0% found this document useful (0 votes)
30 views66 pages

Coursera Course)

This document discusses data storage measurements and units. It explains: 1) There are two systems for naming data storage units - the decimal system uses prefixes like kilo, mega, giga, and the binary system uses prefixes like kibi, mebi, gibi. 2) It provides the precise definitions and conversions for common storage units like kilobyte, megabyte, gigabyte, and terabyte in both decimal and binary formats. 3) Larger units like petabyte, exabyte, and zettabyte are also defined along with examples of how much data each unit can store.

Uploaded by

kwakuapee
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views66 pages

Coursera Course)

This document discusses data storage measurements and units. It explains: 1) There are two systems for naming data storage units - the decimal system uses prefixes like kilo, mega, giga, and the binary system uses prefixes like kibi, mebi, gibi. 2) It provides the precise definitions and conversions for common storage units like kilobyte, megabyte, gigabyte, and terabyte in both decimal and binary formats. 3) Larger units like petabyte, exabyte, and zettabyte are also defined along with examples of how much data each unit can store.

Uploaded by

kwakuapee
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 66

Data Storage Measurements

In this reading, you will learn about the different names for measurements of
data storage capacities and file sizes. Data storage capacity increases in step
with the evolution of computer hardware technology. Larger storage capacities
allow for dynamic growth in file sizes. These advances make it possible for
companies like Netflix and Hulu to store thousands of feature-length films in
high video quality formats.
There are standardized sets of terms used to name the ever expanding sizes of
data storage and files. For example, the common terms used to describe file
sizes and hard drive storage capacity include: bytes, kilobytes, megabytes,
gigabytes, and terabytes. However, if you are a computer engineer, you might
use a different set of terms.
Data storage measurement nomenclature

 Decimal nomenclature: kilobyte, megabyte, gigabyte, terabyte,


petabyte, exabyte, zettabyte, yottabyte
The decimal naming system for computer storage uses the metric system of
prefixes from the International System of Units: kilo, mega, giga, tera, peta, exa,
zetta, and yotta. These prefixes may also be referred to as the decimal system of
prefixes. The metric/decimal nomenclature represent a base-10 approximation
of the actual amount of data storage bytes. The metric system prefixes were
selected to simplify the marketing of computer products.
 Binary nomenclature: kibibyte, mebibyte, gibibyte, tebibyte, pebibyte,
exbibyte, zebibyte, yobibyte
The binary naming system is a standard set by the International Organization
for Standardization (ISO) in partnership with the International Electrotechnical
Commission (IEC). The ISO 80000 and IEC 80000 guides to units of measurement
define the International System of Quantities (ISQ). The prefixes kibi-, mebi-,
gibi, -tebi-. pebi-, exbi-, zebi-, and yobi- were created by the IEC organization.
They are a blend of the first two letters of the metric prefix fused with the first
two letters of the word “binary” (example: megabyte + binary + byte=
mebibyte).
Binary measurements of computer data are more accurate than decimal system
measurements. While decimal nomenclature is commonly used to market
computers and computer parts to the general public, binary nomenclature is
often used in computer engineering for numerical accuracy.
Quantities of storage measurements
As data storage grows, the need for new terminology to describe the
exponentially larger byte quantities grows too. The current byte nomenclature,
mathematical representations, and storage capacities are as follows:
 One bit: Also called a binary digit, bits store an electric signal as 1. The
absence of an electric signal is stored as 0, which is also the default value
of a bit. One bit can store only one value, either 1 or 0. These two possible
values are the basis of the binary number system (base-2) that computers
use. All numbers in a base-2 system increase exponentially as powers of 2.
 One byte: One byte stores eight bits of ones and zeros that translate to a
symbol or basic computer instruction. Examples: 01101101 is the byte
that translates to the letter “m.” The byte 01111111 tells the computer to
delete the character to the right of the cursor.
 One kilobyte (1 KB):
o Kilobyte (KB) decimal format: 103 = 1,000 bytes
o Kibibyte (KiB) binary format: 210 = 1,024 bytes
o Decimal inaccuracy: Off by -2.4% or -24 bytes
o Name origin: “Kilo-” is a French derivation from the Ancient Greek
word for “thousand” A kilobyte is one thousand bytes.
o 1 KB can hold: A short text file or a small icon as a 16x16 pixel .gif
file.
 One megabyte (1 MB):
o Megabyte (MB) decimal format: 106 = 1,000,000 bytes
o Mebibyte (MiB) binary format: 220 = 1,048,576 bytes
o Decimal inaccuracy: Off by -4.9% or -48,576 bytes
o Name origin: “Mega-” is derived from the Ancient Greek word for
“large.” A megabyte is a large number of bytes.
o 1 MB can hold: Approximately one minute of music in a
lossless .mp3 format or a short novel.
 One gigabyte (1 GB):
o Gigabyte (GB) decimal format: 109 = 1,000,000,000 bytes
o Gibibyte (GiB) binary format: 230 = 1,073,741,824 bytes
o Decimal inaccuracy: Off by -7.4% or -73,741,824 bytes
o Name origin: “Giga-” is derived from the Ancient Greek word for
“giant.” A gigabyte is a giant number of bytes.
o 1 GB can hold: Between 2.5-3 hours of music in .mp3 format or 300
high-resolution images.
 One terabyte (1 TB):
o Terabyte (TB) decimal format: 1012 = 1,000,000,000,000 bytes
o Tebibyte (TiB) binary format: 240 = 1,099,511,627,776 bytes
o Decimal inaccuracy: Off by -10.0%
o Name origin: “Tera-” is a shortened form of “tetra-”, which was
derived from the Ancient Greek word for the number four. The 1012
decimal format can also be written as 10004 (one-thousand to the
4th power). “Tera-” in Ancient Greek means “monster.” You might
think of the word “terabyte” as a monstrously large number of
bytes.
o 1 TB can hold: Approximately 200,000 songs in .mp3 format or 300
hours of video.
 One petabyte (PB):
o Petabyte (PB) decimal format: 1015 = 1,000,000,000,000,000
bytes
o Pebibyte (PiB) binary format: 250 = 1,125,899,906,842,624 bytes
o Decimal inaccuracy: Off by -12.6%
o Name origin: “Peta-” is derived from the Ancient Greek word
“penta” meaning five. The 1018 decimal format can also be written
as 10005 (one-thousand to the 5th power).
o 1 PB can hold: The content from 1.5 million CD-ROM discs or 500
billion pages of text.
 One exabyte (EB):
o Exabyte (EB) decimal format: 1018 = 1,000,000,000,000,000,000
bytes
o Exbibyte (EiB) binary format: 260 = 1,152,921,504,606,846,976
bytes
o Decimal inaccuracy: Off by -15.3%
o Name origin: “Exa-” was derived from the Ancient Greek word for
six. The 1018 decimal format can also be written as 10006 (one-
thousand to the 6th power).
o 1 EB can hold: Approximately 11 million movies in 4k video
resolution or 3,000 copies of the entire United States Library of
Congress.
 One zettabyte (ZB):
o Zettabyte (ZB) decimal format: 1021 =
1,000,000,000,000,000,000,000 bytes
o Zebibyte (ZiB) binary format: 270 =
1,180,591,620,717,411,303,424 bytes
o Decimal inaccuracy: Off by -18.1%
o Name origin: “Zetta” was derived from the Latin word “septem”
which means seven. The 1021 decimal format can also be written
as 10007 (one-thousand to the 7th power).
o 1 ZB can hold: Seagate reports one zettabyte can hold 30 billion
movies in 4k video resolution.
 One yottabyte (YB):
o Yottabyte (YB) decimal format: 1024 =
1,000,000,000,000,000,000,000,000 bytes
o Yobibyte (YiB) binary format: 280 =
1,208,925,819,614,629,174,706,176 bytes
o Decimal inaccuracy: Off by -20.9%
o Name origin: “Yotta” is Ancient Greek for eight. The 1024 decimal
format can also be written as 10008 (one-thousand to the 8th
power).
o 1 YB can hold: In 2011, a cloud storage company estimated that
one yottabyte could hold the data of one million data centers.
Power Supplies
In this reading, you will learn how to select the correct power supply for a
personal computer (PC) to support the main components of the PC.
As you learned in a previous video, computer systems require a direct current
(DC) of electricity to operate. However, power companies deliver electricity in
alternating currents (AC). AC power can damage the internal components of a
computer. To solve this problem, computer power supplies are used to convert
the AC from the wall socket to DC. Power supplies also reduce the voltage
delivered to the computer’s internal components.
Computer architecture
Computer architecture refers to the engineering design of computers and the
interconnecting hardware components that together create computing devices
that meet functional, performance and cost goals. Power supplies are part of
the hardware layer of a computer’s architecture. You learned earlier about the
other major hardware components of a computer’s architecture, including the
motherboard, chipsets, CPUs, RAM, storage, peripherals, expansion slots and
cards, etc. These components influence the size and type of power supply a
computer needs.
Selecting a power supply
Local input voltage
A main consideration when selecting a computer power supply is the voltage
delivered to common wall sockets in your country. Power standards for input
voltages can vary from country to country. The most common voltage inputs are
110-120 VAC and 220-240 VAC. VAC stands for volts of alternating current.
 Voltages in the Americas
North, Central, and parts of South America use the 110-127 VAC standard for
common wall sockets. Computers and power supplies sold in these regions are
designed to use this level of power.
 Voltages for most of the world
Most countries use the 220-240 VAC standard for common wall sockets.
Computers and power supplies sold in these areas are designed to use this
higher voltage.
Please visit WorldStandards “Plug, socket & voltage by country” to find your
country’s voltage standards.
It is important to use the correct voltage power supply or power converter for
the computer’s voltage specifications. Imagine that you have a customer who
imported a PC from a country that uses a different standard for input voltage.
You will need to adapt the input power to protect the computer. Some options
for doing this might include:
 Replace the power supply with a unit that uses the appropriate voltage
for the target country.
 Install a power supply model that includes a dual-voltage switch that can
be toggled from 110-120VAC to 220-240VAC.
 Plug the computer into an external power converter that then plugs into a
normal wall socket. Power converters can be purchased from any store
that sells international travel merchandise.
Without a power converter, the following problems may be experienced:

If a computer But the wall


The result will be
needs socket delivers

not enough power for the computer


220-240VAC 110-120VAC
to run properly

too much power, which will damage


110-120VAC 220-240VAC
the computer’s internal parts

Motherboard engineering specifications


The motherboard and form factor specifications document will provide a list of
compatible power supply types to help you select the correct part. The ATX form
factor is the most common motherboard design for full-sized, personal desktop
computers. You may also find a version of the ITX form factor in smaller
computers. The form factor size and components embedded in the
motherboards will create a starting point for the minimum power supply
wattages required.
Power consumption of components
The number of internal components and peripherals the computer will need to
support will also determine the minimum wattage a power supply must
provide. For example, a basic computer that is designed for word processing
and surfing the Internet should work with a standard power supply. However,
some computers may need higher wattage power supplies to support items like
a powerful CPU, multiple CPUs, multiple hard drives, video rendering
applications, a top-tier graphics processing unit (GPU) for gaming, and more.
Voltages and pin connectors
The internal hardware components of a computer require varied input voltages
to operate. Voltage regulators embedded in the motherboard of the computer
control the amount of power that is delivered to the computer’s various internal
components.

