Highlighters Index

In this section, we've attempted to compile the facts within the exam's subject areas that you are most likely to need another look at—in other words, the areas of study that you might have highlighted while reading the Study Guide. The title of each highlighted element corresponds to the heading title in the A+ Essentials Study Guide. In this way, if you have a question about a highlight, you can refer back to the corresponding section in the Study Guide. For the most part, the entries under a heading are organized as term lists with main points that you need to memorize for the exam.

This subsection covers a summary of highlights from the "Personal Computer Components" section in the A+ Essentials Study Guide.

Types of motherboards
  • There are two types of motherboards: integrated and nonintegrated.

  • Integrated motherboards natively possess most essential components (a video adapter and network interface card are two examples) on it.

  • A nonintegrated motherboard needs such components to be installed as add-on cards.

  • Most new personal computers have integrated motherboards.

  • The Form Factor specifies the design of the motherboard as well as details such as size and layout of components.

ATX
Micro ATX
BTX
NLX
Chipsets
BIOS/Firmware
Memory slots and cache
Processor sockets
Integrated I/O ports
Expansion bus slots
Floppy disk and hard disk connectors
Power supplies
Characteristics of processors
Random Access Memory (RAM)
Types of memory
Memory modules (Packaging)
Hard disk drives
CD drives
DVD drives
Flash memory
Video technologies
Types of monitors
Types of port connectors
Cooling fans
CPU cooling
Drive preparation
Installing/upgrading display devices
Basic troubleshooting theory
Basic diagnostic procedures
Hardware tools
Software tools and utilities
Identifying problems
Preventive maintenance (PM)

This subsection covers a summary of highlights from the "Laptop and Portable Devices" section in the A+ Essentials Study Guide.

Laptop components
  • The size of a laptop is much smaller than a desktop because all of its components are in a single case.

  • The cost of a laptop is more than a standard desktop of comparable configuration.

  • Laptop components are not equally good in performance compared to desktops, and offer limited expandability.

  • Laptops require special repair skills and proprietary replacement parts.

Laptop motherboards and processors
  • Most laptop motherboards are proprietary and have a small form factor compared to desktop motherboards.

  • Most interfaces—such as serial, parallel, USB, video, network, modem, and sound—are integrated due to shortage of space.

  • Laptop processors are usually soldered directly to the motherboard.

  • Processor throttling allows the OS to put the processor in active sleep mode or slow-down mode when not in use.

  • Laptop processors require less power to run than desktop processors.

Laptop power supply
  • Laptops use battery power when not connected to the AC mains.

  • The AC adapter charges the battery as long as the laptop is connected to the AC mains.

  • A DC adapter can be plugged into a DC power outlet in a car or an airplane.

  • Nickel Cadmium (NiCd), Nickel Metal Hydride (NiMH), or Lithium-Ion (LiIon) are leading types of batteries used for laptops.

  • The milliAmp-Hour (mAH) rating indicates the capacity of the battery.

  • Most laptops use LiIon batteries because they are lightweight and have a longer life.

Laptop memory
  • Laptops use smaller memory modules called MicroDIMM or SO-DIMM.

  • MicroDIMM has 144 or 172 pins and supports a 64-bit data bus.

  • MicroDIMM is about half the size of a SO-DIMM and has a capacity of up to 1 GB.

  • SO-DIMM has 72, 100, 144, or 200 pins.

  • The 72- and 100-pin SO-DIMMs support a 32-bit data transfer while the 144- and 200-pin SO-DIMMs support a 64-bit data bus.

  • SO-DIMMs have a storage capacity of up to 2 GB.

LCD technologies
  • An Active Matrix LCD screen utilizes the Thin Film Transistor (TFT) technology.

  • An Active Matrix LCD screen is made up of a matrix of several pixels.

  • Active Matrix LCDs offer good response time, high screen resolution, and crisp picture quality.

  • Passive Matrix LCD screens use a simple grid to supply a charge to a particular pixel in the display.

  • Passive Matrix LCD screens offer lower screen resolution, slower response time, and poorer image quality than does an Active Matrix LCD.

Resolution, native resolution, aspect ratio, and contrast ratio
  • The number of rows and columns of pixels measure screen resolution.

  • Aspect ratio refers to the ratio of width and height of the screen.

  • The single fixed resolution of the LCD screen is called the native resolution.

  • Contrast ratio is the ratio of lightest color and the brightest color that a video display can produce.

Storage devices
  • Laptops use hard drives, floppy drives, and CD/DVD drives for data storage.

  • A laptop hard drive is about 2.5" wide and 1/2" thick, and has smaller connectors.

  • The CD and DVD drives for laptops are about 1/2" thick.

