Certif Ication Handbook

Total Page:16

File Type:pdf, Size:1020Kb

Certif Ication Handbook Certification Handbook EXAM FC0-U51 TM TM CompTIA® IT Fundamentals™ (Exam FC0-U51) CompTIA® IT Fundamentals™ (Exam FC0-U51) 2 Chapter # | Name of chapter CompTIA® IT Fundamentals™ (Exam FC0-U51) CompTIA® IT Fundamentals™ (Exam FC0-U51) Part Number: 099004 Course Edition: 1.0 Acknowledgements We wish to thank the following project team for their contributions to the development of this certification study guide: Pamela J. Taylor, Laurie A. Perry, Gail Sandler, Jason Nufryk, Alex Tong, and Catherine M. Albano. Notices DISCLAIMER While CompTIA Properties, LLC takes care to ensure the accuracy and quality of these materials, we cannot guarantee their ac- curacy, and all materials are provided without any warranty whatsoever, including, but not limited to, the implied warranties of merchantability or fitness for a particular purpose. The name used in the data files for this course is that of a fictitious com- pany. Any resemblance to current or future companies is purely coincidental. We do not believe we have used anyone’s name in creating this course, but if we have, please notify us and we will change the name in the next revision of the course. Use of screenshots, photographs of another entity’s products, or another entity’s product name or service in this book is for edito- rial purposes only. No such use should be construed to imply sponsorship or endorsement of the book by, nor any affiliation of such entity with CompTIA Properties, LLC. This courseware may contain links to sites on the internet that are owned and operated by third parties (the “External Sites”). CompTIA Properties, LLC is not responsible for the availability of, or the content located on or through, any External Site. Trademark Notices CompTIA® is a registered trademark and CompTIA® IT Fundamentals is a trademark of CompTIA in the U.S. and other countries. Other CompTIA products and services discussed or described may be trademarks or registered trademarks of CompTIA. Microsoft® Windows® is a registered trademark of Microsoft Corporation in the U.S. and other countries. Other Microsoft products and services discussed or described may be trademarks or registered trademarks of Microsoft Corporation. All other product and service names used may be common law or registered trademarks of their respective proprietors. Copyright © 2014 CompTIA Properties, LLC. All rights reserved. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, storage in an information retrieval system, or otherwise, without express written permission of CompTIA, 3500 Lacey Road, Downers Grove, IL 60515. Contact CompTIA: call 866-835-8020 ext. 5 or email [email protected]. CompTIA’s World Wide Web site is located at CompTIA.org. This book conveys no rights in the software or other products about which it was written; all use or licensing of such software or other products is the responsibility of the user according to terms and conditions of the owner. Do not make illegal copies of books or software. 3 Chapter # | Name of chapter CompTIA® IT Fundamentals™ (Exam FC0-U51) CompTIA® IT Fundamentals™ (Exam FC0-U51) Lesson 1: Identifying Computer Hardware 8 Topic A: Identify Types of Computing Devices 9 Topic B: Identify Internal Computer Components 15 Topic C: Common Computer Connector Types 23 Topic D: Identify Common Peripheral Devices 37 Lesson 2: Identifying Computer Software 47 Topic A: Compare Functions and Features of Common Operating Systems 48 Topic B: Identify Application Software 54 Lesson 3: Setting Up a Basic Workstation 61 Topic A: Connect Hardware 62 Topic B: Install and Configure Operating Systems 69 Topic C: Install and Configure Applications 79 Topic D: Configure Accessibility Options 84 Lesson 4: Configuring Network Access 92 Topic A: Network Connection Types 93 Topic B: Install and Configure a SOHO Router 102 Topic C: Network and Alternative Technologies 110 Topic D: Sharing and Storage Methods 115 Lesson 5: Working with Files, Folders, and Applications. 121 Topic A: Create Files 122 Topic B: Navigate a File Structure 129 Topic C: Manage Files and Folders 134 Topic D: Compress and Extract Files 150 Topic E: Create Screen Captures 154 Lesson 6: Configuring and Using Wireless Devices 161 Topic A: Configure Wireless Devices 162 Topic B: Use Wireless Devices 172 Lesson 7: Securing Computing Devices 179 Topic A: Identify Security Threats 180 Topic B: Apply Security Best Practices 189 Topic C: Perform Secure Web Browsing 196 4 Table of Contents CompTIA® IT Fundamentals™ (Exam FC0-U51) Lesson 8: Supporting Computers and Users 205 Topic A: Environmental and Safety Concepts 206 Topic B: Back Up and Restore Data 218 Topic C: Manage Software 225 Topic D: Implement Basic Support Measures 230 Appendix A: Mapping Course Content to the CompTIA® IT Fundamentals™ (Exam FC0-U51) Certification Exam 241 Lesson Labs 252 Solutions 256 Glossary 264 Index 278 5 Table of Contents CompTIA® IT Fundamentals™ (Exam FC0-U51) About This