Voltage Examples of components that use each voltage level

3.3V DIMMs, chipsets, and some PCI/AGP cards

5V SIMMS, disk drive logic, ISA, and some voltage regulators

12V Motors and voltage regulators with high outputs

The computer’s power supply plugs into an adapter on the computer’s


motherboard. The wiring for this connection uses color coded wires. Each wire
color carries a different voltage of electricity to the motherboard or serves as a
grounding wire. A standard ATX motherboard power adaptor has either 20-pins
or 24-pins to connect these wires. The 20-pin design is an older technology. The
24-pin connector was developed to provide more power to support additional
expansion cards, powerful CPUs, and more. The 24-pin connector has become
the standard for today’s personal computer power supplies and motherboards.
The power supply will have multiple connectors that plug into the motherboard,
hard drives, and graphic cards. Each cable has a specific purpose and delivers
the appropriate amount of electricity to the following parts:
Connections from a PC power supply (ATX 2)
1. Floppy disk drive (obsolete)
2. "Molex" universal (e.g. IDE hard drives, optical drives)
3. SATA drives
4. Graphics cards 8-pin, separable for 6-pin
5. Graphics cards 6-pin
6. Motherboard 8-pin
7. Motherboard P4 connector, can be combined to 8-pin mainboard
connector 12V
8. ATX2 24-pin, divisible 20+4, and can therefore also be used for old 20-pin
connections
You will learn how to install a power supply and connect these power cables
later in this module.
Key takeaways
When selecting a power supply for a computer, the following items should be
taken into consideration:
1. Wall socket input voltage standard for the country where the computer
will be used;
2. The number and power consumption needs of the computer’s internal
components;
3. The motherboard model and form factor engineering specifications and
requirements.
Resources for more information
For more information on these topics, please visit:
 Plug, socket & voltage by country - List of countries around the world and
their voltage standards for common wall sockets and plug types.
 How to Diagnose and Replace a Failed PC Power Supply - Step-by-step
illustrated instructions on how to diagnose a power supply failure and
replace it on a desktop PC.
 Check out these links for more information:

You can learn about Inductive Charging.

Read more about batteries and charge cycles for Windows or Macs. You can also check out: Safe
handling of lithium-ion batteries.

Finally, learn how to maximize your batteries for iOS or Android.

Connector Types
A computer has many physical ports or connectors. You can use these
connectors to connect devices that add functionality to your computing, such as
a keyboard, mouse, or monitor. These external devices are called peripherals. IT
often works with and troubleshoots these peripherals, so it is helpful to
understand the types of connectors. This reading will cover different types of
connectors and their uses.
USB Connectors
USB 2.0, 3.0 & 3.1
USB connectors transfer data and power to devices connected to a computer.
USB connectors are the most popular connectors for all types of peripherals.

There are three generations of USB type A connectors in use today: USB 2.0, 3.0,
and 3.1. Here are the differences between the three generations:
 USB 2.0: Black port on the computer, 480 MBps transfer speed
 USB 3.0: Blue port on computer, 5 Gbps transfer speed
 USB 3.1: Teal port on the computer, 10 Gbps transfer speed
USB ports are backwards compatible, meaning a USB port can connect any of
the three generations of USB type A connectors. The connected cable will
determine the speed of data transfer. Connecting a USB 3 to a USB 2 port will
result in 480 megabytes per second of speed.
Micro USB, USB-C & Lightning Port
Micro USB, USB-C, USB4 (Thunderbolt), and Lightning Ports are smaller
connectors that carry more power than older USB connectors and have faster
data transfer speeds. These connectors are used for devices like smartphones,
laptops, and tablets.
 Micro USB is a small USB port found on many non-Apple cellphones,
tablets, and other portable devices.
 USB-C is the newest reversible connector with either end having the same
build. USB-C cables replace traditional USB connectors since they can
carry significantly more power and transfer data at 20 Gbps.
 USB4 uses Thunderbolt 3 protocol and USB-C cables to transfer data at
speeds of 40 Gbps and provide power as well.
 Lightning Port is a connector exclusive to Apple that is similar to USB-C.
It is used for charging and connecting devices to computers, external
monitors, cameras and other peripherals.

Communication Connectors
Different cable connectors are used to share information between devices and
connect to the internet. IT professionals maintain network systems that use
different types of communication connectors.

 Plain Old Telephone Service (POTS) refers to cables transmitting voice


through twisted copper pair wires. Landline telephones, dial-up internet,
and alarm systems use POTS. The RJ-11 (Register Jack 11) connector is
used for POTS.
 Digital Subscriber Line (DSL) provides access to high-speed networks or
the internet through telephone lines and a modem. The RJ-45 connects a
computer to network elements and is mostly used with ethernet cables.
 Cable Internet uses a cable TV infrastructure and a modem to provide
high-speed internet access to users. An F type connector is commonly
used with cable modems..
 Fiber-optic cables contain strands of glass fibers inside an insulated
casing that send data long-distance and allow for higher-bandwidth
communication. The major internet providers use fiber-optic cables for
high-speed internet service.

Device Connectors
IT professionals will encounter legacy devices that still use older connectors
such as DB89 and Molex.

DB89 connectors are used for older peripherals like keyboards, mice, and
joysticks. An IT professional may still encounter a DB89 connector for external
tools a computer uses and should recognize the cable to connect to the
appropriate port.
Molex connectors provide power to drives or devices inside the computer.
Molex connectors are used for connecting a hard drive, disc drive (CD-ROM, DVD,
Blu-ray), or a video card.
Punch Down Blocks
A punch down block is a terminal strip used to connect telephone or data lines.
Punch down blocks are a quick and easy way to connect wiring. IT professionals
use punch down blocks to change a wire or make a new connection for a
telephone system or Local Area Network (LAN).

These are the most common cables and connectors. As technology advances,
these cables and connectors will also change.

Key Takeaways
IT professionals need to be familiar with cables and connectors used to attach
peripheral devices to computers.
 USB connectors are the most common connector type and they transfer
data and power to devices connected to a computer.
 Communication connectors, such as RJ-45 and fiber optic cables, connect
devices to the internet and one another.
 IT professionals may encounter legacy devices that use older connectors
such as DB89 and Molex.
 Punch down blocks are terminal strips used to connect telephone or data
lines.

Projectors

Projectors are display devices for when you need to share information with people in the same
location! Most projectors can be used just like any other display on a computer, and with a few
differences, can be troubleshot just like any other display device. For example, projectors can have
dead or stuck pixels, and can acquire image burn-in, just like other types of displays.

Connectors and Cables

You will connect a computer to a projector using a display cable like VGA, DVI, HDMI, or DisplayPort.
When you do this, the computer’s operating system will detect that a new display has been added.
Depending on what your computer’s video adapter supports, this new display can be extended or
mirrored just like if you had added a second monitor!

Windows – How to connect to a projector or PC

MacOS – How to connect a display, TV or projector to Mac

Ubuntu – How to connect another monitor to your computer

A lot of times, display issues with projectors come down to the connectors and the cables that you
are using. Because people frequently connect and disconnect from projectors, the cables and
connectors can become worn out or damaged. Always consider this early in your troubleshooting if
the projection display flickers or disappears.

Device Drivers

Just like other display devices, if your computer does not correctly recognize the display resolution of
the projector it may default to a very low-resolution VGA mode like 640x480 or 1024x768. If this
happens, your computer may need a device driver for your projector. Take a look at the support
website for your projector’s manufacturer!

Lighting

Projectors often rely on expensive, hot, very bright incandescent bulbs, or lamps. If a projector gets
too hot for the lamp to safely operate, the projector will shut down. If the lamp burns out, the
projector will either not work or will shut itself down. It is increasingly common for projectors to rely
on LED lights, rather than incandescent lamps. These LED lights have far fewer issues with
overheating, and have much longer lifespans than incandescent lamps.

Calibration

Sometimes, like when a projector is first installed, reset, or moved, you will need to calibrate the
projector image to account for the distance and angle that the projector is installed at. If the image is
skewed or keystoned, you might need to recalibrate the projector geometry. Calibrating the image
involves focusing the image, and making adjustments to the image to make it square and aligned
with the projection surface. Every projector is a little different, so refer to the vendor documentation
to complete this task!

Mobile Display Types

In this reading, you will learn about several types of displays used in modern mobile devices and
monitors. As an IT Support professional, you may need to troubleshoot various types of displays. This
might involve repairing damaged mobile device screens. You may even be responsible for selecting
and ordering mobile devices for the employees of an organization. In your IT job role, you should
have a basic understanding of the technology behind modern displays, as well as their common uses,
positive features, and negative flaws. The top two technologies used in mobile system displays are
Liquid Crystal Displays (LCD) and Light Emitting Diodes (LED).

Liquid Crystal Display (LCD)

LCDs use liquid crystal technology. Liquid crystals have the properties of both a liquid and a solid. The
crystals can be aligned in a variety of patterns and manipulated with electricity. How the liquid
crystals are arranged and manipulated inside display panels affects refresh rates, image quality, and
display performance. LCDs require backlighting, often provided by LEDs. Displays that need
backlighting are also called non-emissive or passive displays. The backlighting unit (BLU) requires
extra space, which makes LCD panels thicker and less flexible than other displays. Polarizers on either
side of the liquid crystal layer control the path of the backlight to ensure the light is aimed toward
the user.

