Preview only show first 10 pages with watermark. For full document please download

Answers To Memory Tables

   EMBED


Share

Transcript

APPENDIX C Answers to Memory Tables Chapter 2 Table 2-1 Major CMOS/BIOS/UEFI Settings Memory Table Option Settings Notes Boot Sequence Hard drive, optical (CD/ To boot from bootable OS or diagnostic CDs DVD, Blu-ray), USB, network or DVDs, place the CD or DVD (optical) drive ROM; order as wanted before the hard drive in the boot sequence. To boot from a bootable USB device, place the USB device before the hard drive in the boot sequence. You can enable or disable additional boot devices on some systems. Memory Configuration By SPD or Auto (default); manual settings (Frequency, CAS Latency [CL], Fast R-2-R turnaround, and so on) also available Provides stable operation using the settings stored in memory by the vendor. CPU Clock and Frequency Automatically detected on most recent systems Faster or higher settings overclock the system but could cause instability (see Chapter 8, “Ports and Interfaces,” for details). Some systems default to low values when the system doesn’t start properly. Hardware Monitor Enable display for all fans Also known as PC Health on some systems; plugged in to the motherboard can be monitored from within the OS with vendor-supplied or third-party utilities. Use manual settings (frequency, CAS latency, so son on) for overclocking (running memory at faster than normal speeds) or to enable memory of different speeds to be used safely by selecting slower settings. Onboard Enable or disable Audio, Modem, or Network Enable when you don’t use add-on cards for any of these functions; disable each setting before installing a replacement card. Some systems include two network adapters. USB Legacy Enables USB keyboard to work outside the OS. Enable when USB keyboard is used 4 CompTIA A+ 220-901 and 220-902 Cert Guide Option Settings Notes Serial Ports Disable unused ports; use Also known as COM ports. Most systems no default settings for port you use longer have serial ports. Parallel Port Disable unused port; use EPP/ Compatible with almost any parallel printer ECP mode with default IRQ/ or device; be sure to use an IEEE-1284compatible printer cable. DMA when parallel port or device is connected USB Function Enable When motherboard supports USB 2.0 (Hi-Speed USB) ports, be sure to enable USB 2.0 function and load USB 2.0 drivers in the OS. USB 3.0 Function Enable USB 3.0 ports also support USB 3.1, 2.0, and USB 1.1 devices. Disable when USB 3.0 drivers are not available for operating system. Keyboard NumLock, auto-repeat rate/ delay Leave at defaults (NumLock On) unless keyboard has problems. Plug-and-Play OS Enable for all except some Linux distributions, Windows NT, MS-DOS When enabled, Windows configures devices. Primary VGA BIOS Varies Select the primary graphics card type (PCIe or onboard). Shadowing Varies Enable shadowing for video BIOS; leave other shadowing disabled. Quiet Boot Varies Disable to display system configuration information at startup. Boot-Time Diagnostic Screen Varies Enable to display system configuration information at startup. Virtualization Varies Enable to run hardware-based virtualization programs such as Hyper-V or Parallels so that you can run multiple operating systems, each in its own window. Power Management (Menu) Enable unless you have problems with devices Enable CPU fan settings to receive warnings of CPU fan failure. S1 or S3 standby Enable S3 Use S1 (which saves minimal power) only when you use devices that do not properly wake up from S3 standby. AC Pwr Loss Restart Enable restart or Full on Prevents the system from staying down when a power failure takes place. Appendix C: Answers to Memory Tables 5 Option Settings Notes Wake on LAN (WOL) Enable when you use WOLcompatible network card or modem WOL-compatible cards use a small cable between the card and the motherboard. Some integrated network ports also support WOL. User/PowerOn Password Blocks system from starting when password is not known Enable when physical security settings are needed, but be sure to record the password in a secure place. Setup Password Blocks access to setup when password is not known Both passwords can be cleared on both systems when CMOS RAM is cleared. Write-Protect Boot Sector Enable for normal use, but disable when installing drives or using a multiboot system. Helps prevent accidental formatting but might not stop third-party disk prep software from working. Varies Enable Boot Virus Detection (Antivirus Boot Sector) Stops true infections but allows multiboot