provide customer support using appropriate communication skills • Understand the basics of scripting, cloud technologies, virtualization, and multi-OS deployments in corporate environments These content examples are meant to clarify the test objectives and should not be construed as a comprehensive listing of all the content of this examination. The table below lists the domains measured by this examination and the extent to which they are represented. The CompTIA A+ 220-1101 exam is based on these objectives. Domain Percentage of Examination 1.0 Mobile Devices 15% 2.0 Networking 20% 3.0 Hardware 25% 3.0 Virtualization and Cloud Computing 11% 5.0 Hardware & Network Troubleshooting 29% Total 100% A+ 220-1101 Study Guide Success 5 Tips The A+ 220-1101 Study Guide Success is not intended to be an all-inclusive reference for technicians. Rather, it is mainly for the reference purpose only. A+ 220-1101 Study Guide Success 6 Practice Questions Question 1 Which of the following statements is TRUE about overclocking? A. Forcing a computer component to run at a lower clock rate than it was designed. B. Adjusting the clock in the motherboard to obtain a higher clock speed. C. The temperature will keep the same when over-clocking. D. Overclocking would most likely void the manufacturer's warranty on the component. Answer: D Explanation Overclocking is the process of forcing a computer component to run at a higher clock rate than it was designed for. Therefore, it would most likely void the warranty on the component as the manufacturer will only guarantee the component to be run at its designated speed. An effective cooling system is necessary to avoid damaging the component as the overclocked component will increase heat. All electronic circuits discharge heat generated by the movement of electrons. As clock frequencies in digital circuits increase, the temperature will go up and produce more heat. A+ 220-1101 Study Guide Success 7 Question 2 Which of the following components make up the scan head in a scanner? (Select ALL THAT APPLY) A. CCD (Charge-Coupled Device) array B. Mirrors C. Lamp D. Lens E. Filter F. Fuse Answer: ABDE Explanation Scanner is a device that optically scans images, printed text, handwriting, or an object, and converts it to a digital image. Common examples found in offices are variations of the desktop (or flatbed) scanner where the document is placed on a glass window for scanning. Hand-held scanners, where the device is moved by hand, were briefly popular but are now less common due to the difficulty of obtaining a high-quality image. Mechanically driven scanners that move the document are typically used for large-format documents, where a flatbed design would be impractical. Modern scanners typically use charge-coupled device (CCD) or Contact Image Sensor (CIS) as the image sensor, whereas older drum scanners use a photomultiplier tube as the image sensor. A rotary scanner, used for high-speed document scanning, is another type of drum A+ 220-1101 Study Guide Success 8 scanner, using a CCD array instead of a photomultiplier. Other types of scanners are planetary scanners, which take photographs of books and documents, and 3D scanners, for producing three-dimensional models of objects. Scanning Process The document is placed on the glass plate and the cover is closed. The inside of the cover in most scanners is flat white, although a few are black. The cover provides a uniform background that the scanner software can use as a reference point for determining the size of the document being scanned. Most flatbed scanners allow the cover to be removed for scanning a bulky object, such as a page in a thick book. A lamp is used to illuminate the document. The lamp in newer scanners is either a cold cathode fluorescent lamp (CCFL) or a xenon lamp, while older scanners may have a standard fluorescent lamp. The entire mechanism (mirrors, lens, filter and CCD array) make up the scan head. The scan head is moved slowly across the document by a belt that is attached to a stepper motor. The scan head is attached to a stabilizer bar to ensure that there is no wobble or deviation in the pass. Pass means that the scan head has completed a single complete scan of the document. The image of the document is reflected by an angled mirror to another mirror. In some scanners, there are only two mirrors while others use a three mirror approach. Each mirror is slightly curved to focus the image it reflects onto a smaller surface. The last mirror reflects the image onto a lens. The lens focuses the image through a filter on the CCD array. A+ 220-1101 Study Guide Success 9 The filter and lens arrangement vary based on the scanner. Some scanners use a three pass scanning method. Each pass uses a different color filter (red, green or blue) between the lens and CCD array. After the three passes are completed, the scanner software assembles the three filtered images into a single full-color image. Most scanners today use the single pass method. The lens splits the image into three smaller versions of the original. Each smaller version passes through a color filter (either red, green or blue) onto a discrete section of the CCD array. The scanner combines the data from the three parts of the CCD array into a single full-color image. Another imaging array technology that has become popular in inexpensive flatbed scanners is contact image sensor (CIS). CIS replaces the CCD array, mirrors, filters, lamp and lens with rows of red, green and blue light emitting diodes (LEDs). The image sensor mechanism, consisting of 300 to 600 sensors spanning the width of the scan area, is placed very close to the glass plate that the document rests upon. When the image is scanned, the LEDs combine to provide white light. The illuminated image is then captured by the row of sensors. CIS scanners are cheaper, lighter and thinner, but do not provide the same level of quality and resolution found in most CCD scanners. A+ 220-1101 Study Guide Success 10 Question 3 In order to increase the performance for graphics processing, you plan to use NVIDIA's technology to link two graphics cards together to produce a single output. What feature should the motherboard support to achieve it? A. SLI B. AGP C. CrossFire D. SCSI Answer: A Explanation [NVIDIA] NVIDIA is a company specializing in the manufacture of integrated circuits (ICs) used for personal computer motherboard chipsets, graphics processing units (GPUs), and game consoles. NVIDIA's products include GeForce series for gaming, Quadro series for professional workstation graphics processing, and nForce series of integrated motherboard chipsets. NVIDIA's SLI (Scalable Link Interface) technology provides a multi-GPU solution that links two graphics cards together to produce a single output with increased performance. NVIDIA SLI takes advantage of the increased bandwidth of the PCI Express bus architecture, and features hardware and software innovations within NVIDIA GPUs (Graphics Processing Units) A+ 220-1101 Study Guide Success 11 and NVIDIA MCPs (Media and Communications Processors). Depending on the application, NVIDIA SLI can deliver as much as two times the performance of a single GPU configuration. To implement SLI technology, the system usually needs two fairly recent (6600 or newer) identical NVIDIA cards and a motherboard that supports SLI. Ideally, two identical graphics cards are installed in a motherboard that contains two PCI-Express x16 slots, set up in a master-slave configuration. Then, the two cards will work together, each rendering one half of the screen. However, if there are only 24 lanes available on motherboards, using both x16 slots will reduce each to only x8 bandwidth. Mnemonic NVIDIA's multi-GPU solution: SLI (Scalable Link Interface) ATI's multi-GPU solution: CrossFire [ATI] ATI is a major designer and supplier of the graphics processing units, motherboard chipsets, and video display cards. ATI's main competitor is NVIDIA. The ATI's flagship Radeon series of graphics cards directly competes with NVIDIA's GeForce. CrossFire is ATI's technology for multi-GPU solution, which competes with SLI (Scalable Link Interface) from NVIDIA. The technology allows a pair of graphics cards to be used in a single computer to improve graphics performance. ATI has opened the Crossfire architecture to Intel, allowing CrossFire to be enabled on certain Intel chipsets which boast two 16x PCIe slots. To implement this technology, the system requires a CrossFire-compliant motherboard with a pair of PCIe graphics cards, which can be enabled via either hardware or software. However, if there are only 24 lanes available on motherboards, using both x16 slots will reduce each to only x8 bandwidth. A+ 220-1101 Study Guide Success 12 Mnemonic NVIDIA's multi-GPU solution: SLI (Scalable Link Interface) ATI's multi-GPU solution: CrossFire [AGP] AGP (Accelerated Graphics Port), an interface specification developed by Intel Corporation, is designed to assist in the acceleration of 3-D computer graphics, which uses a high-speed point-to-point channel that allows the graphics controller to directly access main memory. The AGP bus is mainly used for the graphics with 32-bit bus width, 66 MHz speed and 266 MBps bandwidth, as opposed to the PCI bus with 32-bit bus width, 33 MHz speed and 133 MBps bandwidth. However, the newer versions of AGP have higher data transfer rate of up to 2.13 GBps. AGP is slowly being replaced by PCI Express. The data transfer rates of AGP can be represented as 1x, 2x, 4x, or 8x, as follow: AGP 1x Operating at 66 MHz, data rate of 266 MBps, 3.3 volt signaling AGP 2x Operating at 66 MHz but double pumped to an effective 133 MHz, data rate 533 MBps, 3.3 volt signaling AGP 4x Operating at 66 MHz but quad pumped to an effective 266 MHz, data rate 1.07 GBps, 1.5 volt signaling A+ 220-1101 Study Guide Success 13 AGP 8x Operating at 66 MHz but strobing eight times per clock to an effective 533 MHz, data rate 2.13 GBps, 0.8 volt signaling There are some non-standard variations of the AGP interface listed below: AGP Pro is an extension to the AGP interface. AGP Pro cards are often longer than standard AGP cards and have a few extra pins to supply extra power to the graphics add-in cards so as to meet the needs of advanced graphics functionality, such as the professional computer-aided design. The AGP Pro definition includes an extended connector, thermal envelope, mechanical specifications for cards, I/O brackets, and motherboard layout requirements. AGP Express is a not a true AGP interface, but rather a way to allow an AGP card to be connected over the legacy PCI bus on a PCI Express motherboard. It is a technology found on ECS motherboards, and is used as a selling point for AGP card owners who want a new motherboard but do not want to be forced to buy a PCIe graphics card as well (most new motherboards do not provide AGP slots, only PCIe slots). An "AGP Express" slot is basically a PCI slot (with the electrical power of two) in the AGP form factor. While it offers backward compatibility with AGP cards, its disadvantages include incomplete support (some AGP cards do not work with AGP Express) and reduced performance (the card is forced to use the shared PCI bus at its lower bandwidth, rather than having exclusive use of the faster AGP). Compatibility 1.5 V-only AGP cards will not go into 3.3 V slots and vice versa, though there are some universal slots exist which accept either type of card. AGP Pro cards will not fit into standard AGP slots, but standard AGP cards will work in an AGP Pro slot. A+ 220-1101 Study Guide Success 14 Note PCI Express, PCIe, or PCI-E is an enhancement of PCI bus and is based on a completely different and much faster serial physical-layer communications protocol. PCI Express was formerly known as Arapaho or 3GIO (Third-Generation Input/Output). It has a data rate of 250 MBps per channel, and a total combined data rate of 4GBps while running a maximum of 16 channels. [SCSI] SCSI (Small Computer System Interface) is a standard interface that can transfer data between devices on both internal and external buses in computer systems. It is most commonly used for hard disks and tape storage devices while it is also able to connect a wide range of other devices such as CD-ROM drives, CD recorders, DVD drives, scanners, and printers. Just like USB, SCSI devices usually do not require a separate power cable. The SCSI cable is capable of providing power. A+ 220-1101 Study Guide Success 15 Question 4 Which of the following types of connectors would allow a transmission of 2560 x 1600 pixels image at a frequency of 60 Hz? A. Single-Link DVI B. Dual-Link DVI C. Dual DVI D. DVI Answer: B Explanation DVI (Digital Visual Interface) is a digital interface standard developed by an industry consortium, the Digital Display Working Group (DDWG), to convert analog signals into digital signals to accommodate both analog and digital monitors. Data is transmitted using the transition minimized differential signaling (TMDS) protocol, providing a digital signal from the PC's graphics subsystem to the display. The standard specifies a single plug and connector that encompass both the new digital and legacy VGA interfaces, as well as a digital-only plug connector. DVI provides three types of connectors: (1) DVI-D (Digital, for digital signals only): provides a fast transfer rate, high quality image and no quality loss. A+ 220-1101 Study Guide Success 16 (2) DVI-A (Analog, for analog signals only): virtually obsolete. It carries a DVI signal to an analog display like CRT. (3) DVI-I (Integrated, for both digital and analog): provides the flexibility. The DVI connector usually contains pins to pass the DVI-native digital video signals. There are some special types connectors listed below: Dual DVI Dual-DVI video cards have two DVI connectors for dual monitor support. Dual DVI is different from Dual-Link DVI. Single-Link DVI Single-Link allows a transmission of 1920 x 1080 pixels image at a frequency of 60 Hz. Dual-Link DVI Dual-Link uses additional pins for the second set of data signals, doubling the bandwidth to allow a transmission of 2560 x 1600 pixels image at a frequency of 60 Hz. The DVI connector may also include pins that provide the same analog signals found on a VGA connector, allowing a VGA monitor to be connected with a simple plug adapter. This feature was included in order to make DVI universal, as it allows either type of monitor (analog or digital) to be operated from the same connector. Note A DVI to HDMI cable may be used to connect the computer to a HDTV. DVI/HDMI cables have a single-link DVI-D connector on one end and an HDMI connector on the other. These cables are bi-directional and function equally well in either direction: HDMI to DVI, or DVI to HDMI. Please note that DVI does not pass audio so you will have to route your audio separately A+ 220-1101 Study Guide Success 17 when using a DVI to HDMI adapter or cable. DVI Male Connector DVI Connector Pins A+ 220-1101 Study Guide Success 18 Question 5 The SATA 3 has the data transfer rate of: A. 150 MB/s B. 300 MB/s C. 600 MB/s D. 900 MB/s Answer: C Explanation Serial ATA (SATA or S-ATA) is the serial interface for storage devices, especially hard disks. It is a replacement for the legacy ATA (AT Attachment) standard, which was retroactively renamed Parallel ATA (PATA) to distinguish it from Serial ATA. Both SATA and PATA are IDE (Integrated Drive Electronics) drives, but IDE and EIDE are often used to indicate PATA drives. SATA offers backwards compatibility for existing ATA and ATAPI devices. SATA 1 Standard Serial ATA (also known as SATA-150 or SATA 1.5 Gbit/s) is the first generation and run at 1.5 Gbit/s. Serial ATA uses 8B/10B encoding at the physical layer and has an efficiency of 80%, resulting in an actual data transfer rate of 1.2 Gbit/s, or 150 MB/s (megabytes per second). SATA 2 Also known as SATA-300 or SATA 3.0 Gbit/s, is an enhancement to the Standard SATA and A+ 220-1101 Study Guide Success 19 runs at 3.0 Gbit/s (actual data transfer rate of 2.4 Gbit/s, or 300 MB/s). SATA 3 Also known as Serial ATA-600 or SATA 6.0 Gbit/s, runs at 6.0 Gbit/s (actual data transfer rate of 4.8 Gb/s, or 600 MB/s). External SATA Also known as eSATA, extends the SATA bus at full speed and supports a cable length of up to 2 meters. SATA uses a point-to-point connection, which means one end of SATA cable would be connected to the motherboard, and the other to the hard disk. Unlike parallel ATA, which is capable of connecting two drives to each cable, no second device can be connected to the SATA cable. In other words, there is no need to configure the SATA drive controller as Master or Slave. SATA drives are automatically recognized. One of the main advantages of Serial ATA is that it offers a thinner serial cable to facilitate better airflow inside a form factor and also allow for smaller chassis designs when compared to the earlier ribbon cables used with ATA drives. In addition, Serial ATA cables have a maximal length of 1 meter, while Parallel ATA cables can only extend to 45cm (18 inch). Data Cable The SATA standard defines a data cable with 7 conductors (3 grounds and 4 active data lines in two pairs). Power Cable and Connector Like IDE/EIDE, the SATA power cable is separate from the data cable. However, the SATA standard defines a new power connector with 15-pin shape that is different from the old 4-pin Molex connector found on all IDE/EIDE devices. The SATA power cable and connector A+ 220-1101 Study Guide Success 20 offer three different voltages: +3.3, +5, and +12 volts. It is different from traditional cables that only have +12 and +5 volt wires. There are adaptors available for converting a 4-pin Molex connector to 15-pin SATA power connector. However, because the 4-pin Molex connectors do not provide 3.3 volt power, these adapters provide only 5 V and 12 V power and leave the 3.3 volt lines disconnected, thus precluding the use of such adapters with drives that require 3.3 volt power. SATA Adapter Card By installing a SATA adapter card in an open expansion slot, a SATA hard drive can be added to an older computer system that only has EIDE controllers available. SATA Bridge By using a SATA Bridge, an older EIDE hard drive can be added to a computer system that only has SATA controllers available. 