  • A floppy drive is optional in most laptops.

Pointing devices
  • A trackball functions just like a normal mouse turned upside down.

  • A touchpoint or a finger mouse uses a small stick with a rubber tip that moves the on-screen pointer.

  • The touchpad consists of a rubber pad, which is sensitive to a finger's touch.

  • On a touch screen, you just have to touch an appropriate button in order to select an item from the menu.

Laptop expansion buses and ports
  • The Mini PCI bus is a 32-bit bus operating at 33 MHz that uses a 3.3 volt power connection.

  • Three different form factors of Mini PCI bus are Type I, Type II, and Type III.

  • Type I and Type II buses have a 100-pin connector while the Type III bus has a 124-pin connector.

  • A Type I PC Card is used for memory modules, Type II is used for network and modem adapters, and Type III is used for hard drives.

  • The PCMCIA bus standard is also known as the PC Card standard.

  • PCMCIA 2 has a 16-bit bus, and the PCMCIA 3 has a 32-bit bus.

  • Socket Services Software and Card Services Software are two main components of a PC Card.

  • External devices such as thumb drives, keyboards, or a mouse can be connected using USB ports.

  • Most laptops have a 15-pin VGA connector for attaching an external monitor.

  • Laptops support a variety of wireless connections for networking.

  • An Ethernet connection can be made using the RJ-45 port.

  • A telephone line is connected for a dial-up modem using the RJ-11 port.

Docking station
Power management
Power Options in Windows
Safely removing devices
Power problems
Keyboard and pointing device problems
Display problems
Networking problems
Preventive maintenance (PM)

This subsection covers a summary of highlights from the "Operating Systems" section in the A+ Essentials Study Guide.

Windows 3.x
  • Windows 3.x was the first 16-bit OS to effectively manage computer memory.

  • Windows 3.1 supported multimedia devices and had an improved GUI.

  • It included error protection for system and applications through Object Linking and Embedding (OLE).

  • Windows 3.11 (Windows for Workgroups) supported both 16- and 32-bit applications.

Windows 95/98/Me/NT/2000
  • Windows 95 supported both 16- and 32-bit applications.

  • It had the ability to network computers, and supported Plug and Play (PnP) devices.

  • Windows 98 was released in 1998, followed by Windows Me.

  • Windows NT Workstation and Windows NT Server had versions named Windows NT 3.5x and Windows NT 4.0.

  • Windows NT supported multitasking.

  • Windows NT introduced domains for effectively managing users, computers, resources, and security in the network.

  • Windows 2000 OS has Windows 2000 Professional and Windows 2000 Server editions.

Windows XP
  • Windows XP Professional Edition is used as a client operating system in networked environments.

  • Windows XP Home Edition is used for standalone home computers.

  • Windows XP Media Center Edition is used where multimedia capabilities are more important than other features.

Windows Server 2003
  • Windows Server 2003 R2 is the current server OS.

  • Editions of this OS include Windows Small Business Server, Web, Standard, Enterprise, and Datacenter.

  • It supports both 32- and 64-bit microprocessors.

  • It supports centralized management for applications, users, data storage, and security through a centralized database called Active Directory.

  • It has strong support for client/server-based applications and services.

  • It supports server clusters for providing fault tolerance and network load balancing for improved performance.

Windows Vista
  • Windows Vista is the latest desktop operating system from Microsoft.

  • Different editions of this OS include Home Basic, Home Premium, Business, Ultimate, and Enterprise.

  • Windows Aero (which is a 3-D graphical interface) and centralized management are some of the attractions of Windows Vista.

  • Windows Vista includes Internet Explorer 7.

MAC OS
  • The MAC OS is used primarily on Apple Macintosh computers.

  • Its GUI is similar to Windows and is called Aqua.

  • The most current version of this OS is the MAC OS X.

  • Older Apple computers used PowerPC microprocessors but now use both Power PC and Intel processors.

Linux
  • Linux has Unix-like functionality and is an extremely stable and reliable OS.

  • Some distributions of Linux are Red Hat, Mandrake, SuSe, and Debian.

  • The hardware requirements for each variation of Linux OS are different.

  • There is no standard graphical user interface for Linux.

Windows desktop
Taskbar
Start menu
Desktop icons
Control Panel
The System Control Panel
Windows Registry
Virtual memory
Windows system files
Basic disks
Dynamic disks
Filesystems
Windows Explorer
File attributes
File permissions
OS installation methods
Installing Windows
Installing over the network
Post-installation tasks
Installing devices and drivers
Optimizing performance
Understanding boot sequence
Advanced boot options
Recovery Console
System Restore (Windows XP)
Automated System Recovery (ASR) (Windows XP)
Troubleshooting procedures
Operational problems
Disk management utilities
System management utilities

This subsection covers a summary of highlights from the "Printers and Scanners" section in the A+ Essentials Study Guide.