configuration. SATA Drives Varies Auto-detects drive type and settings at startup time. Select CD/DVD for CD/DVD/Blu-ray drive; select None when drive is not present or to disable an installed drive. SATA Drive configuration IDE, AHCI, RAID IDE setting emulates now-obsolete PATA drives. To take advantage of hot-swapping and Native Command Queuing (NCQ) to improve performance, select AHCI. Use RAID when the drive will be used as part of a RAID array. Chapter 3 Table 3-1 ATX Motherboard Family Comparison Motherboard Type Maximum Width Maximum Depth Maximum Number of Expansion Slots Typical Uses ATX 12 in. 9.6 in. Seven Full tower Mini-ATX 11.2 in. 8.2 in. Seven Full tower microATX 9.6 in. 9.6 in. Four Mini tower 6 CompTIA A+ 220-901 and 220-902 Cert Guide Table 3-2 Technical Information About Expansion Slot Types Slot Type Performance Suggested Uses PCI 32-bit, 33MHz 133MBps Video, network, mass storage (SATA/RAID), sound card PCI 32-bit, 66MHz 266MBps Network, mass storage (workstation and server) PCI 64-bit, 33MHz 266MBps Network, mass storage (workstation and server) PCI 64-bit, 66MHz 533MBps Network, mass storage (workstation and server) PCI-X 66MHz 533MBps Network, mass storage (workstation and server) PCI-X 133MHz 1,066MBps Network, mass storage (workstation and server) PCI-X 2.0 266MHz 2,133MBps Network, mass storage (workstation and server) PCI-X 2.0 533MHz 4,266MBps Network, mass storage (workstation and server) PCIe x1 v1 500MBps* Network, I/O PCIe x4 v1 2,000MBps* Network PCIe x8 v1 4,000MBps* Multi-GPU video secondary card PCIe x16 v1 8,000MBps* Video primary and secondary cards PCIe x1 v2 1,000MBps* Network, I/O PCIe x4 v2 4,000MBps* Network PCIe x8 v2 8,000MBps* Video secondary card PCIe x16 v2 16,000MBps* Video primary and secondary cards PCIe x1 v3 2,000MBps* Network, I/O PCIe x4 v3 8,000MBps* Network PCIe x8 v3 16,000MBps* Video secondary card PCIe x16 v3 32,000MBps* Video primary and secondary cards *Bidirectional data rates (full duplex simultaneous send/receive); unidirectional data rates are one-half of values listed. All versions of PCIe use the same connectors. GPU = graphics processing unit Appendix C: Answers to Memory Tables 7 Chapter 4 Table 4-1 RAM Comparisons RAM Type Pins Pins Common Type and Speed (DIMM) (SODIMM) Defining Characteristic DDR SDRAM 184 2001 PC3200 = 400MHz/3200Mbps Double the transfers per clock cycle compared to regular SDRAM. DDR2 SDRAM 2402 2001 DDR2-800 (PC2-6400) = 800MHz/6400Mbps External data bus speed (I/O bus clock) is 2x faster than DDR SDRAM. DDR3 SDRAM 2402 204 DDR3-1333 (PC3-10600) = 1333MHz/10,600Mbps External data bus speed (I/O bus clock) is 2x faster than DDR2 SDRAM (4x faster than DDR SDRAM). DDR4 SDRAM* 288 260 DDR4-2400 (PC4-19200) = 2400MHz/19200Mbps External data bus speed (I/O bus clock) is 2x faster than DDR3 SDRAM (8x faster than DDR SDRAM). 260 DDR3 or DDR4 Designed for use with Intel Skylake (6th generation Core i-series CPU); memory controller on motherboard/processor must support both DDR3 and DDR4 memory UniDIMM3 — 1 DDR SODIMM keying is closer to the middle of the motherboard than with SDRAM SODIMM 2 The keying on DDR3 is offset to one side compared to DDR2 3 The keying on UniDIMM is different than DDR4 SODIMM * Not an objective on the CompTIA A+ Certification 900-series exams; included for information purposes only 8 CompTIA A+ 220-901 and 220-902 Cert Guide Chapter 6 Table 6-3 Comparisons of Common RAID Levels RAID Minimum Data Protection Total Capacity of Array Level Number Features of Drives Required Major Benefit over Single Drive Notes 0 2 None. Improved read/ Also called 2 × capacity of write performance striping either drive (if same size) OR 2 × capacity of smaller drive. 1 2 Changes to contents of one drive immediately performed on other drive. Capacity of one drive (if same size); OR capacity of smaller drive. Automatic backup; Also called faster read mirroring performance 5 3 Parity information is saved across all drives. (x-1) Capacity of smallest drive (x equals the number of drives in the array). Full data redundancy in all drives; hot swap of damaged drive supported in most implementations 10 4 Changes on one two-drive array are immediately performed on other two-drive array. Capacity of smallest drive × number of drives / 2. Also called Improved read/ write performance striped and mirrored and automatic backup Chapter 7 Table 7-1 CPU Manufacturers, Sockets, and Code Names Quick Reference CPU Socket Manufacturer Compatible Processor Code Name(s) Intel LGA 775 Prescott, Presler, Conroe, Wolfdale, Kentsfield, Yorkfield Intel LGA 1366 Bloomfield, Gulftown