7-pin SATA Data Cable 5-pin SATA Power Connector A+ 220-1101 Study Guide Success 21 Question 6 You are at an electronics store shopping for a monitor. Which factors below would lead you to choose OLED over LED? (Select ALL THAT APPLY) A. Uses fluorescent lighting B. Better picture quality C. Lightweight D. Thinner E. Cheaper Answer: BCD Explanation LED technology is mostly used in television sets and became popular when 3D TVs became cutting edge. It demonstrates the excellent viewing quality and light build with the low power consumption. OLED (Organic Light-Emitting Diode, or Organic LED) are made up of organic compounds that light up when electricity flows through them. When compared with LED, OLED displays are thinner and lighter, and have better picture quality. They also offer the best viewing angle by far. However, they are a little more expensive, though they have come down in price considerably. Both LED and OLED displays do NOT use fluorescent lighting. A+ 220-1101 Study Guide Success 22 Question 7 Which of the following statements are INCORRECT about the wide SCSI network? (Select ALL THAT APPLY) A. SCSI devices are connected in a chain. B. There are totally 16 devices that can be connected. C. The SCSI ID of host adapters must be set to 15 and cannot be set to other unused addresses. D. SCSI devices can share the same SCSI ID as long as they are not the same type of devices. E. There is no need to set the SCSI ID for the host adapter. Answer: CDE Explanation SCSI (Small Computer Systems Interface) devices are connected in a chain and each device (e.g. host adapter, disk drive) must have a unique SCSI ID number regardless of what type of device it is. There are totally 8 devices that can be connected in a narrow SCSI bus with the ID numbers 0 through 7, or 16 devices in a wide bus with the ID numbers 0 through 15. Most SCSI host adapters are conventionally set to the highest ID on the bus (7 on a narrow bus or 15 on a wide bus), which gives host adapters the highest priority on the SCSI bus because the priority descends as the SCSI ID descends. However, the host adapter can actually be set to any unused address. Please note that if the boot device is in a SCSI chain, it needs to be assigned the lower numbers (0 or 1), otherwise the system will not boot. Also, the Host Bus A+ 220-1101 Study Guide Success 23 Adapter BIOS needs to be enabled if it is controlling the SCSI boot drives. A SCSI host adapter connects a SCSI bus to a computer. The host adapter bridges the physical and logical chasm that separates the SCSI bus from the host computer's internal bus. Modern host adapters contain all the electronics and firmware required to execute SCSI transactions, and often include a BIOS that not only allows the host system to boot from a SCSI device, but also facilitates configuration of the host adapter. Typically a device driver, linked to the operating system, controls the host adapter itself. The host adapter usually assumes the role of SCSI initiator, in that it issues commands to other SCSI devices. A computer can contain more than one host adapter, which can greatly increase the number of SCSI devices available You would usually set the SCSI ID of the initiator (host adapter) with a physical jumper or switch on early models. On modern host adapters, you are allowed to set the SCSI ID by either utilizing the adapter BIOS program that runs when the computer boots up and has menus that let you choose the SCSI ID for the host adapter, or installing the software that comes with the host adapter to let you set the SCSI ID. A+ 220-1101 Study Guide Success 24 Question 8 What are the maximum devices and transfer speed that USB 2.0 supports? A. 64 daisy chained devices, 1.5 Mbps B. 64 daisy chained devices, 12 Mbps C. 127 daisy chained devices, 480 Mbps D. 127 daisy chained devices, 800 Mbps Answer: C Explanation USB (Universal Serial Bus) was designed by a group of manufacturers to make peripherals easier to install. It was designed to allow peripherals to be connected without the need to plug expansion cards into the computer's ISA, EISA, or PCI bus, and improve plug-and-play capabilities by allowing devices to be hot-swapped. When a device is first connected, the host enumerates and recognizes it, and loads the device driver it needs. Therefore, the configurations for device IDs, interrupts etc. are no longer needed. A USB system may contain a host controller and multiple daisy-chained devices. You may add additional USB hubs to the chain to branch into a tree structure, but subject to a limit of 5 levels of branching per controller. Up to 127 devices, including the bus devices, can be connected to one single host controller and unlike SCSI there is no need to terminate USB cables. Modern computers often offer several host controllers, allowing a very large number of USB devices to be connected. A+ 220-1101 Study Guide Success 25 USB supports many kinds of peripherals such as mice, keyboards, game-pads and joysticks, scanners, digital cameras, printers, external storage, networking components, etc. The newest USB specification is at version 2.0. USB supports three data rates as follows: (1) Low Speed rate of 1.5 Mbps - it is mostly used for Human Interface Devices (HID) such as keyboards, mice, and joysticks. (2) Full Speed rate of 12 Mbps - it was the fastest rate before the USB 2.0 specification and many devices fall back to Full Speed. Full Speed devices divide the USB bandwidth between them in a first-come first-served basis and it is not uncommon to run out of bandwidth with several isochronous devices. All USB Hubs support Full Speed. (3) Hi-Speed rate of 480 Mbps - USB 2.0, also known as "Hi-Speed USB" that supports a transfer rate of up to 480 Mbps, was developed by Compaq, Hewlett Packard, Intel, Lucent, Microsoft, NEC and Philips and was introduced in 2001. USB 2.0 is backwards compatible, meaning it is capable of supporting USB 1.0 and 1.1 devices and cables. (4) 5 Gbps - USB 3.0, also known as SuperSpeed USB (SS) that can transfer data at up to 5 Gbit/s (625 MB/s), which is about 10 times faster than the USB 2.0 standard. It is recommended that manufacturers distinguish USB 3.0 connectors from their USB 2.0 counterparts by using blue color for the Standard-A receptacles and plugs and by the initials SS. (5) USB-C was first released in 2014 as a replacement for the older USB, Thunderbolt, and DisplayPort standards. USB-C is also known as USB Type-C, and features a small physical connector, nearing the size of a micro USB connector. USB-C supports USB 3.1 and USB power delivery of up to 100 watts (USB 2.0 only supports up to 2.5 watts). USB-C also supports a wide range of different protocols using alternate modes to support HDMI, VGA, DisplayPort, as well as ordinary USB functions. USB 3.1 Type-C cables offer a transfer rate of A+ 220-1101 Study Guide Success 26 10Gbps, which is double the transfer speed of USB 3.0 (5 Gbps). USB Cable The maximum length any standard USB cable is rated for, without amplification, is 15 feet. There are stories of people using several extenders to reach up to 40 feet but USB.org (site has all the White Papers, etc.) notes there could be significant data loss doing this. Therefore, do not use more than 15 feet for a passive extension cable. However, you may use Active Extension 16 foot USB Repeater Cables. These cables may be connected serially for lengths up to 80 feet. Data traffic is buffered to assure signal quality. Use the Active Extension cable coming from the PC or PC hub and use one of USB A/B cables to complete the connection to the peripheral device. The Active Extensions have A/A ends so they may be linked serially in a chain. Peripheral devices have a "B" receptacle (female port about 3/8" square) so you will need an A/B cable at the end of the chain to connect to the peripheral device. USB Connector A+ 220-1101 Study Guide Success 27 Question 9 Which of the following statements are TRUE about Secure Digital (SD) Card and MultiMediaCard (MMC)? (Select ALL THAT APPLY) A. Devices with MMC slots can use the SD cards, but the standard MMCs will not fit into the SD slots. B. SD cards generally measure 32 mm × 24 mm × 2.1 mm, while MMCs measure 24 mm x 32 mm x 1.4 mm. C. Both MMC and SD cards provide encryption capabilities for protected content. D. MMCs are generally used in portable devices while SD cards are intended for desktop computer. E. Most MMCs have the write-protect tab on the side, while SD cards do not. F. MMCs can be used in most devices that support SD cards. Answer: BCF Explanation The SD (Secure Digital) card is a tiny memory card used to make storage portable among various devices, such as car navigation systems, cellular phones, eBooks, PDAs, smartphones, digital cameras, music players, camcorders, and personal computers. An SD card features a high data transfer rate and low battery consumption, both primary considerations for portable devices. It uses flash memory to provide nonvolatile storage, which means that a power source is not required to retain stored data. SD card capacities range from 8 MB to 2 GB. A+ 220-1101 Study Guide Success 28 An SD card is about the size of a postage stamp and weighs approximately two grams. It is similar in size to a MultiMediaCard, but smaller than older memory card types such as the SmartMedia card and the CompactFlash (CF) card. Both MMC and SD cards provide encryption capabilities for protected content to ensure secure distribution of copyrighted material, such as digital music, video, and eBooks. SDHC (Secure Digital High Capacity, or SD 2.0) is an extension of the SD standard and has the capacities ranging from 4 GB to 32 GB as of 2008. Although SDHC uses the same form factor as SD, SDHC cards can only work with SDHC compatible devices. However, SD cards can work with both SD and SDHC compatible devices. The MultiMediaCard (MMC) is a flash memory card standard. Unveiled in 1997 by Siemens AG and SanDisk, it is based on Toshiba's NAND-based flash memory, and is therefore much smaller than earlier systems based on Intel NOR-based memory such as CompactFlash. MMC is about the size of a postage stamp: 24 mm x 32 mm x 1.4 mm. MMC originally used a 1-bit serial interface, but newer versions of the specification allow transfers of 4 or sometimes even 8 bits at a time. They have been more or less superseded by Secure Digital cards (SD card), but still see significant use because MMCs can be used in most devices that support SD cards. The differences between SD card and MMC SD cards are based on the older MultiMediaCard (MMC) format, but have a number of differences: (1) The SD card is asymmetrically shaped in order not to be inserted upside down, while an MMC would go in most of the way but not make contact if inverted. (2) Most SD cards are physically thicker than MMCs. SD cards generally measure 32 mm × A+ 220-1101 Study Guide Success 29 24 mm × 2.1 mm, while MMCs measure 24 mm x 32 mm x 1.4 mm. (3) Although the write-protect is optional, most SD cards have the write-protect tab (or switch) on the side. MMCs do not have this feature. (4) The contacts of SD cards are recessed beneath the surface of the card (like Memory Stick cards), protecting the contacts from contact with the fingers. (5) SD cards typically have higher data transfer rates, but this is always changing, particularly in light of recent improvements to the MMC standard. Devices with SD slots can use the thinner MMCs, but the standard SD cards will not fit into the thinner MMC slots. SD cards can be used in CompactFlash (CF) or PC card slots with an adapter. miniSD and microSD cards can be used directly in SD slots with a physical interface adapter. There are some SD cards with a USB connector for dual-purpose use, and there are card readers that allow SD cards to be accessed via many connectivity ports such as USB, FireWire, and the parallel printer port. SD cards can also be accessed via a floppy disk drive with a FlashPath adapter. A+ 220-1101 Study Guide Success SD card, mini SD card, and micro SD card (from top to bottom) 30 A+ 220-1101 Study Guide Success 31 Question 10 Which of the following statements are INCORRECT about KVM switch, switch, firewall, and proxy server? (Select ALL THAT APPLY) A. The KVM switch segments a network. B. The switch reduces device needs in a data center. C. The firewall caches web data and images. D. The proxy server protects an internal network. Answer: ABCD Explanation The KVM switch allows a user to connect a single keyboard, video display device, and mouse to multiple computers. It reduces device needs in a data center. KVM switches include multiple input connectors, including PS2, VGA, and USB connectors. The switch segments a network. The firewall protects an internal network. The proxy server caches Web data and images. A+ 220-1101 Study Guide Success 32 Question 11 Which of the following statement is INCORRECT about ATX (Advanced Technology Extended) and ITX (Information Technology Extended) motherboards? A. ATX can support a maximum of seven expansion slots and has a 20-pin power connector. B. ATX can support Extended Data Output (EDO) Random Access Memory (RAM). C. Mini ITX motherboards are small in height and width when compared to Micro ATX ones. D. MIni ITX motherboards come with only a single PCle lane. Answer: C Explanation ATX (Advanced Technology Extended) motherboards are generally an improvement over AT and baby AT motherboards and provide more space for expansion slots, such as Industry Standard Architecture (ISA), Peripheral Component Interconnect (PCI), and Accelerated Graphics Port (AGP) card slots. An ATX motherboard can support a maximum of seven expansion slots. An ATX motherboard supports a 20-pin power connector. A 20-pin power connector consists