The laser printing process
  • Laser printing involves cleaning, conditioning, writing, developing, transferring, and fusing processes.

  • In the cleaning process, a rubber blade in the cleaning assembly removes the particles of toner residing on the drum's surface, and a discharge lamp removes the remaining charge from the drum and makes it neutral.

  • In the conditioning process, the primary corona wire charges the drum surface with a high negative voltage (−600 to −1000 volts).

  • In the writing process, a highly focused beam of laser light scans the drum surface and removes some of the charge.

  • In the developing process, the toner particles charged with −200 to −500 volts are electrostatically attracted to the drum's surface where the laser light left the image.

  • In the transferring process, the positively charged paper attracts the toner particles from the drum, leaving the image on the positively charged paper when the drum is pressed over the paper.

  • In the fusing process, the paper is passed through the fuser assembly containing pressure rollers and heating rollers to apply heat and pressure to the paper that firmly bonds the toner particles to the paper surface.

Inkjet printing process
  • The printing process starts with cleaning the printhead.

  • The stepper motor engages rollers to pick a piece of paper from the paper tray and guide it into the printer.

  • The printhead stepper motor moves the printhead assembly across the paper and stops at each point for a fraction of a second to spray multiple dots of ink on the paper surface.

  • The paper feed motor then moves the paper to the next line. This process continues until the printing process is complete.

  • Once the printing process is complete, the paper feed assembly pushes the paper onto the paper tray, and the printhead is then parked in its home position.

Impact printers
  • These printers use a head or a needle that is hit against an ink ribbon to place a mark on the paper.

  • These produce significant noise but are very efficient for printing multipart forms.

  • Dot matrix, daisy wheel, and line printers are all impact printers.

Dot matrix printers
Thermal printers
Solid ink printers
Printer interfaces
Printer software
Printer supplies
Types of scanners
Components of a scanner
The scanning process
Scanner interfaces
Installing printers and scanners
Troubleshooting inkjet printers
Troubleshooting laser printers
Troubleshooting dot-matrix printers
Problems with scanners

This subsection covers a summary of highlights from the "Networks" section in the A+ Essentials Study Guide.

Types of networks
  • A local area network (LAN) is a network of joined computers in a small office, a home, or a building.

  • A wide area network (WAN) connects two or more LANs.

  • A personal area network (PAN) is a network of devices located in close proximity of each other.

  • A metropolitan area network (MAN) connects LANs in a campus or inside the boundaries of one city.

Networking models
  • In the centralized computing model, all processing is done on a central computer, and the clients are called dumb terminals.

  • A client/server network is based on the centralized computing model.

  • A client/server network is scalable to very large-scale internetworks.

  • In a decentralized computing model, all processing and resources are distributed among several computers.

  • A peer-to-peer (P2P) network or a workgroup is based on a decentralized computing model.

Network topologies
  • In a star topology, computers (or nodes) connect to each other through a central device, called a hub or a switch.

  • In a bus topology, all computers are connected to a single cable called a backbone using T-connectors.

  • In a mesh topology, each computer makes a point-to-point connection to every other computer.

  • In a ring topology, each computer is connected to its neighboring computer to form a logical ring using a Multi-Station Access Unit (MSAU).

  • In a wireless topology, computers connect to each other using radio frequencies.

Twisted pair cables
  • These cables use pairs of insulated cables bundled inside a plastic sheath.

  • The twists are used to prevent electromagnetic interference, which causes crosstalk.

  • These cables are identified by category numbers denoted as CAT-1, CAT-2, CAT-3, CAT-5, etc.

  • Unshielded twisted pair (UTP) cables are inexpensive. CAT5 UTP is the most commonly used type.

  • Shielded twisted pair (STP) cables come with a layer of shielding material between the cables and the sheath for preventing interferences.

Plenum/PVC
  • Plenum refers to the space between the main ceiling and the dropped ceiling.

  • The network cable used in this space is known as plenum cable and is surrounded by a fire-retardant jacket.

  • The jacket consists of a low-smoke polyvinyl chloride (PVC) or fluorinated ethylene polymer (FEP).

Fiber optic cable
Network connectors
Network devices
Transmission Control Protocol/Internet Protocol (TCP/IP)
Internet Packet Exchange/Sequenced Packet Exchange (IPX/SPX)
TCP/IP addressing
Subnetting
IPX addressing
LAN technologies
Internet Service Provider (ISP)
Integrated Services Digital Network (ISDN)
Digital Subscriber Line (DSL)
Wireless
Infrared
Bluetooth
Installing a network adapter
Status indicators
Troubleshooting network media
Troubleshooting network devices
Troubleshooting wireless connectivity

This subsection covers a summary of highlights from the "Security" section in the A+ Essentials Study Guide.

