Summary

This is a CompTIA ITF+ study guide for IT Fundamentals. It provides an introduction to using computers, apps, and databases, along with troubleshooting tips. The book delves into computer systems, common operating systems, apps, and application management within the computing realm and also covers foundational programming concepts and database structures.

Full Transcript

Acknowledgements The Official CompTIA ITF+ Study Guide (Exam FC0‑U61) PROJECT TEAM Thomas Reilly, Vice President Learning Katie Hoenicke, Director of Product Management James Chesterfield, Manager, Learning Content and Design Becky Mann, Senior Manager, P...

Acknowledgements The Official CompTIA ITF+ Study Guide (Exam FC0‑U61) PROJECT TEAM Thomas Reilly, Vice President Learning Katie Hoenicke, Director of Product Management James Chesterfield, Manager, Learning Content and Design Becky Mann, Senior Manager, Product Development James Pengelly, Senior Manager, Product Development DISCLAIMER While CompTIA, Inc. takes care to ensure the accuracy and quality of these materials, we cannot guarantee their accuracy, and all materials are provided without any warranty whatsoever, including, but not limited to, the implied warranties of merchantability or fitness for a particular purpose. The use of screenshots, photographs of another entity's products, or another entity's product name or service in this book is for editorial purposes only. No such use should be construed to imply sponsorship or endorsement of the book by nor any affiliation of such entity with CompTIA. This courseware may contain links to sites on the Internet that are owned and operated by third parties (the "External Sites"). CompTIA is not responsible for the availability of, or the content located on or through, any External Site. Please contact CompTIA if you have any concerns regarding such links or External Sites. TRADEMARK NOTICES CompTIA® and the CompTIA logo are registered trademarks of CompTIA, Inc., in the U.S. and other countries. All other product and service names used may be common law or registered trademarks of their respective proprietors. COPYRIGHT NOTICE Copyright © 2019 CompTIA, Inc. All rights reserved. Screenshots used for illustrative purposes are the property of the software proprietor. Except as permitted under the Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission CompTIA, 3500 Lacey Road, Suite 100, Downers Grove, IL 60515-5439. This book conveys no rights in the software or other products about which it was written; all use or licensing of such software or other products is the responsibility of the user according to terms and conditions of the owner. If you believe that this book, related materials, or any other CompTIA materials are being reproduced or transmitted without permission, please call 1-866-835-8020 or help.comptia.org. LICENSED FOR USE ONLY BY: AMOYA WILSON · 60028402 · NOV 14 2024 Table of Contents Table of Contents Course Introduction i Table of Contents....................................................................................... iii About This Course................................................................................... viii Module 1 / Using Computers 1 Module 1 / Unit 1 Common Computing Devices 3 Information Technology.............................................................................. 4 Personal Computers (PC)........................................................................... 6 Mobile Devices......................................................................................... 10 Internet of Things (IoT) Devices................................................................ 11 Module 1 / Unit 2 Using a Workstation 14 Setting up a PC System............................................................................ 15 Ergonomic Concepts................................................................................ 17 Navigating an OS..................................................................................... 18 Using Input Devices................................................................................. 26 Recognizing Desktop Icons...................................................................... 30 Working with Windows............................................................................. 31 Module 1 / Unit 3 Using an OS 39 Functions of an Operating System............................................................ 40 Types of Operating System...................................................................... 42 Virtualization............................................................................................ 44 Microsoft Windows................................................................................... 46 Apple macOS and iOS............................................................................. 49 Linux, Chrome, and Android..................................................................... 51 File Explorer............................................................................................. 53 Windows Settings and Control Panel........................................................ 55 Using a Web Browser............................................................................... 58 Module 1 / Unit 4 Managing an OS 65 Management Interfaces............................................................................ 66 Process and Service Management............................................................ 67 Memory and Disk Management................................................................ 70 Command Line Interfaces......................................................................... 73 Access Control and Protection.................................................................. 74 Module 1 / Unit 5 Troubleshooting and Support 85 Support and Troubleshooting.................................................................... 86 Identifying the Problem............................................................................. 