The following are common LCD display types used for mobile devices:

In-Plane Switching (IPS)

How it works: In IPS displays, the liquid crystals are aligned horizontally to the screen. Electricity is
passed between the ends of the crystals to control their behavior.

Uses: IPS technology is used in touch screen displays and high-end monitors. They are often used for
design, photography, video/film editing, animation, movies, and other media. They can also be used
for games that rely on color accuracy and wide viewing angles, as opposed to speed.

Positives: IPS displays provide vibrant colors, high quality graphics, and wide viewing areas.
Additionally, they offer excellent color reproduction, accuracy, and contrast.
Negatives: IPS displays are expensive. They have low refresh rates and slow response times. However,
response times have been improving as the IPS technology evolves. IPS displays can be affected by
“IPS Glow”, where the backlight is visible from side viewing angles.

Twisted Nematic (TN)

Twisted Nematic (TN) is the earliest LCD technology that is still in use today. The term nematic, which
means “threadlike,” is used to describe the appearance of the molecules inside the liquid.

How it works: In TN displays, the liquid crystals are twisted. When voltage is applied, the crystals will
untwist to change the angle of the light they transmit.

Uses: TN displays are appropriate for basic business use (e.g., email, document, and spreadsheet
applications). They are also used for games that need rapid display response times.

Positives: TN displays are low cost, easy to produce, have excellent refresh rates, response times, and
resolutions. They are versatile and can be manufactured for any size and/or shape.

Negatives: TN displays have narrow viewing angles, low image quality, color distortion, and poor
color accuracy and contrast.

VA-Vertical Alignment

How it works: In VA displays, the liquid crystal molecules are vertically aligned. They tilt when
electricity passes through them.

Uses: VA displays are intended for general purpose. Provides mid-range performance for graphic
work, movies, and TV.

Positives: VA displays offergreat contrast, deep black shades, and fast response times. They are mid-
range quality for refresh rates, image quality, viewing angle, and color reproduction.

Negatives: On VA displays, motion blur and ghosting occurs with fast-motion visuals.

Organic Light Emitting Diodes (OLED)


OLEDs are diodes that emit light using organic (carbon-based) materials when electricity is passed
through the diodes. Displays that are able to convert electricity into light are called emissive or active
displays.

How it works: The basic structure of an OLED display consists of an emissive layer placed between a
cathode (which injects electrons) and an anode (which removes electrons). Electricity enters through
the cathode layer, passes into the emissive layer and conductive layer to create light, then out
through the anode layer.

Uses: OLED display technology can be used in foldable smartphones, rollable TVs, as backlighting in
LCD TVs, for gaming, and inside VR headsets.

Positives: OLED displays deliver excellent picture quality, wide viewing angles, infinite contrast, fast
response rate, and brilliant colors with true blacks. They are energy efficient, simpler to make, and
much thinner than LCDs. OLED panels can be built to be flexible and even rollable.

Negatives: OLED displays are sensitive to light and moisture. Blue LEDs degrade faster than other LED
colors causing color distortion over time. They are also prone to image retention and burn-in.

Active Matrix Organic Light Emitting Diode (AMOLED)

Active Matrix Organic Light Emitting Diode (AMOLED) and Super AMOLED are recent technologies
used in smartphone displays.

How it works: AMOLED displays are a type of OLED panel that uses active matrix technology. Active-
matrix displays have active capacitors arranged in a matrix with thin film transistors (TFTs). This
technology enables the control of each individual pixel for rapid state changes, including changing
brightness and color. AMOLEDs have touchscreen functions integrated into the screen.

Uses: AMOLED and Super AMOLED panels are used in high-end mobile devices, flat screen monitors,
curved screens, and touchscreens.

Positives: AMOLED displays offer a high picture quality and fast response time. Color and brightness
are consistent across the screen. Fast-moving images and motion are displayed clearly without
blurring or ghosting. Super AMOLED panels can display a wider range of colors with enhanced
contrast, which makes them easy to view in a wider variety of lighting conditions.
Negatives: AMOLED displays have the same problems as OLED displays (listed above) plus AMOLED
panels can be difficult and expensive to manufacture.

Inorganic mini-LEDs (mLEDs)

Inorganic mini-LEDs (mLEDs) are a next-generation, emissive display technology.

How it works: Mini-LED displays work the same way that OLED displays work, but the individual LED
size is much smaller at approximately 50-60 micrometers.

Uses: Mini-LED displays are used for LCD backlighting in smartphones, public information displays,
signage, electronics, vehicle displays, and more. Mini-LEDs are also the tech behind “Liquid Retina
XDR” screens.

Positives: Mini-LED displays offer ultra high luminance, superior HDR fineness, long lifetimes, thin
panels, and are readable in sunlight. They are also less expensive than micro-LED displays.

Negatives: Mini-LED displays, when used as LCD backlighting, are limited by the properties of LCD
technology. Mini-LED displays for mobile devices are more expensive than OLED displays.

Inorganic micro-LEDs (μLEDs)

Micro-LEDs (μLEDs) are also emissive, next-generation displays.

How it works: Micro-LED displays work the same way that OLED displays work, but the individual LED
size is extremely small at 15 micrometers.

Uses: Micro-LED displays can be used in smartphones, AR/VR headsets, wearables, public
information displays, wall-sized TVs, vehicle displays, and more.

Positives: Micro-LED displaysoffer superior performances across virtually all common display
features, such as brightness, reaction speeds, power consumption, durability, color gamut, stability,
viewing angles, HDR, contrast, refresh rates, transparency, seamless connectivity, and more. Micro-
LED displays are readable in sunlight and have sensor integration capability.

Negatives: Micro-LED displaysare expensive to manufacture and are not yet ready for mass
production.
Key takeaways

The two main technologies used in mobile displays are Liquid Crystal Display (LCD) and Organic Light
Emitting Diodes (OLED). Each technology has its own benefits and drawbacks when used in mobile
device displays, among other consumer goods.

Common LCDs include:

In-Plane Switching (IPS) displays

Twisted Nematic (TN) displays

VA-Vertical Alignment displays

Common and upcoming OLED displays include:

Active Matrix Organic Light Emitting Diode (AMOLED) displays

Inorganic mini-LEDs (mLEDs) displays

Inorganic micro-LEDs (μLEDs) displays

New terms and their definitions: Course 1 Week 2

Address bus: Connects the CPU to the MCC and sends over the location of the data, but not the data
itself

ATA: The most common interface that hard drives use to connect to our system

ATX (Advanced Technology eXtended): The most common form factor for motherboards
Backward compatible: It means older hardware works with newer hardware

Bios (Basic Input Output Services): The BIOS is software that helps initialize the hardware in our
computer and gets our operating system up and running

BYOD (Bring Your Own Device): Refers to the practice of allowing people to use their own personal
devices for work

Cache: The assigned stored location for recently or frequently accessed data; on a mobile app it is
where anything that was changed or created with that app is stored

Charge cycle: One full charge and discharge of a battery

Chipset: It decides how components talk to each other on our machine

Clock cycle: When you send a voltage to the clock wire

Clock speed: The maximum number of clock cycles that it can handle in a set in a certain time period

Clock wire: When you send or receive data, it sends a voltage to that clock wire to let the CPU know
it can start doing calculations

CPU: Central processing unit

CPU sockets: A CPU socket is a series of pins that connect a CPU’s processor to the PC’s motherboard

Data sizes: Metrics that refer to data sizes including bit, byte, kilobyte, kibibyte, and megabyte

DDR SDRAM (Double Data Rate SDRAM): A type of RAM that is faster, takes up less power, and has a
larger capacity than earlier SDRAM versions

Desktop: The main screen where we can navigate our files, folders, and applications
DIMM: Dual Inline Memory Module

Display port: Port which also outputs audio and video

DRAM: Dynamic Random Access Memory

Drivers: The drivers contain the instructions our CPU needs to understand external devices like
keyboards, webcams, printers

DVI: DVI cables generally just output video

Electrostatic discharge: Electrostatic discharge is a sudden and momentary flow of electric current
between two electrically charged objects caused by contact, an electrical short or dielectric
breakdown

External Data Bus (EDB): It’s a row of wires that interconnect the parts of our computer

Factory reset: Resetting a device to the settings it came with from the factory

Form factor: A mathematical way to compensate for irregularities in the shape of an object by using a
ratio between its volume and height

Hard drive: It is a long term memory component that holds all of our data, which can include music,
pictures, applications

Hardware: External or internal devices and equipment that help you perform major functions

HDD (Hard disk drive): Hard disk drives, or HDDs, use a spinning platter and a mechanical arm to read
and write information

HDMI: A type of cable that outputs both video and audio

Heatsink: It is used to dissipate heat from our CPU


Instruction set: A list of instructions that our CPU is able to run

ITX (Information Technology eXtended): A form factor for motherboards that is much smaller than
ATX boards

Land Grid Array (LGA): It is a type of CPU socket that stick out of the motherboard

Lightning adaptor: One of the standard power, data and display connector types used in mobile
devices

Mb/s: megabit per second, which is a unit of data transfer rate

Memory controller chip (MCC): A bridge between the CPU and the RAM

Micro display port: One of the standard power, data and display connector types used in mobile
devices

Micro HDMI: One of the standard power, data and display connector types used in mobile devices

Micro USB: One of the standard power, data and display connector types used in mobile devices

Mini HDMI: One of the standard power, data and display connector types used in mobile devices

Mini USB: One of the standard power, data and display connector types used in mobile devices

Motherboard: The body or circulatory system of the computer that connects all the pieces together

Northbridge: interconnects stuff like RAM and video cards

NVMe (NVM Express): interface standard which allows greater throughput of data and increased
efficiency
Overclocking: it increases the rate of your CPU clock cycles in order to perform more tasks

PCI Express: Peripheral Component Interconnect Express

Peripherals: the external devices which we connect to our computer that add functionality, like: a
mouse, a keyboard, and a monitor

Pin Grid Array (PGA): CPU socket where the pins are located on the processor itself

Ports: Connection points that we can connect devices to that extend the functionality of our
computer

POST (Power On Self Test): It figures out what hardware is on the computer

Power supply: Converts electricity from our wall outlet onto a format that our computer can use

Programs: Basic instructions that tell the computer what to do

RAM: Random Access Memory

Registers: An accessible location for storing the data that our CPU works with

Reimaging: The process of reimaging involves wiping and reinstalling an operating system using a disk
image which is a copy of an operating system