Intel LGA 1156 Clarkdale, Lynnfield Appendix C: Answers to Memory Tables 9 CPU Socket Manufacturer Compatible Processor Code Name(s) Intel LGA 1155 Sandy Bridge, Ivy Bridge Intel LGA 1150 Haswell, Broadwell Intel LGA 2011 Sandy Bridge E, Ivy Bridge E Intel LGA 2011-v3 Haswell E AMD Socket AM3 AMD Socket AM3+ Vishera, Zembezi AMD Socket FM1 Llano AMD Socket FM2 Trinity, Richland AMD Socket FM2+ Kaveri Thuban, Zosma, Deneb, Propus, Heka, Rana, Callisto, Regor, Sargas Chapter 8 Table 8-1 USB Standards Overview Version Marketing Name Speeds Maximum Notes Supported Cable Length** 1.1 USB 12Mbps 3 meters 1.5Mbps 2.0 HighSpeed USB SuperSpeed USB 3.1 Gen 1 (also known as USB 3.0) 3.1 Gen 2 480Mbps 5 meters Also supports USB 1.1 devices and speeds 5Gbps * Also supports USB 1.1 and 2.0 devices and speeds * Also supports USB 1.1, 2.0, 3.0/3.1 Gen 1 devices and speeds SuperSpeed+ USB 10Gbps * 3 meters is the recommended length, but no maximum cable length has been established for these versions of USB ** To exceed recommended or maximum cable lengths, connect the cable to a USB hub or use an Active USB extension cable 10 CompTIA A+ 220-901 and 220-902 Cert Guide Table 8-3 SATA and eSATA Drive Interface Overview Interface Location Interface Also Known As Speeds Drive Types Supported eSATA Hard disk drives, SSD External 1.5Gbps 3Gbps 6Gbps SATA1 Internal 1.5Gbps SATA 1.5Gbps SATA Revision 1.0 SATA2 Internal 3.0Gbps SATA 3Gbps SATA Revision 2.0 SATA3 Internal 6.0Gbps SATA 6Gbps Revision 3.0 Hard disk drives, optical (DVD, BD media) drives, RAID arrays, SSD Can be converted to eSATA via header cable Hard disk drives, optical (DVD, BD media) drives, RAID arrays, SSD Can be converted to eSATA via header cable Hard disk drives, RAID arrays, SSD Backward compatible with SATA1, SATA2 Can be converted to eSATA via header cable Chapter 9 Table 9-1 Graphic/CAD/CAM Design Workstation Features Features Benefits Recommendations and Example Products Multicore Fast rendering of 4.0GHz or faster, six cores or more, processor 3D or 2D graphics large cache (8MB or more total cache), 64-bit support Intel Core i7 Extreme Edition, Core i7 “Haswell-E” or “Skylake” AMD FX-9000 series Notes Fastest multicore CPUs available from Intel or AMD. Appendix C: Answers to Memory Tables 11 Features Benefits Recommendations and Example Products Notes High-end Faster rendering of video 3D or 2D graphics on applications that support GPU acceleration (AutoCAD, Photoshop CC, and others) PCIe CAD/CAM or 3D cards with 2GB or more RAM optimized for OpenGL 4.x, DirectX 11 or 12, support for two or more displays Fastest GPUs available from AMD or NVIDIA. More GPU RAM AMD FirePro W-series (CAD, CAM, provides faster performance when CGI, Photoshop) rendering large 3D AMD Radeon R9 (Photoshop) objects. NVIDIA Quadro M series (CAD, FirePro and Quadro CAM, CGI) cards use drivers optimized for CAD/ NVIDIA GeForce GTX 980 Ti, CAM/CGI. TITAN Z, TITAN X (Photoshop) NVIDIA Tegra (CAD, CAM, CGI, Photoshop) Maximum Reduces swapping RAM to disk during editing or rendering Table 9-2 16GB or more DDR3 or DDR4 Use matched memory modules running in multi-channel configurations System should be running 64-bit version of the operating system Audio/Video Editing Workstation Features Features Benefits Recommendations Multicore processor Fast rendering of 3D 4.0GHz or faster, six cores or Fastest multicore or 2D graphics more, large cache (8MB or more CPUs available from total cache), 64-bit support Intel or AMD. Intel Core i7 Extreme Edition, Core i7 “Haswell-E” AMD FX-9000 series Maximum RAM Reduces swapping to 16GB or more DDR3 or DDR4 disk during editing or Use matched memory modules rendering running in multi-channel configurations Notes 12 CompTIA A+ 220-901 and 220-902 Cert Guide Features Benefits Recommendations Notes Specialized audio card Higher sampling rates and higher signal-to-noise ratios for better audio quality 24-bit, 192kHz or better audio performance; upgradable Op-amp sockets; PCIe interface PCIe interface is preferred because it is faster than PCI. Sound Blaster ZxR Upgradable op-amp sockets allow customization of audio characteristics. ASUS Essence STX II, Xonar H6, Essence ST, Essence STX Specialized video card Faster performance AMD FirePro W-series, AMD when rendering video Radeon R9 Fastest GPUs on market. HDMI, DisplayPort, NVIDIA Quadro M series, NVIDIA GeForce GTX 980 Ti, or DVI interfaces. TITAN Z, TITAN X, NVIDIA Tegra Large, fast hard drive Faster writes during saves, faster retrieval of source material during media editing and creation Maximum performance: SATA Express or