Friday, January 27, 2012

Follow the Simple Steps to develop the iPhone App and Submit it to App Store

It is not as hard or as simple to develop an iPhone App that one might think. As many people have misconception that iPhone Application development is really very hard, I want to remove this conception and motivate them to go for it by following the steps mentioned in the article below.
“Cooking” up an iPhone application also involves a process similar to Cooking. You can find here the steps which should be followed from head to the bottom i.e. from an app idea to its upload on the iTunes.
It must be clear to you that creating an iPhone app or the iPhone application development is not entirely free; also you will need a Mac at some point and so need to use specific Mac-happy code to develop the application.


MCTS Certification, MCITP Certification

Microsoft Commptia A+ Training , Comptia A+ Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


Are you excited now? Follow these exhilarating steps:
1. Design a Smart and Unique Idea

Think of a unique idea and craft the design in a way that one want to use your app. Develop the app in a way that people can pay you for that as they will get more in return of their money.

Please cross check about your idea in the app store that there is no app having the same idea. If you found one, go for a better app which already exists.

2. Get a Mac and Register on Apple as an Developer
As the iPhone development tools are available only for Mac Users, so it is necessary to get a Mac to have your app in the App Store. Mac mini will also serve the purpose.

After having a Mac, go for the free registration to become an official Apple Developer by providing them with your details and agreeing to their terms. Only once the registration is needed. After registration, you can develop iPhone apps for any of the Mac products.

3. Download iPhone Software Development Kit (SDK) and XCODE

Now you are an Official Apple Developer, you are allowed to download iPhone SDK. As SDK comes with all types of documents, sample codes and all the other things you might need later. So, the download is HUGE, and so will take a few hours. Do take care of its version, as it depends on the OS you are using.


As per Apple, “XCode is a complete, full-featured IDE built around a smooth workflow that integrates the editing of source code, with the build and compile steps, through to a graphical debugging experience – all without leaving the view of your source code.” So, go for this and download it.

4. Use the Templates in SDK for iPhone Application development
Start designing the app with the templates available in the SDK. In the SDK, you can find lot of templates to choose one from and also have great You tube clip tutorials to tell you how to use these templates effectively.
5. Program your App using Objective-C

Understand the basics of Objective-C and program your app. You can take screenshots as you precede that helps you remember what you tried. Time required by the apps totally depends on the app features and the details you want in it.

6. Test the application

Make the full use of the huge download of SDK you have done. SDK comes with a lovely iPhone simulator, load your app in it and test it on the simulator. Use the app in all the possible ways one can use and try to work out as many bugs as you can. Test it completely.

7. Upload the iPhone application on iTunes for Approval

Loading an app into iTunes costs a one time member fee of $99 (USD), and it is must to be paid. There is no way to get away of this amount. But, if your app is worthy, you can earn it back in many folds.

Test your App completely and work on all the issues and then submit for approval. Apple takes few days to approve it so be patient and wait for the response.

Wednesday, January 25, 2012

Major Symantec breach highlights risks of running old software

Symantec says it has fewer than 50,000 users of pcAnywhere, a remote-access program that has been around for decades. It now says, for safety’s sake, those users should pull the plug. Immediately.

Comptia A+ Training, Comptia A+ certification

Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com



PCAnywhere was ancient in June 1996, when Symantec shipped pcAnywhere 7.5 for Windows 95 and Windows NT Workstation 4.0. That’s the oldest press release I can find online, and it’s introducing version 7.5. The product already had seven releases at the dawn of the Windows era. And the software industry didn’t run at Internet speed back then.

People are still using versions even older than that. I am pretty sure the MS-DOS version of the remote-access program goes back to the late 1980s. And yet I found a support request on Symantec’s forums from May 2010—less than two years ago—from someone who needed to connect to a computer running MS-DOS 6.22 and PC Anywhere 5.0 for DOS.

This was well into the 21st Century.

pcAnywhere version 12.0 shipped in 2006. It’s had incremental releases since then, but Symantec hasn’t found any of those events important enough to issue a press release.

Let’s paint this picture in stark black and white: This is a six-year-old software program, built on decades of legacy code written in pre-Internet days, that is now in maintenance mode. Or, if you prefer, on life support.

And now Symantec is urging its users to pull the plug, at least temporarily. The company revealed the gory details this morning not in a press release, but in a 10-page white paper (PDF):

Upon investigation of the claims made by Anonymous regarding source code disclosure, Symantec believes that the disclosure was the result of a theft of source code that occurred in 2006. We believe that source code for the 2006-era versions of the following products was exposed: Norton Antivirus Corporate Edition; Norton Internet Security; Norton SystemWorks (Norton Utilities and Norton GoBack); and pcAnywhere.

I wouldn’t be worried about those antivirus and security programs. They have been regularly updated and heavily rearchitected since 2006, with significant upgrades every year. But pcAnywhere has been in maintenance mode, a forgotten product.

Symantec says fewer than 50,000 people are still using pcAnywhere. And now the company says, in no uncertain terms, they should stop:

With this incident pcAnywhere customers have increased risk. Malicious users with access to the source code have an increased ability to identify vulnerabilities and build new exploits. Additionally, customers that are not following general security best practices are susceptible to man-in-the-middle attacks which can reveal authentication and session information. General security best practices include endpoint, network, remote access, and physical security, as well as configuring pcAnywhere in a way that minimizes potential risks.

At this time, Symantec recommends disabling the product until Symantec releases a final set of software updates that resolve currently known vulnerability risks. For customers that require pcAnywhere for business critical purposes, it is recommended that customers understand the current risks, ensure pcAnywhere 12.5 is installed, apply all relevant patches as they are released, and follow the general security best practices discussed herein. [emphasis added]

I am not sure I have ever heard of a company advising its customers to stop using a product completely because it was too dangerous. But apparently the risk with pcAnywhere is so great that this is the only sane option.

There are many, many modern alternatives to allow secure external access to your business network or your home PC. If you’ve been hanging on to pcAnywhere, you’re now officially out of excuses to switch.

Update: Reached for comment, a Symantec spokesperson replied vie e-mail with a statement that repeated, almost word for word, the advice contained in the white-paper advisory. The spokesperson also referred customers to a Symantec site that hosts information on the breach:

Tuesday, January 24, 2012

Avaya launches iPad app for Flare Communicator

Avaya said it plans to add consumer devices and operating systems later in 2012 for Flare Communicator. Android would be an obvious next step.

MCTS Certification, MCITP Certification

Best Avaya Certification Training and Avaya Exams Training and more Cisco exams log in to examkingdom.com



Avaya has launched an iPad app for its Flare Communicator communications and collaboration systems.

Flare Communicator, generally available today, is a system that enables enterprise voice, instant messaging, presence and email over various networks. The app, which is available via Apple’s App Store, is an end point for Avaya’s effort to manage the consumerization movement.

According to Avaya, its Avaya Aura architecture with Flare Communicator are designed to manage bring your own device efforts at enterprises.

The company said it plans to add consumer devices and operating systems later in 2012. Android would be an obvious next step.

Flare Communicator allows for two simultaneous voice calls, contact lists, multitasking and secure connections. The app is free on Apple’s App Store and businesses with Avaya Aura 6.1 or later get 50 access licenses with no cost through Jan. 24 to April 30.

Monday, January 23, 2012

FC0-U41 Q & A / Study Guide

Comptia A+ Training, Comptia A+ certification

Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com


QUESTION 1
Which of the following statements about a riser card is true?

A. It is used to connect a computer in a network.
B. It is used to connect extra microprocessors.
C. It provides extra memory for expansion cards.
D. It is used to extend slots for expansion cards.