Return merchandise authorization (RMA): The process of receiving returned merchandise and
authorizing a refund

ROM chip (Read Only Memory): A read-only memory chip where the BIOS is stored

RPM: Revolutions per minute


Safe operating temperature: The temperature range in which rechargeable batteries must be kept in
order to avoid demanage

SATA: The most popular serial ATA drive, which uses one cable for data transfers

SDRAM: It stands for Synchronous DRAM, this type of RAM is synchronized to our systems’ clock
speed allowing quicker processing of data

SOC (System On a Chip): Packs the CPU, Ram, and sometimes even the storage onto a single chip

Southbridge: It maintains our IO or input/output controllers, like hard drives and USB devices that
input and output data

SSD: Solid State Drive

Standoffs: Used to raise and attach your motherboard to the case

Thermal paste: A substance used to better connect our CPU and heat sink, so the heat transfers from
to the other better

Type-C connector: A type of USB connector meant to replace many peripheral connections

UEFI: United Extensible Firmware Interface

USB (Universal Serial Bus): A connection standard for connecting peripherals to devices such as
computers

USB-C adapter: One of the standard power, data and display connector types used in mobile devices

Terms and their definitions from previous weeks

A
Abstraction: To take a relatively complex system and simplify it for our use

Algorithm: A series of steps that solves specific problems

ASCII: The oldest character encoding standard used is ASCII. It represents the English alphabet, digits,
and punctuation marks

Binary system: The communication that a computer uses is referred to as binary system, also known
as base-2 numeral system

Byte: A group of 8 bits

Character encoding: Is used to assign our binary values to characters so that we as humans can read
them

Computer: A device that stores and processes data by performing calculations

Cryptography: The overarching discipline that covers the practice of coding and hiding messages
from third parties

Decimal form- base 10 system: In the decimal system, there are 10 possible numbers you can use
ranging from zero to nine

Digital divide: The growing skills gap between people with and without digital literacy skills

I
Information technology: The use of digital technology, like computers and the internet, to store and
process data into useful information

Linux OS: Linux is one of the largest an open source operating systems used heavily in business
infrastructure and in the consumer space

Logic gates: Allow transistors to do more complex tasks, like deciding where to send electrical signals
depending on logical conditions

Open source: This means the developers will let other developers share, modify, and distribute their
software for free

PDA (Personal Digital Assistant): Allows computing to go mobile

Punch cards: A sequence of cards with holes in them to automatically perform calculations instead of
manually entering them by hand

RGB model: RGB or red, green, and blue model is the basic model of representing colors

UTF-8: The most prevalent encoding standard used today


Week 3

Boot Methods

While the most common way to boot a computer is to simply push the power button and allow the
normal process to run, there are many other boot options. This reading covers the various methods
you can use to boot a computer.

Internal method

You can create partitions on the computer’s drive so that only one part of the drive runs the boot
process. A common reason to partition your drive is to have two separate operating systems on your
computer, such as both Windows and Linux. When you have two operating systems on your drive,
you must choose which one will run the boot process. Having two possible systems to boot into is
called dual booting.

While having two operating systems can be helpful for various reasons, it is especially helpful when
one system is failing or unable to boot. If this happens, you can still boot the computer using the
other system and troubleshoot from there.

External tools

External tools can be used to boot the computer. You can load the needed resources on an external
tool to boot a system before any problems happen.

External bootable devices include:

USB drive: You use a USB drive loaded with resources needed to boot the computer. This drive is
inserted into a USB port and chosen at startup.

Optical Media: You use a disk loaded with booting resources. This disk can be a DVD, CD, or Blu-ray
disk and is loaded through the computer’s optical drive.

Solid State Boot Drive: You use a solid state drive to boot. Solid state drives do not use spinning discs
or moving parts. This solid state drive can be installed in your computer or can be a smaller device
such as a flash drive.

External hot-swappable drive: You boot from an external hard drive that can be moved between
computers without turning it off.
Network boot: You boot the operating system directly from a local area network (LAN) without using
a storage device. Your computer must be connected to a LAN for this option.

Internet-based boot: You boot the computer from an internet source, as long as it is a secure source.
Your computer must be connected to the internet for this option.

Window OS or Linux OS

In order to boot either Windows OS or Linux OS with an external tool, you’ll need to enter BIOS at
startup by pressing F2/F12/Del keys. From there you can change the boot order so that the first
option is the external tool you want to use.

macOS

If booting macOS, press and hold the Option key at startup. This will open up the Startup Manager,
which will scan your computer and identify bootable devices. Then you can choose the bootable
device you want to use.

Key Takeaways

There are multiple ways to boot a computer.

A computer can be partitioned into different operating systems and you can select which OS to use
when booting.

You can boot from an external tool. External tools include USB drives, optical media, solid state boot
drives, external hot-swappable drives, network booting, and internet-based booting.

Choosing a boot method on startup varies depending on which operating system you use.

Boot Methods Best Practices


The most common way to boot a computer is to simply push the power button
and allow the normal startup process to run. But what happens if the normal
startup process becomes corrupted and the computer will not boot? Or maybe
you would like to run a computer on a different operating system than the one
specified by your normal boot process. For situations like these, you have
several options for booting your operating system. This reading covers the
various methods you can use to boot a computer.
The boot process
When your computer is powered on, the BIOS/UEFI (BIOS) runs a series of
diagnostic tests to make sure that the computer is in proper working order. The
BIOS is a low-level software that initializes a computer's hardware to make sure
everything is good to go. A boot device is selected based on a boot order that is
configured in the BIOS. Devices that are attached to your system, like hard
drives, USB drives, and CD drives are checked in this configured boot order and
the computer searches these devices for a small program called a “bootloader.”
Once your computer finds a bootloader on a device, it executes this program.
The bootloader program then initiates a process that loads the specific
operating system setup that you want to use.
You can choose a computer’s boot method by telling the BIOS on which device
to search for the bootloader. If you want to run an OS setup that’s stored on a
USB drive, you can configure the boot order in your computer’s BIOS to search
for a bootloader on a USB drive first.
Configuring boot options
Boot order is the order in which a computer chooses which boot files to use to
startup. The boot order determines your boot method. To set the boot order for
a computer, you need to enter the BIOS and configure the boot options.
To enter your computer’s BIOS on a Windows or Linux computer, power on the
system and look for an on-screen message that says which function key you
should press to enter setup. The function keys used for entering the BIOS vary
between computer manufacturers and the version of BIOS. Some of the more
common function key messages are "Press DEL to enter SETUP," "F2=SETUP,"
or "Press F12 to enter SETUP." If booting macOS, press and hold the Option key
at startup. This will open up the Startup Manager, which will scan your
computer and identify bootable devices. Then you can choose the bootable
device you want to use.
If you press the specified function key during the Windows or Linux power up
process (before the OS begins to load), you will open your BIOS program. A BIOS
screen will look similar to this:
The BIOS screen will vary depending on your computer manufacturer and BIOS
version, but all BIOS programs will feature a Boot Options menu. The Boot
Options menu is where you can set your preferred boot method.
The boot options menu lists all the devices attached to your system where it
may find a bootloader program. These include devices like internal hard drives,
USB drives, CD drives, as well as other storage options, like network storage or
cloud storage. In the BIOS boot options menu you can set the specific order you
want to search these devices for the bootloader that will load your OS setup.
The BIOS will run the first bootloader that it finds.

Boot method options


You may find the following boot methods listed in your BIOS boot options:
External options
 USB drive: You use a USB drive loaded with resources needed to boot the
computer. This drive is inserted into a USB port and chosen at startup.
 Optical Media: You use an optical media disk loaded with booting
resources. This disk can be a DVD, CD, or Blu-ray disk and is loaded
through the computer's optical drive.
The USB drive and optical media methods are useful for recovering a computer
with a corrupted OS. They can also be used to start up a computer with a
different OS. For example, you might boot a Windows computer in a Linux
environment by using a USB with Linux OS. You will need to prepare these
media with a bootable OS in order to use them as a boot method (see resources
linked below).
 Solid State Boot Drive: You can use a solid state drive to boot your
computer. Solid state drives do not use spinning discs or moving parts.
This solid state drive can be installed in the computer or can be a smaller
device such as a flash drive.
 External hot-swappable drive: You may boot from an external hard
drive that can be moved between computers without turning it off.
 Network boot: You can boot an operating system directly from a local
area network (LAN) without using a storage device. Your computer must
be connected to a LAN for this option. The network boot is used when the
computer does not have an OS installed, among other things. To boot
from a network, you will need to set up the Preboot Execution
Environment (PXE) capability on the BIOS and have the network
environment prepared for this type of request (see resources linked
below).
 Internet-based boot: You boot the computer from an internet source, as
long as it is a secure source. If you are in charge of a network and your
server is down for any reason, you can use this boot method to remotely
power on the server and restart network operations. Internet-based boot
can be achieved in one of two ways:
1. Remote access. Remote Access Controller (IPMI or similar) has to be
enabled on the BIOS and the computer needs to have a Remote access
control device, such as IDRAC (see resources linked below).
2. Wake on LAN (WoL). This process requires the WoL option enabled on the
BIOS (see resources linked below). The WoL instruction should come
from a device in the network or use a WoL gateway, and the network card
should have WoL capability.
Internal options
Disk partitions: You can create partitions on your computer’s drive so that only
one part of the drive runs the boot process. A common reason to partition your
drive is to have two separate operating systems on your computer. For example,
you could have Windows on one partition of your drive and Linux on the other.
When you have two operating systems on your drive, you must choose which
one will run the boot process. Having two possible systems to boot into is called
dual booting.
While having two operating systems can be helpful for various reasons, it is
especially helpful when one system is failing or unable to boot. If this happens,
you can still boot the computer using the other system and troubleshoot from
there.

Key Takeaways
There are multiple ways to boot a computer.
 A computer can be partitioned into different operating systems and you
can select which OS to use when booting.
 You can boot from an external tool. External tools include USB drives,
optical media, solid state boot drives, external hot-swappable drives,
network booting, and internet-based booting.
 Choosing a boot method on startup varies depending on which operating
system you use.
Resource Links:
 How to make a bootable CD/DVD/USB to install windows
 How to build your own bootable Linux Live CD
 Create a bootable installer for macOS
 What is preboot execution environment (PXE)?
 How to set up PXE boot for UEFI hardware
 Installing and configuring the RAC software
 How to enable and use Wake on LAN (WoL) on Windows 10

Windows 10 and 11 Feature Matrix


Windows 10 and 11 are two operating systems IT Professionals work with. This reading describes the
differences between them and highlights features that are important to IT. Windows 11 was released
more recently and has higher system requirements than Windows 10. Professionals will still work
with Windows 10 often, as many companies still use it.