of a single connector that can only be connected in one way to the motherboard. A 12-pin power connector is supported on AT and baby AT motherboards. A 12-pin power connector is a combination of two 6-pin power connectors where the P8 and P9 pins are together. Therefore, you must ensure that the black wires are adjacent to each other while connecting a 12-pin power connector to the motherboard. A+ 220-1101 Study Guide Success 33 The ATX power supply standard was developed to provide a better way to plug the power supply into the motherboard. The processor, memory, and expansion slots are NOT in line with each other on an ATX motherboard. The memory slot on an ATX motherboard, also referred to as a RAM slot, is placed at a 90 degree angle to all expansion slots. The processor, memory, and expansion slots are oriented parallel to each other on AT and baby AT types of motherboards. An ATX motherboard cannot support EDO RAM, which is considered obsolete. ITX (Information Technology Extended) is a smaller form factor of motherboards. It was first introduced in 2001 by VIA Technologies, beginning with the Mini-ITX. Later, there were other versions, known as the Nano-ITX, Mobile ITX, the Pico ITX and the micro ITX. ITX motherboards come in smaller dimensions compared to ATX ones. Mini-ITX motherboards are small in height and width when compared to Micro ATX ones. Mini-ITX motherboards come with only a single PCle lane. Micro-ATX, ITX, and Mini-ITX use the 20- or 24-pin power connectors. A+ 220-1101 Study Guide Success 34 Question 12 The integrated GPU is used to: A. Provide video capture capability B. Provide additional memory C. Process gaming applications D. Process video and graphics Answer: D Explanation The integrated GPU (Graphics Processing Unit) is used to process video and graphics. The paging file provides additional memory capabilities. The video capture card provides video capture capability. A+ 220-1101 Study Guide Success 35 Question 13 You are going to install a wireless keyboard and a wireless mouse in your client’s computer. What technology would be the best solution? A. Bluetooth B. IrDA C. Wi-Fi D. IEEE 802.11 Answer: A Explanation Bluetooth would be the best solution for connecting electronic devices, such as keyboards and mice, in short intervals without needing any wires or special connectors. IrDA (Infrared, or IR) can also be used in wireless keyboards and mice, but it is limited by the need of an unobstructed line-of-sight between connecting devices. IEEE 802.11 is a family of standards introduced by IEEE for wireless Ethernet networks. Wi-Fi is a brand originally licensed by the Wi-Fi Alliance for utilizing one of the IEEE 802.11 wireless standards to achieve a wireless network. Bluetooth is competing against two other major methods of wireless networking: IrDA and WiFi. However, WiFi is most useful as a replacement for LANs and IrDA is limited by its need for an unobstructed line-of-sight between connecting devices. However, Bluetooth has no native support for IP, thereby does not support TCP/IP and wireless LAN well. It is best suited for connecting electronic devices in short intervals without needing any wires or special connectors. A+ 220-1101 Study Guide Success 36 Bluetooth, also known as IEEE 802.15.1, is a specification for wireless personal area networks that facilitates the exchange of data between electronic devices, such as mobile phones, PDAs, laptops, PCs, keyboards, mice, and printers and digital cameras. Bluetooth is a RF technology that operates at 2.45 GHz with an effective range of 1 meter to 100 meters depending on the device class, Class 1, Class 2, and Class 3, being used. It has a transfer rate of up to 3 Mbps (utilizing Enhanced Data Rate, EDR, in Bluetooth 2.0). Because Bluetooth uses short-range radio frequencies, it is useful when transferring information between two or more devices that are near each other in low-bandwidth situations. Bluetooth is commonly used to transfer sound data with phones (i.e. with a Bluetooth headset) or byte data with hand-held computers (transferring files). Besides, Bluetooth devices usually have low power consumption. Each Bluetooth enabled device is assigned a unique 48-bit address and a 24-bit class identifier. The class identifier provides information as to the nature of the device (phone, PC, etc.) and is transmitted to other devices performing an inquiry. Products with Bluetooth technology must be qualified and pass interoperability testing by the Bluetooth Special Interest Group (SIG) prior to release. Bluetooth devices would provide data encryption to ensure private communication if it is paired with passkey. This security implementation is necessary for devices such as wireless keyboards where passwords and other sensitive information may be typed. A Bluetooth device acting as "master" can communicate with up to 7 devices acting as "slave" to form an ad-hoc computer network called piconet (1 master plus 7 slaves). It allows up to 255 further slave devices to be inactive or parked, and allows the master device to bring them into active status at any time. Usually, the master switches rapidly from slave to slave in a round-robin fashion to have data transferred. Either device may switch the A+ 220-1101 Study Guide Success 37 master/slave role at any time. When an inquiry is sent to a Bluetooth device, it will generally return the device name, device class, a list of services, and the technical information on the device. The latest version of Bluetooth by the end of 2019 is version 5.2. A+ 220-1101 Study Guide Success 38 Question 14 Recently your Chief Technology Officer asked you to implement drive-level encryption for security provided by BitLocker. What technology should you use? A. NTFS B. TPM C. EFS D. SSL Answer: B Explanation TPM (Trusted Platform Module, also known as ISO/IEC 11889) is an international standard for a secure cryptoprocessor, a dedicated microcontroller designed to secure hardware through integrated cryptographic keys. The primary scope of TPM is to assure the integrity of a platform. It is to ensure that the boot process starts from a trusted combination of hardware and software, and continues until the operating system has fully booted and applications are running. Full disk encryption utilities, such as dm-crypt and BitLocker, can use this technology to protect the keys used to encrypt the computer's storage devices and provide integrity authentication for a trusted boot pathway that includes firmware and boot sector. dm-crypt is a transparent disk encryption subsystem in Linux kernel versions 2.6 and later A+ 220-1101 Study Guide Success 39 and in DragonFly BSD. BitLocker is a full volume encryption feature included with Microsoft Windows versions starting with Windows Vista. It is designed to protect data by providing encryption for entire volumes NTFS (New Technology File System), EFS (Encrypting File System), and SSL (Secure Sockets Laye) are not used to implement drive-level encryption for security provided by BitLocker. A+ 220-1101 Study Guide Success 40 Question 15 Michael uses an older laptop that only has a standard VGA port. However, he needs to connect his laptop to a HDMI display and interface for presentation at office. What is the most cost-effective solution for him to fix this compatibility issue? A. Purchase a portable projector for VGA B. Purchase a new laptop with both VGA and HDMI connectors C. Purchase an HDMI to DVI cable D. Purchase a VGA to HDMI adapter Answer: D Explanation VGA, DVI, and HMDI are interfaces used for connecting various devices, such as computers, laptops and projectors, to a display. VGA and DVI are older standards that carry only a video signal. HDMI is now the default cable standard for newer electronic devices. It can carry both digital video and audio signals. The most cost-effective solution for Michael to fix this compatibility is to purchase a VGA to HDMI adapter. The adapter features a VGA input and an HDMI output by providing a 3.5mm audio input to accompany the VGA video input. A+ 220-1101 Study Guide Success 41 Question 16 Which of the followings is NOT a common BSOD (Blue Screen of Death) error? A. Unexpected_Kernel_Mode_Trap B. Distended Capacitors C. Irq1_not_less_or_equal D. Unexpected Shutdown E. Pin Wheel Error Answer: D Explanation To be an A+ technician, you must recognize the following symptoms: POST Beep Code The Power-On Self Test (POST) checks the devices for functionality when the system boots. A series of beep codes will sound to indicate the problem if the device fails during the POST. The beep codes vary depending on the manufacturer of the BIOS. You need to be familiar with the beep codes of the major BIOS manufacturers or know how to locate the beep codes. One short beep means that the system is operational. Attempts To Boot To Incorrect Device This issue is usually caused by the BIOS boot order. If a non-bootable floppy, CD-ROM, DVD, or USB drive is listed as the first boot device and is left in the device at boot time, the computer would display a Non-system disk or disk error at startup. Once it is removed from A+ 220-1101 Study Guide Success 42 the drive, the system would boot successfully. If you want, you can change the boot order in the BIOS. Also, this issue may be caused by the missing or corrupt boot files. If so, you should enable boot logging from the Windows Advanced Menu and use the Windows installation DVD to replace the missing or corrupt boot files. Continuous Reboot Reboots are usually caused by electrical issues, power supply issues, or overheating. Brownouts or blackouts cause computers to reboot. Attaching a computer to an uninterruptible power supply (UPS) will ensure that you can safely shut down the computer if these occur. If the power supply in the computer is the issue, you should replace it with one that supplies adequate power to the computer. Finally, if overheating is causing the reboots, you should check all fans and ensure that the CPU heat sink is still attached. You may need to replace these or add another cooling device to your computer. Blank Screen On Bootup The blank screen is usually caused by a video device problem. Check and see if the monitor is plugged in to the wall socket, plugged into the computer, and is turned on. It may also be necessary to test the wall outlet and check that the computer is plugged into the wall socket and is turned on. At last, you may consider replacing the video card with a known-good video card. If you hear the system fan but the computer is not making the POST beep sound, you may have a failed motherboard. BIOS Times and Settings Reset This issue is due to the CMOS battery. You should replace the CMOS battery and reset the BIOS settings. Loud Noise Loud noise is usually caused by system fans, the power supply, or the hard drives because very few internal devices have moving parts. Check those three devices to trace the noise. A+ 220-1101 Study Guide Success 43 Replace the part that is making the noise because the noise usually means that the device is close to failure. No Power Verify that the computer is plugged in and that the wall outlet is supplying power. If a UPS or surge protector is used, make sure its breaker was tripped by a power surge. At last, check the computer's power supply by replacing with known-good unit. Intermittent Device Failure Check and see if you have the latest driver for the device. If the problem persists, you should replace the device. If intermittent failures are occurring with different devices, you may need to replace the motherboar. Fans Spin But No Power To Other Devices If no beep codes are heard, you probably have motherboard failure. If you hear beep codes, record the code that is heard and research that code to find the problem device. This problem could also mean that the power supply was not properly plugged into the motherboard. Indicator Lights Many components in a computer have indicator lights. In most cases, indicator lights will blink when activity is occurring and will be steady green when idle. However, some devices will have other lights and/or colors. Always check the vendor documentation. If problems continue, you should replace the device. Overheating This issue is usually caused by the cooling fan or cooling system failures. Check and see if that all open slots are covered and all system fans are functional. A+ 220-1101 Study Guide Success 44 Smoke or Burning Smell When this occurs, you should shut down the computer immediately, locate the device that is the problem, and then replace that device. System Lockup When the system lockups, it mysteriously stops functioning and no error or BSOD is displayed. The system lockups are usually caused by memory issues, viruses, malware, or video issues. You should first check the system log files to troubleshoot the issue. Unexpected Shutdown An unexpected shutdown without a particular error message is usually caused by the overheating. Ensure that all fans are working effectively and consider deploying additional cooling options. Also check all open ports in the computer and see if they all have a cover. If the unexpected shutdown is accompanied by a blue screen of death (BSOD), see the solutions for BSOD below. Proprietary Crash Screens (BSOD/pin wheel) BSOD (Blue Screen of Death) errors are usually caused by the hardware issues. You should try to replace hardware one device at a time and reboot the system. If the new hardware did not fix the issue, then that component is not the issue. Replace the component with the original and try replacing another component. There are some of common BSOD errors as follows: Data_Bus_Error This error indicates that faulty hardware has been installed or existing hardware has failed. It is usually caused by RAM, cache, or video RAM. Unexpected_Kernel_Mode_Trap A+ 220-1101 Study Guide Success 45 Remove or replace any recently installed hardware. Run hardware diagnostics to determine which component has failed. Replace the failed hardware. This error can also be caused if you set the CPU to run at a higher speed than the CPU supports. Page_Fault_in-nonpaged_area This errors is caused by RAM, cache, or video RAM, Replace the failed component. Irq1_not_less_or_equal This issue is usually caused by a device driver, system service, virus scanner, or backup tool that is not compatible with the version of Windows you are running. Make sure that all your drivers and software is updated to the version that is compatible with the Windows OS you are using. Pin Wheel Error This occurs when you see the spinning rainbow pin wheel. The causes may include bugs in applications, event processing issues, and virtual memory issues. Distended Capacitors Capacitors are included in computers on the motherboards, video cards, and power supplies. Capacitors can fail prematurely, causing the capacitor's case to bulge or rupture. In most cases, the only way to fix this problem is to replace the card that has the swollen capacitor. It is possible to replace them, but the process requires soldering experience. Replacing the capacitor is an electrical hazard and should only be attempted with proper training. A+ 220-1101 Study Guide Success 46 Question 17 Which of the following is the subnet mask that can be used for a standard class A address? A. 255.255.255.255 B. 255.255.255.0 C. 255.255.0.0 D. 255.0.0.0 Answer: D Explanation Subnet Mask, short for subnetwork mask, is a method of dividing a network of IP addresses into groups. For example: (1) The subnet mask “255.0.0.0” is used for a standard class A address. (2) The subnet mask “255.255.0.0” is used for a class B address. (3) The subnet mask “255.255.255.0” is used for a class C address. [Note] 255.255.255.255 is not a subnet address. It is used for a network broadcast. A+ 220-1101 Study Guide Success 47 Question 18 You computer has a static IP address: 169.254.192.237. Which of the following classes does it belong to? A. Class A B. Class B C. Class C D. Class D E. Class E Answer: B Explanation There are three classes of networks