M.2 SSD drive (see Figure 9-1) Good performance: SSD SATA 6Gbps large enough for Windows and applications (128-512GB) and separate SATA 6Gbps or USB 3.0 data drive or SATA hybrid drive 4TB or larger SATA 6Gbps or USB 3.0 drives from Seagate, WD, Toshiba, HGTS Dual displays Editing software menus and playback can be on separate screens Can render and edit while using secondary display for other applications 27-inch or larger from many vendors HDMI or DisplayPort interfaces recommended; DVI acceptable; avoid VGA-only displays. Appendix C: Answers to Memory Tables 13 Table 9-4 Gaming PC Features Features Benefits Recommendations Powerful processor High performance for maximum frame rates, 3D rendering, and audio performance on games where CPU performance is most significant factor 4.0GHz or faster, six cores or more, large cache (8MB or more total cache), 64-bit support High-end video/ High performance Specialized GPU for maximum frame rates in 3D rendering where GPU performance is most significant factor Notes Although multicore CPUs are also the fastest CPUs available from Intel and AMD, many Intel Core i7 Extreme Edition, games are not Core i7 “Haswell-E” yet optimized for multicore processors. AMD FX-9000 series Fastest available PCIe 3D cards with 2GB GPUs available from or more RAM optimized AMD and NVIDIA. for OpenGL 4.x, DirectX 11, support for two or more displays with SLI (NVIDIA) or CrossFire (AMD) multi-GPU support AMD Radeon R9 NVIDIA GeForce GTX 980 Ti, TITAN Z, TITAN X Better sound card 5.1 or 7.1 surround audio for realistic, high-performance 3D audio rendering. 24-bit, 96kHz or better audio performance; PCIe interface; hardware acceleration Sound Blaster X-Fi Extreme Gamer Sound Blaster Recon3D series Sound Blaster Fatal1ty series ASUS Xonar DG Azuntech X-Fi Forte PCIe sound cards provide faster performance than PCI sound cards. Connect to 5.1 or 7.1 surround audio speakers or headsets for 3D audio effects. 14 CompTIA A+ 220-901 and 220-902 Cert Guide Features Benefits Recommendations Notes High-end cooling Overclocking is common to reach highest system speeds; overclocked systems can overheat if OEM cooling is not supplemented or replaced by more powerful cooling solutions. Heat-pipe-based CPU cooler for fan or liquid cooling; heat sinks on RAM; dual-slot video card with high-performance cooler; all optional fan bays on chassis equipped with fans. Be sure to verify compatibility with CPU, clearance around CPU socket, and power requirements for a particular system. See www.FrostyTech.com for reviews of numerous heat-pipe CPU cooling products. See www.frozencpu.com for numerous cooling products for CPUs (liquid and heat-pipe), GPUs, and RAM modules. Table 9-8 Home Server PC Features Features Benefits Implementation Media streaming Enables media playback Windows: Configured through Network and Sharing Center on connected systems even if normal file Use third-party apps on MacOS sharing is not enabled X or Linux File sharing Enables file read or read/write access across the network Windows: Configured through Share with or Sharing tab on folders; must enable File and Printer sharing through Network and Sharing Center Mac OS X: Configured through Sharing pane in System Preferences using SMB Linux: Install Samba and enable local network sharing with your distribution’s file manager Notes With Windows 7/8/8.1, use HomeGroup for easiest configuration if all computers or network have Windows 7 or newer. HomeGroup can coexist with normal file sharing. Appendix C: Answers to Memory Tables 15 Features Benefits Implementation Notes Print sharing Enables printing from any computer on the network Windows: Configured through Sharing tab on printer properties sheet; must enable File and Printer sharing through Network and Sharing Center; install Samba for sharing with Mac OS X and Linux With Windows 7/8/8.1, use HomeGroup for easiest configuration when all computers or network have Windows 7 or newer. Mac OS X and Linux: Use Bonjour protocol; use Samba to access Windows printers Linux: Make sure shared printers are published to the system Integrated into many recent systems or available as low-cost add-on card for PCIe x1 or ExpressCard slots; systems with USB 3.0 and USB 3.1 ports can use adapters to connect to Gigabit Ethernet Router or switch in network must support Gigabit Ethernet. Gigabit NIC Data transfer between computers or computer and router up to 10x faster than with Fast Ethernet NIC RAID Array Use two or four drives with same Install latest Faster boot times capacity and configure using storage drivers for (RAID 0), protection