The primary difference between the two operating systems is aesthetic. Windows 11’s design is more
minimal, corners have been rounded, and colors are pastel. Another difference is in Windows 10, the
start menu and taskbar are in the bottom left corner. In Windows 11, the start menu and taskbar are
centered along the bottom.
Features

Apps: In Windows 10, apps can only be added from the Windows Store or installed manually. In
Windows 11, Android apps can also be added natively.

Virtual desktop: In Windows 10 it is possible to use Virtual Desktops, but it is unintuitive to set up. In
Windows 11, the support for virtual desktops is more user-friendly making it easy to set up different
desktops for work and personal use.

Teams: In Windows 10, Teams is included in the operating system, but defaults to Skype for video
conferencing. In Windows 11, Teams is featured prominently and incorporated into the taskbar and
no longer defaults to Skype for video conferencing.

Widgets: In Windows 10, there are desktop gadgets similar to widgets that can be added to the start
menu. In Windows 11, widgets can be accessed from the taskbar directly.

Touch and pen: Windows 11 has added more features for touch and pen use on supported devices,
including vibration features for pens.

Random Access Memory (RAM) Support Limitations: In Windows 10, the lowest RAM (Random
Access Memory) requirements are 1GB for 32-bit versions and 2GB for 64-bit versions. In Windows
11, the base requirement is 4GB of RAM.

Services and settings

Domain access: Joining a domain, a centrally administered group of computers, functions the same in
Windows 10 and 11. A user can quickly join a domain from the “System Properties” window.

Workgroup access: Joining a workgroup, a group of computers on the same Local Area Network
(LAN) with shared access and responsibilities, also functions the other same in Windows 10 and 11. A
user can quickly join a workgroup from the “System Properties” window.

Group Policy Settings (Gpedit.msc): Editing Group Policies (with Gpedit.msc) locally or using Active
Directory is largely unchanged. Note that Gpedit.msc is not available in Home licenses of Windows.

Remote Desktop Protocol: The Remote Desktop tool, used for connecting to the desktop of a
different computer over a network connection, is largely unchanged between Windows versions.
Note that to use a Remote Desktop Server, the server machine needs to be running at least the Pro
edition of Windows.

Bitlocker: Bitlocker, a drive encryption tool included with Windows, is largely unchanged. Note that
Bitlocker is only available for Pro and Enterprise licenses of Windows.

Key takeaways

Operating systems like Windows 10 and Windows 11 are constantly changing and evolving. As an IT
professional, you may be required to maintain two or more versions of an operating system at the
same time. IT professionals need to stay on top of changes and new development to ensure they can
support their users.

Windows 10 and Windows 11 primary difference is aesthetic.

Windows 11 updated and added new features to make it simpler to access or use apps services, and
settings.

To learn more about Ubuntu, click here.

To help you load your installation image onto a USB drive, you may want to look at the tool, etcher.io.

For a list of all Ubuntu’s updates, check out the link here.

For more information on why Ubuntu will be switching its default user interface over to GNOME,
click here.

Heads up: A big part of being successful in an IT role is the ability to be a self-led learner – someone
who finds key resources and reads up on the latest tech trends and solutions. The supplemental
readings we’ve provided have been designed to show you just some of the support materials
available to you online; they’re not meant to be considered a comprehensive list. Feel free to add to
the conversation by posting other useful resources for learners to this forum thread.

