comptia a+ customer lcd panel quotation
This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution. There are several actions that could trigger this block including submitting a certain word or phrase, a SQL command or malformed data.
This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution. There are several actions that could trigger this block including submitting a certain word or phrase, a SQL command or malformed data.
Breakdown: Port replicators as well as docking stations allow you to keep peripheral devices such as external monitors and keyboards plugged in when you need to take the notebook with you. Both devices, in essence, replicate the peripheral ports of the notebook in order to allow this. Docking stations include additional features such as slots for full-size desktop PCI cards, additional media/accessory bays, CD drives and other expansion slots.
Breakdown: Some notebooks have a security locking slot on the outside of the case typically indicated by a symbol of a padlock next to it. You can use this slot to attach a cable lock with the other end looped around a fixed, sturdy object.
Breakdown: A local area network (LAN) is a specifically designed configuration of computers and other devices located within a confined area, such as a home or office building, and connected by wires or radio waves that permit connected devices to communicate with one another or share data and services.
Breakdown: In a star topology, each node is connected to a central network connectivity device such as a hub or a switch. This device then distributes the information packets it receives to the star’s nodes. In a star topology, each node has its own wired or wireless connection to the hub.
Breakdown: In a bus topology, each node is connected to the next by a direct line so that a continuous line is formed. There’s no central point in such an arrangement. Each node is simply connected to the next one on either side of it. The ends of the bus are closed off with a terminator device to prevent signal reflection which could generate interference on the line.
Breakdown: In a ring topology, each node is connected to two nodes on either side of it such that all nodes form a continuous loop. Communication is enabled by passing a token around the ring to each node. When a node has the token, it can transmit data. The token packet travels in a circle or ring in a single direction even though the nodes are physically arranged as a star.
Breakdown: In a mesh topology, all nodes in the mesh have independent connections to all other nodes in the mesh. This configuration makes it very fault tolerant and scalable. Most mesh topologies aren’t fully meshed due to cost. More common is a partial mesh topology with some redundant links.
Breakdown: The benefit of the star topology is that because each node has its own connection to the central network connectivity device, when a single connection fails, it doesn’t affect the communication ability of other nodes connected to the same central device. If the central device fails, however, none of the nodes connected to it are able to communicate on the network.
Breakdown: A Digital Subscriber Line (DSL) is a high-speed data and voice transmission line that still uses telephone wires for transmission but carries the digital data at frequencies well above those used for voice transmission. Voice and data can be transmitted at the same time over a DSL connection.
Breakdown: You can now connect to the Internet either through your smartphone or through your laptop using a cellular network PC card. 4G cellular networks are capable of speeds of 100 Mbps while and 1 Gbps while stationary using Long Term Evolution (LTE) technology.
Breakdown: Modems are devices that enable you to connect your computer to another network through a phone line. The modem in the sending computer must convert the digital signals within the computer to analog signals that are compatible with the phone system. On the other end, the receiving modem must then convert analog signals back into digital signals.
Breakdown: Load balancers are devices that distribute networking or computing workloads across multiple resources. A load balancing router can dynamically adjust network routes to balance the utilization across networks.
Breakdown: A proxy server is a server that acts as an intermediary between computers on a network and the Internet. Before sending a packet, the proxy server replaces the original sender’s IP address and other identifying information with its own. When the response arrives, the proxy server looks up the original sender’s information, updates the incoming packet, and forwards it to the client. This allows for anonymous access to the Internet, thus providing an added layer of security.
Many proxy servers also provide caching functions which speed up content serving so that clients don’t need to constantly hit the Internet for web pages that already reside on the local network.
Breakdown: On a PC, the modem provides a connection for a regular phone line which is an RJ-11 connection – the same type of connection used for a standard phone wall outlet. In addition, a modem usually has an Rj-11 connection for a telephone.
Breakdown: A bridge is an internetworking device that connects two LANs and makes them appear to be one or segments a larger LAN into two smaller pieces. Bridges can filter traffic thus preventing local traffic from one segment from going beyond the segment.
You’re wiring Ethernet in a star topology. What’s the internetworking device you use to take the signal transmitted from one computer and propagate it to all the other computers in the network?
Breakdown: Fiber optic cables carry light-based data through strands of glass or plastic and is currently the fastest (and most expensive) network transmission medium.
Breakdown: Unshielded Twisted-Pair (UTP) uses four pairs of wires and is typically used to connect network nodes. The wire pairs are twisted together to prevent crosstalk (interference).