87 LICENSED FOR USE ONLY the Understanding BY: Problem AMOYA...................................................................... WILSON · 60028402 · NOV 14 2024 89 Resolving and Documenting the Problem.................................................. 91 Page iii Table of Contents Troubleshooting PC Issues....................................................................... 94 Getting Support........................................................................................ 95 Using a Search Engine............................................................................. 98 Module 1 / Summary Using Computers 105 Module 2 / Using Apps and Databases 107 Module 2 / Unit 1 Using Data Types and Units 109 Notational Systems................................................................................. 110 Units of Measure.................................................................................... 112 Data Types............................................................................................. 114 Data Representation............................................................................... 115 The Value of Data................................................................................... 117 Intellectual Property................................................................................ 118 Data-driven Business Decisions.............................................................. 121 Module 2 / Unit 2 Using Apps 124 Installing Applications............................................................................. 125 Application Management......................................................................... 127 Managing Software Licensing................................................................. 130 Productivity Software.............................................................................. 132 Collaboration Software............................................................................ 134 Business Software.................................................................................. 137 Module 2 / Unit 3 Programming and App Development 144 Programming Logic................................................................................ 145 Programming Languages........................................................................ 148 Programming Concepts.......................................................................... 151 Object-Oriented Programming................................................................. 155 Scripting Languages............................................................................... 156 Application Platforms and Delivery.......................................................... 158 Module 2 / Unit 4 Using Databases 178 Database Concepts................................................................................ 179 Database Structures............................................................................... 181 Relational Methods................................................................................. 185 Database Access Methods...................................................................... 187 Application Architecture Models.............................................................. 188 Module 2 / Summary Using Apps and Databases 205 LICENSED FOR USE ONLY BY: AMOYA WILSON · 60028402 · NOV 14 2024 Page iv Module 3 / Using Computer Hardware 207 Table of Contents Module 3 / Unit 1 System Components 209 Selecting a Computer............................................................................. 210 Motherboard Components...................................................................... 212 Processors............................................................................................. 213 Features of Processors.......................................................................... 214 System and Expansion Bus Technologies............................................... 216 System Cooling...................................................................................... 218 BIOS and UEFI System Firmware........................................................... 220 Module 3 / Unit 2 Using Device Interfaces 225 Computer Port and Connector Types...................................................... 226 USB and Firewire................................................................................... 227 Graphics Devices................................................................................... 229 Graphic Device Interfaces....................................................................... 230 Input Devices......................................................................................... 233 Configuring Peripherals.......................................................................... 236 Bluetooth............................................................................................... 239 RF and Near Field Communications (NFC)............................................. 241 Networking Interfaces............................................................................. 241 Module 3 / Unit 3 Using Peripheral Devices 249 Installing and Uninstalling Peripherals..................................................... 250 Display Devices..................................................................................... 254 Display Settings..................................................................................... 257 Multimedia Ports and Devices................................................................. 261 Printer Types......................................................................................... 264 Installing and Configuring a Printer......................................................... 265 Scanners and Cameras.......................................................................... 268 Module 3 / Unit 4 Using Storage Devices 276 System Memory..................................................................................... 277 Mass Storage Devices............................................................................ 279 Optical Discs and Drives......................................................................... 