BIOS RAID Manager motherboard chipset. against failure of one drive (RAID 1), or both (RAID 10) Table 9-10 Power Levels by Connector Type Connector +5V +12V +3.3V Notes Molex Y Y N Used today primarily for case fans that do not connect to the motherboard or can be adapted to SATA drives Berg Y Y N Used for floppy drives; some add-on cards use this connector for power SATA Y Y Opt Use Molex to SATA power connector if power supply lacks adequate SATA connectors PCIe six-pin N Y N Mid-range PCIe video cards PCIe eightpin N Y N High-performance PCIe video cards ATX12V N Y N Most recent and current motherboards except those using EPS12V EPS12V N Y N Split into two ATX12V-compatible sections 16 CompTIA A+ 220-901 and 220-902 Cert Guide Chapter 10 The major components of a laser printer include: ■ Imaging drum—Applies the page image to the transfer belt or roller; frequently combined with the toner supply in a toner cartridge ■ Fuser assembly—Fuses the page image to the paper ■ Transfer belt or transfer roller—Transfers the page image from the drum to the page ■ Pickup rollers—Picks up paper ■ Paper separation pad (separate pad)—Enables pickup rollers to pick up only one sheet of paper at a time ■ Duplexing assembly (optional)—An assembly that switches paper from the front to the back side so that the printer can print on both sides of the paper Chapter 11 Table 11-6 Common Protocols and Their Ports Port Number(s) Protocol Port Type 21 FTP TCP, UDP 22 SSH TCP, UDP 23 Telnet TCP, UDP 25 SMTP TCP, UDP 53 DNS TCP, UDP 80 HTTP TCP, UDP 110 POP3 TCP, UDP 143 IMAP TCP 443 HTTPS TCP, UDP 3389 RDP TCP, UDP 137–139 NetBIOS/NetBT TCP, UDP 445 SMB/CIFS TCP 427 SLP TCP, UDP 548 AFP TCP Appendix C: Answers to Memory Tables 17 Table 11-7 Wireless Ethernet Standards Interoperable With Wireless Frequency Maximum MIMO Estimated Channel Width/ Speed Support Range Ethernet Number of Indoors/ Type Outdoors Channels 802.11a 802.11b 802.11g 802.11n 5GHz 2.4GHz 2.4GHz 2.4GHz 802.11n 5GHz (optional) 802.11ac 5GHz 54Mbps 35m 20MHz 120m 12* 32m 20MHz 140m 3** 32m 20MHz 140m 3** Yes^ 72Mbps per stream (20MHz channel) 70m 20MHz 802.11b, 802.11g 250m 3** (802.11a on networks also supporting 5GHz frequency) 150Mbps Yes^ per stream (40MHz channel) 70m 20MHz 250m 40MHz 802.11a (20MHz wide channels only) 433Mbps Yes^ per stream (80MHz channel) 70m 20MHz 250m 40MHz 11Mbps 54Mbps No No No Requires dual-mode (802.11a/b or 802.11a/g) hardware; 802.11n networks supporting 5GHz frequency 802.11g 802.11b, 802.11n 12* 80MHz 802.11a, 802.11n (5GHz). 802.11ac routers also support previous standards. ^ Up to four streams supported. Most devices have up to three antennas but can receive/transmit only two streams at a time. * Non-overlapping channels; exact number varies by country ** Non-overlapping channels Chapter 12 Table 12-1 SODIMM Features Memory Type Number of Pins Notch Location Notes DDR 200 After pin 20 67.6mm long – 30mm high Notch closer to short end than with DDR2 18 CompTIA A+ 220-901 and 220-902 Cert Guide Memory Type Number of Pins Notch Location Notes DDR2 200 After pin 20 Notch closer to long end than with DDR DDR3 204 After pin 36 Same dimensions as DDR, DDR2 DDR4 260 After pin 72 69.7mm long 30mm high Chapter 13 Table 13-1 Common System Errors and Their Beep Codes Problem Phoenix BIOS Award BIOS Memory Beep sequences: Beeping (other than 2 long, 1 short) 1-3-4-1 AMI BIOS IBM BIOS 1 or 3 or 11 beeps (None) 1 long, 3 short beeps 1-3-4-3 1-4-1-1 Video (None) 2 long, 1 short beep 8 beeps 1 long, 8 short beeps Processor or Beep sequence: motherboard 1-2-2-3 High-frequency beeps 5 beeps or 9 beeps 1 long, 3 short beeps, or 1 beep 1 long, 1 short beep Repeating high-low beeps Table 13-2 Using a Multimeter Test to Perform Multimeter Probe Positions Setting Procedure AC voltage (wall outlet) AC Red to hot, black to ground. Read voltage from meter; should be near 115V in North America. DC voltage (power DC supply outputs to motherboard, drives, batteries) Red to hot, black to ground. Read voltage from meter; compare to default values. Appendix C: Answers to Memory Tables 19 Test to Perform Multimeter Probe Positions Setting Continuity (cables, fuses) CONT Resistance (Ohms) Ohms Procedure Red to lead at one end of cable; No CONT signal black to corresponding lead at indicates bad cable or bad other end. fuse. For a straight-through cable, check the same pin at each end. For other types of cables, consult a cable pinout to select the correct leads. Double-check leads and retest to be sure. Connect one lead to each end of resistor. Check reading; compare to rating for