Which network medium contains a layer of braided wire or foil between the core and the outside insulating layer, plus another layer of plastic or rubberized material that separates the central core from the shielding layer?
Breakdown: Coaxial cables (“coax” for short) contain a layer of braided wire or foil between the core and the outside insulating layer. The shielding layer helps protect the data from EMI problems. Coaxial cabling is typically found in older networks.
Breakdown: The standard BNC connector is considered a 2-pin connector – pin 1 is the center conductor, which carries the data signal and pin 2 is the tinned copper braid, which provides the ground.
Which medium might also have letters after the number to indicate the cable’s impedance (specified in ohms) and to indicate whether the inner conductor is solid or stranded?
Breakdown: Coaxial cable comes in many variations and is specified by the RG standard. RG cable might also have letters after the number to indicate cable’s impedance (specified in ohms) and whether the inner conductor is solid or stranded.
Breakdown: Fiber optic cable is used by telephone and cable companies to deliver information across long distances. It’s also used as the backbone for networks.
Breakdown: Since fiber optic cable doesn’t carry electrical signals it’s safe to use in hazardous, high-voltage environments. It can be used where explosive fumes are present without danger of ignition, however, not all fiber optic cable is plenum grade. For use in plenum installations, fiber optic cable must have an outer material made from some kind of fire-resistant material such as PVC. Such cables are sold as plenum grade fiber optic cables.
Breakdown: A cable testing device can be used to test cables and network connections. It’s a highly versatile device, which can be used to test a wide variety of cables and connections. You can purchase cable testing devices for your particular LAN or one that’s compatible with multiple network types.
Breakdown: In addition to testing physical cables and connections, a cable testing device can also test and verify a wide variety of network functions.
Breakdown: The basic electrical measurement functions of a multimeter (both analog and digital) are voltage, resistance, and current. Typically, a computer technician will need to measure voltage (both DC and AC) and resistance (mostly in terms of continuity) in the course of his/her work. Electrical current will seldom, if ever, be something that needs to be measured.
Breakdown: Subnet masks are used to identify the network-ID portion of an IP address. Subnet masks allow additional addresses to be implemented within a given address space. Each IP network class has a default subnet mask. The default submask for a Class C network is: 255.255.255.0.
Breakdown: On a TCP/IP network, if a computer doesn’t know how to deliver a packet, it hands off the packet to the default gateway (usually a router) to deliver. This happens every time a computer needs to deliver a packet to a network other than its own.
Breakdown: The network 169.254.0.0. is reserved for Automatic Private IP Addressing (APIPA). Windows 2000 and later operating systems automatically generate an address in this range if they are configured to obtain an IPv4 address from a DHCP server and are unable to contact one. Addresses in this range are private and can’t be used on the Internet.
Breakdown: A MAC address, also referred to as a physical address, adapter address, or Ethernet address, identifies a device on a LAN. Part of the address contains the manufacturer’s identifier with the rest being a unique number. No two NICs have the same identifying code. MAC addresses are absolute, unlike IP addresses which are subject to change.
Breakdown: The IP version uses 128-bit addresses. These addresses are written and displayed in the hexadecimal-equivalent values for each of their 16 bytes. Like IPv4 addresses, IPv6 are also composed of two parts: the network ID and the host ID.
Breakdown: The Domain Name System (DNS) is used to resolve host names to IP addresses and to find computers such as Web and e-mail servers. A fully qualified domain name (FQDN) is typically composed of three parts: a host name, a domain name, and a top-level domain name. The “www” part is the host’s name or an alias for the actual name.
Breakdown: Dynamic Host Configuration Protocol (DHCP) is an automated mechanism to assign IP addresses dynamically to clients from a pool of possible addresses called a scope. Using DHCP to assign IP configuration to client computers on your network simplifies administration and avoids the problem of IP information being entered incorrectly in the case of static IP assignment.
Breakdown: TCP is connection-oriented and reliable. It is similar to delivering a letter by registered mail. Inside the letter, each page is numbered so that it can be read in the proper order. When the message is received, the sender is notified that it arrived properly at its destination. If it doesn’t, then the receiver notifies the sender to resend the message.
SSH was designed as a replacement for insecure remote shells, which sent data (including passwords) in plain text. Which of the following is one of those insecure remote shells?
Breakdown: Secure Shell (SSH) exchanges data between two network nodes over a secure channel. SSH was designed as a replacement for Telnet and other insecure remote shells, which sent data (including passwords) in plain text. These shells left the data open for interception.