281 Removable Flash Memory Devices......................................................... 284 Module 3 / Unit 5 Using File Systems 289 Managing the File System...................................................................... 290 Folders and Directories.......................................................................... 293 File Explorer........................................................................................... 295 Files...................................................................................................... 298 File Attributes and Permissions............................................................... 304 Searching for Folders and Files.............................................................. 307 File Types and Extensions...................................................................... 310 Module 3 / Summary LICENSED FOR USE Using ONLY BY: Computer AMOYA WILSON · 60028402 · NOV 14 2024 Hardware 325 Page v Table of Contents Module 4 / Using Networks 327 Module 4 / Unit 1 Networking Concepts 329 Network Components............................................................................. 330 TCP/IP................................................................................................... 332 Internet Protocol..................................................................................... 335 Packet Delivery and Forwarding.............................................................. 337 DNS and URLs....................................................................................... 338 Internet Application Services................................................................... 341 Module 4 / Unit 2 Connecting to a Network 346 Internet Service Types............................................................................ 347 Wireless Internet Services...................................................................... 349 Setting Up a Wireless Network................................................................ 351 Configuring a Wireless Client.................................................................. 355 Connecting to an Enterprise Network...................................................... 356 Module 4 / Unit 3 Secure Web Browsing 365 Safe Browsing Practices......................................................................... 366 Configuring Browser Security.................................................................. 368 Managing Cookies and PII...................................................................... 372 Digital Certificates and Anti-phishing....................................................... 377 Enabling a Firewall................................................................................. 378 Module 4 / Unit 4 Using Shared Storage 386 Local Network Sharing and Storage........................................................ 387 Windows File Sharing............................................................................. 389 Hosted Sharing and Storage................................................................... 393 Backups................................................................................................. 397 Windows Backup.................................................................................... 400 Module 4 / Unit 5 Using Mobile Devices 410 Using a Mobile Device............................................................................ 411 Mobile Applications and App Stores........................................................ 414 Network Connectivity.............................................................................. 415 Email Configuration................................................................................ 417 Synchronization and Data Transfer......................................................... 418 Module 4 / Summary Using Networks 421 LICENSED FOR USE ONLY BY: AMOYA WILSON · 60028402 · NOV 14 2024 Page vi Module 5 / Security Concepts 423 Table of Contents Module 5 / Unit 1 Security Concerns 425 Computer Security Basics....................................................................... 426 Social Engineering................................................................................. 429 Business Continuity................................................................................ 432 Disaster Recovery.................................................................................. 435 Module 5 / Unit 2 Using Best Practices 437 Securing Devices................................................................................... 438 Malware................................................................................................. 439 Preventing Malware Infections................................................................ 443 Spam..................................................................................................... 448 Software Sources and Patch Management.............................................. 452 Module 5 / Unit 3 Using Access Controls 461 Access Controls..................................................................................... 462 User Account Types............................................................................... 464 Authentication Factors............................................................................ 465 Uses of Encryption................................................................................. 470 Password Cracking and Management..................................................... 473 Module 5 / Unit 4 Behavioral Security Concepts 477 Policies and Procedures......................................................................... 478 Handling Confidential Information........................................................... 479 Acceptable Use Policies......................................................................... 480 Expectations of Privacy.......................................................................... 