Course If you are a high-end computer user at home or college considering a career in information technology, or interested in furthering your knowledge about personal computers, the CompTIA® IT Fundamentals™ (Exam FC0-U51) course is the first step in your preparation. In this course you will: identify PC components; work with files and folders; and conduct basic software installations. This course will provide you with the fundamental skills and concepts required to maintain, support, and work efficiently with personal computers. In addition, you will acquire the essential skills and information you need to: set up, configure, maintain, troubleshoot, and perform preventative maintenance of the hardware and software components of a basic personal computer workstation as well as basic wireless devices. Additionally you will also implement basic security measures as well as basic computer and user support practices. Whether you are a home user, an experienced knowledge worker, or someone new to the work force considering an information technology (IT) career, the CompTIA® IT Fundamentals™ (Exam FC0-U51) course can benefit you in many ways. Having a basic foundational knowledge about personal computers and the skills required to work with them provides you with the starting point to build your career. If your existing job role is linked with personal computers, this course will provide you with the fundamental technical knowledge about personal computers that you need to work efficiently in your current role. It will also assist you if you are preparing to take the CompTIA® IT Fundamentals™ examination (Exam FC0-U51). COURSE DESCRIPTION Target Student This course is designed for individuals who are considering a career in information technology (IT) and who might be planning to pursue CompTIA IT Fundamentals certification, CompTIA A+™ certification, or other similar certifications. COURSE PREREQUISITES To ensure your success in your course you will need basic Windows end-user skills. COURSE OBJECTIVES Upon successful completion of this course, you will be able to: • Identify hardware commonly found in or attached to computing devices. • Identify software commonly installed on computing devices. • Set up a basic workstation. • Configure network access. • Work with files, folders, and applications. • Configure and use wireless devices. • Secure computing devices. • Support computers and users. 6 About This Course CompTIA® IT Fundamentals™ (Exam FC0-U51) How to Use This Book AS YOU LEARN This book is divided into lessons and topics, covering a subject or a set of related subjects. In most cases, lessons are arranged in order of increasing proficiency. The results-oriented topics include relevant and supporting information you need to master the content. Each topic has various types of activities designed to enable you to practice the guidelines and procedures as well as to solidify your understanding of the informational material presented in the course. Procedures and guidelines are presented in a concise fashion along with activities and discussions. Information is provided for reference and reflection in such a way as to facilitate understanding and practice. Data files for various activities, as well as other supporting files for the course, are available from CompTIA. Contact CompTIA by email at [email protected] for more information on how to obtain these files. At the back of the book, you will find a glossary of the definitions of the terms and concepts used throughout the course. You will also find an index to assist in locating information within the instructional components of the book. AS YOU REVIEW Any method of instruction is only as effective as the time and effort you, the student, are willing to invest in it. In addition, some of the information that you learn in class may not be important to you immediately, but it may become important later. For this reason, we encourage you to spend some time reviewing the content of the course after your time in the classroom. AS A REFERENCE This book’s organization and layout make it an easy-to-use resource for future reference. Taking advantage of the glossary, index, and table of contents, you can use this book as a first source of definitions, background information, and summaries. COURSE ICONS Look for these visual cues throughout the material: Icon Description A Note provides additional information, guidance, or hints about a topic or task. A Caution helps make you aware of places where you need to be particularly careful with your actions, settings, or decisions so that you can be sure to get the desired results of an activity or task. 7 About This Course CompTIA® IT Fundamentals™ (Exam FC0-U51) 1 Identifying Computer Hardware Lesson Time: 2 hours, 30 minutes LESSON OBJECTIVES In this lesson, you will identify computer hardware. You will: • Identify various types of computing devices used in today’s workplace. • Identify internal computer components. • Compare common computer connector types.