Terms and their definitions from previous weeks


A
Abstraction: To take a relatively complex system and simplify it for our use
Address bus: Connects the CPU to the MCC and sends over the location of the
data, but not the data itself
Algorithm: A series of steps that solves specific problems
Android: A mobile operating system based on Linux
Application: A computer program designed for a specific use
ARPANET: The earliest version of the Internet that we see today, created by the
US government project DARPA in the 1960s
ASCII: The oldest character encoding standard used is ASCII. It represents the
English alphabet, digits, and punctuation marks
ATA: The most common interface that hard drives use to connect to our system
ATX (Advanced Technology eXtended): The most common form factor for
motherboards
B
Backward compatible: It means older hardware works with newer hardware
Binary system: The communication that a computer uses is referred to as
binary system, also known as base-2 numeral system
BIOS (Basic Input Output Services): The BIOS is software that helps initialize
the hardware in our computer and gets our operating system up and running
BIOS/UEFI: A low-level software that initializes our computer's hardware to
make sure everything is good to go
Block storage: It improves faster handling of data because the data isn't stored
in one long piece but in blocks, so it can be accessed more quickly
Boot: To start up a computer
Bootloader: A small program that loads the operating system
BYOD (Bring Your Own Device): Refers to the practice of allowing people to use
their own personal devices for work
Byte: A group of 8 bits
C
Cache: The assigned stored location for recently or frequently accessed data; on
a mobile app it is where anything that was changed or created with that app is
stored
Character encoding: Is used to assign our binary values to characters so that
we as humans can read them
Charge cycle: One full charge and discharge of a battery
Children's Online Privacy Protection Act (COPPA): Regulates the information
we show to children under the age of 13
Chrome OS: A Linux-based operating system designed by Google
Clients: A device that receives data from a server
Computer: A device that stores and processes data by performing calculations
Chipset: It decides how components talk to each other on our machine
Clock cycle: When you send a voltage to the clock wire
Clock speed: The maximum number of clock cycles that it can handle in a set in
a certain time period
Clock wire: When you send or receive data, it sends a voltage to that clock wire
to let the CPU know it can start doing calculations
Command Line Interface (CLI): A shell that uses text commands to interact
with the operating system
Computer file: Data that we store and a file can be anything, a word document,
a picture, a song, literally anything
CPU: Central processing unit
CPU sockets: A CPU socket is a series of pins that connect a CPU’s processor to
the PC’s motherboard
Cryptography: The overarching discipline that covers the practice of coding
and hiding messages from third parties
D
DARPA: A US government project in the 1960s that went on to create the earliest
version of the Internet that we see today
Data blocks: Data that can be broken down into many pieces and written to
different parts of the hard disk
Data sizes: Metrics that refer to data sizes including bit, byte, kilobyte, kibibyte,
and megabyte
DDR SDRAM (Double Data Rate SDRAM): A type of RAM that is faster, takes up
less power, and has a larger capacity than earlier SDRAM versions
Decimal form- base 10 system: In the decimal system, there are 10 possible
numbers you can use ranging from zero to nine
Desktop: The main screen where we can navigate our files, folders, and
applications
Digital divide: The growing skills gap between people with and without digital
literacy skills
DIMM: Dual Inline Memory Module
Display port: Port which also outputs audio and video
Distributions: Some common Linux distributions are Ubuntu, Debian, and Red
Hat
Domain name: A website name; the part of the URL following www.
Domain Name System (DNS): A global and highly distributed network service
that resolves strings of letters, such as a website name, into an IP address
DRAM: Dynamic Random Access Memory
Drivers: The drivers contain the instructions our CPU needs to understand
external devices like keyboards, webcams, printers
DVI: DVI cables generally just output video
E
Electrostatic discharge: Electrostatic discharge is a sudden and momentary
flow of electric current between two electrically charged objects caused by
contact, an electrical short or dielectric breakdown
Etcher.io: A tool you can use to load an install image onto your USB device and
make it bootable
Ethernet cable: It lets you physically connect to the network through a cable
External Data Bus (EDB): It's a row of wires that interconnect the parts of our
computer
F
Factory reset: Resetting a device to the settings it came with from the factory
Fiber optic cable: Fiber optic cables contain individual optical fibers which are
tiny tubes made of glass about the width of a human hair. Unlike copper, which
uses electrical voltages, fiber cables use pulses of light to represent the ones
and zeros of the underlying data
File extension: The appended part of a filename that tells us what type of file it
is in certain operating systems
File handling: A process of storing data using a program
File system: A system used to manage files
Finder: The file manager for all Macs
Folders/Directories: Used to organize files
Form factor: A mathematical way to compensate for irregularities in the shape
of an object by using a ratio between its volume and height
G
Globalization: The movement that lets governments, businesses, and
organizations communicate and integrate together on an international scale
H
Hard drive: It is a long term memory component that holds all of our data,
which can include music, pictures, applications
Hardware: External or internal devices and equipment that help you perform
major functions
Hardware resource deficiency: It refers to the lack of system resources like
memory, hard drive space, et cetera
HDD (Hard disk drive): Hard disk drives, or HDDs, use a spinning platter and a
mechanical arm to read and write information
HDMI: A type of cable that outputs both video and audio
Heatsink: It is used to dissipate heat from our CPU
HFS+/APFS: HFS+ is a journaling system developed by Apple Inc. and APFS is
another but more encrypted Apple journaling system
Hostname: Used to identify the computer when it needs to talk to other
computers
Hubs: Devices that serve as a central location through which data travels
through
I
Information technology: The use of digital technology, like computers and the
internet, to store and process data into useful information
Input/Output device: A device that performs input and output, including
monitors, keyboards, mice, hard disk drives, speakers, bluetooth headsets,
webcams, and network adapters
Install image: A downloadable operating system image used to install an
operating system on a device
Instruction set: A list of instructions that our CPU is able to run
Internet: A worldwide system of interconnected networks
Internet Corporation for Assigned Names and Numbers (ICANN): Where
website names are registered
Internet of Things (IoT): The concept that more and more devices are
connected to the internet in a smarter fashion such as smart thermostats that
turn off the air conditioner when you leave and turn it on when you come back
Internet Protocol version 4 (IPv4): An address that consists of 32 bits
separated into four groups
Internet Protocol version 6 (IPv6): An address that consist of a 128 bits, four
times the amount that IPv4 uses
Internet service provider (ISP): A company that provides a consumer an
internet connection
I/O management: Anything that can give us input or that we can use for output
of data
iOS: A mobile operating system developed by Apple Inc.
IP address: The most common protocol used in the network layer, used to
helps us route information
ITX (Information Technology eXtended): A form factor for motherboards that
is much smaller than ATX boards
K
Kernel: The main core of an operating system that creates processes, efficiently
schedules them, and manages how processes are terminated
L
Land Grid Array (LGA): It is a type of CPU socket that stick out of the
motherboard
Lightning adaptor: One of the standard power, data and display connector
types used in mobile devices
Linux OS: Linux is one of the largest an open source operating system used
heavily in business infrastructure and in the consumer space
Logic gates: Allow transistors to do more complex tasks, like decide where to
send electrical signals depending on logical conditions
Logs: Files that record system events on our computer
M
MAC address: A globally unique identifier attached to an individual network
interface. It's a 48-bit number normally represented by six groupings of two
hexadecimal numbers
Mac OS: Apple's operating system
Mb/s: megabit per second, which is a unit of data transfer rate
Memory controller chip (MCC): A bridge between the CPU and the RAM
Memory management: One of the functions that a kernel performs; it
optimizes memory usage and make sure our applications have enough memory
to run
Metadata: Tells us everything we need to know about a file, including who
created it, when it was last modified, who has access to it, and what type of file
it is
Micro display port: One of the standard power, data and display connector
types used in mobile devices
Microsoft Terminal Services Client: A client program used to create RDP
connections to remote computers
Micro HDMI: One of the standard power, data and display connector types used
in mobile devices
Micro USB: One of the standard power, data and display connector types used
in mobile devices
Mini HDMI: One of the standard power, data and display connector types used
in mobile devices
Mini USB: One of the standard power, data and display connector types used in
mobile devices
Motherboard: The body or circulatory system of the computer that connects all
the pieces together
N
Network: The interconnection of computers
Network Address Translation (NAT): A mitigation tool that lets organizations
use one public IP address and many private IP addresses within the network
Networking: Managing, building and designing networks
Networking protocols: A set of rules for how we transfer data in a network
Network stack: A set of hardware or software that provides the infrastructure
for a computer
Northbridge: interconnects stuff like RAM and video cards
O
Open SSH: The most popular program to use SSH within Linux
Open source: This means the developers will let other developers share,
modify, and distribute their software for free
Operating system: The whole package that manages our computers resources
and lets us interact with it
Overclocking: it increases the rate of your CPU clock cycles in order to perform
more tasks
P
PC: Personal computer, which technically means a computer that one person
uses
PCI Express: Peripheral Component Interconnect Express
PDA (Personal Digital Assistant): Allows computing to go mobile
Peripherals: the external devices which we connect to our computer that add
functionality, like: a mouse, a keyboard, and a monitor
Pin Grid Array (PGA): CPU socket where the pins are located on the processor
itself
Plink (PuTTY Link): A tool built into the command line after PuTTY is installed
that is used to make remote SSH connections
Ports: Connection points that we can connect devices to that extend the
functionality of our computer
POST (Power On Self Test): It figures out what hardware is on the computer
Powershell: A shell (program that interprets text commands) for Windows
Power supply: Converts electricity from our wall outlet onto a format that our
computer can use
Power user: Above average computer users
Process management: The capacity to manage the many programs in a system
- when to run them, the order they run in, how many resources they take up,
how long they run, etc.
Programs: Basic instructions that tell the computer what to do
Punch cards: A sequence of cards with holes in them to automatically perform
calculations instead of manually entering them by hand
Q
Qwiklabs: An online platform which provides training in cloud services
R
RAM: Random Access Memory
Registers: An accessible location for storing the data that our CPU works with
Reimaging: The process of reimaging involves wiping and reinstalling an
operating system using a disk image which is a copy of an operating system
Remote connection: The ability to connect an authorized person to a computer
or network remotely; allows us to manage multiple machines from anywhere in
the world
Remote Desktop Protocol (RDP): A secure network communication protocol
developed by Microsoft that allows a user to connect to another device remotely
Return merchandise authorization (RMA): The process of receiving returned
merchandise and authorizing a refund
RGB model: RGB or red, green, and blue model is the basic model of
representing colors
ROM chip (Read Only Memory): A read-only memory chip where the BIOS is
stored
Router: A device that knows how to forward data between independent
networks
RPM: Revolutions per minute
S
Safe operating temperature: The temperature range in which rechargeable
batteries must be kept in order to avoid demanage
SATA: The most popular serial ATA drive, which uses one cable for data
transfers
Scalability: The measure of a system’s ability to increase or decrease in
performance and cost in response to varying loads in system processing
demands
SDRAM: It stands for Synchronous DRAM, this type of RAM is synchronized to
our systems' clock speed allowing quicker processing of data
Server logs: Text files that contains recorded information about activities
performed on a specific web server in a defined period of time
Servers: Devices that provide data to other devices that request that data, also
known as a client
Shell: A program that interprets text commands and sends them to the OS to
execute
SOC (System On a Chip): Packs the CPU, Ram, and sometimes even the storage
onto a single chip
Southbridge: It maintains our IO or input/output controllers, like hard drives
and USB devices that input and output data
SSD: Solid State Drive
SSH (Secure shell): A protocol implemented by other programs to securely
access one computer from another.
SSH authentication key: A secure authentication method for accessing a
computer from other device
SSH client: A program you must have installed on your device in order to
establish an SSH connection with another device
SSH server: Software installed on a machine that allows for that device to
accept an SSH connection
Standardization: A systematic way of naming hosts
Standoffs: Used to raise and attach your motherboard to the case
Swap space: The allocated space where the virtual memory is stored on the
hard drive when the amount of physical memory space is used up or full
Switches: Devices that help our data travel
System: A group of hardware components and software components that work
together to fun the programs or processes in the computer
System settings: Settings like display resolution, user accounts, network,
devices, etc.
T
Task bar: It gives us quick options and shows us information like network
connectivity, the date, system notifications, sound etc
Terminal: A text based interface to the computer
Thermal paste: A substance used to better connect our CPU and heat sink, so
the heat transfers from to the other better
Time slice: A very short interval of time that gets allocated to a process for CPU
execution
Transfer Control Protocol (TCP): A protocol that handles reliable delivery of
information from one network to another
Type-C connector: A type of USB connector meant to replace many peripheral
connections
U
Ubuntu: The most popular Linux consumer distribution
UEFI: United Extensible Firmware Interface
Uniform Resource Locator (URL): A web address similar to a home address
USB (Universal Serial Bus): A connection standard for connecting peripherals
to devices such as computers
USB-C adapter: One of the standard power, data and display connector types
used in mobile devices
User name: A unique identifier for a user account
User space: The aspect of an operating system that humans interact with
directly like programs, such as text editors, music players, system settings, user
interfaces, etc.
UTF-8: The most prevalent encoding standard used today
V
Virtual Box: An application you can use to install Linux and have it completely
isolated from your machine
Virtual machine (VM): An application that uses physical resources like memory,
CPU and storage, but they offer the added benefit of running multiple operating
systems at once
Virtual memory: A combination of hard drive space and RAM that acts like
memory which our processes can use
VPN (Virtual private network): A secure method of connecting a device to a
private network over the internet
W
WannaCry Attack: A cyber attack that started in Europe and infected hundreds
of thousands of computers across the world
Wireless networking (Wi-Fi): Networks you connect to through radios and
antennas
World Wide Web (WWW): The information system that enables documents and
other web resources to be accessed over the Internet
New terms and their definitions: Course 1
Week 4
ARPANET: The earliest version of the Internet that we see today, created by the US government
project DARPA in the 1960s

Children’s Online Privacy Protection Act (COPPA): Regulates the information we show to children
under the age of 13

Clients: A device that receives data from a server

DARPA: A US government project in the 1960s that went on to create the earliest version of the
Internet that we see today

Domain name: A website name; the part of the URL following www.

Domain Name System (DNS): A global and highly distributed network service that resolves strings of
letters, such as a website name, into an IP address

Ethernet cable: It lets you physically connect to the network through a cable

Fiber optic cable: Fiber optic cables contain individual optical fibers which are tiny tubes made of
glass about the width of a human hair. Unlike copper, which uses electrical voltages, fiber cables use
pulses of light to represent the ones and zeros of the underlying data

Globalization: The movement that lets governments, businesses, and organizations communicate
and integrate together on an international scale

Hubs: Devices that serve as a central location through which data travels through

Internet: A worldwide system of interconnected networks


Internet Corporation for Assigned Names and Numbers (ICANN): Where website names are
registered

Internet of Things (IoT): The concept that more and more devices are connected to the internet in a
smarter fashion such as smart thermostats that turn off the air conditioner when you leave and turn
it on when you come back

Internet Protocol version 4 (IPv4): An address that consists of 32 bits separated into four groups

Internet Protocol version 6 (IPv6): An address that consist of a 128 bits, four times the amount that
IPv4 uses

Internet service provider (ISP): A company that provides a consumer an internet connection

IP address: The most common protocol used in the network layer, used to helps us route information

MAC address: A globally unique identifier attached to an individual network interface. It’s a 48-bit
number normally represented by six groupings of two hexadecimal numbers

Network: The interconnection of computers

Network Address Translation (NAT): A mitigation tool that lets organizations use one public IP
address and many private IP addresses within the network

Networking: Managing, building and designing networks

Networking protocols: A set of rules for how we transfer data in a network

Network stack: A set of hardware or software that provides the infrastructure for a computer

Router: A device that knows how to forward data between independent networks
Server logs: Text files that contains recorded information about activities performed on a specific
web server in a defined period of time

Servers: Devices that provide data to other devices that request that data, also known as a client

Switches: Devices that help our data travel

Transfer Control Protocol (TCP): A protocol that handles reliable delivery of information from one
network to another

Uniform Resource Locator (URL): A web address similar to a home address

WannaCry Attack: A cyber attack that started in Europe and infected hundreds of thousands of
computers across the world

Wireless networking (Wi-Fi): Networks you connect to through radios and antennas

World Wide Web (WWW): The information system that enables documents and other web resources
to be accessed over the Internet