482 Module 5 / Summary Managing Security 485 Taking the Exam 487 Career Advice 497 Glossary 507 Index 531 LICENSED FOR USE ONLY BY: AMOYA WILSON · 60028402 · NOV 14 2024 Page vii About This Course About This Course CompTIA ITF+ (IT Fundamentals) Certification is the essential qualification for beginning a career in IT Support. CompTIA (comptia.org) is a not-for-profit trade association set up in 1982 to advance the interests of IT professionals and companies. It is most well-known for its vendor-neutral IT certifications. The CompTIA ITF+ exam will certify the successful candidate has the knowledge and skills required to identify and explain the basics of computing, IT infrastructure, software development and database use. In addition, candidates will demonstrate their knowledge to install software, establish basic network connectivity and identify/prevent basic security risks. Further, this exam will assess the candidate’s knowledge in the areas of troubleshooting theory and preventative maintenance of devices. This exam is intended for candidates who are advanced end users, are considering a career in IT, and are interested in pursuing professional-level certifications, such as A+. CompTIA ITF+ Exam Objectives Blueprint This course will prepare you to take the FC0-U61 exam to obtain the ITF+ certification and help you to learn some of the basic principles and techniques of providing PC, mobile, applications, and network support. Course Outcomes This course and the ITF+ certification are designed as the starting point for a career in IT support. Obtaining ITF+ certification will show that you have the aptitude to pursue a professional-level certification, such as CompTIA A+. Completing this course will also help you acquire the knowledge and skills to set up and use a computer at home securely and keep it in good working order and to provide informal support for PCs and simple computer networks to your colleagues in a small business. On course completion, you will be able to: Set up a computer workstation and use basic software applications. Explain the functions and types of devices used within a computer system. Apply basic computer maintenance and support principles. Describe some principles of software and database development. Configure computers and mobile devices to connect to home networks and to the Internet. Identify security issues affecting the use of computers and networks. LICENSED FOR USE ONLY BY: AMOYA WILSON · 60028402 · NOV 14 2024 Page viii Target Audience and Course Prerequisites About This Course CompTIA ITF+ is aimed at those considering a career in IT and computer- related fields. Consequently, there are no special prerequisites to start this course. We have made the assumption that you don't know much about how computers or software work, or even how to use them. Some experience with using a keyboard and mouse will be helpful but is not essential. About the Course Material The CompTIA ITF+ exam contains assessment items based on objectives and example content listed in the exam blueprint, published by CompTIA. The objectives are divided into six domains, as listed below: CompTIA ITF+ Certification Domains Weighting 1.0 IT Concepts and Terminology 17% 2.0 Infrastructure 22% 3.0 Applications and Software 18% 4.0 Software Development 12% 5.0 Database Fundamentals 11% 6.0 Security 20% This course is divided into five modules, each covering a different subject area. Each module is organized into several units, containing related topics for study. Module 1 / Using Computers Module 2 / Using Apps and Databases Module 3 / Using Computer Hardware Module 4 / Using Networks Module 5 / Security Concepts As you can see, the course modules do not map directly to the CompTIA exam domains. Instead, we try to present topics and technologies in the order that will make it easiest for you to understand them. Each module and each unit starts with a list of the CompTIA domain objectives and content examples that will be covered so that you can track what you are learning against the original CompTIA syllabus. Each unit in a module is focused on explaining the exam objectives and content examples. Each unit has a set of review questions designed to test your knowledge of the topics covered in the unit. At the back of the book there is an index to help you look up key terms and concepts from the course and a glossary of terms and concepts used. LICENSED FOR USE ONLY BY: AMOYA WILSON · 60028402 · NOV 14 2024 Page ix About This Course The following symbols are used to indicate different features in the course book: Icon Meaning A tip or warning about a feature or topic. A reference to another unit or to a website where more information on a topic can be found. Review questions to help test what you have learned. A hands-on lab exercise for you to practice skills learned during the lesson. LICENSED FOR USE ONLY BY: AMOYA WILSON · 60028402 · NOV 14 2024 Page x Completing the Labs About This Course The practical lab exercises in this book are designed to be completed on a typical home computer running Microsoft Windows 10 Spring Creators Update (1803). You should note some conventions used in the lab instructions: Text in bold refers to a command or part of a dialog. Text in Bold, Courier font represents something you should type. Text in COURIER FONT CAPITALS represents a key or key combo. For example, CTRL+C means press the CTRL and C keys at the same time. Finding a Job The CompTIA ITF+ certification is a great thing to have to prove to employers that you know the basics of Information Technology and support, but it is not a golden ticket into employment. To get a job, you need to know where to look, how to write an effective resume and application letter, how to prepare for an interview, and generally how to impress potential employers. Knowing where to start when looking for a job can be daunting, so the last section of the course contains a guide to help you research the local job market, write a resume and application letter, and prepare for an interview. There's also advice on the next steps you might take in your career in IT support. Four Steps to Getting Certified This training material can help you prepare