Answer: D

Explanation:
Riser card is a circuit board that is used to extend slots for expansion cards and provides the
ability to connect additional expansion cards to the computer. These cards are used with LPX
motherboards. With the introduction of ATX motherboards, riser cards are rarely used. In ATX
motherboards, the expansion cards connect directly to the computer motherboard instead of using
riser cards.
What is LPX?
LPX is a motherboard form or that is used in some desktop computers. In LPX motherboards,
expansion cards are inserted into a riser card that contains several slots. Unlike other common
form ors such as AT and ATX, the expansion cards in LPX are not vertical, but parallel to the
motherboard.
The LPX form or is designed for smaller cases, and usually it is used for connecting two or three
expansion cards.


QUESTION 2
Which of the following devices is used for accessing the data on Secure Digital (SD) card, MMC
card, and CompactFlash (CF)?

A. E-book reader
B. Memory card reader
C. Smart card reader
D. Barcode reader

Answer: B

Explanation:
A memory card reader is a device, typically having a USB interface, for accessing the data on a
memory card such as a CompactFlash (CF),
Secure Digital (SD) or MultiMediaCard (MMC).
Answer option C is incorrect. Smart card readers are used to read smart cards. It is used as a
communications medium between the smart card and a host.
Answer option D is incorrect. A barcode reader (or barcode scanner) is an electronic device for
reading printed barcodes.
Answer option A is incorrect. There is no such device as e-book reader.


QUESTION 3
Which of the following can be used to accomplish authentication?
Each correct answer represents a complete solution. Choose all that apply.

A. Biometrics
B. Encryption
C. Password
D. Token

Answer: A,C,D

Explanation:
The following can be used to accomplish authentication.
1. Password
2. Biometrics
3. Token
A password is a secret word or string of characters that is used for authentication, to prove
identity, or gain access to a resource.
What is authentication?
Authentication is a process of verifying the identity of a person, network host, or system process.
The authentication process compares the provided credentials with the credentials stored in the
database of an authentication server.
What is biometrics?
Biometrics is a method of authentication that uses physical characteristics, such as fingerprints,
scars, retinal patterns, and other forms of biophysical qualities to identify a user. Nowadays, the
usage of biometric devices such as hand scanners and retinal scanners is becoming more
common in the business environment. A token may be a physical device or software token that an
authorized user of computer services is given to ease authentication.
Answer option B is incorrect. Encryption can be used to accomplish security and not
authentication.


QUESTION 4
Which of the following devices can cause great harm to one's life with lethal electric shocks?
Each correct answer represents a complete solution. Choose two.

A. SMPS
B. Floppy drive
C. Monitor
D. Keyboard.

Answer: A,C

Explanation:
A computer monitor and SMPS are at high voltage. Therefore, these devices can be fatal. They
usually have large amount of electric charge stored in capacitors for days after they have been
unplugged from power source.
What is SMPS?
Switch Mode Power Supply (SMPS) is a device that converts raw input power to controlled voltage
and current for the operation of electronic equipment. SMPS uses switches for high efficiency.
Answer options D and B are incorrect. Keyboards and floppy drives do not store electric charge.
Therefore, they cannot cause lethal electric shocks.


QUESTION 5
Which of the following ports on a computer are used to connect a keyboard?
Each correct answer represents a complete solution. Choose two.

A. USB
B. DB-25
C. PS/2
D. DB-9

Answer: A,C

Explanation:
The PS/2 and USB ports on a computer are used to connect a keyboard.
What is USB?
Universal Serial Bus (USB) is a high speed bus standard developed by Compaq, IBM, DEC, Intel,
Microsoft, NEC, and Northern Telecom. It provides the Plug and Play capability of Windows to
external hardware devices. USB supports hot plugging, which means that a USB device can be
installed or removed while the computer is running. A single USB port can be used to connect up to
127 peripheral devices, such as CD-ROM drives, tape drives, keyboards, scanners etc. USB 1.1
has a maximum data transfer rate of 12 Mbps, whereas USB 2.0 has a maximum data transfer
rate of 480 Mbps. USB 2.0 is fully backward compatible with USB 1.1.
Answer options D and B are incorrect. The DB-9 and DB-25 port types on the computer are used
as serial ports. A DB-9 male type port has 9 pins, whereas a DB-25 male type port has 25 pins.
What is a serial port?
Serial port is the primary means for connecting modems and mouse to a computer. There are two
types of serial port connectors, 9-pin and 25-pin. The word serial refers to the data is sent in
series, one bit at a time, over a single wire. This design is significantly slower than sending 8 bits
at a time via a parallel channel, but serial signals can travel much farther without degradation.


QUESTION 6
Which of the following features are related to power management?
Each correct answer represents a complete solution. Choose two.

A. Hot plugging
B. Hibernate mode
C. Standby mode
D. Safe mode

Answer: B,C

Explanation:
The Hibernate mode and Standby mode are features related to power management.
Hibernate mode is a power saving feature for computers. In hibernate mode, the current state of a
computer is saved to the hard disk, and the computer shuts down. A user will have to power on
the computer to restore the previous settings. When a computer resumes from hibernate mode, it
reads the saved settings from the disk and restores the system state as it was before it entered
hibernate mode. By default, hibernate mode is disabled. If a computer is not ACPI-enabled or
APM-enabled, users will have to enter hibernate mode manually. Users cannot set the computer
to automatically hibernate after a certain time. With ACPI-enabled and APM-enabled computers,
users are able to set hibernate mode automatically.
The standby mode is a power saving feature for computers. In this mode, a computer does not
shut down completely. The computer goes to low power state and, as a result, it consumes less
power.
When the computer resumes from the standby mode, full power is restored to its devices. During
the standby mode, if the power supply is disconnected or interrupted, data might be lost. The
standby mode is available automatically on ACPI-enabled or APM-enabled computers. Users do
not need to enable this mode manually. This mode is not available in non-ACPI and non-APM
based computers.
Answer option A is incorrect. Hot plugging is a feature in which a device can be installed or
removed while the computer is running.
Answer option D is incorrect. Safe Mode is a Windows feature used to start a computer with basic
drivers, such as mouse, keyboard, etc. It bypasses blocking issues, such as system corruption, or
installation of incompatible drivers or system services, enabling the Administrator to resolve such
issues.


QUESTION 7
Which of the following are types of LCD monitors?
Each correct answer represents a complete solution. Choose two.

A. SVGA
B. Active Matrix
C. Passive Matrix
D. X-Matrix

Answer: B,C

Explanation:
Two types of LCDs are available.
Active matrix
Passive matrix
Active matrix LCDs uses individual transistors to control each pixel on the screen. This type of
LCD consumes more power but provides sharper images than the passive matrix LCD. Passive
matrix Passive matrix screens do not refresh quickly to rapid changes. The passive matrix screen
displays weak colors. LCDs consume less power and are cheaper than Active matrix LCDs.
Answer option A is incorrect. SVGA is a type of CRT monitor used with the Desktop computers,
and not the LCD monitor.
Answer option D is incorrect. There is no LCD display type such as X-Matrix.


QUESTION 8
Which of the following transmits all ATSC HDTV standards and supports 8-channel digital audio?