Recommended publications
  • Beyond BIOS Developing with the Unified Extensible Firmware Interface
    Digital Edition Digital Editions of selected Intel Press books are in addition to and complement the printed books. Click the icon to access information on other essential books for Developers and IT Professionals Visit our website at www.intel.com/intelpress Beyond BIOS Developing with the Unified Extensible Firmware Interface Second Edition Vincent Zimmer Michael Rothman Suresh Marisetty Copyright © 2010 Intel Corporation. All rights reserved. ISBN 13 978-1-934053-29-4 This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold with the understanding that the publisher is not engaged in professional services. If professional advice or other expert assistance is required, the services of a competent professional person should be sought. Intel Corporation may have patents or pending patent applications, trademarks, copyrights, or other intellectual property rights that relate to the presented subject matter. The furnishing of documents and other materials and information does not provide any license, express or implied, by estoppel or otherwise, to any such patents, trademarks, copyrights, or other intellectual property rights. Intel may make changes to specifications, product descriptions, and plans at any time, without notice. Fictitious names of companies, products, people, characters, and/or data mentioned herein are not intended to represent any real individual, company, product, or event. Intel products are not intended for use in medical, life saving, life sustaining, critical control or safety systems, or in nuclear facility applications. Intel, the Intel logo, Celeron, Intel Centrino, Intel NetBurst, Intel Xeon, Itanium, Pentium, MMX, and VTune are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries.
    [Show full text]
  • Certifications, Reports and Compatibility Applications
    2-port 10Gbps USB C PCIe Card - USB 3.1 Gen 2 Type-C PCI Express Host Controller Add-On Card - Expansion Card - USB 3.2 Gen 2x1 PCIe Adapter 15W/port - Windows, macOS, Linux Product ID: PEXUSB312C3 This PCIe USB 3.1 Gen 2 card installs into an available PCI-Express slot in your computer and enables you to upgrade your current system by adding two USB-C (10Gbps) ports. Also known as USB 3.2 Gen 2x1, this USB 3.1 Gen 2 card adds two 10Gbps USB Type-C ports to your computer. Utilizing an ASMedia ASM3142 chipset, this card harnesses the speed of USB 3.1 Gen 2. With higher data throughput support, this USB 3.1 Gen 2 PCIe expansion card is a necessity for external drives and many other USB 3.1 Gen 2 peripherals and includes an optional SATA power connector for high power devices. The card is backward compatible with USB 3.0 (5Gbps) and USB 2.0 (480mbps) devices. The card works with newer USB-C devices, but can easily support your existing USB-A peripherals using inexpensive USB Type C cables and adapters. See our Accessories Tab for supported options. The USB 3.1 card is compatible with Windows, Linux and macOS operating systems. The card includes both standard-profile and low-profile brackets to install in various form-factor PCs and servers. StarTech.com conducts thorough compatibility and performance testing on all our products to ensure we are meeting or exceeding industry standards and providing high-quality products to IT Professionals.
    [Show full text]
  • A275 User Guide
    A275 User Guide Note: Before using this information and the product it supports, ensure that you read and understand the following: • Safety and Warranty Guide • Setup Guide • “Important safety information” on page v Lenovo® makes constant improvement on the documentation of your computer, including this User Guide. To get all the latest documents, go to: https://support.lenovo.com Second Edition (February 2018) © Copyright Lenovo 2017, 2018. LIMITED AND RESTRICTED RIGHTS NOTICE: If data or software is delivered pursuant to a General Services Administration “GSA” contract, use, reproduction, or disclosure is subject to restrictions set forth in Contract No. GS- 35F-05925. Contents Important safety information . v Using the ThinkPad pointing device . 20 Read this first. v ThinkPad pointing device overview . 20 Important information about using your computer . v Using the TrackPoint pointing device. 21 Conditions that require immediate action . vii Using the trackpad. 22 Service and upgrades . viii Using the trackpad touch gestures . 23 Power cords and power adapters . ix Customizing the ThinkPad pointing device . 24 Extension cords and related devices. ix Replacing the cap on the pointing stick . 24 Plugs and outlets . x Power management . 25 Power supply statement . x Using the ac power adapter . 25 External devices . xi Using the battery . 25 General battery notice . xi Managing the battery power . 27 Notice for removable rechargeable battery . xi Power-saving modes . 27 Notice for built-in rechargeable battery. xii Cabled Ethernet connections . 28 Notice for non-rechargeable coin-cell battery . xii Wireless connections . 28 Heat and product ventilation . xiii Using the wireless-LAN connection . 28 Electrical current safety information .