Which email protocol is used to send and receive e-mail messages between e-mail servers and used by e-mail client software to send messages to the server, but never used by clients to retrieve email from the server?
Breakdown: Simple Mail Transfer Protocol (SMTP) is used to send and receive e-mail messages between email servers. It is also used by e-mail client software, such as MS Outlook, to send messages to the email server. SMTP is never used by a client computer to retrieve email from a server. Other protocols such as POP3 control the retrieval of e-mail messages.
Which IEEE 802.11 standard operates in the 2.4 GHz frequency range, has a data speed of up to 20+ Mbps, and has a range of 45 meters indoors and 90 meters outdoors?
Breakdown: The 802.11g standard is backwards-compatible with 802.11b which transmits data at 11 Mbps. 802.11g has a higher throughput at 20+ Mbps and some devices advertise speeds of up to 54 Mbps. Devices supporting 802.11g have a transmission range of up to 4 meters indoors and 90 meters outdoors.
Which IEEE 802.11 standard operates in the 2.4 and 5 GHz frequency range, has a data speed of up to 600 Mbps, and has a range of 70 meters indoors and 250 meters outdoors?
Breakdown: Devices supporting 802.11n can transmit data at up to 600 Mbps in either the 5 GHz or 2.4 GHz band. The transmission range is up to 70 meters indoors and 250 meters outdoors.
Breakdown: The 802.11 standard defines an access point (AP) as a device that functions as a transparent bridge between the wireless client and the wired network.
Breakdown: Though there are several configuration steps that you should take to adequately secure a wireless router, but at an absolute minimum, you should enable some form of data encryption method. It is advisable to select the most secure transmission encryption method compatible with the clients on the LAN. Options might include WEP, WPA Personal WPA2, WPA Enterprise, RADIUS, and 802.11i.
Breakdown: Network Address Translation (NAT) devices correlate internal and external addresses. A single public IP address is assigned to the device and each private node is assigned a unique IP address that is not visible to the public network. The NAT device (router) makes certain that inbound and outbound packets arrive at the correct destination. NAT expands the limited number of IP addresses that can be used directly on the Internet and also provides a layer of security to private networks.
Breakdown: On larger networks where public access to resources such as a Web server, e-mail server, or FTP server are required, a perimeter network is established where these resources can reside. The perimeter network, also referred to as a demilitarized zone (DMZ), is set up between the private network (intranet) and the Internet. Computers in the DMZ are accessible to computers on both the Internet as well as the intranet. Typically, computers within the DMZ have limited access to computers on the intranet while direct connections between the Internet and the internal network are blocked.
Breakdown: A firewall is a device that controls traffic between a public network and a private internal network. Firewalls examine the contents of network traffic and permit or block transmission based on rules. Firewalls vary in price and complexity and use one or more security techniques such as stateful packet inspection, access control lists, and basic packet filtering.
Breakdown: You should always avoid using jargon where plain language suffices. You aren’t out to impress the user with techno-babble. You need to speak clearly about the issue and implement the appropriate solution. Explain any acronyms and abbreviations you use.
Breakdown: You must match your communication level with your customer’s abilities. By assessing the customer’s competence level you can deliver the message appropriately.
You and a colleague respond to a user who’s having a problem. As the user is describing the problem to your colleague, you roll your eyes. Which guidelines for professional communication are you not following? (Choose all that apply)
Breakdown: Behaving in such a manner in the presence of a customer violates multiple guidelines for professional communication, but the two primary ones that are violated in this example are respecting the customer and considering the total message. Rolling one’s eyes in the presence of a customer is highly disrespectful and sends a hostile message.
Breakdown: Air-quality is important for both humans as well as electronic equipment. Dust and dirt can accumulate inside computers and block air vents that can cause overheating. Hard disk drives, for example, are prone to failure in high-heat environments. Data recovery from damaged drives can be an expensive process.
Breakdown: You should periodically inspect ventilation holes and components for dust. Use compressed-air or an air compressor to push dust and other matter out of the enclosure. A link-free cloth can also be used to clean dust and debris from ventilation openings.
Breakdown: The MSDS personal protective C rating recommends wearing goggles, gloves, and other protective gear when using this product. This is the most hazardous rating and extreme caution must be used when handling and disposing of such materials.
Breakdown: There are six stages in the CompTIA A+ troubleshooting model with the first being to identify the problem. The sixth, and final stage, is to document findings, actions, and outcomes.
