1/30
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Toner Disposal
Proper disposal of used toner cartridges is essential to prevent contamination and protect human health and the environment.
Encrypting File System (EFS)
A Windows feature that allows users to encrypt individual files or folders, protecting sensitive data without affecting other files.
Cloud Backup Services
Automated solutions like Apple iCloud and Google Drive that continuously sync files to protect against data loss and allow access from multiple devices.
WPA3 Security
A wireless network security protocol that requires a password for connection, preventing unauthorized access and protecting sensitive data.
Limiting Permissions
Restricting user access to reduce the risk of Trojan horse exploits by minimizing potential damage from malicious software.
Electrical Grounding
A safety measure in power systems that provides a path for excess electricity to dissipate, preventing shocks and equipment damage.
RADIUS Authentication
A centralized method for authenticating users against an Active Directory database using various devices.
Master Boot Record (MBR)
An older partitioning scheme with a maximum partition size of 2 terabytes, limited compared to GPT (GUID Partition Table).
User Account Control (UAC)
A security feature that prompts for permission to perform administrative tasks.
Group Policy
A tool for centralized management of user and computer settings in Active Directory environments.
Network Address Translation (NAT)
A method that allows multiple devices on a local network to share a single public IP address.
IP Addressing
Understanding IPv4 vs. IPv6, subnetting, and DHCP for dynamic IP assignment.
Backup Solutions
The importance of regular backups and the different types, including full, incremental, and differential.
Malware Protection
Utilizing antivirus software and best practices to prevent infections.
Troubleshooting Steps
A systematic approach to troubleshooting:Identify, Establish, Test, and Document.
NTFS
A file system that enables file and folder security for user access control.
Services Console
A tool accessible through Computer Management for managing services in administrative tools.
System info Command
A command that does not display boot options; the System Configuration Utility should be used instead.
UPS
An uninterruptible power supply that provides short-term battery backup and surge protection during power outages.
CAD Files
Files that require significant bandwidth when using cloud services.
VNC & MSRA
Tools that allow remote desktop control.
User Profile Recovery
A process necessary to resolve issues at a specific workstation.
Private Network
A setting that must be enabled to share files over the network.
Virtualization
Managed in UEFI BIOS, with locking preventing virtualization.
SSID Interference
A problem best resolved by changing wireless channels.
Safe Mode
A boot option that prevents malware execution, allowing antivirus scans for removal.
Disk Management
A tool used to partition and format drives.
Windows Firewall
A security feature essential for protecting against unauthorized access.
BIOS vs UEFI
UEFI supports larger drives and faster boot times compared to the older BIOS.
Network Troubleshooting
The use of tools like ping, tracert, and ipconfig for diagnosing network issues.
Malware Removal Steps
A series of actions including disconnecting from the internet, entering Safe Mode, running antivirus software, and updating passwords after an infection.