commonly used. These classes may be segregated by the number of octets used to identify a single network, and also by the range of numbers used by the first octet. (1) Class A networks: the first octet ranges from 1 to 126. (2) Class B networks: the first octet ranges from 128 to 191. (3) Class C networks: the first octet ranges from 192 to 223. (4) Class D networks: the first octet ranges from 224-239. (4) Class E networks: the first octet ranges from 240-254. Some first-octet values have special meanings: A+ 220-1101 Study Guide Success 48 (1) First octet 127 represents the local computer, regardless of what network it is really in. This is useful when testing internal operations. (2) First octet 224 and above are reserved for special purposes such as multicasting. (3) Octets 0 and 255 are not acceptable values in some situations, but 0 can be used as the second and/or third octet (e.g. 10.2.0.100). A class A network does not necessarily consist of 16 million machines on a single network, which would excessively burden most network technologies and their administrators. Instead, a large company is assigned a class A network, and segregates it further into smaller sub-nets using Classless Inter-Domain Routing. However, the class labels are still commonly used as broad descriptors. A+ 220-1101 Study Guide Success 49 Question 19 You need to build a Redundant Array of Independent Disks for your company's database server. Considering the budget, you decide to implement Disk Mirroring and try to lower the cost. Which of the following types of RAIDs should you implement? A. Hardware RAID Level 0 B. Software RAID Level 1 C. Hardware RAID Level 3 D. Software RAID Level 5 E. Software RAID Level 10 Answer: B Explanation Although a RAID with the hardware controller can handle the job itself without utilizing the CPU, it is indeed more expensive. On the other hand, a RAID with the software implementation would require the utilization of CPU, thus increasing the loading on the system, but it costs less. RAID Level 1 implements the Disk Mirroring. RAID (Redundant Array of Inexpensive Disks, also later known as Redundant Array of Independent Disks) is a system which uses multiple hard drives to share or replicate data among the drives for the purpose of fault tolerance and performance. A+ 220-1101 Study Guide Success 50 Although there are a number of different RAID levels, only four of them are most commonly implemented that you should keep in mind as follows: RAID Level 0 Disk Striping, which is the process whereby data is spread out across multiple disk drives but without redundancy. With striping, the system treats multiple disks as one. It improves performance but does not provide fault tolerance. RAID Level 1 Disk Mirroring, which is a mechanism whereby a second drive is added that is an exact copy of the primary disk. Therefore, there are at least two hard drives required for RAID 1. RAID Level 3 Similar to Level 0, except reserves a dedicated disk for storing parity and error correction code (ECC) data. It provides good performance and some level of fault tolerance. RAID Level 5 Disk Striping with Parity, which writes parity across all of the disks as well as the data. It provides data striping at the byte level and also stripe error correction information (parity), which results in excellent performance and good fault tolerance. RAID Level 10 It is similar to RAID Level 1 with an exception that two used standard RAID levels are layered in the opposite order; thus, RAID 10 is a stripe of mirrors. A+ 220-1101 Study Guide Success 51 Question 20 You want to use the NETSTAT command to display active TCP connections and Ethernet statistics. What can you type in the command line to learn more about this command and its switches? (Select ALL THAT APPLY) A. netstat /? B. netstat ? C. netstat \? D. info netstat E. help netstat Answer: AB Explanation To learn more about the specific command and its switches, you can type "[command] /?" in the command line, for example, "xcopy /?". The command line window will show all information for your reference. For most general commands, like COPY, XCOPY, MD, etc., "help [command]" can be used to get the same result, but "[command] ?" does not work. For some special commands, like NETSTAT, NET, IPCONFIG, etc., "[command] ?" can be used to get the same result, but "help [command]" does not work. A+ 220-1101 Study Guide Success 52 Question 21 You are going to have a business travel to several countries with your laptop computer. What should you carry about? A. Oscilloscope B. Voltage converter C. Breakout Box D. Wall plug adapter Answer: D Explanation The laptop computer is specially designed for travel without bringing the voltage converter. It usually can adapt to 100-240 volts input. The only thing you need to carry about for travel is a wall plug adapter due to the fact that electrical plugs and outlets in different countries may vary. Oscilloscope shows a line chart, time vs. voltage, which can be used to check voltages and frequencies or examine a microprocessor clock signal. Breakout Box is a piece of electronic test equipment used for accessing the individual pins on an interface port or individual wires in a cable (serial port, parallel port, etc.) to diagnose problems in computer communications. A+ 220-1101 Study Guide Success 53 Question 22 Your client’s laptop computer works fine in office when it is attached to a docking station, but receives some unexpected errors when booting alone at home without the docking station. You realize that there are some additional hardware devices attached to the docking station and being absent when the laptop boots alone. What will be the best solution to get this problem fixed? A. Uninstall and remove all additional hardware devices from the docking station B. Install an identical docking station at home with all additional hardware devices attached C. Create another hardware profile for booting the laptop alone D. Create another user profile for booting the laptop alone. Answer: C Explanation Although both “Uninstall and remove all additional hardware devices from the docking station” and “Install an identical docking station at home with all additional hardware devices attached” can get the problem fixed, they are just not the good options. The simplest and best solution is to create another hardware profile for booting the laptop at home. By doing so, you can avoid those additional hardware devices attached to the docking station when using the laptop at home. A+ 220-1101 Study Guide Success 54 Question 23 David wants to keep track of his workout regimen more efficiently. Which of the following devices is suitable for him? (Select ALL THAT APPLY) A. fitness monitor B. smart glasses C. smartphone D. smart watch Answer: AD Explanation A fitness monitor or smart watch will be suitable for David. Fitness monitors are available in all shapes and sizes and can be worn on the wrist, ankle, or neck. They use a Bluetooth wireless connection to communicate with an application located on a computer or portable device, such as a laptop. Fitness monitors are designed to read body temperature, heart rates, sleep cycles, and blood pressure. They can also track the distance you run or walk, and sometimes your elevation changes. Some people use their smart watches as fitness monitors. A special device installed inside the smart watch tracks their movement and records their activity levels. Smart glasses are great tools for watching 3D video, and some actually come with an ear piece that allows you to sync with Bluetooth and listen to as well. However, they do not A+ 220-1101 Study Guide Success 55 provide any function to track your activity or fitness levels. A smartphone would be able to track your motion, but not your sleep or heart rate. Not all smartphones can be calibrated finely enough to record your motions accurately. A+ 220-1101 Study Guide Success 56 Question 24 You want to connect your laptop computer to the Internet via the cellular broadband access. Which of the following are feasible solutions? (Select ALL THAT APPLY) A. Tether a cell phone to the laptop by using a USB connection. B. Attach an 802.11b PC card to the laptop. C. Attach a cellular WAN PC card to the laptop. D. Attach a cellular WAN USB modem to the laptop. E. Install a cellular WAN Bluetooth card to the laptop. Answer: ACD Explanation Wireless Broadband is a fairly new technology that provides high-speed wireless internet and data network access over a wide area. Since the cellular phone towers are already in place, cellular broadband access is rapidly becoming a popular means to access the Internet, with or without a cell phone. A user with a single computer can access the Internet by tethering their cell phone to their laptop or PC, normally using a USB connection. Alternatively, without requiring a cell phone, a user can simply purchase a cellular WAN PC card or a USB modem to connect their PC or laptop to the internet via cell-phone towers. This type of connection would be stable in any area that could also receive a strong cell-phone connection. Some of these modem cards are compatible with cellular broadband A+ 220-1101 Study Guide Success 57 routers, which allow more than one computer to be connected to the Internet using one cellular connection. A+ 220-1101 Study Guide Success 58 Question 25 You are handling the print jobs. After double-clicking the printer’s icon, what can you do to save the documents onto the hard disk with the ready-to-print format so that you can use them immediately once you connect to the printer? A. Select Pause from the Document menu. B. Select Properties from the Document menu. C. Select Use Printer Offline from the Printer menu. D. Select Sharing from the Printer menu. Answer: C Explanation By selecting Use Printer Offline form the Printer menu after double-clicking the printer’s icon, you can save the documents onto the hard disk with the ready-to-print format. Then, when you reconnect to the printer, you can uncheck Use Printer Offline to have the documents sent to the printer. A+ 220-1101 Study Guide Success 59 Question 26 Identify the type of computer cable connector shown in the exhibit. A. SCSI B. Firewire C. DVI D. HDMI Answer: D Explanation HDMI (High-Definition Multimedia Interface), developed by Sony, Hitachi, Thomson (RCA), Philips, Matsushita (Panasonic), Toshiba and Silicon Image, is a licensable audio/video connector interface for transmitting uncompressed, digital streams. HDMI provides an interface between any audio/video source, such as a set-top box, DVD player, or A/V receiver and an audio and/or video monitor, such as a digital television (DTV), over a single cable. Although HDMI is not yet as popular as the DVI connector on video cards, it is mainly A+ 220-1101 Study Guide Success 60 developed for connecting a high definition cable signal to the HDTV (High Definition TV). A DVI to HDMI cable may be used to connect the computer to a HDTV. DVI/HDMI cables have a single-link DVI-D connector on one end and an HDMI connector on the other. These cables are bi-directional and function equally well in either direction: HDMI to DVI, or DVI to HDMI. Please note that DVI does not pass audio so you will have to route your audio separately when using a DVI to HDMI adapter or cable. HDMI supports any TV or PC video format, including standard (VGA, XGA, SXGA), enhanced or high-definition video, plus multi-channel digital audio on a single cable. In HDMI Specification 1.0, the optional Consumer Electronics Control (CEC) channel includes a 1-wire bi-directional serial bus, supporting bi-directional communication between devices. The HDMI Specification includes three connectors: Type A 19 pins, standard type of HDMI connector (13.9 mm wide by 4.45 mm high). It supports all SDTV, EDTV and HDTV modes. It is also electrically compatible with single-link DVI-D. Type B 29 pins, higher resolution version (21.2 mm wide). It can carry an expanded video channel for use with very high-resolution future displays, such as WQSXGA (3200x2048). It is also electrically compatible with dual-link DVI-D. Type C 19 pins, mini-connector (10.42 mm by 2.42 mm). It is intended for portable devices. A+ 220-1101 Study Guide Success HDMI Connector 19-pin HDMI Type A Female Connector 61 A+ 220-1101 Study Guide Success 62 Question 27 Your client reports that her laptop LCD display worked fine yesterday, but started flickering for a while and then totally failed this morning. What would most likely cause the problem? A. The video card was bad B. The LCD display was overheated C. The power line was bad D. The inverter was bad Answer: D Explanation In this case, the LCD display started flickering and then failed. It would be most likely an inverter problem, which resulted in a malfunction of backlight. [About LCD] LCD (Liquid Crystal Display) is a type of flat display technology used in digital watches, portable computers, calculators and flat screen displays. LCD displays is made of two sheets of a flexible polarizing material with a layer of liquid crystal solution between them. An electric current passes through the liquid, causing the crystals to align and activate, whereas others do not. Light cannot pass through the crystals when they are activated. Each crystal, therefore, works in an on/off manner like a shutter, either allowing light to pass through or blocking the light. When individual crystals are colorized, LCD will provide a color display. A+ 220-1101 Study Guide Success 63 The LCD does not refresh the image like a standard computer monitor utilizing the CRT technology. Instead, the display is created by sending various voltages of electricity to cells of liquid crystal causing the liquid crystal to untwist at the rate of electricity applied, generating 64 different shades per cell. Monochrome LCD images usually appear as blue or dark gray images on top of a grayish-white background. Color LCD displays use two basic techniques for producing color: passive-matrix and active-matrix. Passive-Matrix Display It consists of a grid of horizontal and vertical wires. At the intersection of each grid contains a single LCD element that constitutes a single pixel, either letting light through or blocking it. It is less expensive than active-matrix but does not provide the same quality as an active-matrix display can. However, some new technologies such as DSTN (Double-layer Super-twist Nematic), CSTN (Color Super-twist Nematic) and HPA (High Performance Addressing) improve passive-matrix and produce sharp colors rivaling active-matrix. They are usually used for low-end notebook computers. Active-Matrix Display It is also known as TFT (Thin Film Transistor). An active-matrix display is a liquid crystal display found on notebook computers and flat panel displays. With active matrix displays, each pixel is controlled by from one to four transistors which commonly make the screens faster, brighter and more colorful than passive matrix. The TFT technology provides the best resolution of all the flat-panel techniques, but it is also the most expensive. [Laptop Displays] Notebook or portable computers may use different display resolutions as given below: A+ 220-1101 Study Guide Success 64 Standard 4:3 Aspect Ratio SVGA (Super Video Graphics Array): 800 x 600 XGA (Extended Graphics Array): 1024 x 768 SXGA (Super Extended Graphics Array): 1280 x 1024 SXGA+ (Super Extended Graphics Array+): 1400 x 1050 UXGA (Ultra Extended Graphics Array): 1600 x 1200 Wide Screen 16:9 Aspect Ratio WUXGA (Wide Ultra Extended Graphics Array) 1920 x 1200 (Best suited for HDTV) [Note] (1) Resolutions higher than 1024 x 768 are used for display sizes of 14 inches or above. (2) The aspect ratio of a two-dimensional shape is the ratio of its longer dimension to its shorter dimension. A+ 220-1101 Study Guide Success 65 Question 28 What would happen if the backlight of LCD display is damaged? (Select ALL THAT APPLY) A. The LCD screen becomes too bright to see. B. The LCD screen becomes too dark to see. C. The LCD screen starts