    [Show full text]
  • ECESATUSB1 This Expresscard Power Esata Port Controller Card
    1 Port ExpressCard Power eSATA Controller Adapter Card StarTech ID: ECESATUSB1 This ExpressCard Power eSATA port controller card can be installed in an available ExpressCard 34/54 mm slot to provide a powered eSATA connection, and also alternatively provide either external SATA (data only) or USB 2.0 connectivity from one uniquely designed port if using with standard eSATA or USB devices. An ideal solution for using an eSATA SSD Flash drive on your laptop, the power eSATA card delivers both a high speed eSATA connection and power from the combined USB port. A versatile connectivity solution, the card features built-in port multiplier support, allowing multi-drive eSATA storage enclosures to be connected to the host computer using a single eSATA cable. Taking advantage of the transfer speed of eSATA connection and the 5V power output of the USB 2.0 port, the ExpressCard Power eSATA adapter is the perfect answer for connecting compatible mobile drive enclosures, similar to the built-in power eSATA port provided by the following laptop computers: Toshiba: Satellite E105, A350, Satellite Pro P300; Qosmio G50, X305, Portege A600, M750, R500, R600; and Tecra M10, R10, A10. Dell: Studio 15, 17; Latitude E6400, E6500; Precision M2400, M4400, M6400, M6400 Covet. Applications Connects to eSATA SSD Flash drives, such as OCZ Throttle, Kangaru e-Flash drives and Ridata Racer series flash drives Provides connectivity between Notebooks and PCs with ExpressCard slots to external drive enclosures with Power eSATA (eSATA+USB) port, or with regular eSATA
    [Show full text]
  • SMTP (Simple Mail Transfer Protocol)
    P1: JsY JWBS001A-60.tex WL041/Bidgoli WL041-Bidgoli.cls May 12, 2005 3:27 Char Count= 0 SMTP (Simple Mail Transfer Protocol) Vladimir V. Riabov, Rivier College Introduction 1 SMTP Security Issues 12 SMTP Fundamentals 1 SMTP Vulnerabilities 12 SMTP Model and Protocol 2 SMTP Server Buffer Overflow Vulnerability 15 User Agent 4 Mail Relaying SMTP Vulnerability 15 Sending e-Mail 4 Mail Relaying SMTP Vulnerability in Microsoft Mail Header Format 4 Windows 2000 15 Receiving e-Mail 4 Encapsulated SMTP Address Vulnerability 15 The SMTP Destination Address 4 Malformed Request Denial of Service 16 Delayed Delivery 4 Extended Verb Request Handling Flaw 16 Aliases 5 Reverse DNS Response Buffer Overflow 16 Mail Transfer Agent 5 Firewall SMTP Filtering Vulnerability 16 SMTP Mail Transaction Flow 5 Spoofing 16 SMTP Commands 6 Bounce Attack 16 Mail Service Types 6 Restricting Access to an Outgoing Mail SMTP Service Extensions 8 Server 17 SMTP Responses 8 Mail Encryption 17 SMTP Server 8 Bastille Hardening System 17 On-Demand Mail Relay 8 POP and IMAP Vulnerabilities 17 Multipurpose Internet Mail Extensions Standards, Organizations, and (MIME) 8 Associations 18 MIME-Version 10 Internet Assigned Numbers Authority 18 Content-Type 10 Internet Engineering Task Force Working Content-Transfer-Encoding 10 Groups 18 Content-Id 11 Internet Mail Consortium 18 Content-Description 11 Mitre Corporation 18 Security Scheme for MIME 11 Conclusion 18 Mail Transmission Types 11 Glossary 18 Mail Access Modes 11 Cross References 19 Mail Access Protocols 11 References 19 POP3 11 Further Reading 22 IMAP4 12 INTRODUCTION and IMAP4), SMTP software, vulnerability and security issues, standards, associations, and organizations.