A. DVI
B. S-Video
C. SVGA
D. HDMI

Answer: D

Explanation:
HDMI stands for High-Definition Multimedia Interface. It is a standard, uncompressed, and alldigital
audio/video interface. HDMI is capable of delivering the highest quality digital video and
multichannel digital audio on a single cable. It provides an interface between any audio/video
sources, such as a DVD player or a computer and a digital television (DTV) or video monitor.
HDMI transmits all ATSC HDTV standards and supports 8-channel digital audio, with extra
bandwidth to accommodate future enhancements. HDMI has two types of connectors. Type A and
Type B. Type A and Type B connectors use 19 pins and 29 pins, respectively. The Type B
connector is designed for very high-resolution displays that are expected in near future.
Answer option B is incorrect. S-Video, also known as Y/C video, stands for Super-Video. It is a
technology for video transmission. Using this technology, the video is transmitted into two
separate signals. One is used for color, and the other for brightness. Sometimes S-Video signals
are considered as a type of component video signal. However, its quality is inferior to other
complex component video schemes such as RGB. This technology produces sharper images than
those produced by composite video, which carries the entire set of signals in a single line. For
using SVideo, the device sending the signal must support S-Video output and the device receiving
the signal needs to have an S-Video input jack.
Answer option A is incorrect. DVI stands for Digital Visual Interface. It is a standard for high speed,
high resolution digital display invented by
Digital Display Working Group (DDWG). DVI accommodates analog and digital interfaces with a
single connector. New video cards have DVI as well as VGA ports built into them. Most of LCD
monitors come with a 15-pin VGA connection cable, even if they are capable of handling digital
signals coming from DVI connections. However, some monitors come with both types of cables.
DVI has three main categories of connectors. They are. DVI-A, DVI-D, and DVI-I. DVI-A is an
analog-only connector, DVI-D is a digital-only connector, and DVI-I is an analog/digital connector.
DVI-D and DVI-I connectors are of two types. single link and dual link. DVI supports UXGA and
HDTV with a single set of links.
Higher resolutions such as 1920 x 1080, 2048 x 1536, or more can be supported with dual links.
Answer option C is incorrect. A VGA or SVGA connector is a 15-pin, three rows, female connector,
on the back of a PC used for connecting monitors. Reference. "http.//en.wikipedia.org/wiki/High-
Definition_Multimedia_Interface"


QUESTION 9
You are handling IT support for a sales company. One of the sales representatives complains that
his laptop does not have a network card. You wish to add one via an expansion slot. What type of
expansion card should you use?

A. MCA
B. PCMCIA
C. PCI
D. AGP

Answer: B

Explanation:
PCMCIA is a widely used expansion card slot for laptops.
What is PCMCIA card? Personal Computer Memory Card International Association (PCMCIA)
card is also known as PC card.
The PC card uses a small expansion slot and is primarily used in laptops. However, PC cards are
also available in some of the desktop computers. There are three types of PCMCIA cards.
1.Type I
2.Type II
3.Type III
Answer option C is incorrect. PCI slots are used in PC's, not laptops.
Answer option D is incorrect. AGP is a legacy graphics slot for PC's.
What is AGP (Accelerated Graphics Port)?
AGP is a high speed 32-bit bus designed for high performance graphics and video support. It
allows a video card to have direct access to a computer's RAM, which enables fast video
performance. AGP provides a bandwidth of up to 2,133 MB/second.
Answer option A is incorrect. MCA is a legacy PC slot.
Reference. http.//www.wisegeek.com/what-is-an-expansion-card.htm


QUESTION 10
Which of the following terms refers to an anti-virus software file that is updated from time to time to
protect a computer from new viruses?

A. Definition
B. Modules
C. Service pack
D. Hotfix

Answer: A

Explanation:
Definition is an anti-virus software file that should be updated at regular intervals to protect a
computer from new viruses. This file is also known as virus definition file. The virus definition file
contains information about the latest viruses, which helps identify new viruses and protect
computers from them.
Answer option D is incorrect. Hotfix is a collection of files used by Microsoft for software updates
that are released between major service pack releases. A hotfix is about a problem, occurring
under specific circumstances, which cannot wait to be fixed till the next service pack release.
Hotfixes are generally related to security problems. Hence, it is essential to fix these problems as
soon as possible.
Answer option C is incorrect. A service pack is a collection of Fixes and Patches in a single
product. A service pack can be used to handle a large number of viruses and bugs or to update an
operating system with advanced and better capabilities. A service pack usually contains a number
of file replacements.
Answer option B is incorrect. This term does not refer to any anti-virus software file. Reference.
"http.//en.wikipedia.org/wiki/Computer_virus"

Comptia A+ Training, Comptia A+ certification

Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com

Comptia A+ Training, Comptia A+ certification

Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com


QUESTION 1
Which of the following statements about a riser card is true?

A. It is used to connect a computer in a network.
B. It is used to connect extra microprocessors.
C. It provides extra memory for expansion cards.
D. It is used to extend slots for expansion cards.

Answer: D

Explanation:
Riser card is a circuit board that is used to extend slots for expansion cards and provides the
ability to connect additional expansion cards to the computer. These cards are used with LPX
motherboards. With the introduction of ATX motherboards, riser cards are rarely used. In ATX
motherboards, the expansion cards connect directly to the computer motherboard instead of using
riser cards.
What is LPX?
LPX is a motherboard form or that is used in some desktop computers. In LPX motherboards,
expansion cards are inserted into a riser card that contains several slots. Unlike other common
form ors such as AT and ATX, the expansion cards in LPX are not vertical, but parallel to the
motherboard.
The LPX form or is designed for smaller cases, and usually it is used for connecting two or three
expansion cards.


QUESTION 2
Which of the following devices is used for accessing the data on Secure Digital (SD) card, MMC
card, and CompactFlash (CF)?

A. E-book reader
B. Memory card reader
C. Smart card reader
D. Barcode reader

Answer: B

Explanation:
A memory card reader is a device, typically having a USB interface, for accessing the data on a
memory card such as a CompactFlash (CF),
Secure Digital (SD) or MultiMediaCard (MMC).
Answer option C is incorrect. Smart card readers are used to read smart cards. It is used as a
communications medium between the smart card and a host.
Answer option D is incorrect. A barcode reader (or barcode scanner) is an electronic device for
reading printed barcodes.
Answer option A is incorrect. There is no such device as e-book reader.


QUESTION 3
Which of the following can be used to accomplish authentication?
Each correct answer represents a complete solution. Choose all that apply.

A. Biometrics
B. Encryption
C. Password
D. Token

Answer: A,C,D

Explanation:
The following can be used to accomplish authentication.
1. Password
2. Biometrics
3. Token
A password is a secret word or string of characters that is used for authentication, to prove
identity, or gain access to a resource.
What is authentication?
Authentication is a process of verifying the identity of a person, network host, or system process.
The authentication process compares the provided credentials with the credentials stored in the
database of an authentication server.
What is biometrics?
Biometrics is a method of authentication that uses physical characteristics, such as fingerprints,
scars, retinal patterns, and other forms of biophysical qualities to identify a user. Nowadays, the
usage of biometric devices such as hand scanners and retinal scanners is becoming more
common in the business environment. A token may be a physical device or software token that an
authorized user of computer services is given to ease authentication.
Answer option B is incorrect. Encryption can be used to accomplish security and not
authentication.


QUESTION 4
Which of the following devices can cause great harm to one's life with lethal electric shocks?
Each correct answer represents a complete solution. Choose two.

A. SMPS
B. Floppy drive
C. Monitor
D. Keyboard.

Answer: A,C

Explanation:
A computer monitor and SMPS are at high voltage. Therefore, these devices can be fatal. They
usually have large amount of electric charge stored in capacitors for days after they have been
unplugged from power source.
What is SMPS?
Switch Mode Power Supply (SMPS) is a device that converts raw input power to controlled voltage
and current for the operation of electronic equipment. SMPS uses switches for high efficiency.
Answer options D and B are incorrect. Keyboards and floppy drives do not store electric charge.
Therefore, they cannot cause lethal electric shocks.


QUESTION 5
Which of the following ports on a computer are used to connect a keyboard?
Each correct answer represents a complete solution. Choose two.