for and pass a related CompTIA certification exam or exams. In order to achieve CompTIA certification, you must register for and pass a CompTIA certification exam or exams. In order to become CompTIA certified, you must: 1) Review the certification objectives at certification.comptia.org/certifications/it-fundamentals to make sure you know what is covered in the exam. 2) After you have studied for the certification, use the "Taking the Exam" chapter to find tips on booking the test, the format of the exam, and what to expect. You can also take a free assessment and sample test from CompTIA at certification.comptia.org/training/practice-questions to get an idea what type of questions might be on the exam. 3) Purchase an exam voucher on the CompTIA Marketplace, which is located at help.comptia.org. 4) Select a certification exam provider and schedule a time to take your exam. LICENSED FORYou USEcan find exam ONLY providers BY: AMOYA at www.pearsonvue.com/comptia/. WILSON · 60028402 · NOV 14 2024 Page xi About This Course Visit CompTIA online at comptia.org to learn more about getting CompTIA certified. CompTIA Career Pathway This course will particularly benefit you in pursuing a career in supporting desktop personal computer users, in job roles such as Support Engineer, Maintenance Engineer, Desktop Engineer, Computer Administrator, or PC Support Analyst. CompTIA offers a number of credentials that form a foundation for your career in technology and allow you to pursue specific areas of concentration. Depending on the path you choose to take, CompTIA certifications help you build upon your skills and knowledge, supporting learning throughout your entire career. View the CompTIA career pathway at certification.comptia.org/why-certify/roadmap. LICENSED FOR USE ONLY BY: AMOYA WILSON · 60028402 · NOV 14 2024 Page xii Module 1 / Using Computers Using Computers The following CompTIA ITF+ domain objectives and examples are covered in this module: CompTIA ITF+ Certification Domains Weighting 1.0 IT Concepts and Terminology 17% 2.0 Infrastructure 22% 3.0 Applications and Software 18% 4.0 Software Development 12% 5.0 Database Fundamentals 11% 6.0 Security 20% Refer To Domain Objectives/Examples Unit 1.1 / Common 1.3 Illustrate the basics of computing and Computing Devices processing. Input Processing Output Storage 2.6 Compare and contrast common computing devices and their purposes. Mobile phones Tablets Laptops Workstations Servers Gaming consoles IoT (Home appliances, Home automation devices, Thermostats, Security systems, Modern cars, IP cameras, Streaming media devices, Medical devices) Unit 1.2 / Using a This unit does not cover specific exam domain Workstation objectives or content examples. Unit 1.3 / Using an 3.1 Explain the purpose of operating systems. OS Interface between applications and hardware Types of OS (Mobile device OS, Workstation OS, Server OS, Embedded OS, Firmware, Hypervisor [Type 1]) Unit 1.4 / Managing 3.1 Manage applications and software. an OS Disk management Process management/scheduling (Kill process/end task) Memory management Access control/protection 3.2 Compare and contrast components of an operating system. Services Processes Utilities (Task scheduling) Interfaces (Console/command line, GUI) LICENSED FOR USE ONLY BY: AMOYA WILSON · 60028402 · NOV 14 2024 Page 1 Module 1 / Unit 1 Refer To Domain Objectives/Examples Unit 1.5 / 1.6 Explain the troubleshooting methodology. Troubleshooting and Identify the problem (Gather information, Duplicate Support the problem, if possible, Question users, Identify symptoms, Determine if anything has changed, Approach multiple problems individually) Research knowledge base/Internet, if applicable Establish a theory of probable cause (Question the obvious, Consider multiple approaches, Divide and conquer) Test the theory to determine the cause (Once the theory is confirmed [confirmed root cause], determine the next steps to resolve the problem, If the theory is not confirmed, establish a new theory or escalate) Establish a plan of action to resolve the problem and identify potential effects Implement the solution or escalate as necessary Verify full system functionality and, if applicable, implement preventive measures Document findings/lessons learned, actions and outcomes LICENSED FOR USE ONLY BY: AMOYA WILSON · 60028402 · NOV 14 2024 Page 2 Module 1 / Unit 1 Common Computing Devices Common Computing Devices Objectives On completion of this unit, you will be able to: □ Describe the basics of how a computer processes data. □ Describe the functions and capabilities of types of computing devices, such as PCs, servers, mobiles, and home automation. Syllabus Objectives and Content Examples This unit covers the following exam domain objectives and content examples: □ 1.3 Illustrate the basics of computing and processing. Input Processing Output Storage □ 2.6 Compare and contrast common computing devices and their purposes. Mobile phones Tablets Laptops Workstations Servers Gaming consoles IoT (Home appliances, Home automation devices, Thermostats, Security systems, Modern cars, IP cameras, Streaming media devices, Medical devices) LICENSED FOR USE ONLY BY: AMOYA WILSON · 60028402 · NOV 14 2024 Page 3 Module 1 / Unit 1 Information Technology An Information Technology (IT) system is one that processes, stores, and transfers information. Information can take many different forms including words, numbers, pictures, sound, or video. These can all be represented in an IT system using nothing more complicated than the binary digits one and zero. When information is stored and processed like this, it is often referred to as data. An IT system could use computers, the telecommunications network, and other programmable electronic devices. In fact, because of the importance of communications in IT, the term ICT (Information and Communications Technology) is often used in preference to IT. We live in an "Information Age." The effective use of information is regarded as the defining element of the 21st century, as important as the industrial revolution before it. Computers and software