Breakdown: While testing the theory to determine the actual cause of the problem you will be inspecting and testing components related to the problem. This may include examining connections, power being turned on, and visual and audible indicators. You may need to consult vendor documentation for descriptions of status lights and other indicators.
What is the name of the Web site containing problem and solution references for the Microsoft client operating systems, such as Windows 2000 Professional, Windows XP, Windows Vista, and Windows 7, as well as many other Microsoft applications?
Breakdown: For help with a problem concerning software or hardware on a computer running a Microsoft operating system, an excellent troubleshooting reference is Microsoft’s Help and Support Center site. A component of the Help and Support Center is the Microsoft Knowledge Base, which explains many Microsoft error messages.
Which of the following types of software is responsible for accepting input from devices such as a keyboard, mouse, scanner, or smart card reader, and creating output on devices such as a monitor, printer, or speakers?
Breakdown: An operating system is a set of software instructions that control the computer and run other programs on the computer. Applications are installed on top of the operating system and work with the operating system and the computer’s hardware such as the monitor, mouse, keyboard, printer, and other devices.
Breakdown: A graphical user interface (GUI) has icons or menus that you can click or select to perform a function or run a program. Along with a keyboard and a pointing device such as a mouse, you are able to interact with screen elements when working with a GUI.
Breakdown: The Windows 7 Enterprise edition is designed for large, global organizations with complex IT infrastructures and is available only through Microsoft’s volume licensing programs.
Breakdown: The Windows 7 Home Basic edition is only available in emerging markets. It’s highly unlikely that you will encounter it in the course of your work as an IT professional.
Breakdown: The Aero desktop GUI with Flip 3D is not available in Windows Vista Home Basic along with several other advanced features only available in the higher-end Windows Vista editions.
Breakdown: Multiprocessor support is found in the Windows XP Professional edition. The Professional version is designed for the business user. The feature sets of these editions vary significantly because business organizations need to control and secure their client computers more than the typical home user.
Breakdown: The Windows notification area displays icons for system and program applications that are running but have no desktop presence. The time and volume icons are displayed in the notification area.
Breakdown: The “/a:h” file attributes switch with option to display hidden files combined with the “/o:n” file sort switch and option to display files in alphabetical order.
Breakdown: A hypervisor, or virtual machine manager, is the core virtualization software that enables multiple virtual computers to run on a single physical host. The hypervisor controls and allocates the host machine’s resources to give each guest operating system what it needs while making sure that the different VMs (virtual machines) on the host machine do not interfere with each other.
Breakdown: Despite virtualization having some benefits when it comes to security, they are still vulnerable to malware attacks, user errors, and external attacks just like a standalone computer. VMs still require firewalls, antivirus software, and user security measures just like ordinary desktops on the network.
Breakdown: Task Manager is a Windows GUI utility that provides information about the applications, processes, and services that are running on your computer. The Performance tab within Task Manager displays a dynamic representation of the most common performance indicators for your computers such as CPU and page file usage, number of threads, handles, and processes among others.
Breakdown: In Windows 7 and Windows Vista, DirectX Diagnostic (dxdiag.exe) is a utility you can use to see the status of your DirectX installation, however, unlike in Windows 2000 Professional and Windows XP, you are unable to test and troubleshoot video- or sound-related problems.
Breakdown: The Application tab in Task Manager displays the status of applications running on your computer. You can end an application, switch to a running application, or start an application from this tab.
Breakdown: The Processes tab in Task Manager displays information about the processes that are running on your computer. Information about the process’s percentage of CPU usage and the amount of memory the process is using is displayed. You can end processes from this tab, which comes in handy if a process is consuming too much in the way of computing resources.
Breakdown: The Recovery tab in a service’s Properties dialog box allows you to configure the computer’s response when a service fails, including various actions depending on the number of failures, which includes specifying a program that the operating system should run when a service failure occurs.
Breakdown: The Dependencies tab in the service’s Properties dialog box specifies the services that a service depends on to function correctly as well as the services which depend on this service in order to function.
Breakdown: In Windows 7 the Devices and Printers window provides a central location where you can view and access all of your computer’s devices. You can view detailed information about each device, determine if each device is working properly, and connect network devices and printers that were not added automatically.
Breakdown: If a device is not yet Device Stage-enabled, the AutoPlay dialog box will open when you connect the device to your computer. AutoPlay provides general options for interacting with devices.
True or false? If a device is not yet Device Stage-enabled, double-clicking its icon in the Devices and Printers window opens a specialized page with icons and options; this is an XML “page” built by the device manufacturer.