flickering. D. Some noise comes out from the LCD screen. E. A faint image can still be seen when looking closer. Answer: BE Explanation If there is a failure of backlight in the LCD display, the screen will become dark but a faint image can still be seen when looking closer. [Backlight] A backlight is the form of illumination used in an LCD display. Backlights differ from frontlights because they illuminate the LCD from the side or back, whereas frontlights are in front of the LCD. They are used in small displays to increase readability in low light conditions, and in computer displays and LCD televisions to produce light in a manner similar to a CRT display. The light source can be one or more Cold Cathode Fluorescent Lamp (CCFL) or Hot Cathode Fluorescent Lamps (HCFL), one or more Light-Emitting Diodes (LEDs), an A+ 220-1101 Study Guide Success 66 ElectroLuminescent Panel (ELP), or an Incandescent Lamp. CCFL backlights are used on large displays like computer monitors, and are usually white in color. These also require the use of an inverter and diffuser. The primary CCFL configuration used in LCD backlighting is edge lighting. A cold cathode fluorescent lamp is the light source with a diffuser distributing the light evenly across the viewing area. CCFLs require an inverter to supply the 270 to 300 VAC @ 35KHz used by the CCFL tube. LED backlights offer a longer operating life - 50,000 hours minimum - and are brighter than ELPs. Being a solid state device, they are configured to operate with typically a +5VDC power (and optionally 12VDC power), so they do not require an inverter. The LED backlight has two basic configurations; Array and edge lit. In both types, the LEDs are the light source that are focused into a diffuser that distributes the light evenly behind the viewing area. ELP backlights are very thin, lightweight and provide an even light. They are available in a variety of colors, with white being the most popular for use with LCDs. While their power consumption is fairly low, they require voltages of 100 VAC @ 400Hz. This is supplied by an inverter that converts a 5, 12 or 24 VDC input to the AC output. Incandescent Lamp backlighting is only used where cost is a major factor. While Incandescent lights are very bright, they are not uniform, generate a significant amount of heat (which can cause problems at high temperatures), have short life spans, and use significant power for the brightness achieved. They can provide very white light, but the color can change with changing supply voltages, and they can be sensitive to shock and vibration. A+ 220-1101 Study Guide Success 67 Question 29 Your client reports that his laptop shows nothing on the LCD screen after booting up, while the lights on the laptop appear as normal. What is the first step you should troubleshoot? A. Use the function key to output the display to an external monitor. B. Upgrade the system BIOS. C. Take the LCD monitor apart to find out the problem. D. Replace with a new LCD monitor. Answer: A Explanation By holding down the Fn key, and then pressing the function key that has a monitor picture, you can switch the output display to a blank screen, a laptop screen, an external monitor, or both of the laptop screen and external monitor. The first step you should troubleshoot is to output the display to an external monitor and see if the display can be shown normally. If there is no display on the external monitor, then the problem might be caused by a malfunction video card. A+ 220-1101 Study Guide Success 68 Question 30 Your client complains that when his laser printer finishes the print, the toner seems not to stick to the paper. What defective component might cause the problem? A. Fuser assembly B. OPC drum C. Toner cartridge D. Transfer corona wire Answer: A Explanation In the Fusing stage of laser printing, the paper passes through a fuser assembly, which, having rollers that provide heat (up to 200 degrees Celsius) and pressure, bonds the toner (plastic powder) to the paper. The toner to the laser printer is just like the ink is to the Inkjet printer. The toner is an electrically charged powder that has two main components, plastic and pigments. The pigment is responsible for imparting color onto the page. The pigment is blended with plastic particles to avoid smudging and make an image look sharp. If the toner seems not to stick to the paper, it is most likely that the fuser assembly is damaged and fails to bond the toner to the paper. A+ 220-1101 Study Guide Success 69 Question 31 In the Fusing stage of laser printing, the fusing rollers apply both pressure and heat to the paper. How many degrees Celsius of heat will the fusing rollers provide? A. 100 B. 200 C. 300 D. 400 Answer: B Explanation Laser printers use the same technology as photocopy machines do. Their speeds are measured in PPM (Pages Per Minute). There are typically six main phases of laser printing: 1. Cleaning The beginning of each print cycle involves cleaning leftover toner from the photoreceptor, a revolving photosensitive drum which is capable of holding an electrostatic charge on its surface as long as it hasn't been exposed to certain wavelengths of electromagnetic radiation. In this phase, an electrically neutral rubber blade cleans any excess or leftover toner from the photoreceptor and deposits it into a waste reservoir, and a discharge lamp removes the remaining charge from the photoreceptor. A+ 220-1101 Study Guide Success 70 Summary: Rubber blade takes leftover toner off, and then Lamps erase (neutralize) the photoreceptor. 2. Charging or Conditioning A large charge (typically negative, but it depends on the printer) is applied to the surface of the photoreceptor (often higher than -600 volts) via the primary corona wire or a conditioning roller. The other side of the photoreceptor is connected to power supply ground. Summary: A negative charge is applied to the photoreceptor. 3. Writing A Raster Image Processor (RIP) chip converts incoming images to a raster image suitable for scanning onto the photoreceptor. The laser is aimed at a moving mirror which directs the laser beam through a system of lenses and mirrors onto the photoreceptor. Fixed lasers (now typically laser diodes) are used because they generate a coherent beam of light for a high degree of accuracy. Wherever the laser strikes the photoreceptor, the negative charge is discharged, thus forming a latent or potential electro-photographic image on the photoreceptor surface. Summary: The laser writes the latent image on the photoreceptor. 4. Developing A+ 220-1101 Study Guide Success 71 The surface containing the latent image is exposed to toner, very fine particles of dry plastic powder mixed with carbon black or coloring agents. The charged toner particles are electro-statically attracted to the photoreceptor where the laser wrote the latent image. Usually, the toner cartridge is provided a small electrical charge that pushes toner onto the photoreceptor and loose particles back into the toner cartridge. Summary: Toner is attracted to areas on the photoreceptor that the laser wrote to. 5. Transferring The photoreceptor is pressed or rolled over paper, transferring the image. The transfer corona wire (or charged transfer roller for higher end machines) with an opposite charge (typically positive) is on the back-side of the paper, and then the electromagnetic difference in the charges pulls the toner off of the photoreceptor and onto the paper. Summary: The toner is moved from the photoreceptor to the paper due to the electromagnetic difference. 6. Fusing It is the final phase of laser printing. The paper passes through a fuser assembly, which, having rollers that provide heat (up to 200 degrees Celsius) and pressure, bonds the plastic powder (the toner) to the paper. Two rollers are involved in this process - the fusing roller and the pressure, or backup, roller. Usually, the fusing roller is heated by a quartz heating lamp that is temperature-controlled by a thermal fuse or temperature sensor to prevent overheating damage. A+ 220-1101 Study Guide Success 72 Summary: A fuser assembly bonds (melts) the toner to the paper. [Note] The photoreceptor used in laser printers is usually a revolving photosensitive drum called OPC (Organic Photo Conductor) drum. It is made of a special material that holds an electrical charge for the printing process. OPC drums are sensitive to light and should be stored in light proof wrapping. Also, one side of the drum should be connected to the power supply ground. [Mnemonic] Cleaning - Charging - Writing - Developing - Transferring - Fusing (Can - Chris - Write - Down - The - Facts) A+ 220-1101 Study Guide Success 73 Question 32 What utility can be used in the Windows machine to obtain the information about MAC address, IP address, subnet mask, and default IP gateway? A. NETSTAT B. WINIPCFG C. IPCONFIG D. NSLOOKUP Answer: C Explanation TRACERT TRACERT is a Windows based command-line tool that you can use to trace the path that an IP (Internet Protocol) packet takes to its destination from a source. It is often used for network troubleshooting, such as tracking down where connectivity was lost. By showing a list of routers traversed and the time it takes from one router to another, it allows the user to identify the path taken to reach a particular destination on the network. This can help identify routing problems or firewalls that may be blocking access to a site. It is also used by penetration testers to gather information about network infrastructure and IP ranges around a given host. PING PING (Packet Internet Groper) is a utility to verify whether an IP address is reachable and tell you whether or not a packet has been duplicated, lost or damaged. It will also report how A+ 220-1101 Study Guide Success 74 long a packet takes for a round trip. It works by sending out an ICMP (Internet Control Message Protocol) echo request packet to the specified address and waiting for an ICMP echo response packet. PING is used primarily to troubleshoot local network or Internet connectivity. PING is executed either from the command line of the NOS (Network Operating System) or in the Windows Run box (or DOS prompt) by typing "ping [hostname or IP address]". However, PING may be used by malicious users to attack the network, thus posing the greatest threats to network performance and security. PATHPING PATHPING is a utility that can be used to locate spots that have network latency and network loss. It combines the functionalities of PING and TRACEROUTE (or TRACERT in Windows system), by sending multiple PING requests to each router between the two computers over a period of time so as to compute results based on the packets returned from each router. The advantages of pathping over ping and traceroute are that each node is pinged as the result of a single command, and that the behavior of nodes is studied over an extended time period, rather than the Ping's default sample of four messages or Traceroute's default single route trace. The disadvantage is that, using the default settings, it often takes more than five minutes to produce a result. PATHPING would provide more detailed information than PING and TRACERT do for diagnosing the network connectivity. NETSTAT NETSTAT displays the TCP/IP network protocol statistics and information, including network connectivity (both incoming and outgoing), routing tables, ICMP statistics, and a number of network interface statistics. It can be used for finding problems in the network and to determine the amount of traffic on the network as a performance measurement. ROUTE ROUTE displays and modifies the entries in the local IP routing table. The routing table shows the routes to particular network destinations. ROUTE cannot be used to troubleshoot A+ 220-1101 Study Guide Success 75 connectivity and track down where the connection was lost as it does not show the route of a specific packet in real time. Telnet Telnet is a terminal emulation program for TCP/IP networks such as the Internet. The Telnet program runs on the computer and connects it to a server on the network. The commands can be entered and executed through the Telnet program as if they were on the server console. This can be used to control the server, run programs, and communicate with other servers on the network. IPCONFIG IPCONFIG (Internet Protocol Configuration) is a TCP/IP utility that displays a Windows NT/2000/XP computer's TCP/IP configuration, including host name, DNS (Domain Name System) servers, node type, MAC address, DHCP (Dynamic Host Control Protocol) status, IP address, subnet mask, and default IP gateway. You can use ipconfig /all (with the switch /all) to display all detailed information. WINIPCFG WINIPCFG is a utility similar to IPCONFIG but mainly used in Windows 95 and Windows 98-based systems. It displays IP address information, including MAC address, IP address, subnet mask, and the default gateway. NSLOOKUP NSLOOKUP (Name Server Lookup) enables a user to look up an IP address of a domain or host on a network. It can be used to find out the IP address(es) associated with a particular domain name, or the domain name associated with an IP address. For example, you may type nslookup [domain name] in the command line and one or more IP addresses will be displayed as long as the domain name is in the DNS records. Also, you can type in the IP address to find out the associated domain name. Besides, NSLOOKUP will show the details A+ 220-1101 Study Guide Success 76 relating to DNS, including IP addresses of a particular computer, MX records for a domain or the NS servers of a domain, by using DNS lookups. NSLOOKUP can be used to manage a DNS server in a domain environment. IGMP IGMP (Internet Group Management Protocol) is the standard for IP multicasting, which involves sending data to multiple recipients over the Internet or other network. IGMP is used by IP hosts and adjacent multicast routers to establish multicast group memberships. A+ 220-1101 Study Guide Success 77 Question 33 What bit rates are offered by B and D channels of ISDN BRI (Basic Rate Interface)? A. 64 Kbps / 16 Kbps B. 64 Kbps / 64 Kbps C. 128 Kbps / 64 Kbps D. 128 Kbps / 128 Kbps Answer: A Explanation [ISDN] ISDN (Integrated Services Digital Network) is an international communications standard for sending voice, video, and data over digital telephone lines or normal telephone wires. ISDN supports data transfer rates of 64 Kbps per channel. There are two basic types of ISDN as follows: (1) Basic Rate Interface (BRI) It consists of two 64-Kbps B channels and one 16-Kbps D channel for transmitting control information. Together these three channels can be designated as 2B+D. The B channels of an ISDN basic rate interface can be bonded to provide a total duplex bandwidth of 128 Kbps. (2) Primary Rate Interface (PRI) A+ 220-1101 Study Guide Success 78 It contains a greater number of 64-Kbps B channels and one 64-Kbps D channel. The number of B channels for PRI varies depending on the nation: 23B+1D with an aggregate bit rate of 1.544 Mbps namely T1 (North America and Japan); 30B+2D with an aggregate bit rate of 2.048 Mbps namely E1 (Europe and Australia). Compared to the original version of ISDN that employs baseband transmission, a different version of ISDN, called BISDN (Broadband Integrated Services Digital Network), uses broadband transmission and is able to manage different types of services at the same time and support transmission a rate of 1.5 Mbps. It is primarily used within network backbones and employs ATM. BISDN requires fiber optic cables and is not widely available. A+ 220-1101 Study Guide Success 79 Question 34 Which of the following tools can be used to monitor network-attached devices with pre-configured parameters? A. Network Monitor B. System Monitor C. SNMP D. Device Manager Answer: C Explanation SNMP (Simple Network Management Protocol) was first introduced in 1988 and is used in network management systems to monitor network-attached devices by using a distributed architecture of management