A. USB
B. DB-25
C. PS/2
D. DB-9

Answer: A,C

Explanation:
The PS/2 and USB ports on a computer are used to connect a keyboard.
What is USB?
Universal Serial Bus (USB) is a high speed bus standard developed by Compaq, IBM, DEC, Intel,
Microsoft, NEC, and Northern Telecom. It provides the Plug and Play capability of Windows to
external hardware devices. USB supports hot plugging, which means that a USB device can be
installed or removed while the computer is running. A single USB port can be used to connect up to
127 peripheral devices, such as CD-ROM drives, tape drives, keyboards, scanners etc. USB 1.1
has a maximum data transfer rate of 12 Mbps, whereas USB 2.0 has a maximum data transfer
rate of 480 Mbps. USB 2.0 is fully backward compatible with USB 1.1.
Answer options D and B are incorrect. The DB-9 and DB-25 port types on the computer are used
as serial ports. A DB-9 male type port has 9 pins, whereas a DB-25 male type port has 25 pins.
What is a serial port?
Serial port is the primary means for connecting modems and mouse to a computer. There are two
types of serial port connectors, 9-pin and 25-pin. The word serial refers to the data is sent in
series, one bit at a time, over a single wire. This design is significantly slower than sending 8 bits
at a time via a parallel channel, but serial signals can travel much farther without degradation.


QUESTION 6
Which of the following features are related to power management?
Each correct answer represents a complete solution. Choose two.

A. Hot plugging
B. Hibernate mode
C. Standby mode
D. Safe mode

Answer: B,C

Explanation:
The Hibernate mode and Standby mode are features related to power management.
Hibernate mode is a power saving feature for computers. In hibernate mode, the current state of a
computer is saved to the hard disk, and the computer shuts down. A user will have to power on
the computer to restore the previous settings. When a computer resumes from hibernate mode, it
reads the saved settings from the disk and restores the system state as it was before it entered
hibernate mode. By default, hibernate mode is disabled. If a computer is not ACPI-enabled or
APM-enabled, users will have to enter hibernate mode manually. Users cannot set the computer
to automatically hibernate after a certain time. With ACPI-enabled and APM-enabled computers,
users are able to set hibernate mode automatically.
The standby mode is a power saving feature for computers. In this mode, a computer does not
shut down completely. The computer goes to low power state and, as a result, it consumes less
power.
When the computer resumes from the standby mode, full power is restored to its devices. During
the standby mode, if the power supply is disconnected or interrupted, data might be lost. The
standby mode is available automatically on ACPI-enabled or APM-enabled computers. Users do
not need to enable this mode manually. This mode is not available in non-ACPI and non-APM
based computers.
Answer option A is incorrect. Hot plugging is a feature in which a device can be installed or
removed while the computer is running.
Answer option D is incorrect. Safe Mode is a Windows feature used to start a computer with basic
drivers, such as mouse, keyboard, etc. It bypasses blocking issues, such as system corruption, or
installation of incompatible drivers or system services, enabling the Administrator to resolve such
issues.


QUESTION 7
Which of the following are types of LCD monitors?
Each correct answer represents a complete solution. Choose two.

A. SVGA
B. Active Matrix
C. Passive Matrix
D. X-Matrix

Answer: B,C

Explanation:
Two types of LCDs are available.
Active matrix
Passive matrix
Active matrix LCDs uses individual transistors to control each pixel on the screen. This type of
LCD consumes more power but provides sharper images than the passive matrix LCD. Passive
matrix Passive matrix screens do not refresh quickly to rapid changes. The passive matrix screen
displays weak colors. LCDs consume less power and are cheaper than Active matrix LCDs.
Answer option A is incorrect. SVGA is a type of CRT monitor used with the Desktop computers,
and not the LCD monitor.
Answer option D is incorrect. There is no LCD display type such as X-Matrix.


QUESTION 8
Which of the following transmits all ATSC HDTV standards and supports 8-channel digital audio?

A. DVI
B. S-Video
C. SVGA
D. HDMI

Answer: D

Explanation:
HDMI stands for High-Definition Multimedia Interface. It is a standard, uncompressed, and alldigital
audio/video interface. HDMI is capable of delivering the highest quality digital video and
multichannel digital audio on a single cable. It provides an interface between any audio/video
sources, such as a DVD player or a computer and a digital television (DTV) or video monitor.
HDMI transmits all ATSC HDTV standards and supports 8-channel digital audio, with extra
bandwidth to accommodate future enhancements. HDMI has two types of connectors. Type A and
Type B. Type A and Type B connectors use 19 pins and 29 pins, respectively. The Type B
connector is designed for very high-resolution displays that are expected in near future.
Answer option B is incorrect. S-Video, also known as Y/C video, stands for Super-Video. It is a
technology for video transmission. Using this technology, the video is transmitted into two
separate signals. One is used for color, and the other for brightness. Sometimes S-Video signals
are considered as a type of component video signal. However, its quality is inferior to other
complex component video schemes such as RGB. This technology produces sharper images than
those produced by composite video, which carries the entire set of signals in a single line. For
using SVideo, the device sending the signal must support S-Video output and the device receiving
the signal needs to have an S-Video input jack.
Answer option A is incorrect. DVI stands for Digital Visual Interface. It is a standard for high speed,
high resolution digital display invented by
Digital Display Working Group (DDWG). DVI accommodates analog and digital interfaces with a
single connector. New video cards have DVI as well as VGA ports built into them. Most of LCD
monitors come with a 15-pin VGA connection cable, even if they are capable of handling digital
signals coming from DVI connections. However, some monitors come with both types of cables.
DVI has three main categories of connectors. They are. DVI-A, DVI-D, and DVI-I. DVI-A is an
analog-only connector, DVI-D is a digital-only connector, and DVI-I is an analog/digital connector.
DVI-D and DVI-I connectors are of two types. single link and dual link. DVI supports UXGA and
HDTV with a single set of links.
Higher resolutions such as 1920 x 1080, 2048 x 1536, or more can be supported with dual links.
Answer option C is incorrect. A VGA or SVGA connector is a 15-pin, three rows, female connector,
on the back of a PC used for connecting monitors. Reference. "http.//en.wikipedia.org/wiki/High-
Definition_Multimedia_Interface"


QUESTION 9
You are handling IT support for a sales company. One of the sales representatives complains that
his laptop does not have a network card. You wish to add one via an expansion slot. What type of
expansion card should you use?

A. MCA
B. PCMCIA
C. PCI
D. AGP

Answer: B

Explanation:
PCMCIA is a widely used expansion card slot for laptops.
What is PCMCIA card? Personal Computer Memory Card International Association (PCMCIA)
card is also known as PC card.
The PC card uses a small expansion slot and is primarily used in laptops. However, PC cards are
also available in some of the desktop computers. There are three types of PCMCIA cards.
1.Type I
2.Type II
3.Type III
Answer option C is incorrect. PCI slots are used in PC's, not laptops.
Answer option D is incorrect. AGP is a legacy graphics slot for PC's.
What is AGP (Accelerated Graphics Port)?
AGP is a high speed 32-bit bus designed for high performance graphics and video support. It
allows a video card to have direct access to a computer's RAM, which enables fast video
performance. AGP provides a bandwidth of up to 2,133 MB/second.
Answer option A is incorrect. MCA is a legacy PC slot.
Reference. http.//www.wisegeek.com/what-is-an-expansion-card.htm


QUESTION 10
Which of the following terms refers to an anti-virus software file that is updated from time to time to
protect a computer from new viruses?

A. Definition
B. Modules
C. Service pack
D. Hotfix

Answer: A

Explanation:
Definition is an anti-virus software file that should be updated at regular intervals to protect a
computer from new viruses. This file is also known as virus definition file. The virus definition file
contains information about the latest viruses, which helps identify new viruses and protect
computers from them.
Answer option D is incorrect. Hotfix is a collection of files used by Microsoft for software updates
that are released between major service pack releases. A hotfix is about a problem, occurring
under specific circumstances, which cannot wait to be fixed till the next service pack release.
Hotfixes are generally related to security problems. Hence, it is essential to fix these problems as
soon as possible.
Answer option C is incorrect. A service pack is a collection of Fixes and Patches in a single
product. A service pack can be used to handle a large number of viruses and bugs or to update an
operating system with advanced and better capabilities. A service pack usually contains a number
of file replacements.
Answer option B is incorrect. This term does not refer to any anti-virus software file. Reference.
"http.//en.wikipedia.org/wiki/Computer_virus"

Comptia A+ Training, Comptia A+ certification

Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com

Sunday, January 22, 2012

Mozilla touts Firefox impact in SOPA blackout

Mozilla yesterday extolled the impact of its 12-hour participation in Wednesday's anti-SOPA strike, saying Firefox users and fans generated over a third-of-a-million emails to the U.S. Congress.