Breakdown: In the Devices and Printers window, double-clicking a device not supported by Device Stage will open the Properties dialog box for that device.
In which power state does the computer take all current applications running in RAM, save them to the systems swap partition on the hard disk, and turn the computer’s power off?
Breakdown: During hibernation mode, the computer takes all current applications running in RAM, saves them in the swap partition on the hard disk, and then turns the notebook’s power off. All components of the computer are turned off. As a result, the Hibernate power state requires zero power. The OS is restored faster from this state than from a shutdown, but more slowly than from the Sleep power state.
Breakdown: Power consumption is most important with portable computers that get their power from rechargeable batteries, but even on desktops effective power management can save energy and therefore money for the user or organization.
Breakdown: The Disk Management utility allows you to alter existing partitions on a disk. You can extend a partition if there is unallocated space next to it on the disk. You can also shrink a partition to free up space if the partition is not full.
Breakdown: To share files or folders with other users on a network, you use the Share with command to select users that you wish to give access to your files or folders.
Breakdown: The Wake on LAN feature allows you to configure a computer, such as a print server, that is in a power saving mode to “wake up” when the network card receives a connection request.
This CertKit focuses on establishing best practices in troubleshooting, networking, and security across a variety of devices. It covers the ability to assemble computer components based on specific requirements, and how to install, configure, and maintain PCs and software for end users. It also teaches basic networking and virtualization skills, in addition to appropriate customer support. The CertKit gives students the knowledge to properly diagnose, resolve, and document an assortment of hardware and software issues through proper troubleshooting techniques. This exam counts toward the CompTIA A+ certification.
To ensure your success in this course, you should have basic computer user skills, be able to complete tasks in a Microsoft Windows environment, be able to search for, browse, and access information on the Internet, and have basic knowledge of computing concepts.
This course is designed for individuals who have basic computer user skills and who are interested in obtaining a job as an entry-level IT technician.
Some users are unable to access the Internet form their workstations. A technician runs the ipconfig command on one of the workstations and sees the following:
A systems administrator is configuring a server to host several virtual machines. The administrator configures the server and is ready to begin provisioning the virtual machines. Which of the following features should the administrator utilize to complete the task?
A user accidentally spills liquid on a laptop. The user wants the device to be fixed and would like to know how much it will cost. Which of the following steps should the technician take NEXT to verify if the device is repairable before committing to a price? (Choose two.)
A user is experiencing email problems and explains to a technician that all emails with graphics or images do not display the graphics. Which of the following configurations would correct this behavior?
A technician is replacing an older video card with a new high-end video card in a workstation. The installation was successful, the new card seated properly, and power is connected. However, upon booting, the computer now emits several beeps and will not boot, but shows no error messages. Which of the following is MOST likely the cause of this issue?
A technician is setting up a VM for use in testing software deployments. The VM is offline, but the hypervisor is not. Which of the following settings should the technician change to resolve this issue?
A user’s laptop is shutting down unexpectedly. The technician discovers the shutdowns only happen when the laptop is moved from one room to another. The technician reseated the hard drive, memory, battery, and LCD cable, but the laptop continues to shut down. Which of the following is the MOST probable cause of the issue?
A technician was called to check an unexpected clicking noise on a desktop that has become more frequent every time a video editing application is loaded. The system fans have been replaced, but the clicking noise remains. Diagnostics have been run on the video card. Which of the following should me the technician do FIRST?
A technician has been asked to fix a problem with a projector. The projector lamp turns off for brief periods during a demonstration. After the technician replaced the lamp, the problem continued with an added message that appears just before the lamp turns off. Which of the following MOST likely need to be performed? (Choose two.)
A user printed several documents to a shared network copier and noticed that they have very faint color density. A technician investigates the issue and verifies that the printer had a maintenance kit installed recently. Which of the following next steps will MOST likely resolve the issue? (Select two.)
A customer wants to purchase a new home computer. The machine will mainly be used for internal browsing and streaming video, except on weekends when the customers’ son will use it to play games with friends. Which of the following should the technician focus on to meet these requirements?
A technician needs to routinely run scripting commands in Linux but does not want to walk over the server room every time to perform the task. The technician also travels between buildings and has a Windows 10 laptop with 4GB of memory and a fully partitioned 500GB hard drive. Which of the following steps should the technician take to resolve this issue? (Choose two.)