resistor. A fuse should have no resistance. Amperage (Ammeter) Ammeter Check reading; compare Red probe to positive lead of to rating for component circuit (power disconnected!); tested. black lead to negative lead running through component to be tested. Chapter 14 Table 14-2 Feature Comparisons for Windows Vista, 7, 8, and 8.1 Windows Version Feature Category/Feature 8.1 8 7 Vista Windows Aero No No Yes Yes Sidebar No No No Yes Gadgets No No Yes No Start Menu No No Yes Yes Start Screen Yes Yes No No Pinning Apps and files Yes Yes Yes Yes Charms Yes Yes No No Multi-monitor task bars Yes Yes No No Modern UI (Windows Store) apps Yes Yes No No Desktop Security 20 CompTIA A+ 220-901 and 220-902 Cert Guide Windows Version Feature Category/Feature 8.1 8 7 Vista Live sign-in (Microsoft account) Yes Yes No No Local account Yes Yes Yes Yes User Account Control Yes Yes Yes Yes Defender antivirus Yes Yes Yes Yes BitLocker full disk encryption Yes Yes Yes Yes Windows Firewall Yes Yes Yes Yes Action Center Yes Yes Yes No Security Center No No No Yes Control Panel Yes Yes Yes Yes Administrative Tools Yes Yes Yes Yes Settings Yes Yes No No PowerShell Yes Yes Yes Optional download Event Viewer Yes Yes Yes Yes Image Backup Yes Yes Yes Yes File Backup Yes Yes Yes Yes Shadow Copy No No Yes Yes System Restore Yes Yes Yes Yes Refresh and Reset Yes Yes No No OneDrive (formerly SkyDrive) Integrated Optional download Optional download Optional download ReadyBoost flash memory disk caching Yes Yes Yes Yes Compatibility Mode Yes Yes Yes Yes Virtual XP Mode No No Optional download No Side-by-Side Apps Yes Yes No No Easy Transfer No Yes Yes Yes Windows (App) Store Yes Yes No No Management System Recovery Software and App Support Appendix C: Answers to Memory Tables 21 Chapter 15 Table 15-1 Microsoft Windows Command-Line Tools Command Use TASKKILL Stops specified task(s) on a local or remote computer BOOTREC Repairs boot configuration (must be run from command line in repair mode) SHUTDOWN Shuts down or restarts a computer TASKLIST Lists current running tasks on a local or remote computer MD (MKDIR) Makes a new folder (subdirectory) CD (CHDIR) Changes your current location to the specified folder (subdirectory) RD (RMDIR) Removes an empty folder DEL* Deletes one or more files on current or specified folder or drive FORMAT Creates or recreates the specified file system on recordable or rewriteable storage (magnetic, flash, or optical). In the process, the contents of the drive are overwritten. COPY Copies one or more files to another folder or drive XCOPY Copies one or more files and folders to another folder or drive ROBOCOPY Highly configurable file/folder copy and move app. Can be configured via various optional GUIs DISKPART** Creates, removes, and manages disk partition SFC** Scans system files and replaces damaged or missing files CHKDSK** Scans specified drive for errors and repairs them GPUPDATE Refreshes group policy on local or Active Directory managed systems GPRESULT Displays the Resultant Set of Policy for the specified computer and user DIR Lists files on current or specified folder or drive EXIT Closes command prompt window HELP Displays help for command line utilities EXPAND Expands a specified file in a specified archive to full size or displays contents of archive Command/? Displays help for the specified command * ERASE works in the same way and with the same syntax as DEL ** This command must be run in elevated mode (administrative mode or run as administrator). 22 CompTIA A+ 220-901 and 220-902 Cert Guide Microsoft offers the following utilities to help with these upgrade challenges: ■ Windows Upgrade Advisor—Determines whether a computer can run Windows 7. The Windows 8/8.1 versions are known as Windows 8 Upgrade Assistant and Windows 8.1 Upgrade Assistant. To learn more, see the “Windows Upgrade Paths.” ■ Windows Easy Transfer—Copies files, photos, music, e-mail, and settings (collectively known as the user state) to a Windows 8.1, 8, 7 or Windows Vista computer from a Windows Vista, Windows 7, or Windows 8 computer. ■ User State Migration Tool (USMT)—A command-line tool used to migrate user files and settings for one or more computers. The program can be downloaded from www.microsoft.com/downloads. Table 15-7 Internet Options Tab Function General Set home page; tabs settings; delete browsing history, cookies, temporary files, and saved passwords; change appearance, and configure accessibility settings Security Configure security zones Privacy Select privacy settings for the current zone; location settings; pop-up blocker; InPrivate browsing