Comptia A+ Training, Comptia A+ certification

Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com



Two days ago, Mozilla blackened Firefox's default home page and redirected its websites to an "action page" asking users to contact their federal representatives and voice their opposition to "Internet blacklist legislation."

Mozilla joined other websites, including Craigslist, Google and Wikipedia, in a one-day "virtual strike" to drum up resistance to the Stop Online Piracy Act (SOPA) and the Protect IP Act (PIPA), bills being considered by the U.S. House of Representatives and the Senate, respectively.

Since Wednesday's blackout, Washington politicians have backpedaled on the legislation. Today, Senate Majority Leader Harry Reid (D-Nev.) postponed next week's vote on PIPA, while Rep. Lamar Smith (R-Texas), chairman of the House Judiciary Committee, said the committee was also postponing action "until there is wider agreement on a solution."


According to Mozilla, Firefox users were instrumental in getting the message to Congress.

"Ultimately, 360,000 emails were sent by Mozillians to members of Congress, contributing a third of all the emails generated by EFF's campaign site," said Mozilla in a blog post Thursday.

Both the revised Firefox home page and the special action page offered users a button that led them to a page hosted by the Electronic Frontier Foundation (EFF), a San Francisco-based Internet rights advocacy group. The EFF page provided a way for visitors to quickly email their House and Senate representatives.

More than half of the people who reached the EFF page from Firefox or Mozilla's websites fired off emails to Congress.

In a separate statement today, the EFF said it had helped users send about 1 million emails.

Mozilla also said approximately 30 million people in the U.S. saw the darkened Firefox home page in their browser, and that 1.8 million visited the open-source organization's own SOPA information and action page.

Mozilla's contribution to the anti-SOPA drive was small potatoes compared to Google's: The search giant, which reportedly signed a deal with Mozilla that guarantees the latter $300 millionannually for sticking with Google on the Firefox home page, collected over 7 million signatures Wednesday on its own online petition.

Thursday, January 19, 2012

Avaya SMB collaboration platform gets robust new mobile client

Android and Apple iPhone devices will get a richer conferencing and unified communications experience with Avaya IP Office 8.0.

MCTS Certification, MCITP Certification

Microsoft Avaya Exam Training , Avaya Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


The latest version of Avaya’s unified communications platform for small and midsize businesses boasts two major changes: a robust mobile application and the ability to integrate communications features into certain key business applications.

The mobile component of Avaya IP Office 8.0 is called one-X Mobile Preferred for IP Office. Initially available for Android devices (Apple iPhone is coming soon), the application allows users to manage who is on a conference call — allowing them to invite, view, mute or drop participants. The mobile application is recognized by the IP Office presence application, so that people can tell when you are available or shouldn’t be disturbed. There also is a “geopresence” feature that broadcasts where someone is located. (Part of me can see the usefulness of this feature, but it also smacks a little bit of employee babysitting.)

one-X Mobile Preferred is an extension of Avaya’s Essential Mobility technology.

The other major enhancement to Avaya’s latest SMB unified communications platform update comes in the form of new plug-ins to widely used business productivity applications. For example, small businesses can use the Avaya platform to make or receive a call from within a Salesforce.com page; they can also go to a single location to view Google Talk and IP Office contact lists.

Tuesday, January 17, 2012

Opinion: How Apple has changed enterprise computing, forever

Led by the fast-emerging BYOD (Bring Your Own Device) trend, Apple [AAPL] is crunching into the enterprise market, creating a growing market share with the Trojan Horse of its mobile devices and a fast-growing interest in its Macs.

Cisco CCNA Training, Cisco CCNA Certification

Best Oracle Certification Training and Oracle Exams Training and more Cisco exams log in to Certkingdom.com



We need promises that deliver

With Windows 8 the latest Microsoft promise to woo the corporate markets, this is a time of decision. Many enterprise-class tech purchasers are looking at whether it's worth upgrading to the next MSFT OS on strength of the firm's mobile-meets-PC promise, or whether to take on any of the two main alternatives for this dream you see around today: Apple or Android.

Despite my reservations concerning Google's moral prerogative when it comes to the way it created Android (I'm an Apple Holic and do feel the feeling of betrayal between Apple and Google has some good reasons to run deep) it must be said that in conjunction with iOS and OS X, these two big firms have freed the enterprise world from the rubber-clad silvery handcuffs of the Microsoft-based hegemony. And the latter firm's CEO, Steve Ballmer, has been unable to crack the whip to preserve the firm's control of the corporate world.

Evidence-based dreaming

This isn't just a pipe dream. Think on this:

-- A UK YouGov survey recently claimed iPad usage in business has doubled in the last year.
-- An Aberdeen Group survey points out that 96 percent of businesses have at least one iPad in use.
-- SAP now has at least 3,300 corporate--owned iPhones and over 11,000 iPads -- a move which has reduced tech spend by a significant amount.

That's just Apple's ecosystem. Google still has work to do to deliver a truly credible alternative to Cupertino's lead -- there's over 500 samples of Android OS malware in the market, with Websense predicting this will rise to "thousands" this year. What does that mean?

It means that at this stage, faced with a choice between re-investment in Windows 8 and the subsequent investment in PC upgrade for machines capable of running that OS, or a move to the credible and secure Apple ecosystem, tech buyers face a truly credible choice for the first time in years.

I said, evidence-based

And this is happening. Recent Gartner and IDC figures show a huge slump in the PC market worldwide -- but also reveals that Mac sales continue to climb, delivering Apple a PC marketshare in excess of 10 percent for the first time in years. I can still recall a time when critics, trolls and naysayers said this would never happen. A note to them: it did.

So what's next? I'm not arguing Apple will ever take over the enterprise, but it must be true to say that true security comes from not being 100 percent dependent on any one OS or computing platform. It makes the chosen platform too attractive to malware-makers: check out the domestic users with broken, virus-laden PCs they can't afford to fix as evidence of this.

The future of enterprise tech will not be Microsoft's. Instead the future will consist of heterogeneous collections of mixed-platforms. This will benefit everyone. Business will gain a more stable work environment. Consumers will benefit from their data shared with and within enterprises being safer than before -- at least, they will in the event enterprise users get it together to make the right decisions to ensure rock-solid security across all platforms.

Make good decisions, please

Virtual Private Networks; App installation policies; usage agreements for private devices on corporate networks; malware protection; fast software upgrades and switched-on, flexible disaster management policies will be among the topics which will matter deeply to business IT planners.

The danger is that in the event the wrong choices are made, then the promise of a global, heterogeneous and secure computing environment could be undermined.

Assuming these questions are resolved, then it's clearly arguable to say that, since 1997, Apple has ably fought back, disrupting not just the MP3 player, digital music, mobile and tablet markets, but also the enterprise sector.

Smart education

Intelligence led its decisions. Rather than compete directly, brandishing its cutlass of platform superiority, Apple achieved this PC tech revolution not through a frontal attack on Microsoft's hegemony, but through a focus on delivering the best devices out there, buoyed by the massive success of the iPad, iPhone and iPod.

Monday, January 16, 2012

Career Paths For A CompTIA A+ Certified Technician

The world is your oyster. Where you decide to take your career after this is entirely up to you. There are some things to consider depending on your geographic location. If you happen to live in or near the larger populated cities, competition for entry-level technical positions can be fierce. More and more IT graduates enter the workforce each day. By obtaining your A+ certification you can have a substantial advantage over your competition in the career world, as well as having a good foundation for adding more certifications too.

