NSLOOKUP command-line tool, 112 


Мы поможем в написании ваших работ!



ЗНАЕТЕ ЛИ ВЫ?

NSLOOKUP command-line tool, 112



NTFS (New Technology

File System), 143

files, 109

permissions, 128-130

 

NVRAM (nonvolatile

 

RAM), 11

 

O

 

OLED (Organic LED), 76

 

Olympus/Fujifilm xD-Pic-

 

Ture Card, 64


 

 

Open Handset Alliance, 149

 

operating systems. See OSs

 

Operational Procedures,

 

91-96

 

Optical drives, 24

 

installing, 25-28 replacing, 68-69

Options

 

built-in overclocking, 2 expansion, laptops, 61-64

 

Organic LED (OLED), 76

 

Orientation, modifying screens, 151-152

 

OSs (operating systems)

 

mobile devices, 149-154

 

overview of, 97

 

troubleshooting, 185-192

 

Windows

 

Administrator accounts/ UAC, 103-104

 

client networking, 121-126

 

client-side virtualization, 131-133

 

command-line tools, 111-113

 

Control Panel tools, 118-121

 

determining compatibility, 108

 

differences in editions, 98-103

 

directories, 104-105

 

features, 113-118

 

installing, 108-111

 

maintenance, 127

 

Program Compatibility

 

Wizard, 104

 

Registry, 105-106

 

security, 128-130


ports 217


 

 

system requirements, 98

 

upgrading, 106-107

 

Outer shells, replacing, 75

 

Overclocking options, 2

 

Overwriting drives, 144

 

P

 

Packets, 44, 137

 

Pages per minute (PPM), 81

 

Paging files, 11

 

PANs (personal area net-works), 57, 155-156

Parallel (LPT) ports, 35

Parallel ATA (PATA)

Drives, installing, 26

Parallel printers connec-tions, 88

Parity, 11

Partitioning, 109-110

 

Passive matrix LCD moni-tors, 34

 

Passwords

 

formatting, 141-142

 

modifying, 139

 

security, 136

 

PATA (Parallel ATA)

 

Drives

 

formatting, 144

 

installing, 26

 

Patch cables, 40

 

PC Card (16-bit), 61

 

PCIe (PCI Express) bus, 61

 

PCMCIA (Personal Computer Memory Card International Association) cards, 61-62

 

PCs (personal computers)

 

adapter cards, 19-22

 

BIOS, 11-15


 

 

configurations, 36-37 cooling methods, 30 CPUs

 

32-bit versus 64-bit, 1-2 caches, 3

clock rates, 2 cooling methods, 8 cores, 2-3 graphics, 4 hyperthreading, 4 replacing, 71-73 sockets, 4-8 virtualization, 4

integrated ports, 22 I/O devices, 35-36 laptops. See laptops memory, 9-11 monitors, 33-35 motherboards, 15-19

 

operating systems, 97-104 Operational Procedures, 91-96

 

OS (operating systems), 10-3-113

 

power supplies, 31-32 storage devices, 23-29

 

Performance

 

32-bit versus 64-bit CPUs,

 

1-2 caches, 3

 

clock rates, 2 cooling methods, 8 cores, 2-3 graphics, 4 hyperthreading, 4 memory, 11 sockets, 4-8 virtualization, 4


 

 

Performance Monitor, 114

 

Performance (virtual

 

Memory) setting (Control

 

Panel), 119

 

Peripherals, 1

 

Permissions

 

NTFS, 128-130, 143

 

shares, 130

 

sharing, 143

 

personal area networks. See PANs

 

personal computers. See PCs

 

personal identification number. See PIN

 

PGA (Pin Grid Array), 4

 

Phishing, 139

 

Physical disk destruction, 145

 

Physical keys, 135

 

Physical security, preven-tion methods, 135

 

Piezoelectric nozzles, inkjet printers, 84

 

PING command-line tool, 112

 

Pin Grid Array (PGA), 4

 

PIN (personal identification number), 136

 

Pixels, 34

 

Plan of action, trouble-shooting processes, 163

 

Plastics, replacing, 75

 

Portable air filtration, 94

 

Portals, security, 135

 

Portrait mode, 152

 

Ports

 

forwarding, 51

 

IEEE-1394, 110


218 POST (power-on self-test)


 

 

integrated, 22

 

replicators, 79

 

SATA, 25

 

TCP, 48

 

triggering, 51

 

VGA, 34

 

POST (power-on self-test), 9, 164

 

Power Plans setting (Control Panel), 120

 

Power

 

sources, replacing batteries, 64-65

 

supplies, 31-32

 

Control Panel, 120

 

DC jacks, replacing, 73 electrical fires, 93 electrical shock protec-tion, 92

troubleshooting, 164-170

 

PPM (pages per minute), 81

 

Preboot Execution Environment (PXE), 108-109

 

Preventing

 

data recovery, 144

 

ESD, 91-92

 

implementing, 163

 

prevention methods, secu-rity

 

data destruction/disposal, 144-145

 

digital security, 136-141

 

physical security, 135

 

workstation best prac-tices, 141-143

 



Поделиться:


Последнее изменение этой страницы: 2017-02-08; просмотров: 303; Нарушение авторского права страницы; Мы поможем в написании вашей работы!

infopedia.su Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав. Обратная связь - 18.221.111.22 (0.027 с.)