settings Content Family Safety; SSL certificate management; AutoComplete; feeds Connections VPN, dial-up, LAN connections, and proxy server settings Programs Select default web browser, manage add-ons, select default HTML editor and default apps for email and other Internet services Advanced Enable/disable accelerated graphics; configure Accessibility settings, Browsing settings, HTTP settings, International settings, Multimedia settings, Security settings; reset Internet Explorer to default settings Chapter 17 Table 17-2 Electrical Conditions and Protective Measures Type of Electrical Condition Description Protective Measure Power surge Overvoltage event lasting less than 50ms. Up to 6000V and 3000A. Surge suppressor Sag Momentary voltage drop from 10–90 percent of normal voltage for a few seconds to one minute. UPS Appendix C: Answers to Memory Tables 23 Type of Electrical Condition Description Protective Measure Brownout Sustained voltage drop of up to half normal voltage. Can last for minutes to hours. UPS Blackout Total loss of power for an extended period of time UPS or generator Chapter 21 Table 21-2 Memory Table Chapter 21 Term Definition Spyware Software that spies on system activities and transmits details of web searches or other activities to remote computers. Trojan horse Malware programs disguised as popular videos or website links that trap keystrokes or transmit sensitive information. Phishing Bogus websites or sending fraudulent e-mails that trick users into providing personal, bank, or credit card information. Firewall (software firewall) A program that examines data packets on a network to determine whether to forward them to their destination or block them. Administrator A user who can perform any and all tasks. Modify To change file or folder contents. Login time restrictions Restrictions that determine when an account can be used. Screen lock A pattern that is drawn on the display, a PIN (passcode), or a password. Chapter 22 Table 22-1 Using the Windows Advanced Boot Options and Startup Settings Menus Problem Startup Option to Select Notes Windows Vista/7 won’t start after you install new hardware or software. Last Known Good Configuration Resets Windows to its last-known working configuration; you need to reinstall hardware or software installed after that time. 24 CompTIA A+ 220-901 and 220-902 Cert Guide Problem Startup Option to Select Notes Windows won’t start after you upgrade a device driver. Safe Mode After starting the computer in this mode, open the Device Manager, select the device, and use the Rollback feature to restore the previously used device driver. Restart your system. Windows won’t start after Enable lowyou install a different video resolution video card or monitor. Most video cards should be supported when your system is running in VGA Mode. If a video error occurs, use this option, and then the Display Properties window to select a working video mode before you restart. Windows can’t start normally, but you need access to the Internet to research the problem or download updates. Safe Mode with Networking You can use Windows Update and the Internet, but some devices won’t work in this mode. This mode also uses low resolution but retains the color settings normally used. Windows doesn’t finish starting normally, and you want to know what device driver or process is preventing it from working. Enable Boot Logging This option starts the computer with all its normal drivers and settings and also creates a file called ntbtlog.txt in the default Windows folder (usually C:\ Windows). Restart the computer in Safe Mode, and open this file with Notepad or WordPad to determine the last driver file that loaded. You can update the driver or remove the hardware device using that driver to restore your system to working condition. Windows is loading programs you don’t need during its startup process. Boot computer in Normal Mode (or Safe Mode if the computer won’t start in Normal Mode); click Start, Run or Start Search; and then type msconfig Use this program to disable one or more startup programs, and then restart your computer. You can also use it to restore damaged files or to start System Restore to reset your computer to an earlier condition. Windows prevents you from running an unsigned device driver, so a device doesn’t work Disable driver signature enforcement Obtain signed device driver from vendor as soon as possible. Windows reboots as soon as a STOP (BSOD) error occurs Disable automatic If the STOP (BSOD) error recurs, the system restart after will not restart automatically, enabling you to failure