programs enable us to process data and perform certain tasks much more quickly than we could ourselves. IT systems are very flexible and can be made to perform a variety of different tasks. IT networks, such as the global Internet, allow us to distribute and share information quickly. Computer Hardware and Software A computer is a system that manipulates data according to a set of instructions. Three elements are required for a computer to perform useful tasks: hardware, software, and the computer's user. The devices and components that make up a computer system are called hardware. Many parts are contained within the computer's case. Other parts are connected to the computer and are referred to as peripheral devices. Most peripherals allow information to be entered (input) and retrieved (output). The instructions that a computer follows come from software (computer programs). A basic software environment is established by the computer's Operating System (OS). Software applications, such as word processors, spreadsheet programs, and payroll programs, can be installed within the OS to extend the range of things that the computer can be used to do. Having different software applications means that the same hardware can be put to a variety of uses. Software provides an interface for the user to control the computer system. The user creates data files by inputting information and selecting commands from the interface. Basics of Computing and Processing A good way to understand the functions of the different components of the PC is to think of them working as interfaces. Input and output hardware devices, such as a mouse and a monitor, provide an interface between the user and the computer; LICENSED FOR USE ONLY the operating BY: AMOYA WILSONsystem provides ·an · 60028402 interface NOV between hardware 14 2024 components and software applications. In general terms, this works as follows: Page 4 When a user selects a command (perhaps using a mouse to click an icon Common Computing Devices on the application toolbar), the software application receives the command and, using the functions of the operating system, converts it into a series of instructions, which are stored in system memory, commonly referred to as Random Access Memory (RAM). Similarly, when a user types using the keyboard or scans a picture, the input is converted to digital data and stored in memory. The Central Processing Unit (CPU) retrieves each instruction or data file from memory and processes it. The CPU then writes the result back to memory and directs other components to perform actions. For example, it may instruct the display subsystem to update the image shown to the user or the storage subsystem to save data to a disk. We'll discuss the types and features of system components such as the CPU and RAM in detail in Unit 3.1. All the instructions and data processed by a computer are ultimately represented as strings of 1s and 0s. These 1s and 0s are represented as on or off states in the transistors that make up CPU and RAM components. A CPU can process billions of these binary instructions per second, which gives it the illusion of being able to "think." Input, Output, Processing, and Storage The four functions listed above represent most of the ways that data moves through a computer system: Input—the computer receives data entered by the user through peripheral devices, such as mice, keyboards, scanners, cameras, and microphones. Processing—the data is written to memory and manipulated by the CPU, acting on instructions from the operating system and applications software. Output—the processed data is shown or played to the user through an output device, such as a monitor or loudspeaker system. Storage—the data may be written to different types of storage devices, such as hard disks or optical discs, because data stored in most types of system memory is only preserved while the computer is powered on. Additionally, most computers are configured in networks, allowing them to exchange data. You can think of networking as a special class of input and output, but it is probably more helpful to conceive of it as a separate function. LICENSED FOR USE ONLY BY: AMOYA WILSON · 60028402 · NOV 14 2024 Page 5 Module 1 / Unit 1 Personal Computers (PC) There are many different types of computer. Some of the first types of mainframe computers created in the 1960s and 1970s are unrecognizable from the sorts of desktop and laptop computers you may be familiar with. The term "Personal Computer" is generally understood to apply to versions of the IBM PC, developed in 1981. The IBM PC was based on a microprocessor or Central Processing Unit (CPU) designed by Intel. This is also called the x86 architecture or platform. This type of computer was fundamentally different to mainframes as it was operated directly by the end user. While technologies and performance have completely transformed what we know as PCs from the boxes available in 1981, most workstation and laptop personal computers designed for home and office use are still based on the IBM PC design and x86 platform. As this PC platform matured, it came to be associated with use of Microsoft's Windows operating system software. Hardware and software development for PCs is often (but not exclusively) undertaken with Windows compatibility in mind. In the last couple of decades however, personal computers have become available as much smaller, more portable devices such as tablets and smartphones. These devices can use different hardware platforms and operating systems. This has been coupled with the growth of the Internet as a global data communications network. As the miniaturization of electronics continues, many "ordinary" appliances and systems are being designed with processing and communications capabilities, creating an Internet of Things (IoT). Desktop and Workstation Computers A workstation type of PC is housed in a case that can sit on or under a desk. Consequently, they are often referred to as desktop PCs or just as desktops. A desktop computer can be used independently by a single user to run powerful software