    [Show full text]
  • Understanding Post Office Protocol (POP3)
    Understanding Post Office Protocol (POP3) Author: Conrad Chung, 2BrightSparks Introduction Most Internet users with email accounts would have used some form of “client” software (Outlook, Thunderbird etc.) to access and manage their email at one point or another. To retrieve emails, these email clients may require the configuration of Post Office Protocol (or POP3) before messages can be downloaded from the server. This article will help readers understand what POP3 is and how it works. What is Post Office Protocol? The Post Office Protocol (POP3) is an Internet standard protocol used by local email software clients to retrieve emails from a remote mail server over a TCP/IP connection. Since the first version was created in 1984, the Post Office Protocol (currently at Version 3) has since became one of the most popular protocols and is used by virtually every email client to date. Its popularity lies in the protocol’s simplicity to configure, operate and maintain. Email servers hosted by Internet service providers also use POP3 to receive and hold emails intended for their subscribers. Periodically, these subscribers will use email client software to check their mailbox on the remote server and download any emails addressed to them. Once the email client has downloaded the emails, they are usually deleted from the server, although some email clients allow users to specify that mails be copied or saved on the server for a period of time. Email clients generally use the well-known TCP port 110 to connect to a POP3 server. If encrypted communication is supported on the POP3 server, users can optionally choose to connect either by using the STLS command after the protocol initiation stage or by using POP3S, which can use the Transport Layer Security (TLS) or Secure Sockets Layer (SSL) on TCP port 995 to connect to the server.
    [Show full text]
  • What Is the Difference Between Email Protocols
    What Is The Difference Between Email Protocols Interactions between email servers and users are governed by email protocols. The most common incoming email protocols are POP, and IMAP. Most email applications/programs support one or more of these. This article is to help users understand and choose which protocol should be selected for each user’s situation. Outgoing Incoming POP (Post Office Protocol): IMAP (Internet Message Access Protocol): SSL (Secure Socket Layer): Differences Between POP and IMAP Backups / Email Loss Outgoing SMTP (Simple Mail Transfer Protocol) is the protocol used in sending (outgoing) emails. SMTP is the protocol always used for sending (outgoing) emails. Incoming POP (Post Office Protocol) and IMAP (Internet Message Access Protocol) are two different protocols that do the same thing differently. They are both used in receiving emails from a mail server and can both are available for standard and secure (?) connections. POP (Post Office Protocol): POP is an email accessing protocol used to download emails from a mail server. Applications like Outlook and Outlook Express using POP will download all emails from the server to the user’s computer, and then delete them on the server. Generally POP server uses port 110 to listen to the POP requests or securely using SSL (Secure Socket Layer) (?) POP uses port number 995. The POP protocol assumes that there is only one client/computer that will be connecting to the mailbox. Even though there is an option in most mail applications to leave the copies of the emails in the server, it is not generally used due to various reasons.