WEEK 5

Common Scripting Solutions


In this reading, you will learn about a variety of scripting languages, their uses,
and their risks. As an IT Support professional, you may need to automate
routine tasks. For example, you might want to automate a backup of company
data that runs every night. You might also need to automate high volume tasks,
like changing security access settings on thousands of files. Scripting is a
common tool used for automation. This tool can help IT Support staff save time
and resources in a busy enterprise work environment.
Scripting languages
There are many scripting languages available to use for a variety of tasks in
different operating system environments. Most scripts are written in command
line environments.
Scripting languages for Windows environments:
 PowerShell (.ps1) - Windows PowerShell is among the most common
command line scripting tools used in Windows environments. PowerShell
is built on the .NET platform and employs many of the same elements
that programming languages do. PowerShell scripts are used for building,
testing, and deploying solutions, in addition to automating system
management.
 Batch scripts (.bat) - Batch scripts, also called batch files, have been
around since the early days of MS DOS and OS/2. Batch files can execute
simple tasks, like calling a set of programs to run when a computer boots
up. This type of script could be useful in setting up employees’
workspaces when they power on their computers.
 Visual Basic Script (.vbs) - Visual Basic Script is an older scripting
language. It has reached its end of life for Microsoft support and has been
replaced by PowerShell scripts. However, as an IT professional, you may
encounter .vbs scripts on some legacy systems.
Scripting languages for Linux and Unix environments:
 Shell script (.sh) - Shell scripting languages, like Bash, are used in Unix or
Linux environments. The scripts are often used to manipulate files,
including changing file security settings, creating, copying, editing,
renaming and deleting files. They can also be used to execute programs,
print, navigate the operating system, and much more. The scripts run in
command-line interpreter (CLI) shells, such as the Bourne shell, Bourne
Again SHell (Bash), C shell, and Korn (KSH) shell.
Programming languages that can be used for scripting:
 JavaScript (.js) - JavaScript the most used programming language in the
world. It is a lightweight language that is used for scripting in web
development, mobile and web apps, games, and more. It can also be used
to develop software and automate web server functions.
 Python (.py) - Python is a user-friendly programming language that can
perform advanced tasks and import modules from libraries specially
designed for automation scripts.
Scripting uses - finding the right tool for the job
 Basic automation: Python is an excellent script for automation. It’s one
of the most commonly used, with many available automation libraries.
 Restarting machines: Many power users use PowerShell (.ps1) scripts to
restart machines (Windows). For Linux machines, they can use .sh (shell)
scripts.
 Mapping network drives: In the past, mapping network drives was
accomplished with .bat or .vbs scripts. However, PowerShell scripts are
most commonly used to map drives in Windows environments today. For
Linux users, shell scripts can be used for this purpose.
 Installing applications: Batch files and shell scripts are often used for
automated software installation.
 Automated Backups: Windows PowerShell and Linux/Unix shell scripts
can automate backups.
 Gathering of information and data: Python is a popular choice for
gathering data. Python has many available libraries to help with this task.
 Initiating Updates: Powershell and shell scripts can be used for initiating
updates in Windows and Linux, respectively.
Security risks of using scripts
IT Support professionals need to be very careful when using scripts, especially
with prewritten scripts copied or downloaded from the internet. Some of the
security risks of using scripts could include:
 Unintentionally introducing malware: As an IT Support professional
that is new to scripting, you may try to search the internet for assistance
in writing scripts. In your search, you might find a script online for a task
that you want to automate. It’s tempting to save time and effort by
downloading the script and deploying it in your network environment.
However, this is dangerous because scripts authored by an unverified
source could potentially contain malware. Malicious scripts could have
the power to delete files, corrupt data and software, steal confidential
information, disable systems, and even bring down an entire network.
Malicious scripts can create security weaknesses for the purpose of
creating entry points for cybercriminals to penetrate networks. Scripts
could also introduce ransomware attacks, which often works by
encrypting file systems and then selling the decryption keys for ransom.
 Inadvertently changing system settings: Scripts are powerful tools for
changing system settings. Using the wrong script can cause the user to
inadvertently configure harmful settings. For example, one minor typo in
a shell script that sets file permission security in Linux could make
confidential files accessible to the world.
 Browser or system crashes due to mishandling of resources:
Mishandling resources can lead to program crashes in the browser or
cause the entire computer to crash. For example, directing too much
memory to the browser can overload the computer system.
Key takeaways
A basic knowledge of scripting is an important tool for IT professionals. You may
need to improve workflow efficiency by automating basic functions with a
scripting language. Some common scripting languages include:
 Windows environments: batch scripts (.bat), Powershell (.ps1), Visual
Basic Script (.vbs)
 Linux/Unix environments: shell scripts (.sh)
 Most OS environments: javascript (.js), Python (.py)
Scripts have multiple helpful uses, such as:
 Basic Automation
 Restarting Machines
 Remapping Network Drives
 Installing Applications
 Automating Backups
 Gathering of information/ data
 Initiating Updates
There are risks in using scripts, including:
 Unintentionally introducing malware
 Inadvertently changing system settings
 Browser or system crashes due to mishandling of resources

New terms and their definitions: Course 1


Week 5
Application software: Any software created to fulfill a specific I’llneed, like a
text editor, web browser, or graphics editor
Assembly language: A language that allowed computer scientists to use human
readable instructions, assembled into code that the machines could understand
Automation: It makes processes work automatically
Coding: Translating one language to another
Compiled programming language: A language that uses human readable
instructions, then sends them through a compiler
Copyright: Used when creating original work
.exe: A file extension found in Windows for an executable file
Firmware: Software that's permanently stored on a computer component
GIT: A version control system that helps keep track of changes made to files and
directories
Interpreted programming language: A language that isn't compiled ahead of
time
Programming: Coding in a programming language
Programming language: Special languages that software developers use to
write instructions for computers to execute
Script: It is run by an interpreter, which interprets the code into CPU
instructions just in time to run them
Scripting: Coding in a scripting language
Software: The intangible instructions that tell the hardware what to do
Software bug: An error in software that causes unexpected results
Software management: A broad term used to refer to any and all kinds of
software that are designed to manage or help manage some sort of project or
task
System software: Software used to keep our core system running, like
operating system tools and utilities

New terms and their definitions: Course 1 Week 6


404 Not Found: An error message you might see on websites that have been
moved or deleted

Error message: Helpful indicators that can point you in the right direction

Permission denied: An error message you might find when accessing a


protected file

Root cause: The main factor that’s causing a range of issues


Troubleshooting: The ability to diagnose and resolve a problem

Terms and their definitions from previous modules


A

Abstraction: To take a relatively complex system and simplify it for our use

Address bus: Connects the CPU to the MCC and sends over the location of the
data, but not the data itself

Algorithm: A series of steps that solves specific problems

Android: A mobile operating system based on Linux

Application: A computer program designed for a specific use

Application software: Any software created to fulfill a specific need, like a text
editor, web browser, or graphics editor

ARPANET: The earliest version of the Internet that we see today, created by the
US government project DARPA in the 1960s

ASCII: The oldest character encoding standard used is ASCII. It represents the
English alphabet, digits, and punctuation marks

Assembly language: A language that allowed computer scientists to use human


readable instructions, assembled into code that the machines could understand

ATA: The most common interface that hard drives use to connect to our system

ATX (Advanced Technology eXtended): The most common form factor for
motherboards

Automation: It makes processes work automatically


B

Backward compatible: It means older hardware works with newer hardware

Binary system: The communication that a computer uses is referred to as binary


system, also known as base-2 numeral system

BIOS (Basic Input Output Services): The BIOS is software that helps initialize the
hardware in our computer and gets our operating system up and running

BIOS/UEFI: A low-level software that initializes our computer’s hardware to


make sure everything is good to go

Block storage: It improves faster handling of data because the data isn’t stored
in one long piece but in blocks, so it can be accessed more quickly

Boot: To start up a computer

Bootloader: A small program that loads the operating system

BYOD (Bring Your Own Device): Refers to the practice of allowing people to use
their own personal devices for work

Byte: A group of 8 bits

Cache: The assigned stored location for recently or frequently accessed data; on
a mobile app it is where anything that was changed or created with that app is
stored

Character encoding: Is used to assign our binary values to characters so that we


as humans can read them

Charge cycle: One full charge and discharge of a battery


Children’s Online Privacy Protection Act (COPPA): Regulates the information we
show to children under the age of 13

Chrome OS: A Linux-based operating system designed by Google

Clients: A device that receives data from a server

Coding: Translating one language to another

Compiled programming language: A language that uses human readable


instructions, then sends them through a compiler

Computer: A device that stores and processes data by performing calculations

Copyright: Used when creating original work

Chipset: It decides how components talk to each other on our machine

Clock cycle: When you send a voltage to the clock wire

Clock speed: The maximum number of clock cycles that it can handle in a set in
a certain time period

Clock wire: When you send or receive data, it sends a voltage to that clock wire
to let the CPU know it can start doing calculations

Command Line Interface (CLI): A shell that uses text commands to interact with
the operating system

Computer file: Data that we store and a file can be anything, a word document, a
picture, a song, literally anything

CPU: Central processing unit

CPU sockets: A CPU socket is a series of pins that connect a CPU’s processor to
the PC’s motherboard
Cryptography: The overarching discipline that covers the practice of coding and
hiding messages from third parties

DARPA: A US government project in the 1960s that went on to create the earliest
version of the Internet that we see today

Data blocks: Data that can be broken down into many pieces and written to
different parts of the hard disk

Data sizes: Metrics that refer to data sizes including bit, byte, kilobyte, kibibyte,
and megabyte

DDR SDRAM (Double Data Rate SDRAM): A type of RAM that is faster, takes up
less power, and has a larger capacity than earlier SDRAM versions

Decimal form- base 10 system: In the decimal system, there are 10 possible
numbers you can use ranging from zero to nine

Desktop: The main screen where we can navigate our files, folders, and
applications

Digital divide: The growing skills gap between people with and without digital
literacy skills

DIMM: Dual Inline Memory Module

Display port: Port which also outputs audio and video

Distributions: Some common Linux distributions are Ubuntu, Debian, and Red
Hat

Domain name: A website name; the part of the URL following www.
Domain Name System (DNS): A global and highly distributed network service
that resolves strings of letters, such as a website name, into an IP address

DRAM: Dynamic Random Access Memory

Drivers: The drivers contain the instructions our CPU needs to understand
external devices like keyboards, webcams, printers

DVI: DVI cables generally just output video

Electrostatic discharge: Electrostatic discharge is a sudden and momentary flow


of electric current between two electrically charged objects caused by contact,
an electrical short or dielectric breakdown

Etcher.io: A tool you can use to load an install image onto your USB device and
make it bootable

Ethernet cable: It lets you physically connect to the network through a cable

.exe: A file extension found in Windows for an executable file

External Data Bus (EDB): It’s a row of wires that interconnect the parts of our
computer