systems and agents. It is actually a query, command, and response protocol to examine and change configuration parameters of LAN and WAN connected repeaters, bridges, routers, switches, and other devices connected to a network. SNMP is a useful tool that can be used to configure remote devices, monitor network performance, detect network faults or inappropriate access, and audit network usage. SNMP exposes management data in the form of variables on the managed systems, which describe the system configuration. These variables can then be queried (and sometimes set) by managing applications. SNMP is currently available in three versions: A+ 220-1101 Study Guide Success 80 (1) SNMP version 1 (SNMPv1): SNMP v1 is the first implementation of SNMP and is described in RFC 1157. SNMP v1 operates within the specifications of SMI and has support for such protocols as CLNS, DDP, IP, IPX, and UDP. (2) SNMP version 2 (SNMPv2): SNMP v2, more appropriately known as SNMP v2c (as described in RFC 1901), was first introduced in RFC 1441 and includes improved support increasing efficiency and error handling. (3) SNMP version 3 (SNMPv3): SNMP v3 was introduced in RFC 3410 and improves in security and privacy. A+ 220-1101 Study Guide Success 81 Question 35 What chip deals with the high-speed graphics bus such as AGP or PCI Express? A. Super I/O B. Northbridge C. Southbridge D. Phoenix Answer: B Explanation Super I/O The super I/O chip combines interfaces for a variety of low bandwidth devices, including floppy disk controller, parallel port (commonly used for printers), one or more serial ports, keyboard and mouse interface. The super I/O chip may also contain other interfaces for a joystick or infrared port. Northbridge In Northbridge/Southbridge chipset architecture designs, the Northbridge typically handles communications between the CPU, RAM, AGP or PCI Express, and the Southbridge. Additionally, some Northbridges are also integrated with video controllers, which are also known as a Graphics and Memory Controller Hub (GMCH) in Intel systems. The Northbridge chips communicate with the CPU through the FSB (Front-Side Bus). A+ 220-1101 Study Guide Success 82 Southbridge In Northbridge/Southbridge chipset architecture designs, the Southbridge is a chip that implements the "slower" capabilities of the motherboard. It controls all of the computers I/O functions, such as USB, audio, serial, system BIOS, ISA, PCI, DMA, the interrupt controller, real time clock, nonvolatile BIOS memory, and the IDE (including SATA) channels. The Southbridge can usually be distinguished from the Northbridge by not being directly connected to the CPU. The Northbridge ties the Southbridge to the CPU. Phoenix Phoenix is a type of BIOS (Basic Input / Output System) software created by Phoenix Technologies Ltd. The chip containing the BIOS is located on the mainboard, and it initializes before the operating system and helps the OS communicate with the hardware. American Megatrends Incorporated (AMI) is the other major BIOS creator. A+ 220-1101 Study Guide Success Typical Northbridge/Southbridge Layout 83 A+ 220-1101 Study Guide Success 84 Question 36 Which of the following protocols would change a computer's IP address every time it connects to the network? A. NetBEUI B. DNS C. DHCP D. ARP Answer: C Explanation USB 2.0/IP TCP/IP (Transmission Control Protocol / Internet Protocol) is a suite of communication protocols that are used to connect hosts on the Internet. TCP enables two hosts to establish a virtual connection for exchanging streams of data, and guarantees that packets will be delivered in the same order in which they were sent. Whereas, IP specifies the format of packets (also called datagrams) and the addressing scheme. TCP/IP includes a number of utilities that are useful for troubleshooting and providing network services. Please note not to misname TCP as Transport Control Protocol. UDP UDP (User Datagram Protocol) is defined in RFC 768. UDP is an alternative protocol to the TCP/IP that runs on top of IP and is sometimes referred to as UDP/IP. Unlike TCP/IP, UDP is connectionless and provides very few error recovery services, thus offering a faster A+ 220-1101 Study Guide Success 85 transmission that sends and receives datagrams over an IP network. UDP is used primarily for broadcasting messages over a network. FTP FTP (File Transfer Protocol) is a protocol used to transfer files across the Internet from one computer to another. You can use FTP to either upload the files (from your computer to a remote one) or download the files (from a remote computer to yours). HTTP HTTP (Hypertext Transfer Protocol) is a communications protocol for the transfer of information on Intranets and Internet. Although its original purpose was to provide a way to publish and retrieve hypertext pages over the Internet, HTTP has become more popular for sending streaming video across the Internet. DHCP DHCP (Dynamic Host Configuration Protocol) is a protocol that allows the dynamic assignment of IP addresses on a network. In other words, a device will be assigned a different IP address every time it connects to the network. In some systems, the device's IP address can even change while it is still connected. DNS DNS (Domain Name System, or Service, or Server) is an Internet service that resolves human-friendly text domain names of a destination to their numeric IP addresses by using a distributed database that stores host domain names and their corresponding IP addresses. For example, DNS will translate a human-friendly domain names, such as "www.google.com", into its less friendly IP address such as 72.14.235.99, and vice versa. WINS WINS (Windows Internet Name Service) is a NetBIOS name resolution service that allows A+ 220-1101 Study Guide Success 86 client computers to register their NetBIOS names and IP addresses in a dynamic, distributed database and to resolve the NetBIOS names of network resources to their IP addresses. WINS was designed specifically to support NetBIOS over TCP/IP (NetBT). WINS is required for any environment in which users access resources that have NetBIOS names. WINS and DNS are both name resolution services for TCP/IP networks. While DNS resolves domain names to their corresponding IP addresses, WINS is used to resolve NetBIOS names to their corresponding IP addresses. WINS primarily supports clients that run older versions of Windows and applications that use NetBIOS. Windows 2000, Windows XP, and Windows Server 2003 use DNS names in addition to NetBIOS names. Environments that include some computers that use NetBIOS names and other computers that use domain names must include both WINS servers and DNS servers. ARP ARP (Address Resolution Protocol) is a protocol responsible for resolving the IP address to the physical MAC address of the destination. It works by broadcasting an ARP request onto the TCP/IP network. The ARP request contains the IP address the sender is interested in communicating with. Most hosts ignore the request, but the host that has the IP address in the request replies with its physical hardware address. You may use the TCP/IP utility "ARP" to display, add, change, or delete ARP address entries from a computer's ARP cache. When under MS-DOS mode, simply type ARP to initiate this TCP/IP utility. ARP Table The ARP table is a table of IP addresses stored on a local computer, used to match IP addresses to their corresponding MAC addresses. RARP RARP (Reverse Address Resolution Protocol) is a protocol that allows a physical address to be translated into an IP address. When booted, the hosts such as diskless workstations often A+ 220-1101 Study Guide Success 87 only know their hardware interface addresses (or MAC address) rather than their IP addresses. They must broadcast their physical addresses and an external source, usually a RARP server, replies with the host's IP address. SMTP SMTP (Simple Mail Transfer Protocol) is a protocol responsible for transferring electronic mail from the sender's server to the addressee's server. SMTP sends e-mail across the Internet to addressee's mail server, which holds the mail for addressee in his/her mailbox. Addressee may use mail client like POP3 or IMAP to download the e-mail from his/her mail server. POP3 POP3 (Post Office Protocol) is a protocol responsible for downloading e-mail from the mail server to the user's computer. The number 3 in POP3 represents the version of this protocol. After downloading e-mail to the user's computer, POP3 removes e-mail from the mail server. It is suitable for users who always log on from the same permanently workstation. IMAP IMAP (Interactive Mail Access Protocol) is a protocol similar to POP3 except that the e-mail remains on the mail server indefinitely until the user decide to remove it. It is suitable for users who regularly access their mail from different machines or email clients. MIME MIME (Multipurpose Internet Mail Extensions) is a standard format for attaching non-text files, such as compressed files, sound files, graphic files, document files, video files, and various other files, to a text base e-mail message. X.400 X.400 is a set of standards developed by the ITU-T (at the time the CCITT) in cooperation with ISO for the exchange of messages, both between people and between software A+ 220-1101 Study Guide Success 88 applications. It is not really used for the Internet but almost entirely confined to in-house applications. NetBIOS NetBIOS (Network Basic Input/Output System) allows for OSI Model Layer 5 (Session Layer) communication. NetBIOS provides two functions: naming and starting/stopping communication sessions. NetBIOS names are 16 bytes in length but usually consist of 15 characters with the last being reserved for special purposes. NetBIOS names follow the UNC format. NetBEUI NetBEUI (NetBIOS Extended User Interface) is an extended version of NetBIOS that uses NetBIOS names (up to 15 characters in UNC format) and allows communication and data transport between computers within a LAN. NetBEUI protocol is often referred to as NetBIOS frame (NBF) protocol as it introduces the frame format that was not specified as part of NetBIOS. NetBEUI works at the OSI Model Layer 3 (Network Layer) and OSI Model Layer 4 (Transport Layer). It is a non-routable protocol and must be adapted to other protocols, such as TCP/IP, for Internet routing. Usually, both NetBEUI and TCP/IP are installed in the system and the server is set up to use NetBEUI for communication within the LAN and TCP/IP for communication beyond the LAN. NetBEUI is non-routable (unable to transmit through routers) because the addressing system (up to 15 characters in UNC format) does not provide unique identifiers or addresses. NetBIOS and NetBEUI Applications Both NetBIOS and NetBEUI were developed by IBM and have been adopted by Microsoft for its Windows NT, XP and 2000, and Windows for Hewlett-Packard and DEC also use it in similar products. Workgroup products. Novell, A+ 220-1101 Study Guide Success 89 IPX/SPX IPX/SPX (Internetwork Packet Exchange/Sequenced Packet Exchange) is a routable network protocol used by the Novell NetWare operating systems. Like UDP, IPX is a datagram protocol used for connectionless communications. SPX is a transport layer protocol (OSI Model Layer 4) that sits on top of the IPX layer (OSI Model Layer 3 - Network Layer) and provides connection-oriented services between two nodes on the network. IPX/SPX provides connection services similar to TCP/IP, with the IPX protocol similar to IP and SPX similar to TCP. IPX/SPX was primarily designed for LANs (Local Area Networks). NWLink NWLink is Microsoft's implementation of Novell's IPX/SPX protocols to allow a Microsoft machine to communicate with a Novell server. NWLink includes an implementation of NetBIOS atop IPX/SPX. It is a routable protocol. Apple Talk Apple Talk was developed by Apple Computer Corporation and is used with older Apple computer systems. It is a routable protocol by using DDP at the network layer. Gopher Gopher is a system that displays files on Internet servers. Its goal was similar to that of the World Wide Web, and it has been almost completely replaced by the Web. Gopher was developed at the University of Minnesota and named after the school's mascot. RIP RIP (Routing Information Protocol) is a routing protocol used by computers, routers and other network devices to broadcast known addresses, allowing networking devices to learn available routes. It helps routers and other network devices dynamically exchange updates to their routing tables. Although RIP is still actively used, it is generally replaced by OSPF or A+ 220-1101 Study Guide Success 90 other more current routing protocols. OSPF OSPF (Open Shortest Path First) is an IP link-state networking routing protocol that helps determine the best or shortest path to the next hop in a network. The latest version, version 3, supports IPv6 only, while OSPF version 2 supports IPv4. A+ 220-1101 Study Guide Success 91 Question 37 What would be the most likely reason that Chip Creep (loose chips) occurs? A. Thermal cycling B. Defective chips C. Vibration D. Improper installation Answer: A Explanation Chip Creep refers to the problem that the chips have a tendency to be out of the socket over time due to thermal cycling, the expanding and contracting during system heat up and cool down. To fix chip creep, users would often have to remove the case cover and push the loose chip back into the socket. However, Chip Creep are mainly referenced to older computer systems since the chips in the modern systems are all soldered into place or are more securely held by various types of retainer clips. But plug-in cards can still exhibit the problem to a degree. A+ 220-1101 Study Guide Success 92 Question 38 Which of the following media type can be used to store 4 GB data? (Select ALL THAT APPLY) A. CD-RW B. DDS-3 C. DVD-R D. Zip E. DDS-2 F. DVD+R DL Answer: BCEF Explanation [Zip] Zip is a hardware data storage device developed by Iomega, similar to the Standard 1.44" floppy drive. What makes the Iomega zip drive unique is its capability to hold up to 100 MB of data or 250 MB of data on new drives, and the wide use of these drives. Because the zip diskettes are cheap media and commonly found, Zip Drives became very popular in late 1990s. Later, the Zip drives became less popular with the larger storage capabilities, uses, and cheaper CD-R and CD-RW drives and discs. [DDS] Digital Data Storage (DDS) is a format for storing and backing up computer data on A+ 220-1101 Study Guide Success 93 magnetic tape that evolved from Digital Audio Tape (DAT) technology, which was originally created for CD-quality audio recording. DDS drives have data transfer rates ranging from 1.5 to 2.4 MBps and come in four different types, DDS-1, DDS-2, DDS-3 and DDS-4. DDS-1 It has a native capacity of up to 2 GB (4GB compressed). DDS-2 It has a native capacity of up to 4 GB (8 GB compressed). DDS-3 It has a native capacity of up to 12 GB (24 GB compressed). DDS-3 uses PRML (Partial Response Maximum Likelihood). PRML eliminates electronic noise for a cleaner data recording. DDS-4 It has a native capacity of up to 20 GB (40 GB compressed). This format is also called DAT 40. [CD-RW] Compact Disc ReWritable (CD-RW) is a rewritable optical disc format. It can be used to store up to 700 MB on a single optical disc. [DVD+R / DVD-R] DVD+R is a once-writable optical disc with 4.7 GB of storage capacity. It has slightly less A+ 220-1101 Study Guide Success 94 storage capacity than the DVD-R 4.71 GB. The format was developed by a coalition of corporations, known as the DVD+RW Alliance, in mid 2002. Since the DVD+R format is a competing format to the DVD-R format, which is developed by the DVD Forum, it had not been approved by the DVD Forum. DVD+R can read and write to a DVD+RW or DVD+R disc, while DVD-R can read and write to a DVD-RW or DVD-R disc. [DVD+R DL / DVD-R DL] DVD+R DL (DL stands for Double Layer) also called DVD+R9, is a derivative of the DVD+R format standard. DVD+R DL discs employ two recordable