A server administrator set up a VM to be used in a lab setting. A technician is setting up thin-client computers to access this VM. Which of the following tasks are required to complete the project? (Choose three.)
A customer contacts the help disk stating a laptop does not remain charged for more than 30 minutes and will not charge more than 15%. Which of the following components are the MOST likely causes the issue? (Select three.)
A customer asks a technician to help set up a specialized computing system for video editing. Which of the following should the technician install on the workstation to BEST meet the customer’s specifications? (Choose two.)
A user is unable to access websites and has reported connectivity issues with pop-ups on the screen. A technician removes malware, and then is able to ping the router and access the websites. Which of the following NEXT steps should the technician perform in troubleshooting this issue? (Choose two.)
A technician replaced a broken LED screen on a mobile computer. The operating system can be seen perfectly on screen, but the touch screen is non-responsive. Which of the following are the MOST probable root causes for the given failure? (Choose three.)
A technician is setting up a WiFi-enabled thermostat for a customer, but the customer is concerned about IoT devices getting hacked. Which of the following BEST address the customer’s concerns? (Choose two.)
A client has three locations within city limits that need to be networked. Vendor network requirements for all three locations are a minimum of 1GB. Which of the following are the types of networks that will MOST likely be used for internal office and office-to-office networking? (Choose two.)
Ann, a user, reports that after setting up a new WAP in her kitchen she is experiencing intermittent connectivity issues. Which of the following should a technician check FIRST?
This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution. There are several actions that could trigger this block including submitting a certain word or phrase, a SQL command or malformed data.
ITIL® is a registered trade mark of AXELOS Limited, used under permission of AXELOS Limited. The Swirl logo™ is a trade mark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved.
Lo sentimos, se ha producido un error en el servidor • Désolé, une erreur de serveur s"est produite • Desculpe, ocorreu um erro no servidor • Es ist leider ein Server-Fehler aufgetreten •
- So this, my friends, what I have in front of me, is an actual LCD monitor, I just took off the case, because in this episode I want to talk about some of the parts that are really, really important to us techs on the inside of LCD monitors. So let me go ahead and let"s start with probably the most important part there is right here. And this is a big guy right here. This is the actual LCD screen itself. Now, if we take a look, let me zoom in on this, there are millions of tiny little wires coming into this LCD screen with a few controller functions right here. So, this incredibly fragile piece contains gazillions, over a million, of these little picture elements in here. Now, because there"s no power, theoretically, you can"t see through an LCD when there"s no power, however, no LCD is perfect, so you can probably see me a little bit, I can see the camera a little bit. Alright, so this is the working part of any monitor. So let me just set this off to the side for a moment, because there"s more. So let"s look down here at this very bright, very white piece right here. What you"re actually looking at, they"re a little bit taped down so it"s tricky to see, but underneath here, and also way down at the bottom, are these big, long fluorescent tubes. They"re CCFLs. All of this white is basically a reflector, because we want the light to be as even as possible across the monitor so you don"t have dark and bright spots on the monitor itself. So, those are where the CCFLs live. Now, what"s interesting, if I can do this without losing a finger, is underneath here. Eh, you know what, let"s flip the whole thing over first. Here"s the power connection, this is where the monitor gets its electricity, and over here are inputs that are going to come from video cards from my system itself. Okay, now let"s go back in this guy a little bit. So, first of all, here"s the power over here, so what you have in here is a standard AC to DC power supply just like you"d see at a desktop system, although much, much smaller. This is designed to give us the DC power that our circuitry needs to run. However, there"s a problem, and the problem is, especially with the old school CCFLs, these CCFLs are fluorescent lights, and fluorescent lights need AC power. So what you would do is you would take your DC power and then have to convert it back into AC through what were known as inverters. Now, with these LED panels we see today, we don"t see the inverters anymore, you"re only going to have inverters if you have CCFLs. Okay, now coming back over here, this is the actual inputs from our video card itself, and these are different types of technologies, of connectors, we cover those in other episodes, we have some logic circuitry here, and this guy right here is the primary connection to the LCD panel itself. So, when you"re working with an LCD panel, couple things I want to make sure you understand. Number one, you"re going to have a panel of course, number two, you"re going to have a separate backlight unit. If you"re using CCFLs, and there"s plenty of monitors that still do, you are going to have inverters that take the DC power that was just converted from AC, yeah it was, and turns it back into AC to run the CCFLs. On top of that, we"re going to have our connectors, our inputs from our data connection, and of course, a big power connection as well. (jazzy guitar music)