    [Show full text]
  • Evo Notebook N600c Series
    229045-002.book Page 1 Friday, September 21, 2001 11:16 AM b Hardware Guide Evo Notebook N600c Series Document Part Number: 229045-002 November 2001 This guide identifies computer hardware features and provides procedures for using them. It also includes instructions for setting up the computer, information about connecting external devices, and computer specifications. 229045-002.book Page 2 Friday, September 21, 2001 11:16 AM © 2001 Compaq Computer Corporation Compaq and the Compaq logo Registered in U. S. Patent and Trademark Office. Evo is a trademark of Compaq Information Technologies Group, L.P. Microsoft, MS-DOS, Windows, Windows NT are trademarks of Microsoft Corporation. All other product names mentioned herein may be trademarks of their respective companies. Compaq shall not be liable for technical or editorial errors or omissions contained herein. The information in this document is provided “as is” without warranty of any kind and is subject to change without notice. The warranties for Compaq products are set forth in the express limited warranty statements accompanying such products. Nothing herein should be construed as constituting an additional warranty. Hardware Guide Second Edition November 2001 First Edition June 2001 Document Part Number: 229045-002 229045-002.book Page iii Friday, September 21, 2001 11:16 AM Contents 1 Hardware and Software Setup Setting Up the Hardware. 1–1 Setting Up the Software . 1–4 Installing Optional Applications. 1–4 After Software Setup . 1–5 2 A Look at the Computer Display Components . 2–1 Pointing Device Components (Pointing Stick Models) . 2–2 Pointing Device Components (TouchPad Models). 2–3 Pointing Device Components (Dual Models) .
    [Show full text]
  • Ii Jacobs Rp316
    !II JACOBS RP316 RACIBORZ FLOOD RESERVOIR Public Disclosure Authorized Resettlement Action Plan Public Disclosure Authorized DRAFT Public Disclosure Authorized Public Disclosure Authorized March 2005 JACOBS Document control sheet Form IP180/B Client: PCU Project: Odra Flood Mitigation Job No: J24201A Title: Draft Resettlement Action Plan Prepared by Reviewed by Approved by ORIGINAL0 NAME NAME NAME P Devitt L J S Attewill see list of authors H Fiedler-Krukowicz J Loch | DATfE SIGNATURE SIGNATURE SIGNATURE REVISION NAME NAME NAME DATE SIGNATURE SIGNATURE SIGNATURE REVISION NAME NAME NAME DATE SIGNATURE SIGNATURE SIGNATURE REVISION NAME NAME NAME DATE SIGNATURE SIGNATURE SIGNATURE This report, and infonnabon or advice which it contains, is provided by JacobsGIBB Ltd solely for internal use and reliance by its Cient in performance of JacobsGIBB Ltd's duties and liabilities under its contract with the Client Any advice, opinions, or recomrnendatons within this report should be read and retied upon only in the context of the report as a whole. The advice and opinions in this report are based upon the information nmadeavailable to JacobsGIBB Ltd at the date of this report and on current UK standards, codes, technology and constnuction practices as at the date of this report. Folloving final delvery of this report to the Client, JacobsGIBB Ltd will have no further obligations or duty to advise She Client on any mafters, including developrrient affecting the information or advice provided in ths report This report has been prepared by JacobsGIBB Ltd in their professional capaaty as Consuhing Engineers The contents of the report do not, in any way, purport to include any mranner of legal advice or opinion This report is prepared in accordance wrth the terms and conditions of JacobsGIBB Ltd's contract with the Client.
    [Show full text]
  • Aoc-Slg3-2M2
    AOC-SLG3-2M2 User's Guide Revision 1.1 The information in this user’s manual has been carefully reviewed and is believed to be accurate. The vendor assumes no responsibility for any inaccuracies that may be contained in this document, and makes no commitment to update or to keep current the information in this manual, or to notify any person or organization of the updates. Please Note: For the most up-to-date version of this manual, please see our website at www.supermicro.com. Super Micro Computer, Inc. ("Supermicro") reserves the right to make changes to the product described in this manual at any time and without notice. This product, including software and documentation, is the property of Supermicro and/or its licensors, and is supplied only under a license. Any use or reproduction of this product is not allowed, except as expressly permitted by the terms of said license. IN NO EVENT WILL SUPER MICRO COMPUTER, INC. BE LIABLE FOR DIRECT, INDIRECT, SPECIAL, INCIDENTAL, SPECULATIVE OR CONSEQUENTIAL DAMAGES ARISING FROM THE USE OR INABILITY TO USE THIS PRODUCT OR DOCUMENTATION, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. IN PARTICULAR, SUPER MICRO COMPUTER, INC. SHALL NOT HAVE LIABILITY FOR ANY HARDWARE, SOFTWARE, OR DATA STORED OR USED WITH THE PRODUCT, INCLUDING THE COSTS OF REPAIRING, REPLACING, INTEGRATING, INSTALLING OR RECOVERING SUCH HARDWARE, SOFTWARE, OR DATA. Any disputes arising between manufacturer and customer shall be governed by the laws of Santa Clara County in the State of California, USA. The State of California, County of Santa Clara shall be the exclusive venue for the resolution of any such disputes.