dye layers, each capable of storing nearly the 4.7 GB capacity of a single-layer disc, almost doubling the total disc capacity to 8.55 GB (or 7.96 GiB). DVD-R DL (DL stands for Dual Layer), also called DVD-R9, is a derivative of the DVD-R format standard. DVD-R DL discs hold 8.54 GB (7.96 GiB) per side by utilizing two recordable dye layers, each capable of storing nearly the 4.7 GB (4.38 GiB) of a single layer disc - almost doubling the total disc capacity. A+ 220-1101 Study Guide Success 95 Question 39 What is the data verification for backups? A. It ensures the backups are encrypted properly by decrypting the data. B. It is a procedure to verify the access right for the backup data. C. It verifies the backups by reading data back from the backup media. D. It secures the backup data with password authentication. Answer: C Explanation [Backup Rotation Scheme] A backup rotation scheme is a method for effectively backing up data where multiple media, such as tapes, are used in the backup process. The scheme determines how and when each piece of removable storage is used for a backup job and how long it is retained once it has backup data stored on it. Different techniques have evolved over time to balance data retention and restoration needs with the cost of extra data storage media. Such a scheme can be quite complicated if it takes incremental backups, multiple retention periods, and off-site storage into consideration. There are many different types of tape rotation schemes available: (1) Incremental Backup The incremental backup is just backing up onto the oldest media in the set. So with a daily A+ 220-1101 Study Guide Success 96 backup onto a set of 14 media, you would have 14 days worth of individual daily backups, when all the tapes are used, the oldest one is inserted. This is the simple method that first comes to mind to most new computer users wanting to do backups. It was commonly used when people backed up regularly to floppy disks. (2) Grandfather-Father-Son Backup Grandfather-Father-Son Backup, originally designed for tape back up, works well for any hierarchical backup strategy. The basic method is to define three sets of backups, such as daily, weekly and monthly. The daily or Son backups are rotated on a daily basis with one graduating to Father status each week. The weekly or Father backups are rotated on a weekly basis with one graduating to Grandfather status each month. Often one or more of the graduated backups is removed from the site for safekeeping and disaster recovery purposes. The Grandfather-Father-Son Backup is one of the most popular methods as it achieves multiple aims in having multiple recent backups as well as the ability to refer to past revisions as well as archived data. (3) Towers of Hanoi The Towers of Hanoi rotation method is more complex. It is based on the mathematics of the Tower of Hanoi puzzle, with what is essentially a recursive method. It is a smart way of archiving an effective number of backups as well as the ability to go back over time, but it is more complex to understand. Basically, every tape is associated with a disk in the puzzle, and every disk movement to a different peg corresponds with a backup to that tape. So the first tape is used every other day (1, 3, 5, 7, 9,...), the second tape is used every fourth day (2, 6, 10, ...), the third tape is used every eighth day (4, 12, 20, ...). A set of n tapes (or tapes sets) will allow backups for 2 n - 1 days before the last set is recycled. So, three tapes will give seven days worth of backups and on the eighth day Set C will be overwritten; four tapes will give fifteen days, and Set D is overwritten on day sixteen; five tapes will give 31 days, etc. Files can be restored from 1, 2, 4, 8, 16, ..., 2 n days ago. A+ 220-1101 Study Guide Success 97 (4) Incremented Media Method This method has many variations and names. A set of numbered media is used until the end of the cycle. Then the cycle is repeated using media numbered the same as the previous cycle, but incremented by one. The lowest numbered tape from the previous cycle is retired and kept permanently. Thus, one has access to every backup for one cycle, and one backup per cycle before that. This method has the advantage of ensuring even media wear, but requires a schedule to be pre-calculated. The system is generally too complex to mentally calculate the next media to be used. [Data Verification for Backups] Data verification for backups ensures that backups are working correctly and the data can be read from the backup media. It can be performed by using backup software that includes the ability to perform data verification. The only disadvantage is that it lengthens the amount of time that it takes to perform the backup. There are two different levels of verification, depending on the software you are using. The most secure level of verification is full verification, where each and every file that is backed up is also verified by reading back from the backup medium. A lesser type of verification is sampling verification. Here, instead of verifying everything that was backed up, a sample of what was backed up is read back and verified. This makes the verification take much less time, but of course doesn't do nearly as good a job. Usually full verification is easier to find on most software than sampling. The ultimate in backup verification is doing a test restore, but this takes both time and some spare hardware. If you have an extra hard disk or PC, you can take your backup set and try to restore the backup to this machine. If it works properly, you can feel confident that your backup will probably protect you when you need it. A+ 220-1101 Study Guide Success 98 [Off-site Data Protection] Off-site Data Protection is the strategy of sending business critical data to an off-site location as part of an IT Disaster Recovery Plan. It is important because it can prevent the data from being destroyed if a disaster happens to the office or building where the computer resides. Data is usually transported off-site using removable storage media such as magnetic tape, but can also be sent off-site electronically via a remote backup service. Sending data offsite electronically is also known as Electronic Vaulting (or E-Vaulting). Although some organizations manage and store their own off-site backups, many chose to have their backups managed and stored by third parties who specialize in the commercial protection of off-site data. A+ 220-1101 Study Guide Success 99 Question 40 What is the most important thing to do before flashing the BIOS on a computer? A. Write down the CMOS settings. B. Scan for viruses. C. Wear an antistatic wrist strap. D. Perform a BIOS backup. Answer: D Explanation Flash BIOS is a special type of ROM BIOS chip that can be erased and reprogrammed electrically. This technology makes the BIOS upgrades online possible whenever the manufacturer releases a new version of the BIOS. The process of upgrading BIOS online is called "flashing the BIOS". You should always perform a BIOS backup before flashing the BIOS, in case the upgrade causes some unrecoverable errors. A+ 220-1101 Study Guide Success 100 Question 41 What types of securities can be implemented on an 802.11b WLAN? (Select ALL THAT APPLY) A. VPN B. WEP C. PPTP D. WPA E. DES3 Answer: BD Explanation The IEEE 802.11 is a family of standards introduced by IEEE in 1997 for wireless Ethernet networks. IEEE 802.11 specifies an over-the-air interface between a wireless client and a base station, or between two wireless clients. There are some important specifications in the 802.11 family: A+ 220-1101 Study Guide Success Max. IEEE 101 Indoor Band Rate Modulation Scheme Security Note Range WEP 802.11 2 Mbps 2.4GHz 20m FHSS or DSSS Extended into 802.11b WPA WEP 802.11a 54 Mbps 5GHz 35m OFDM Wi-Fi certified 8 channels WPA Wi-Fi certified 14 channels* WEP 802.11b 11 Mbps 2.4GHz 35m DSSS with CCK Fallback to 5.5, 2, and 1 WPA Mbps OFDM (above 20 Mbps) WEP 802.11g 54 Mbps 2.4GHz 38m DSSS with CCK (below Wi-Fi certified 14 channels* WPA 20 Mbps) 600 2.4GHz / 802.11n WEP 70m Mbps 5GHz WPA 3466.8 802.11ac WEP 5GHz Mbps Labelled as Wi-Fi 4 MIMO-OFDM 35m labelled as Wi-Fi 4 MIMO-OFDM WPA * only 11 channels can be used in the U.S. due to FCC (Federal Communications Commission) regulations [Note] Wi-Fi Certified Wi-Fi (or WiFi, Wireless Fidelity) is a brand originally licensed by the Wi-Fi Alliance. It utilizes one of the IEEE 802.11 wireless standards to achieve a wireless network. The Alliance A+ 220-1101 Study Guide Success 102 created another brand "Wi-Fi Certified" to denote products interoperable with other products that are also Wi-Fi certified. A user with a "Wi-Fi Certified" product can use any brand of access point with any other brand of client hardware that also is certified. However, any Wi-Fi product using the same radio frequency (for example, 2.4GHz for 802.11b or 11g, 5GHz for 802.11a) will work with any other, even if not "Wi-Fi Certified". WEP WEP (Wired Equivalent Privacy) is a type of encryption for WLANs (also known as Wi-Fi networks) defined in the 802.11 standard. Because a wireless network broadcasts messages using radio, it is particularly susceptible to eavesdropping. WEP is designed to provide the same level of security as that of a wired LAN. WEP aims to provide security by encrypting data over radio waves so that it is protected as it is transmitted from one end point to another. However, it has been found that WEP is not as secure as once believed. Several serious weaknesses were identified by cryptanalysts (any WEP key can be cracked with readily-available software in two minutes or less). WEP is used at the two lowest layers of the OSI model (the data link and physical layers), thus being lack of end-to-end security. WEP was superseded by WPA (Wi-Fi Protected Access) in 2003, and then by the full IEEE 802.11i standard (also known as WPA2) in 2004. WPA WPA (Wi-Fi Protected Access) is an enhanced data encryption standard introduced with 802.11i wireless standard that improves upon the security features of WEP. The technology is designed to work with existing Wi-Fi products that have been enabled with WEP. It implements the majority of the IEEE 802.11i standard, and was intended as an intermediate measure to take the place of WEP while 802.11i was prepared. WPA works with all wireless network interface cards, but not necessarily with first generation wireless access points. WPA2 replaced WPA. WPA2, which requires testing and certification by the Wi-Fi Alliance, implements the mandatory elements of IEEE 802.11i. WPA2 implements the full standard, A+ 220-1101 Study Guide Success 103 but will not work with some older network cards. In January 2018, the Wi-Fi Alliance announced WPA3 as a replacement to WPA2. The new standard uses an equivalent 192-bit cryptographic strength in WPA3-Enterprise mode, and still mandates the use of CCMP-128 (AES-128 in CCM mode) as the minimum encryption algorithm in WPA3-Personal mode. FHSS FHSS (Frequency-Hopping Spread Spectrum) is a spread-spectrum method of transmitting radio signals by rapidly switching a carrier among many frequency channels, using a pseudorandom sequence known to both transmitter and receiver. DSSS DSSS (Direct-Sequence Spread Spectrum) is a spread-spectrum method of transmitting radio signals by combining data at the sending station with a higher data rate bit sequence, or chipping code, that divides the user data according to a spreading ratio. CKK CKK (Complementary Code Keying) is a set of 64 eight-bit code words used to encode data for 5.5 and 11Mbps data rates in the 2.4GHz band of 802.11b and 802.11g wireless networking. OFDM OFDM (Orthogonal Frequency Division Multiplexing) is an FDM modulation technique for transmitting large amounts of digital data over a radio wave.. A+ 220-1101 Study Guide Success 104 Question 42 Your client is using the laptop for web surfing, emailing, and creating documents only. Which hard drive would you recommend to him in terms of best performance and reliability? A. Magnetic Hard Drive B. SSD (Solid State Drive) C. Hybrid D. eSata External Drive Answer: B Explanation SSD (Solid State Drive) is the best option. Solid state drives are not as fragile as magnetic hard drives because they do NOT use a read/write assembly, do not have any moving parts, and are resistant to shock. When in operation, solid state drives are silent. SSDs are faster, more reliable, and require less power than magnetic drives. On the flip side, SSDs are limited on storage space compared with traditional hard drives. There are hybrid and eMMC versions of SSD drives that work mainly in portables but are used for testing purposes when troubleshooting hard drive failures due to their SATA port compatibility. Hybrid drives are a combination of a hard drive with some moving parts and a true SSD, which is basically flash memory. The data is stored differently but serves the same purpose by giving uses a performance like an SSD. A hybrid would not be the solution here A+ 220-1101 Study Guide Success 105 because an SSD would provide better performance and reliability. Magnetic hard drives are very affordable but crash more easily than solid state drives due to the way they are manufactured. They were extremely popular for years and reliable, unless they were damaged. Then the only way you could repair them was to format them (completely erase the data) and re-partition them. The reason they are so fragile is because they have read/write heads that move across magnetic platters. They are easy to scratch and break. E-Sata drives are SSDs that have to be connected externally. They are great for backing up and storing data off site, but not used for internal storage purposes. They also do not perform as efficiently as internal SSDs. Laptops use either 1.8" or 2.5" hard drives. The 2.5" drives are more popular and less costly. The 1.8" drives weigh less and are more power efficient. In most cases, the 2.5" drives offer better performance because they have larger caches and higher rotation speeds. The 1.8" drives are most often use in ultra-portable laptops, iPads, and other mobile devices, while the 2.5" drives are used in traditional laptops. A+ 220-1101 Study Guide Success 106 Question 43 Which of the following is NOT a cloud model? A. IaaS B. PaaS C. SaaS D. YaaS Answer: D Explanation Cloud computing is the on-demand availability of computer system resources, especially data storage (cloud storage) and computing power, without direct active management by the user. Large clouds, predominant today, often have functions distributed over multiple locations from central servers. [Common Cloud Models] IaaS (Infrastructure as a service) IaaS refers to online services that provide high-level APIs used to abstract various low-level details of underlying network infrastructure like physical computing resources, location, data partitioning, scaling, security, backup, etc. A hypervisor runs the virtual machines as guests. Pools of hypervisors within the cloud operational system can support large numbers of virtual machines and the ability to scale services up and down according to customers' varying requirements. A+ 220-1101 Study Guide Success 107 IaaS-cloud providers supply resources on-demand from their large pools of equipment installed in data centers. For wide-area connectivity, customers can use either the Internet or carrier clouds (dedicated virtual private networks). To deploy their applications, cloud users install operating-system images and their application software on the cloud infrastructure. In this model, the cloud user patches and maintains the operating systems and the application software. Cloud providers typically bill IaaS services on a utility computing basis: cost reflects the amount of resources allocated and consumed. PaaS (Platform as a service) The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages, libraries, services, and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application-hosting environment. PaaS vendors offer a development environment to application developers. The provider typically develops toolkit and standards for development and channels for distribution and payment. In the PaaS models, cloud providers deliver a computing platform, typically including operating system, programming-language execution environment, database, and web server. Application developers develop and run their software on a cloud platform instead of directly buying and managing the underlying hardware and software layers. With some PaaS, the underlying computer and storage resources scale automatically to match application demand so that the cloud user does not have to allocate resources manually. SaaS (Software as a service) The capability provided to the consumer is to use the provider's applications running on a cloud infrastructure. The applications are accessible from various client devices through either a thin A+ 220-1101 Study Guide Success 108 client interface, such as a web browser (e.g., web-based email), or a program interface. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings. In SaaS model, users gain access to application software and databases. Cloud providers manage the infrastructure and platforms that run the applications. SaaS is sometimes referred to as "on-demand software" and is usually priced on a pay-per-use basis or using a subscription fee. In the SaaS model, cloud providers install and operate application software in the cloud and cloud users access the software from cloud clients. Cloud users do not manage the cloud infrastructure and platform where the application runs. This eliminates the need to install and run the application on the cloud user's own computers, which simplifies maintenance and support. Cloud applications differ from other applications in their scalability—which can be achieved by cloning tasks onto multiple virtual machines at run-time to meet changing work demand. Load balancers distribute the work over the set of virtual machines. This process is transparent to the cloud user, who sees only a single access-point. To accommodate a large number of cloud users, cloud applications can be multitenant, meaning that any machine may serve more than one cloud-user organization. [Deployment Models] Private Cloud Private cloud is cloud infrastructure operated solely for a single organization, whether managed internally or by a third party, and hosted either internally or externally. Undertaking a private cloud project requires significant engagement to virtualize the business environment, and requires the organization to reevaluate decisions about existing resources. Public Cloud A cloud is called a "public cloud" when the services are rendered over a network that is open for A+ 220-1101 Study Guide Success 109 public use. Public cloud services may be free. Technically there may be little or no difference between public and private cloud architecture, however, security consideration may be substantially different for services (applications, storage, and other resources) that are made available by a service provider for a public audience and when communication is effected over a non-trusted network. Generally, public cloud service providers like Amazon Web Services (AWS), IBM Cloud, Oracle, Microsoft, Google, and Alibaba own and operate the infrastructure at their data center and access is generally via the Internet. AWS, Oracle, Microsoft, and Google also offer direct connect services called "AWS Direct Connect", "Oracle FastConnect", "Azure ExpressRoute", and "Cloud Interconnect" respectively, such connections require customers to purchase or lease a private connection to a peering point offered by the cloud provider. Hybrid Cloud Hybrid cloud is a composition of a public cloud and a private environment, such as a private cloud or on-premises resources, that remain distinct entities but are bound together, offering the benefits of multiple deployment models. Hybrid cloud can also mean the ability to connect collocation, managed and/or dedicated services with cloud resources. Gartner defines a hybrid cloud service as a cloud computing service that is composed of some combination of private, public and community cloud services, from different service providers. A hybrid cloud service crosses isolation and provider boundaries so that it can't be simply put in one category of private, public, or community cloud service. It allows one to extend either the capacity or the capability of a cloud service, by aggregation, integration or customization with another cloud service. Community Cloud Community cloud shares infrastructure between several organizations from a specific community with common concerns (security, compliance, jurisdiction, etc.), whether managed internally or by a third-party, and either hosted internally or externally. The costs are spread over fewer users than a public cloud (but more than a private cloud), so only some of the cost A+ 220-1101 Study Guide Success savings potential of cloud computing are realized. 110 A+ 220-1101 Study Guide Success 111 Question 44 A user is just hired by a company that has 802.11g wireless Ethernet network built in the office. The user needs to work with her own laptop computer in the office quite often and must connect to the company’s Ethernet network, but her laptop has no built-in 802.11g NIC card. What is your suggestion? (Select ALL THAT APPLY) A. Install an 802.11g PCMCIA card B. Install a USB 2.0 hub C. Ask the company to provide a physical network cable D. Install a USB 2.0 802.11g NIC card E. Purchase a new laptop that has a built-in 802.11g NIC card Answer: AD Explanation Both USB 2.0 802.11g NIC card and 802.11g PCMCIA card will fit the user’s need and are considered the two best options. A+ 220-1101 Study Guide Success 112 Question 45 Which of the following power modes can you use to completely power down your laptop, and later when startup, quickly resume from where you were working at? A. Standby B. Hibernate C. Resume D. Shutdown Answer: B Explanation Shutdown will completely power down the machine and later start from the beginning. Standby does not power down the machine, but only turns off all nonessential hardware. There is no Resume mode that can be chosen in the laptop. Hibernate is the one you can use to completely power down the laptop and later quickly resume form where you were working at. [Power Saving Mode] Hibernate Mode When Windows hibernates, it dumps the entire contents of the RAM to disk and powers down the entire machine. On startup, it quickly reloads the data back to RAM. This allows the system to be completely powered off while in hibernate mode. Hibernating and restoring from hibernate is generally faster than a hard reboot and, if A+ 220-1101 Study Guide Success 113 necessary, can be done without user interaction (unlike shutting down, which often requires the user to specify if open documents should be saved). Microsoft Windows systems support hibernation at the operating system level without special drivers from the hardware manufacturer. The file is called "hiberfil.sys" and is the same size as total RAM. The file resides in the root of the system partition, usually "C:\hiberfil.sys". The file is a hidden system file and uses up space even when not in hibernation. To use hibernation, the hard disk needs to have at least as much free space as there is RAM on the system. Hibernation is enabled by default and can be disabled in order to recover disk space. Standby mode When Windows enters standby mode, it turns off all nonessential hardware components, including the monitor, hard drives, and removable drives, but maintains power to the computer's memory. This means that the system reactivates itself very quickly when "woken up". This does not power down the system. In order to save power without user intervention, a system can be configured to go to standby when idle and then hibernate if not re-activated. A+ 220-1101 Study Guide Success 114 Question 46 What is used to power the CMOS (Complementary Metal-Oxide Semiconductor) in the computer system? A. CMOS Battery B. Fuel Cell C. Bridge Battery D. Main Battery Answer: A Explanation There are three main categories of computer batteries: (1) Backup Battery It is commonly referred to as the CMOS Battery. It is used to power the CMOS (Complementary Metal-Oxide Semiconductor), which is an on-board semiconductor chip and also known as a RTC/NVRAM or CMOS RAM. CMOS holds the computer's settings, such as the system time and system settings, and allows the computer to be booted without entering those settings each time. The standard lifetime of a CMOS battery is around 10 Years. However, this amount of time can change depending on the use and environment that the computer resides. (2) Bridge Battery It is only found within portable computers and is used as a temporary backup for the main A+ 220-1101 Study Guide Success 115 battery. This allows the main battery to be temporarily removed for replacement with a good battery without having to turn off the computer. (3) Main Battery It is only used with portable computers and is used as an alternate source of power when the computer is not connected to a standard wall outlet. A+ 220-1101 Study Guide Success Question 47 How many pins does DDR4 SDRAM have? A. 128 pins B. 168 pins C. 184 pins D. 240 pins E. 288 pins Answer: E Explanation Standard SDRAM DIMMs (or SDR DIMMs): 168 pins, 3.3 volts DDR SDRAM DIMMs (or DDR DIMMs): 184 pins, 2.5 volts DDR2 SDRAM DIMMs (or DDR2 DIMMs): 240 pins, 1.8 volts DDR3 SDRAM DIMMs (or DDR3 DIMMs): 240 pins, 1.5/1.35 volts DDR4 SDRAM DIMMs (or DDR4 DIMMs): 288 pins, 1.2/1.05 volts 116 A+ 220-1101 Study Guide Success 117 Question 48 Which of the following memory types could be found in a laptop? (Select ALL THAT APPLY) A. MicroDIMM B. FB-DIMM C. SoDIMM D. RIMM E. SIMM Answer: AC Explanation Both SoDIMMs and MicroDIMMs could be found in laptop computers. SoDIMMs are commonly utilized in notebook computers, while MicroDIMMs are primarily used in sub-notebook computers. SoDIMM SoDIMM (or SO-DIMM, Small Outline DIMM) is a type of computer memory integrated circuit. It is a smaller alternative to a DIMM with roughly half the size of regular DIMMs. SoDIMMs are commonly utilized in laptops, small footprint PCs, high-end upgradeable office printers and networking hardware like routers. SoDIMMs are available in 100-pin SDRAM, 144-pin SDRAM, 200-pin DDR, 200-pin DDR2, 204-pin DDR3, and 260-pin DDR4 modules. A+ 220-1101 Study Guide Success 118 You may recognize the different types of SoDIMMs via the distinctive notches on them. The 100-pin module has two notches, 144-pin has a single notch near the center, 200-pin has a single notch nearer to one side, 204-pin has a single notch closer to the center than on 200-pin, and 260-pin has a single notch after pin 144. MicroDIMM MicroDIMM (or Micro-DIMM, Micro Dual In-Line Memory Module) is a type of computer memory integrated circuit. It is smaller than a SoDIMM (Small Outline DIMM) and primarily used in sub-notebook computers (or kneetop, ultraportable). MicroDIMMs are available in 144-pin SDRAM, 172-pin DDR, 214-pin DDR2, and 214-pin DDR3. MicroDIMM memory module requires 35% less space than the SoDIMM at same memory density. This is achieved by using a slim mezzanine connector which is directly attached on the DIMM. With the MicroDIMM, the small sized notebooks like sub-notebooks can be supported, which are expected to penetrate the market in the next years due to the mobility trend. A+ 220-1101 Study Guide Success 119 Question 49 What is INCORRECT about the parity and non-parity RAM? A. Parity RAM includes one more bit for storing error detection information. B. Non-parity RAM has no error detection capability. C. Parity RAM has higher memory access performance when compared to non-parity RAM manufactured with the same technology. D. Parity RAM has higher storage capacity per chip when compared to non-parity RAM manufactured with the same technology. Answer: C Explanation Parity is a basic method of checking data for errors during a transmission or on a data storage mechanism. Parity works by setting a parity bit to an even or odd number. If the binary stream contains eight 0's or 1's, for example, we know that this is an even number; however, if the parity bit indicates that this number should be an odd number we would be able to easily determine that the data is corrupt. Parity RAM is the RAM that stores a parity bit for error detection purposes. Whereas, non-parity RAM does not include a parity bit as RAM does. Parity RAM requires one additional bit to be stored with each byte of information for error detection, thus decreasing the access performance and the storage capacity per chip when compared to non-parity RAM manufactured with the same technology. A+ 220-1101 Study Guide Success 120 Logic parity RAM is non-parity RAM and has no error detection capability. It is used in the computers that require parity RAM. Logic parity RAM recalculates the parity bit each time a byte is read from the memory, but never stores the parity bit when the memory is written to. A+ 220-1101 Study Guide Success 121 Question 50 Which of the following are TRUE about heat sinks? (Select ALL THAT APPLY) A. Heat sinks are used to increase the temperature of hot devices. B. There are two types of heat sinks available, active and passive heat sinks. C. All modern CPUs require a fan instead of a heat sink. D. Heat sinks are typically made of plastic materials and often have fins. E. Thermal paste is used to ensure placing the heat sink directly onto the CPU without air gaps. Answer: BE Explanation Heat Sink A Heat Sink is a component designed to absorb and dissipate heat from another hot device, like a processor, using thermal contact (in either direct or radiant contact). The heat sinks are needed since heat has become a big issue with computer processors and other advanced peripherals due to the increase of performance. All modern CPUs require a heat sink and/or a fan. There are two types of heat sinks available, active and passive. A heat sink without a fan is called a passive heat sink; whereas a heat sink with a fan is called an active heat sink. Heat sinks are generally made of a good thermal conductor such as copper or aluminum alloy and often have fins. Thermal Paste A+ 220-1101 Study Guide Success 122 Thermal Paste is also referred to thermal compound, heat sink jelly, heat sink compound, thermal gunk or silicon compound. It is a sticky paste that allows for the heat sink to be placed directly onto the CPU. It is used to prevent air gaps (causing poor heat conductivity) from forming between the CPU and heat sink. There are different types of thermal pastes as follows: (1) Silicone-base thermal pastes Since Silicone grease is stable at high temperatures, it is often used as a medium, a heat conductor in itself. (2) Ceramic-based thermal pastes Ceramic thermal pastes are usually composed of the ceramic powder suspended in other thermally conductive ingredients. It has a better thermal conductivity than Silicone-based thermal compounds. (3) Metal-based thermal pastes Most metal-based thermal pastes contain solid metal particles (usually silver) suspended in other thermally conductive ingredients. Although it is more expensive, it has a better thermal conductivity than other thermal compounds. Also, it is more electrically conductive, which can cause problems if it contacts the electrical connections of an integrated circuit. (4) Carbon-based thermal pastes There are some experiments being done with carbon-based greases, using diamond powder. (5) Liquid metal-based thermal pastes Some thermal pastes are made of liquid metal alloys of gallium. However, they are rare and expensive. A+ 220-1101 Study Guide Success 123 Technical Support Although we always strive for perfection, but some mistakes do occur inevitably. Please email us your questions and/or comments concerning our exam questions and explanations. We appreciate the feedback from you. You can contact us via email: 24x7@supervoucher.com