Working with the Windows OS
There is a lot of hype currently about A.I., however, the concept has been around for decades. Before we dive into A.I., let me explain a related term; machine learning.
A.I. is this concept supercharged. It combines a variety of fields to create devices that can reason, learn, and respond to input in new and unique ways.
Using API's, scripts, and software to complete time consuming and monotonous tasks. E.G. copying and pasting data from a ticketing system to an Excel sheet.
Bluetooth: used to connect two devices that are close to each other (~30 feet). Common in wireless earbuds, wireless printers, etc. Switches frequency hundreds of times a second. Devices have to be paired first
NFC (Near-Field Communication)
connect devices over very short distances (~4 inches). Commonly used for mobile payments, like Google Pay
(Dynamic Host Configuration Protocol) -- allows for automatically assigning and reserving IP addresses for connected devices. Can provide default gateway, domain name, DNS servers and time servers info to devices. It is like the road map of the network.
In a small office / residential setting DHCP is often handled by the router. In an enterprise setting DHCP runs on a server instance and device connect and renew IP leases.
(Domain Name System) - provides a naming system for resources on the internet or other IP networks. Converts a common name to the IP address of the resource. It consists of a set of distributed servers maintain the domain name hierarchy and IP address spaces for the internet.
Convert plain-text into a form that is unreadable without a decryption key. Ensures confidentiality and protects data at rest and it transit in data transmissions. You can employ symmetric (where both sender / receiver have the same key) or public keys (where the only the receiver has the key to decrypt).
TLS (transport layer security): uses encryption to provide secure communications for services like email, VoIP phones, HTTPS requests and more. Runs in the Application layer.
A network device (or software) that monitors network traffic and allows or blocks inbound / outbound traffic on the network based on rules. They evaluate packets against an number of criteria:
Firewalls are used to protect corporate networks from the public internet and on individual devices as part of the overall security suite.
Open Systems Interconnection model) - rules / concepts that are used in data transmission and troubleshooting network issues.
There are 7 layers:
Uses psychological manipulation (fear, urgency, empathy) to get a person to share sensitive data or take an action, like opening a link. Phishing is the most common social engineering attack.
A type of attack in which perpetrators create fake webpages, email addresses, phone number and domains that look legitimate, but are not. Victims then divulge private information.
An attack in which the victim’s files are encrypted and the attacker demands payment to decrypt the files. The file name extensions change and the victim can’t open there own documents.
You need to know the basic parts of a computer. There are some differences between laptop and desktop devices, this is hardware you’ll find in both.
Motherboard: the motherboard contains, houses, or connects to all the other parts of the computer. Things like the CPU and RAM are directly connected to the motherboard, while other devices, like power supplies connect to it. The motherboard is covered in wires, resistors and components.
CPU: central processing units is like the ‘brain’ of the computer, executing code at the binary level from the instructions it is given.
GPU: graphical processing unit is specifically designed to handle computer graphics. Modern video and gaming demands require a lot of comput power to meet, so GPUs were developed to provide smooth graphics.
PCIe: Peripheral Component Interconnect Express are slots on the motherboard you can plug memory and other cards into. GPU’s are plugged into a PCIe slots in desktop devices often and in laptops you can easily change out or add RAM with a PCIe slot.
RAM: Random Access Memory is the short term memory storage for the
(Application programing interface) enable disparate applications to communicate with each other and exchange data. The API is the set of rules (or protocols) used to coordinate this exchange. E.G. if you log into a website using a Google account to authenticate, that website is making and API call to Google.
Used to direct network traffic to the correct services, E.G. port 443 for HTTPS traffic.
Think back to the OSI model and how data flows from outside a network, to a connected device, and back out again (see OSI model above). The network is all the devices and software running to make that function. From cables coming into the building from the internet provider, to switches to route data, access points to provide a wireless connection, and firewalls on client device to filter packets.
Many of the things we do on computers, like checking email or browsing the web, rely on services running as background processes. These services each have a specific set of rules (protocols) that govern how they work. Protocols are what define how data is sent, received and encapsulated in transit. Also, most protocols use a specific port number to communicate on.
Here are some of the most important ones:
SaaS, Paas, IaaS: these refer to how cloud providers deliver products to their customers and how much management and updating you’re responsible for as the network administrator.
Uses radio waves to provide wireless network connection for devices. Almost all personal devices that connect to the internet have a wi-fi cards inside. To provide Wi-Fi to client devices, you install access points (AP) throughout the building. Devices need to be no more than about 100 feet away from the AP, and less with walls and obstacles in the way.
There are two primary wavelengths used in wifi set ups, 2.4 Ghz and 5 Ghz, and a number of common bands used, 802.11a, 802.11b, 802.11g and 802.11n.
**For the Comptia exams, you’ll need to know the speeds and reach of each of these bands.
Virtual private networks create a secure, encrypted connection between a device and a remote server (or two devices) . Workplaces often use them to protect data.
Each device that connects to the internet needs a unique IP (internet protocol) address so it can receive and send data. They consist of 4 groups of numbers separated by a period, e.g. 192.168.4.26. Often, you create a range of addresses (called a subnet) to logically group devices and manage them more easily, or to keep different subnets isolated from each other / the public internet.
Running a holiday sale or weekly special? Definitely promote it here to get customers excited about getting a sweet deal.