see the error message and start the diagnostic process. Appendix C: Answers to Memory Tables 25 Problem Startup Option to Select Notes Windows prevents a driver or program from running because it has incorrectly identified it as malware Disable early launch antimalware protection As soon as you restart the computer, be sure to update anti-malware apps and scan the computer for threats. Table 22-4 Common Symptoms of Malware Infection Symptom Possible Causes Pop-ups If your browser is configured to block these, but they are showing up anyway, your system might be infected with malware. If many of these are displayed on-screen rapidly and they keep showing up as you close them, your system is almost certainly infected and needs to be scanned immediately. Browser redirection This is the term for when the home page for your browser is changed without your permission. Some “free” apps offer to change your browser home page during installation, but you can opt-in or opt-out of the change. If an app changes your browser home page without notifying you, it could be malware. Scan the system. Security alerts Windows Action Center or your OS could display these. Alleged alerts that pop up without any notification in Action Center are attempts to infect your system by tricking you into clicking a phishing link in the pop-up. Scan the system. Slow performance If you’re not running a lot of apps or resource-intensive processes, this issue could be caused by a malware infection. Use Task Manager or the equivalent to see which programs are running. Unfamiliar programs could be malware. Scan the system. Internet connectivity This problem that does not affect all computers and devices on the issues network could be caused by malware. Run troubleshooters to repair the problem. If it continues to occur, scan the system. PC/OS Lockups This can be caused by many problems. If you have already checked hardware and OS issues without finding a cause, scan the system. Application crashes This problem could be caused by malware, but first repair the app or reinstall it. If it continues to crash, update it. If it continues to crash, scan the system. OS updates failures If you can’t get this task to finish, make sure the computer has enough free disk space and that the antivirus or anti-malware app is not blocking updates. If the problem continues, scan the system. 26 CompTIA A+ 220-901 and 220-902 Cert Guide Symptom Possible Causes Rogue antivirus These programs look like legitimate antivirus programs, but actually are designed to infect your system or phish users for personal information. Follow the links at http://support.kaspersky.com/us/viruses/rogue for more information. Spam Unsolicited e-mail can carry malware through attachments or could contain purported links to e-commerce or e-banking websites that are actually phishing sites. Renamed system files Malware infections might make a change to certain files that can help block it, such as msconfig, regedit, and taskmgr. Files disappearing Some malware infections change file attributes to hidden and might also create file shortcuts that are visible. File permission changes Some malware infections change this file setting to make the malware harder to remove or to prevent users from running anti-malware apps. Hijacked e-mail and This problem is almost certainly caused by a malware infection. Receivers responses from users of this type of message might reply to complain about inappropriate regarding e-mail content, links, or messages that seem out of character. Automated replies from unknown sent e-mail This problem can also trigger automated replies indicating that messages were being rejected. If a user who has previously been able to send messages to a recipient notices that the messages are being rejected (“bouncing”), there could be a malware infection at either end of the connection. Access denied If a user sees this message when trying to start anti-malware tools, it indicates that file permissions changes are blocking access to the tools. See https://tinyapps.org/blog/windows/200908160730_access_is_denied_ malware.html for a way to fix the problem. Invalid certificate (trusted root CA) Digital certificates are used by operating systems and browsers to determine the source of apps and drivers. Certificates that have been obtained fraudulently from a certification authority can be used to launch malware attacks. For an example that also discusses how PDF files can be used to launch malware attacks, see https://blog.malwarebytes.org/threatanalysis/2013/02/digital-certificates-and-malware-a-dangerous-mix/.