applications with many functions. It can also be used as a network client to access shared resources. PC system LICENSED FOR USE ONLY showing WILSON BY: AMOYA processing ·and storage components 60028402 · NOV 14(within 2024 case), input components (keyboard and mouse), and output components (display, speakers, printer). Image © 123rf.com. Page 6 Common Computing Devices Sometimes the terms PC, desktop computer, and workstation are used interchangeably. Quite often however, the term workstation is used to mean a particularly powerful type of desktop computer. Some of a PC's components are attached to a motherboard contained within the computer's case. However, a desktop PC also requires the use of peripheral devices, connected to the motherboard via ports aligned to holes in the case. Some peripheral devices, such as a mouse and keyboard for input and a monitor for output, are essential. Others, such as speakers and microphone or a printer, are optional. The advantage of desktops is that the basic design can be modified with higher or lower specified components and optional features, making a particular model better suited to different tasks. A workstation-class computer with higher specification components, such as CPU and system memory, will cost more but be able to process data faster. The computer's performance is largely determined by the following factors: The speed of the CPU determines the basic speed of the computer. More system memory makes it possible to run more applications simultaneously and process large amounts of data more quickly. The capacity of the main storage drive determines how much data can be stored on the computer when it is switched off. Optional components extend the range of things the computer can do (for example, a sound card makes it possible to play audio while a webcam allows sound and video recording). The quality of peripherals such as the display, mouse, and keyboard make the computer more comfortable to use (this is referred to as ergonomics). We are simplifying a bit here. In fact, the type and speed of the main storage drive also has a big impact on system speed. Legacy hard drives were a serious performance bottleneck, but these are being replaced by solid state drives, which can work much more quickly. Storage devices are discussed in more detail in Unit 3.4. The graphics subsystem is also an important performance factor. LICENSED FOR USE ONLY BY: AMOYA WILSON · 60028402 · NOV 14 2024 Page 7 Module 1 / Unit 1 Desktop PCs can also be purchased as "all-in-one" units. All-in-one means that the computer components (except the keyboard and mouse) are contained within the monitor case. All-in-One PC—the system components are all contained within the monitor case. Image © 123rf.com. Servers A server is any computer providing services to other computers, but usually the term server implies a powerful computer that supports a number of users simultaneously in a computer network. Most servers use the same type of components as a desktop. The main difference is that the components are more powerful and more reliable, and consequently more expensive. If a desktop PC stops working, a single user may be unable to do their job; if a server computer stops working, tens or even hundreds of users may not be able to do their jobs. Consequently, servers need to be very reliable. This is achieved by specifying high quality components and also by using extra copies of components for redundancy. This makes a server system fault tolerant. Server systems are also, usually designed to be easy to expand and upgrade with additional or improved components. Very often, server computers use a special type of case designed to fit into a steel rack shelving system. You should also understand that the term server can refer either to hardware or software. A hardware server may be running many software servers and sometimes different types of software servers. LICENSED FOR USE ONLY BY: AMOYA WILSON · 60028402 · NOV 14 2024 Examples of types of software servers include web servers, email Page 8 servers, database servers, authentication servers, and so on. Laptops Common Computing Devices A laptop computer is one that integrates the display, system components, and input/output devices within a single, portable case (or chassis). Distinctive features of a laptop computer, including the built-in screen, Integrated keyboard, touchpad pointer control, and I/O ports (on both sides and rear of chassis). Image © 123rf.com. The main features distinguishing laptops from desktop PCs are: Size and weight—laptops weigh between 1 and 4 kg (2–9 lbs). Display type—laptops use flat-panel display technologies to provide lightweight, slimline screens that are built into the case. Laptop screen sizes come in the ranges 11–14", 15–16", and 17"+. Input devices—the main input devices are integrated into the case, such as a built-in keyboard, a touchpad instead of mouse, and/or a touchscreen. Power source—portable computers can be run from internal battery packs as well as from building power. Components—laptops often use different system components (CPU, RAM, and graphics) that are smaller, lighter, and draw less power than desktop versions. Networking—portable computers use wireless radio technologies to connect to networks rather than cabled connections. Small laptops can also be described as notebooks and subnotebooks, while bigger models are often called "desktop replacements." The term Ultrabook is used for laptops meeting a particular Intel specification for performance, size/weight, and battery life. There are also hybrid laptops that can be used LICENSED like FORa USE tabletONLY (see BY: below) as well AMOYA as like a· 60028402 WILSON traditional laptop. · NOV 14 2024 Page 9 Module 1 / Unit 1 PC and Laptop Vendors Most companies producing PCs and laptops are referred to as Original Equipment Manufacturers (OEM). This is because rather than making each component that goes into a PC, they source components such as CPUs and RAM modules from manufacturers and put them together as a branded PC system. While there are many vendors serving local