Factory reset: Resetting a device to the settings it came with from the factory

Fiber optic cable: Fiber optic cables contain individual optical fibers which are
tiny tubes made of glass about the width of a human hair. Unlike copper, which
uses electrical voltages, fiber cables use pulses of light to represent the ones
and zeros of the underlying data

File extension: The appended part of a filename that tells us what type of file it is
in certain operating systems
File handling: A process of storing data using a program

File system: A system used to manage files

Firmware: Software that’s permanently stored on a computer component

Finder: The file manager for all Macs

Folders/Directories: Used to organize files

Form factor: A mathematical way to compensate for irregularities in the shape


of an object by using a ratio between its volume and height

GIT: A version control system that helps keep track of changes made to files and
directories

Globalization: The movement that lets governments, businesses, and


organizations communicate and integrate together on an international scale

Hard drive: It is a long term memory component that holds all of our data, which
can include music, pictures, applications

Hardware: External or internal devices and equipment that help you perform
major functions

Hardware resource deficiency: It refers to the lack of system resources like


memory, hard drive space, et cetera

HDD (Hard disk drive): Hard disk drives, or HDDs, use a spinning platter and a
mechanical arm to read and write information
HDMI: A type of cable that outputs both video and audio

Heatsink: It is used to dissipate heat from our CPU

HFS+/APFS: HFS+ is a journaling system developed by Apple Inc. And APFS is


another but more encrypted Apple journaling system

Hostname: Used to identify the computer when it needs to talk to other


computers

Hubs: Devices that serve as a central location through which data travels
through

Information technology: The use of digital technology, like computers and the
internet, to store and process data into useful information

Input/Output device: A device that performs input and output, including


monitors, keyboards, mice, hard disk drives, speakers, bluetooth headsets,
webcams, and network adapters

Install image: A downloadable operating system image used to install an


operating system on a device

Instruction set: A list of instructions that our CPU is able to run

Internet: A worldwide system of interconnected networks

Internet Corporation for Assigned Names and Numbers (ICANN): Where website
names are registered

Internet of Things (IoT): The concept that more and more devices are connected
to the internet in a smarter fashion such as smart thermostats that turn off the
air conditioner when you leave and turn it on when you come back
Internet Protocol version 4 (IPv4): An address that consists of 32 bits separated
into four groups

Internet Protocol version 6 (IPv6): An address that consist of a 128 bits, four
times the amount that IPv4 uses

Internet service provider (ISP): A company that provides a consumer an internet


connection

Interpreted programming language: A language that isn’t compiled ahead of


time

I/O management: Anything that can give us input or that we can use for output
of data

iOS: A mobile operating system developed by Apple Inc.

IP address: The most common protocol used in the network layer, used to helps
us route information

ITX (Information Technology eXtended): A form factor for motherboards that is


much smaller than ATX boards

Kernel: The main core of an operating system that creates processes, efficiently
schedules them, and manages how processes are terminated

Land Grid Array (LGA): It is a type of CPU socket that stick out of the
motherboard

Lightning adaptor: One of the standard power, data and display connector types
used in mobile devices
Linux OS: Linux is one of the largest an open source operating system used
heavily in business infrastructure and in the consumer space

Logic gates: Allow transistors to do more complex tasks, like decide where to
send electrical signals depending on logical conditions

Logs: Files that record system events on our computer

MAC address: A globally unique identifier attached to an individual network


interface. It’s a 48-bit number normally represented by six groupings of two
hexadecimal numbers

Mac OS: Apple’s operating system

Mb/s: megabit per second, which is a unit of data transfer rate

Memory controller chip (MCC): A bridge between the CPU and the RAM

Memory management: One of the functions that a kernel performs; it optimizes


memory usage and make sure our applications have enough memory to run

Metadata: Tells us everything we need to know about a file, including who


created it, when it was last modified, who has access to it, and what type of file
it is

Micro display port: One of the standard power, data and display connector types
used in mobile devices

Microsoft Terminal Services Client: A client program used to create RDP


connections to remote computers

Micro HDMI: One of the standard power, data and display connector types used
in mobile devices
Micro USB: One of the standard power, data and display connector types used in
mobile devices

Mini HDMI: One of the standard power, data and display connector types used in
mobile devices

Mini USB: One of the standard power, data and display connector types used in
mobile devices

Motherboard: The body or circulatory system of the computer that connects all
the pieces together

Network: The interconnection of computers

Network Address Translation (NAT): A mitigation tool that lets organizations use
one public IP address and many private IP addresses within the network

Networking: Managing, building and designing networks

Networking protocols: A set of rules for how we transfer data in a network

Network stack: A set of hardware or software that provides the infrastructure for
a computer

Northbridge: interconnects stuff like RAM and video cards

Open SSH: The most popular program to use SSH within Linux

Open source: This means the developers will let other developers share, modify,
and distribute their software for free

Operating system: The whole package that manages our computers resources
and lets us interact with it
Overclocking: it increases the rate of your CPU clock cycles in order to perform
more tasks

PC: Personal computer, which technically means a computer that one person
uses

PCI Express: Peripheral Component Interconnect Express

PDA (Personal Digital Assistant): Allows computing to go mobile

Peripherals: the external devices which we connect to our computer that add
functionality, like: a mouse, a keyboard, and a monitor

Pin Grid Array (PGA): CPU socket where the pins are located on the processor
itself

Plink (PuTTY Link): A tool built into the command line after PuTTY is installed
that is used to make remote SSH connections

Ports: Connection points that we can connect devices to that extend the
functionality of our computer

POST (Power On Self Test): It figures out what hardware is on the computer

Powershell: A shell (program that interprets text commands) for Windows

Power supply: Converts electricity from our wall outlet onto a format that our
computer can use

Power user: Above average computer users

Process management: The capacity to manage the many programs in a system –


when to run them, the order they run in, how many resources they take up, how
long they run, etc.
Programming: Coding in a programming language

Programming language: Special languages that software developers use to


write instructions for computers to execute

Programs: Basic instructions that tell the computer what to do

Punch cards: A sequence of cards with holes in them to automatically perform


calculations instead of manually entering them by hand

Qwiklabs: An online platform which provides training in cloud services

RAM: Random Access Memory

Registers: An accessible location for storing the data that our CPU works with

Reimaging: The process of reimaging involves wiping and reinstalling an


operating system using a disk image which is a copy of an operating system

Remote connection: The ability to connect an authorized person to a computer


or network remotely; allows us to manage multiple machines from anywhere in
the world

Remote Desktop Protocol (RDP): A secure network communication protocol


developed by Microsoft that allows a user to connect to another device remotely

Return merchandise authorization (RMA): The process of receiving returned


merchandise and authorizing a refund

RGB model: RGB or red, green, and blue model is the basic model of
representing colors
ROM chip (Read Only Memory): A read-only memory chip where the BIOS is
stored

Router: A device that knows how to forward data between independent


networks

RPM: Revolutions per minute

Safe operating temperature: The temperature range in which rechargeable


batteries must be kept in order to avoid demanage

SATA: The most popular serial ATA drive, which uses one cable for data transfers

Scalability: The measure of a system’s ability to increase or decrease in


performance and cost in response to varying loads in system processing
demands

Script: It is run by an interpreter, which interprets the code into CPU instructions
just in time to run them

Scripting: Coding in a scripting language

SDRAM: It stands for Synchronous DRAM, this type of RAM is synchronized to our
systems’ clock speed allowing quicker processing of data

Server logs: Text files that contains recorded information about activities
performed on a specific web server in a defined period of time

Servers: Devices that provide data to other devices that request that data, also
known as a client

Shell: A program that interprets text commands and sends them to the OS to
execute
SOC (System On a Chip): Packs the CPU, Ram, and sometimes even the storage
onto a single chip

Software: The intangible instructions that tell the hardware what to do

Software bug: An error in software that causes unexpected results

Software management: A broad term used to refer to any and all kinds of
software that are designed to manage or help manage some sort of project or
task

Southbridge: It maintains our IO or input/output controllers, like hard drives


and USB devices that input and output data

SSD: Solid State Drive

SSH (Secure shell): A protocol implemented by other programs to securely


access one computer from another.

SSH authentication key: A secure authentication method for accessing a


computer from other device

SSH client: A program you must have installed on your device in order to
establish an SSH connection with another device

SSH server: Software installed on a machine that allows for that device to
accept an SSH connection

Standardization: A systematic way of naming hosts

Standoffs: Used to raise and attach your motherboard to the case

Swap space: The allocated space where the virtual memory is stored on the
hard drive when the amount of physical memory space is used up or full

Switches: Devices that help our data travel


System: A group of hardware components and software components that work
together to fun the programs or processes in the computer

System settings: Settings like display resolution, user accounts, network,


devices, etc.

System software: Software used to keep our core system running, like operating
system tools and utilities

Task bar: It gives us quick options and shows us information like network
connectivity, the date, system notifications, sound etc

Terminal: A text based interface to the computer

Thermal paste: A substance used to better connect our CPU and heat sink, so
the heat transfers from to the other better

Time slice: A very short interval of time that gets allocated to a process for CPU
execution

Transfer Control Protocol (TCP): A protocol that handles reliable delivery of


information from one network to another

Type-C connector: A type of USB connector meant to replace many peripheral


connections

Ubuntu: The most popular Linux consumer distribution

UEFI: United Extensible Firmware Interface

Uniform Resource Locator (URL): A web address similar to a home address


USB (Universal Serial Bus): A connection standard for connecting peripherals to
devices such as computers

USB-C adapter: One of the standard power, data and display connector types
used in mobile devices

User name: A unique identifier for a user account

User space: The aspect of an operating system that humans interact with
directly like programs, such as text editors, music players, system settings, user
interfaces, etc.

UTF-8: The most prevalent encoding standard used today

Virtual Box: An application you can use to install Linux and have it completely
isolated from your machine

Virtual machine (VM): An application that uses physical resources like memory,
CPU and storage, but they offer the added benefit of running multiple operating
systems at once

Virtual memory: A combination of hard drive space and RAM that acts like
memory which our processes can use

VPN (Virtual private network): A secure method of connecting a device to a


private network over the internet

WannaCry Attack: A cyber attack that started in Europe and infected hundreds
of thousands of computers across the world

Wireless networking (Wi-Fi): Networks you connect to through radios and


antennas
World Wide Web (WWW): The information system that enables documents and
other web resources to be accessed over the Internet

You might also like