-
The Visible Computer—CompTIA A+ (220-1001) A-PLUS Certification Prep Course Notes
The Visible Computer A computer gets work or play done. A computer will have a CPU, RAM, mass storage, & an OS. Primary PC Components System unit, Monitor (output), Keyboard & mouse (input), Printer (paper output); Speakers, game controllers, web cameras, external hard drives, headsets, microphones. External Connections USB, network cable connections (RJ45); DVI; HDMI; older: mini-din (PS2); Parallel port; serial port; VGA. Inside the PC What is a computer? What is an Operating System? A program that runs the other programs (the conductor). An OS controls all the programs on a computer. Kernel—the core part of the OS that handles the primary memory management. The core of the operating…
-
Safety & Professionalism—CompTIA A+ (220-1001) A-PLUS Certification Prep Course Notes
Safety & Professionalism Professional Communication, Part 1 Be on time Active Listening—avoid interrupting the customer Clarify Customer Statements Maintain Positive Attitude/Project Confidence Use proper language and avoid jargon, acronyms and slang. Set and meet expectations/timeline and communicate status with customer (managing expectations!!) Professional Communication, Part 2 Be culturally sensitive Use appropriate professional titles/greetings Avoid distractions when working with the customer (no phones, etc) Avoid being judgmental Avoid dismissing customer problems Deal appropriately with customers’ confidential & private materials Don’t argue with the customer or be defensive (or offensive, for that matter!) Follow up with the customer to verify satisfaction Provide proper documentation on services provided Offer different repair/replacement options Tools…
-
Networking Notes—The Process Status Command, NETSTAT, & LSOF
The PS Command ps—the process status command, is used to provide info about currently running processes, including their process identification numbers (PID’s). A process, also referred to as a task, is an executing (running) instance of a program. Every process is assigned a unique PID by the system. The basic syntax is: ps [options] ex: ps -aux PS results in 4 items: PID, TTY (‘Terminal Type’, or ‘teletype’, TIME, & CMD. The ‘-aux’ parameter combinations shows: ‘-a’ option shows all user processes; ‘-a’ option tells ps to list the processes of all users on the system rather than just those of the current user, with the exception of group leaders…
-
Computer Science (CompSci) Notes
Step 1–Define the problem to solve Step 2–Define a solution Step 3-Write a program that implements the solution Step 4-Compile the program Step 5-Link object files Step 6-Test program Step 7-Debug C++ (C plus plus) files should end in a “.cpp” extension to indicate a C++ source file. (ex: name.cpp) Use a C++ compiler to compile a C++ (.cpp) program. The C++ compiler sequentially goes through each source code (.cpp) file in your program and does 2 important tasks: FIRST, it checks the code to make sure it follows the rules of the C++ language. If it does not, the compiler will give you an error to help pinpoint what…
-
Cryptography & Cyber Security Course Notes
Crytopgraphy For Security course on You Tube. The triad of cybersecurity is: Confidentiality Integrity Availability Confidentiality refers to “the property that sensitive info is not disclosed to unauthorized individuals, entities, or processes”. —N.I.S.T. Intregrity is defined as the “guarding against improper info modification or destruction, and includes ensuring information non-repudiation & authenticity”. -NIST Availability is “ensuring timely and reliable access to and use of information”. -NIST Impact of Security Breaches: Effectiveness of primary operations are reduced. Financial loss Damage to assets Harm to individuals Threat: potential violation of security Attack: assault on system security derived from intelligent threat. Aspects of Security Security Attack—any action that attempts to compromise the security…
-
Security issue in Apple Airdrop allow attackers to steal personal information
Simple tip for NON-TECH users…This security issue can also be mitigated by sticking to the principle of least privilege, even when it comes to seemingly innocent apps, that are just trying to make our lives easier. If you’re not actively using Apple’s AirDrop feature, then DO NOT have it running in the background, unnecessarily. “So far, Apple has neither acknowledged the problem nor indicated that they are working on a solution,” the researchers concluded. “This means that the users of more than 1.5 billion Apple devices are still vulnerable to the outlined privacy attacks. Users can only protect themselves by disabling AirDrop discovery in the system settings and by refraining…
-
What is Blockchain Technology?
Cryptocurrency a medium of exchange; a digital asset. its created & stored electronically in the blockchain, using encryption techniques to control the creation of monetary units and to verify the transfer of funds. (Bitcoin is the most widely know example.) Cryptocurrency has no intrinsic value (meaning not redeemable for another commodity, such as gold). It has no physical form (and exists only in the network). Cryptocurrency is DECENTRALIZED. It’s supply is not determined by a central bank; the network is completely decentralized. Blockchain–a distributed ledger technology; a database that is shared, replicated and in-sync. Blockchain–a blockchain is a decentralized ledger of all transactions across a peer-to-peer network. By using blockchain…
-
Blockchain & Money: Session 24: Conclusion, by M.I.T. Sloan School of Management with Professor Gary Gensler
Overview: Money and Ledgers; Satoshi Nakamoto’s Innovation; Economics of Blockchain Technology; Financial Sector Opportunities; Crypto Finance; Public Policy Frameworks; Conclusions & Pay It Forward. What is the Role of Money? Biblio: Gary Gensler. 15.S12 Blockchain and Money. Fall 2018. Massachusetts Institute of Technology: MIT OpenCourseWare, https://ocw.mit.edu. License: Creative Commons BY-NC-SA. Video Link: Session 24: Conclusion. Slides Link: Session 24: Conclusion, Slides.
-
Blockchain & Money: Session 23: Digital ID, by M.I.T. Sloan School of Management with Professor Gary Gensler
Session 23: Digital ID Overview: Readings and Study Questions; Identity; Identity and Access Management; State Projects; Identity & Blockchain Technology; Your MIT Blockchain Diploma; Conclusions. Session 23: Study Questions What are the trade-offs of using blockchain technology for identity and access management (IAM)? What is self-sovereign identity? How might blockchain self-sovereign or digital identity applications be applicable within the financial sector? Will you ask for your MIT diploma digitally or on paper? Session 23: Readings ‘Self-sovereign identity:Why blockchain?’, IBM. ‘Blockchain and Digital Identity–A Good Fit?’, Internet Society. ‘Can blockchain ease banks’ digital-identity concerns?’, -American Banker. ‘Blockchains and Digital Identity’, Toward Data Science. ‘Singapore Regulator, Banks Complete KYC Blockchain Prototype’, CCN.…
-
Blockchain & Money: Session 22: Trade Finance & Supply Chain, by M.I.T. Sloan School of Management with Professor Gary Gensler
Session 22: Trade Finance & Supply Chain Overview: Readings and Study Questions; Trade Finance; Trade Finance Blockchain Technology Efforts; Shipping and Supply Chain Blockchain Projects; Final Projects; Spring Courses; Conclusions. Session 22: Study Questions What attributes of trade finance and supply chain management might make this a ripe set of use cases for blockchain applications? What lessons might be drawn from the ongoing projects? Session 22: Readings ‘Trade Tech–A New Age for Trade and Supply Chain Finance’, World Economic Forum/Bain. ‘How Banks Are Teaming Up To Bring Blockchain To Trade Finance’, CB Insights. ‘Hong Kong, Singapore to link up trade finance blockchain platforms’, Reuters. ‘Business Interest in Blockchain Picks Up…