Authentication technologies and protocols
  • Authentication is the process of verifying the identity of a person.

  • It is the first point of controlling access to a system.

  • In computer security, authentication protocols are used to verify the identity of a person or an application seeking access to a system, object, or resource.

Username and password
Biometrics
Smart cards
Security Tokens
Digital certificates
Multifactor
Challenge Handshake Authentication Protocol (CHAP)
Kerberos
Virus
Trojan
Worm
Spam
Spyware, adware, and grayware
Software firewalls
Filesystem security
Wireless authentication
Wired Equivalent Privacy (WEP)
Data access security
Backups
Encryption
Data migration
Data remnant removal
Password management
Physical security
Incident reporting
Social engineering
Preventive maintenance procedures for security

This subsection covers a summary of highlights from the "Safety and Environmental Issues" section in the A+ Essentials Study Guide.

Safety hazards
  • A safety hazard can potentially cause physical harm or injury.

  • A poorly laid-out workplace increases the chances of accidents.

  • Hazards in the workplace must be identified.

  • Most hazards can be easily spotted or their risk can be reduced.

Identifying safety hazards
  • Identify loose or trailing network and electrical cables or cables that are not running through proper routes.

  • Faulty electrical equipment should either be repaired or stored safely.

  • Workstations located near hazardous materials should be relocated elsewhere.

  • Persons working on electronic devices should use precautions to prevent electrostatic discharge (ESD).

  • Consult MSDS for proper handling, usage, transportation, and storage of hazardous materials.

  • Flammable material should be handled appropriately.

  • Chemicals, batteries, and cleaning products should be stored at designated places.

  • Waste materials should be disposed of using appropriate guidelines.

  • Proper protective wear should be used when working with hazardous materials.

  • Employees should be trained on safe use of hazardous materials.

  • Only trained personnel should be allowed to work on locations where hazards exist.

Material Safety Data Sheet (MSDS)
  • This is a document accompanying chemicals or other hazardous materials.

  • It provides instructions on safe usage, potential hazards, and methods for safe disposal of a hazardous material.

  • The MSDS contains the product name, its chemical name, the name of the manufacturer, and the address and telephone number.

  • A product can be listed as hazardous due to reasons such as toxic, corrosive, or flammable nature.

  • A product might burn or explode when subjected to certain conditions.

  • The MSDS contains procedures for safe storage, handling, moving, and transportation of the product.

  • It explains what labels or signs should be posted inside and outside the designated storage place.

  • It explains how to contain spillage or leakage of the product.

Handling safety incidents
  • The person observing a hazard should immediately report it to the concerned supervisor.

  • Incidents that do not involve personal injury should also be reported.

  • Incidents involving serious personal injury need immediate attention.

  • Safety incidents can also cause damage to the property.

ESD precautions
  • Wear ESD wrist straps when working on computer components.

  • Place components on antistatic ESD table mats.

  • Discharge static electricity in your body by touching a grounded metal surface.

  • Hold printed circuit boards from the edges.

  • Avoid touching the semiconductor chips and connection pins on cards.

  • Use conductive flooring in places where repairs are done.

  • Use ESD safe protective packaging for storing and transporting components.

  • Humidity levels should be controlled. Increasing humidity levels to 70 pecent or above helps reduce static charge build-up.

Equipment handling
  • Electrical and electronic equipment should be connected using grounded 3-pin power cables.

  • Check the power cords regularly for possible damage.

  • Power off and unplug the equipment before opening the cover for service or repair.

  • Move computer parts such as CPUs and printers in carts.

  • Do not lift or carry any heavy equipment by hand.

  • Store computer equipment in designated places where humidity and temperature are controlled.

Disposal procedures
  • Batteries contain metals and chemicals such as cadmium, copper, mercury, zinc, manganese, lithium, and nickel.

  • Batteries collected from households are disposed of in hazardous waste landfills.

  • CRT monitors contain toxic substances such as lead, mercury, cadmium, phosphorus, and barium.

  • Batteries and monitors should be sent to recycling centers.

  • Read the MSDS instructions on how to safely dispose of chemicals.

  • Keep unused chemicals in their original containers.

  • Do not drain the unused part of chemicals into household drainage.

This subsection covers a summary of highlights from the "Communications and Professionalism" section in the A+ Essentials Study Guide.

Privacy
Talking to the customer
Active listening
Asking questions
Do not be judgmental
Professional behavior
Use of property