    [Show full text]
  • Software Engineering a Abnormal End: Abend Abnormaal Einde De Beëindiging Van Een Proces Voordat Dat Proces Geheel Is Afgewerkt
    1 Verklarende terminologielijst voor de Software Engineering A abnormal end: abend abnormaal einde De beëindiging van een proces voordat dat proces geheel is afgewerkt. abort (to) afbreken Een proces afbreken voordat het volledig is afgewerkt. absolute address absoluut adres Een adres dat permanent aan een eenheid of geheugenplaats is toegewezen en dat de eenheid of de geheugenplaats identificeert zonder dat daarvoor een vertaling of berekening nodig is. absolute assembler absoluut assembleerprogramma Een assembleerprogramma dat uitsluitend absolute code genereert. absolute code absolute code Code waarin alle adressen absoluut zijn. absolute coding absolute codering Een coderingsmethode waarin gebruik wordt gemaakt van instructies die absolute adressen bevatten. absolute expression absolute uitdrukking Een uitdrukking voorafgaande aan het moment waarop het assembleren van een programma plaatsvindt. Dit moment wordt niet beïnvloed door het verplaatsen van het programma. Een absolute uitdrukking kan een absoluut adres in een assembleertaal weergeven. absolute instruction absolute instructie 1. Een instructie in de definitieve uitvoerbare vorm. 2. Een computerinstructie waarin alle adressen uit absolute adressen bestaan. absolute loader absoluut laadprogramma Een programma dat een ander programma in het hoofdgeheugen kan plaatsen. Dit begint bij het initiële adres dat aan de code door het assembleerprogramma of de compiler is toegewezen en dat de adressen in de code niet verder wijzigt of aanpast. absolute load module absolute laadmodule 2 Een combinatie van werkmodules die op een gespecificeerd adres in het werkgeheugen wordt uitgevoerd. absolute machine code absolute machinecode Machinecode die steeds in vaste geheugenplaatsen moet worden geladen en niet mag worden verplaatst. Dit in tegenstelling tot verplaatsbare machinecode. absolute pathname absolute padnaam Een padnaam die de informatie bevat over de wijze waarop een bestand kan worden gevonden.
    [Show full text]
  • Policy and Procedures
    Policy and Procedures PEER FORUM I: DISK IMAGING December 7-8, 2017 at The Museum of Modern Art The following notes came out of Peer Forum I: Disk Imaging, a discussion as part of the Media Conservation Initiative ​ at MoMA. These notes represent the views of the speakers and participants who attended this meeting. The following notes came out of Peer Forum I: Disk Imaging, a discussion as part of the Media Conservation Initiative ​ at MoMA. These notes represent the views of the speakers and participants who attended this meeting. Contributors Reinhard Bek, Conservator of Contemporary Art, Bek & Frohnert LLC ​ Amy Brost, Assistant Media Conservator, The Museum of Modern Art ​ Euan Cochrane (Speaker), Digital Preservation Manager, Yale University Library ​ ​ Eddy Colloton, Assistant Conservator specializing in Electronic Media, Denver Art Museum ​ Deena Engel (Moderator), Clinical Professor, Director of the Program in Digital Humanities and Social ​ ​ ​ Science; Department of Computer Science, Courant Institute of Mathematical Sciences, New York University Dragan Espenschied (Speaker), Preservation Director, Rhizome ​ ​ Patricia Falcão, Time-Based Media Conservator, Tate ​ Jonathan Farbowitz, Fellow in the Conservation of Computer-Based Art, The Solomon R. Guggenheim ​ Museum Briana Feston-Brunet, Variable Media Conservator, Hirshhorn Museum & Sculpture Garden ​ Dan Finn, Media Conservator, Smithsonian American Art Museum ​ Ben Fino-Radin, Founder, Small Data Industries ​ Flaminia Fortunato, Andrew W. Mellon Fellow in Media Conservation,
    [Show full text]