MCTS Certification, MCITP Certification

Best comptia A+ Training, Comptia A+ Certification at examkingdom.com



Computer repair and technical support can however be quite lucrative. Here are some of the common fields that your A+ cert can make you a part of:

Field service technicians
Help Desk and Customer Service
PC technicians
Computer Manufacturing (DELL, HP, IBM etc.,)

However the opportunities for advacement and alternate fields are virtually endless. Here are some areas where specialized training and skills are in large demand:

Computer Forensics
(Due to an increase in computer related crimes such as identity theft etc., lead to a greater need for people to analyze data without corruption.)
Disaster prevention and recovery
(Oh-No!, I forgot to back-up my files. Now what do I do?)
Personalized Training
(Teach corporate and home users how to use software applications, prevent data loss and identity theft.)
LSDBMS and VLSDBMS
(Large Scale Database Management Systems and Very Large Scale Database Management Systems) otherwise know as terabyte data warehousing.

Other Career Paths:
Once you have gone through the IT industry right of passage, the CompTIA A+ certification. Your career path can go in any direction you decide to take it. Let's take a look at some different paths to follow.

The Hardware Path:
You can go from simple computer repair to manufacturing high-end workstations and servers.

The Technician Path:
The next step is taking the Net+ Exam and installing network cabling, supporting corporate end users and managing the corporate desktop.

Administration:
Network support, configuring routers and managing user accounts on the corporate servers.
(This is also the well known Nework+/ MCSE/NOVEL CNA/Cisco CCNA track)

Development:
Design and manage the companies web presence and intranet.
(.NET, ASP, MsSQL, PHP, MySQL, Oracle, ColdFusion)

As you can see from just this small list the possibilities are astounding. This is only a small percentage of the technologies and career paths for you to choose from. The table below lists various other certifications that you can combine with A+ to take your career in a new direction.
Hardware:

Server+
Manufacturing

Technician:

Net+
MCDST
MCP/MCSA (Microsoft Track)

Administration:

Network+
CCNA/CCNP (Cisco Track)
CNA/CNE (Novell Track)
RedHat (Linux Track)
MCSE (Highest level Microsoft Track)

Development:

.NET (dot net, web development)
MCDBA (Microsoft Database Track)
PHP/MySQL (Open-source Track)

Information technology is an ever changing arena. And while you may have decided on a specific career path, the benefits of the CompTIA A+ certification will remain a solid foundation for you to build on.

Wednesday, January 11, 2012

What To Prepare For The MCSE Examination of IT individuals worldwide

The Microsoft Certified Programs Engineer or MCSE examination offers all professionals within the data expertise field that rare opportunity to be the very best in what they do. Microsoft puts premium in the talents of individuals who are eager in making a distinction in information systems. The company itself comes up with a web-based and classroom-primarily based instruction learning middle to boost and improve the technical skills of IT individuals worldwide. The expertise of a MCSE focuses on handling Home windows Server 2003 systems edition. Work tasks include the implementation of network protocols using particular Microsoft software. The implementation process tackles community procedures involving the installation, the designing and the configuration of the systems. As well as, a mcse exam professional should also be capable of exercise bother taking pictures duties within the networking environment.


MCTS Certification, MCITP Certification

Best Microsoft MCTS Certification, Microsoft MCITP Training at examkingdom.com



The Microsoft Firm has launched its online data programs with the intention to assist IT professionals across the globe to manage up with new and upgraded technical and pc-primarily based networks. A full entry to the information about community programs is available. Producing a proficient methods engineer is important to the global operation of Microsoft. However, to qualify for the MCSE exam, it can be crucial that an individual has a major exposure in networking environment. Without the appliance experience, an IT particular person will find it difficult to understand the ideas pertaining to network processing. A relevant employment length is certainly important to ensure that an individual to know the ideas of methods application.


The preparation resulting in the actual MCSE exam is vital to every IT skilled who needs to be on top of their discipline when the outcomes come out. As a result of tough means of getting a passing mark, the availability of reference supplies about networking techniques is numerous. Nonetheless, examiners should strategy all practice methods with caution. Not all materials are useful or beneficial to the individual. There are knowledge which includes the mandatory solutions for network problems however such info may be thought of insignificant. It must be famous that the software used throughout the examination is principally related to the Home windows Server 2003 version. Matters that do not comply or match with the server is kind of useless. For an MCSE to be prime level materials, getting that certification means everything.

Making ready for the mcsa exams takes more than just information to get through. The practical check concerned throughout the examination will be a activity reserved for technical familiarity regarding the community environment. So as to focus solely on relevant sources of information about the check, it's advised that review supplies to be utilized should bear the Microsoft Licensed Practice Take a look at Provider logo. The contents of these preparation instruments will guide the examinees in the direction of gaining enough knowledge and skills to hurdle the examination. Regardless of the accessible reference products from Microsoft, various sources about community systems open their doorways to many at a worth which tempting for most people to consider. The prices of these so-referred to as references are cheaper in comparison with the software from Microsoft. Precaution in opposition to useless contents of these products have to be applied. It's most well-liked that demo tests have to be checked prior to purchasing practice examination items. The MCSE examination is supported by authorized teams that provides software program helpful throughout the preparation. Consultations amongst examinees should also be accomplished as a way to share helpful information. Furthermore, a Microsoft simulation examination software is available to help the IT professionals get a really feel of the actual test.

Saturday, January 7, 2012

220-702 Study Guide

Comptia A+ Training, Comptia A+ certification

Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com

C H A P T E R S E V E N

Hardware

The first domain for the 220-702 exam is hardware, which is a continuation of the hardware domain in the 220-701 exam. Different from the hardware domain in the 220-701 exam, the 220-702 exam focuses on installing, configuring, and troubleshooting the hardware components of the PC. Out of the four domains for the 220-702 exam, the hardware domain is the largest and takes up 38%.

The given objectives for this domain of the 220-702 exam are as follows:

. 1.1—Given a scenario, install, configure, and maintain personal computer components

. 1.2—Given a scenario, detect problems, troubleshoot, and repair/replace personal computer components

. 1.3—Given a scenario, install, configure, detect problems, troubleshoot, and repair/replace laptop components

. 1.4—Given a scenario, select and use the following tools

. 1.5—Given a scenario, detect and resolve common printer issues

1.1 Given a scenario, install, configure, and maintain personal computer components

. Storage devices

. HDD

. SATA

. PATA

. Solid state

. FDD

. Optical drives

. CD/DVD/RW/Blu-ray

. Removable

. External

. Motherboards

. Jumper settings

. CMOS battery

. Advanced BIOS settings

. Bus speeds

. Chipsets

242 Chapter 7

. Firmware updates

. Socket types

. Expansion slots

. Memory slots

. Front panel connectors

. I/O ports

. Sound, video, USB 1.1, USB 2.0, serial, IEEE 1394/Firewire, parallel, NIC, modem, PS/2

. Power supplies

. Wattages and capacity

. Connector types and quantity

. Output voltage

. Processors

. Socket types

. Speed

. Number of cores

. Power consumption

. Cache

. Front-side bus

. 32-bit vs. 64-bit

. Memory

. Adapter cards

. Graphics cards

. Sound cards

. Storage controllers

. RAID cards (RAID array—levels 0, 1, 5)

. eSATA cards

. I/O cards

. Firewire

. USB

. Parallel

. Serial

. Wired and wireless network cards

. Capture cards (TV, video)

. Media reader

. Cooling systems

. Heat sinks

. Thermal compound

. CPU fans

. Case fans

1. Which of the following determines the master or slave in a system that supports two IDE devices?

A. A twist in the cable

B. Which device was installed first

C. The jumper settings

D. The BIOS

E. Which drive is connected at the end and which drive is connected in the middle


2.
You just installed a second new IDE hard drive in a computer system.

However, the system does not recognize the new hard drive.

What should be the first thing you check?

A. The BIOS

B. The cabling

C. The jumper settings

D. The drive

3. You have been asked to install a SATA hard drive in a computer that already has a PATA HDD and CD-ROM drive installed. Which cable should you connect the new drive to?

A. The secondary signal cable

B. The primary signal cable

C. The 15-pin SATA signal cable

D. The 7-pin SATA signal cable

4. While installing an IDE device, you find that the cable to connect the IDE device is not keyed. Which of the following should you do? (Select all that apply.)

A. Locate the red stripe on the cable, and connect to the device with the red stripe lining up to pin #1.

B. Attach the cable any way that fits.

C. If there is no red stripe, locate the blue stripe on the cable and connect to the device with the blue stripe lining up to pin #1.

D. Purchase a new cable.

5. When installing an IDE CD-ROM drive on a computer with a single IDE hard drive on the primary chain already configured as master, which of the following would be the best configuration for the CDROM drive?

A. Master on the secondary IDE controller

B. Slave on the primary IDE controller

C. Master on the primary IDE controller

D. Slave on the secondary IDE controller

6. What is the maximum number of IDE devices that can be installed in an ATX computer?

A. 1

B. 2

C. 3

D. 4

7. Which of the following are legitimate PATA drive configuration options? (Select all that apply.)

A. Master

B. Cable select

C. ID source

D. Slave

8. Which option must be enabled in the CMOS setup to support large hard drive sizes and allow the IDE controller to convert the sector/ head/cylinder addresses into a physical block address that improves data throughput?

A. Type 1

B. Fast-throughput

C. LBA

D. ECHS

9. When installing a SATA hard drive, how many connectors or cables do you have to install?

A. 1

B. 2

C. 3

D. 4


10. How many serial ATA drives can you connect to a single data cable?

A. 1

B. 2

C. 3

D. 4

11. Which of the following is the SCSI ID number generally recommended or the CD-ROM?

A. ID 0

B. ID 5

C. ID 2

D. ID 3

12. How do you configure several SCSI drives connected to a single SCSI chain?

A. All the hard drives are terminated and have consecutive IDs of 0, 1, and 2.

B. The chain is terminated and all hard disks have the same ID.

C. Both ends of the chain are terminated and each hard drive has a unique ID.

D. The host adapter is terminated and has a unique ID.

13. Which type of hard drive is based on a daisy chain?

A. Parallel ATA

B. Serial ATA

C. SCSI

D. eSATA

14. Which of the following is a task that you have to perform when installing SCSI devices?

A. Set the jumpers for master/slave

B. Perform a low-level format on the SCSI drive

C. Assign each SCSI device a unique ID number

D. Set the drive type in the CMOS setup

Comptia A+ Training, Comptia A+ certification

Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com

Friday, January 6, 2012

Google acquires 200 more patents from IBM

Google has acquired over 200 more patents from IBM, adding to the 1,000 patents it bought from the technology giant last summer.

MCTS Certification, MCITP Certification

Best IBM Certification Training and IBM Exams Training and more Cisco exams log in to examkingdom.com



Google is ramping up its efforts to bolster its patent position, as it acquires 217 patents from technology giant IBM.

The patents range from server infrastructure technologies to mobile phones, databases and even self-driving cars; something the search giant has been venturing into in recent months.

Google acquired 187 patents and 36 patent-pending applications, adding to the 1,000 it bought off IBM in the summer. From the $12.5 billion Motorola Mobility purchase, the search giant will take 17,000 patents and over 7,000 patents-pending.

But it failed in its bid to acquire a crucial platter of 6,000 patents from bankrupt telecoms giant Nortel.

According to sister site ZDNet UK, the new IBM patents cover areas “pertinent to Android”, such as NFC-enabling technologies and availability policies on virtual machines.

The company continues to spend billions on its technology portfolio in efforts to fight off competitive action from its rivals.

In August, Google accused Apple and Microsoft amongst others of conspiring to attack its Android mobile operating system, saying they were waging a “hostile, organised campaign” of “bogus” patents to make Android more expensive.

Google’s acquisition plans of Motorola Mobility hit a roadblock late last year as European regulators suspended the review. While Google is “confident” that the proposed merger is good for competition, the European antitrust authority seeks the access of further documentation.

The patents alone are worth a goldmine to Google, rather than ‘what’ it can do with the smartphone maker.

Google is also embroiled in a legal spat with Oracle that is expected to go to trial later this year. It is alleged that Android technologies relating to Java infringe Oracle’s patents.

As Android remains in the limelight of global patent turf wars, Google continues the battle with its rivals and competitors in court.

It’s wake-up time for Google, as the company realises that it is late to the game. By bolstering its patent portfolio, it can not only have itself a nest egg for licenses but an additional layer of protection for its valuable mobile operating system from future attacks.

Monday, January 2, 2012

220-701 – 220-702 Study Guide

Comptia A+ Training, Comptia A+ certification

Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com

Contents at a Glance
Introduction 1

Part I A+ Essentials 220-701
CHAPTER 1 Hardware 3
CHAPTER 2 Troubleshooting, Repair, and Maintenance 57
CHAPTER 3 Operating System and Software 95
CHAPTER 4 Networking 147
CHAPTER 5 Security 185
CHAPTER 6 Operational Procedure 211
Part II A+ 220-702
CHAPTER 7 Hardware 241
CHAPTER 8 Operating Systems 285
CHAPTER 9 Networking 339
CHAPTER 10 Security 375

Table of Contents
Introduction. ......................................................................................................................... 1
Part I A+ Essentials 220-701
Chapter 1:
Hardware. .............................................................................................................................. 3
1.1 Categorize storage devices and backup media . ...................................... 3
1.2 Explain motherboard components, types, and features. ...................... 6
1.3 Classify power supplies types and characteristics. ............................... 16
1.4 Explain the purpose and characteristics of CPUs and their features.
................................................................................................................................. 18
1.5 Explain cooling methods and devices . ................................................... 21
1.6 Compare and contrast memory types, characteristics, and their
purpose. ................................................................................................................. 22
1.7 Distinguish between the different display devices and their characteristics
. ................................................................................................................ 25
1.8 Install and configure peripherals and input devices. ........................... 27
1.9 Summarize the function and types of adapter cards . ......................... 29
1.10 Install, configure, and optimize laptop components and features.
................................................................................................................................. 32
1.11 Install and configure printers . ................................................................ 35
Quick-Check Answer Key . ................................................................................ 40
Answers and Explanations . ............................................................................. 41
Chapter 2:
Troubleshooting, Repair, and Maintenance . .............................................................. 57
2.1 Given a scenario, explain the troubleshooting theory. ...................... 57
2.2 Given a scenario, explain and interpret common hardware and operating
system symptoms and their causes . ................................................... 60
2.3 Given a scenario, determine the troubleshooting methods and tools
for printers. .......................................................................................................... 64
2.4 Given a scenario, explain and interpret common laptop issues and
determine the appropriate basic troubleshooting method . .................. 67
2.5 Given a scenario, integrate common preventative maintenance techniques
. .................................................................................................................. 71
Quick-Check Answer Key . ................................................................................ 81
Answers and Explanations . ............................................................................. 82
Chapter 3:
Operating System and Software . .................................................................................. 95
3.1 Compare and contrast the different Windows Operating
Systems and their features. ............................................................................. 95
3.2 Given a scenario, demonstrate proper use of user interfaces . ....... 107
3.3 Explain the process and steps to install and configure the
Windows OS. ................................................................................................... 113
3.4 Explain the basics of boot sequences, methods, and startup
utilities . .............................................................................................................. 123
Quick-Check Answer Key . ............................................................................. 127
Answers and Explanations . ........................................................................... 129
Chapter 4:
Networking . ..................................................................................................................... 147
4.1 Summarize the basics of networking fundamentals, including technologies,
devices, and protocols . .................................................................... 147
4.2 Categorize network cables and connectors and their implementations
. ................................................................................................................... 159
4.3 Compare and contrast the different network types . ......................... 164
Quick-Check Answer Key . ............................................................................. 169
Answers and Explanations . ........................................................................... 170
Chapter 5:
Security . ............................................................................................................................ 185
5.1 Explain the basic principles of security concepts and
echnologies . ...................................................................................................... 185
5.2 Summarize the following security features . ........................................ 193
Quick-Check Answer Key . ............................................................................. 199
Answers and Explanations . ........................................................................... 200
Chapter 6:
Operational Procedure . ................................................................................................. 211
6.1 Outline the purpose of appropriate safety and environmental
procedures and, given a scenario, apply them . ...................................... 211
6.2 Given a scenario, demonstrate the appropriate use of communication
skills and professionalism in the workplace . .................................. 221
Quick-Check Answer Key . ............................................................................. 229
Answers and Explanations . ........................................................................... 230
Part II A+ 220-702
Chapter 7:
Hardware. ......................................................................................................................... 241
1.1 Given a scenario, install, configure, and maintain personal computer
components . ..................................................................................................... 241
1.2 Given a scenario, detect problems, troubleshoot, and repair/replace
personal computer components . ............................................................... 252
1.3 Given a scenario, install, configure, detect problems, troubleshoot,
and repair/replace laptop components . ................................................... 260
1.4 Given a scenario, select and use the following tools . ...................... 261
1.5 Given a scenario, detect and resolve common printer issues . ....... 263
Quick-Check Answer Key . .............................................................................. 270
Answers and Explanations . ........................................................................... 271
Chapter 8:
Operating Systems . ........................................................................................................ 285
2.1 Select the appropriate commands and options to troubleshoot
and resolve problems . .................................................................................... 285
2.2 Differentiate between Windows Operating System directory structures
(Windows 2000, XP, Vista, and Windows 7) . .............................. 296
2.3 Given a scenario, select and use system utilities/tools and
evaluate the results . ........................................................................................ 299
2.4 Evaluate and resolve common issues . ................................................... 310
Quick-Check Answer Key . ............................................................................. 319
Answers and Explanations . ........................................................................... 321

Chapter 9:
Networking . ..................................................................................................................... 339
3.1 Troubleshoot client-side connectivity issues using appropriate
tools . ................................................................................................................... 339
3.2 Install and configure a small office home office (SOHO)
network . ............................................................................................................ 352
Quick-Check Answer Key . ............................................................................. 361
Answers and Explanations . ........................................................................... 362
Chapter 10:
Security . ............................................................................................................................ 375
4.1 Given a scenario, prevent, troubleshoot, and remove viruses
and malware . ................................................................................................... 375
4.2 Implement security and troubleshoot common issues . .................. 379
Quick-Check Answer Key . .............................................................................. 395
Answers and Explanations . ........................................................................... 396

==================================================================
Introduction
Welcome to CompTIA A+ Practice Questions Exam Cram. The sole purpose of
this book is to provide you with practice questions that are complete with
answers and explanations to help you learn, drill, and review for the CompTIA
A+ certification exam. The book offers many questions that will help you practice
each exam objective and will help you assess your knowledge before you
write the real exam. The detailed answers to every question will help you reinforce
your knowledge about different issues involving the concepts associated
with the updated A+ exam (2009 Edition), which also includes topics on
Windows 7 and IPv6.
Who This Book Is For
If you have studied the content for both the 220-701 and 220-702 exam and feel
you are ready to put your knowledge to the test, but you are not sure that you
want to take the real exam yet, this book is for you! If you have answered other
practice questions or unsuccessfully taken the real exam, and want to do more
practice questions before going to take the real exam, this book is for you, too!
Even when the exam is done and you have passed with flying colors and have the
A+ certificate in your pocket, keep the book handy on your desktop to look for
answers to your everyday security issues.
What You Will Find in This Book
This book is all about practice questions! The practice questions in the book,
some very easy and others with a little complicated problem scenario, all are
intended to raise your confidence level before you take the real exam. You will
find questions that you will face in real life.
This book is organized according to the objectives published by CompTIA for
the 220-701: CompTIA A+ Essentials and 220-702: CompTIA A+ (2009
Edition) exams. Each chapter corresponds to an exam objective, and in every
chapter, you will find the following three elements:
. Practice Questions: These are the numerous questions that will help
you learn, drill, and review exam objectives. All of the questions in this
section are multiple-choice type. Choose the correct answer based on
your knowledge of security.
. Quick-Check Answer Key: After you have finished answering the questions,
you can quickly grade your exam from this section. Only correct

CompTIA A+ 220-701 and 220-701 Practice Questions Exam Cram
answers are given in this section. No explanations are offered yet! Even if
you have answered a question incorrectly, do not be discouraged. Just
move on! Keep in mind that this is not the real exam. You can always
review the topic and do the questions again.
. Answers and Explanations: This section provides you with correct
answers as well as further explanations about the content posed in that
question. Use this information to learn why an answer is correct and to
reinforce the content in your mind for the exam day.
Note
It is not possible to reflect a real exam on a paper product. As mentioned earlier, the purpose
of the book is to help you prepare for the exam and not provide you with real exam
questions. Neither the author nor the publisher can guarantee that you will pass the exam
only by memorizing the practice questions given in this book.

Hints for Using This Book
Because this book is a paper practice product, you might want to complete your
exams on a separate piece of paper so that you can reuse the practice questions
again and again without having previous answers in your way. Also, a general
rule of thumb across all practice questions products is to make sure that you are
scoring in the high 80% to 90% range for all topics before attempting the real
exam. The higher percentages you score on practice question products, the better
your chances for passing the real exam. Of course, we cannot guarantee a
passing score on the real exam, but we can offer you plenty of opportunities to
practice and assess your knowledge level before you enter the real exam.
When you have completed the exam on paper, use the companion CD to take a
timed exam. This will further help you gain confidence and make a self-assessment
in case you need more study. Your results will indicate the exam objectives
in which you need further study or hands-on practice.
Need Further Study?
Are you having a hard time correctly answering these questions? If so, you probably
need further review of all exam objectives. Be sure to see the following sister
products to this book:
CompTIA A+ Exam Cram, Fifth Edition by David L. Prowse, (ISBN:
9780789747921)
CompTIA A+ Cert Flash Cards Online (220-701, 220-702), Retail Packaged Version,
Third Edition, by Scott Honeycutt (ISBN: 9780132674553)

1 C H A P T E R O N E
Hardware

The first domain for the A+ Essentials (220-701) exam is hardware, which
focuses on teaching you to identify components and to demonstrate a basic
knowledge of hardware technology. This domain is essential because it gives
you a background for the other domains and also counts as 27% of the test
score, the largest percentage of all the domains. It also includes the most
objectives because today’s PCs have such a wide variety of hardware and
technology:
The objectives for this domain are as follows:
. 1.1—Categorize storage devices and backup media
. 1.2—Explain motherboard components, types, and features
. 1.3—Classify power supplies types and characteristics
. 1.4—Explain the purpose and characteristics of CPUs and their features
. 1.5—Explain cooling methods and devices
. 1.6—Compare and contrast memory types, characteristics, and their
purpose
. 1.7—Distinguish between the different display devices and their
characteristics
. 1.8—Install and configure peripherals and input devices
. 1.9—Summarize the function and types of adapter cards
. 1.10—Install, configure, and optimize laptop components and features
1.1 Categorize storage devices and backup media
. FDD
. HDD
. Solid state vs. magnetic
. Optical drives
. CD/DVD/RW/Blu-Ray
. Removable storage
. Tape drive
. Solid state (e.g., thumb drive, flash, SD cards, USB)
. External CD-RW and hard drive
. Hot swappable devices and non-hot swappable devices From <

Comptia A+ Training, Comptia A+ certification

Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com