and special interest markets, global PC manufacturing is dominated by Dell, Hewlett-Packard (HP)/Compaq, Lenovo (previously IBM's PC division), Acer, and Huawei with Samsung, Sony, Toshiba, and Asus also strong in the laptop and hybrid markets. Another personal computer vendor, Apple, ship Macintosh computers with a different operating system (Apple Mac OS) and a different hardware platform to the IBM PC-compatible vendors. There are also chromebooks, laptops built to run Chrome OS and interface primarily with Google's web apps. The market for server computers is dominated by Dell, HP Enterprise (HPE), and Lenovo. Mobile Devices Many of the uses of PCs and laptops have been superseded by smaller personal devices or by specialized devices. Smartphones and Tablets A smartphone is a device with roughly the same functionality as a personal computer that can be held in one hand. Previous handheld computers, known as Personal Digital Assistants (PDA), and earlier types of mobile phones with some software functionality (feature phones), were hampered by clumsy user interfaces. Modern smartphones use touchscreen displays, making them much easier to operate. Most smartphones have a screen size between 4.5" and 5.7". Typical smartphone form factor. Image © 123rf.com. Prior to the Apple iPad, tablet PCs were usually laptops with touchscreens. LICENSED FOR USE ONLY BY: defined The iPad AMOYAaWILSON new form· 60028402 · NOV factor; smaller than14 2024 and with no a laptop Page 10 keyboard. Tablet screens tend to be sized between 7” and 10”. Common Computing Devices Smartphones sized between the 5" and 7" form factors are often called phablets. Many Windows mobile devices adopt a hybrid approach where a laptop can be converted into a tablet by flipping the screen. Microsoft's Surface Pro tablet is available with a detachable keyboard, which can also function as a cover for the screen. Other vendors are also producing "two-in-one" devices that can function as both a laptop and a tablet. The main smartphone and tablet vendors are Apple and Samsung. Other vendors include LG, HTC, Huawei, Motorola/Lenovo, Microsoft, Nokia, Sony, and Amazon. Internet of Things (IoT) Devices Aside from devices easily recognizable as "computers," your home and office are quite likely populated by other consumer electronics devices connected to each other and to the Internet. The Internet of Things (IoT) refers to a world in which many different types of things are embedded with processing and networking functionality. Processing and networking functionality can be provisioned by very small chips, so the "things" can range from motor vehicles and washing machines to clothing and birthday cards. Home Automation Pretty much anything from a clock to an alarm system or a refrigerator can be controlled over the Internet by home automation software, if the appliance or device is "smart." Often, sitting at the heart of this automation, is a hub to which other devices connect. Hubs are usually controlled using voice recognition systems and smartphone apps. Some of the major vendors include Amazon (Alexa voice recognition), Samsung (S Voice), Apple (Siri), and Logitech (working with either Alexa or Google Assistant), but there are many others. One of the critical points in building a "smart" or "digital" home or office solution is ensuring compatibility between the networking or communications standards supported by the hub and the appliances. Most devices support ordinary Wi-Fi standards-based wireless networking, but some may require connectivity standards designed for low power use, such as Z-Wave, ZigBee, or Bluetooth LE. Some of the specific home automation product categories include: Thermostats—monitor and adjust your home or office Heating, Ventilation, and Air Conditioning (HVAC) controls from an app installed on your phone. Security systems—monitor and control alarms, locks, lighting, and videophone entry systems remotely. IP cameras—often used for security, these devices connect to Internet LICENSED FOR USE ONLY BY: AMOYA WILSON · 60028402 · NOV 14 2024 Protocol (IP)-based networks such as the Internet and support direct upload and sync to cloud storage for remote monitoring. Page 11 Module 1 / Unit 1 Home appliances—check the contents of your refrigerator from your smartphone while out shopping or start the washing machine cycle so that it has finished just as you get back to your house. Streaming media—play content stored on a storage device through any smart speaker or TV connected to the home network. Modern Cars and Drones Modern motor vehicles use a substantial amount of electronics. As well as computer systems to control the vehicle's engine and brakes, there may be embedded systems for in-vehicle entertainment and for navigation (sat-nav) using Global Positioning Systems (GPS) to identify the vehicle's precise location. Some vehicles are now, also fitted with a "black box," or event data recorder, that can log the car's telemetry (acceleration, braking, and position). There are also sophisticated systems to control the vehicle on behalf of the driver, including automatic collision detection and avoidance, and parking assist. Companies are experimenting with fully-automated self-driving or autonomous vehicles. Another rapidly developing sector is that of Unmanned Aerial Vehicles (UAV). This sector ranges from full-size fixed wing aircraft to much smaller multi-rotor hover drones. Medical Devices Medical devices represent another class of devices where use of electronics to remotely monitor and configure the appliance is expanding rapidly. It is important to recognize that use of these devices is not confined to hospitals and clinics but includes portable devices such as cardiac monitors/defibrillators and insulin pumps. These allow doctors and nurses to remotely monitor a patient and potentially to adjust dosage levels or other settings without the patient having to visit the care provider. Gaming Consoles A gaming console contains many of the same components as a workstation. Gaming consoles have powerful CPUs and graphics processors, plus Ethernet and Wi-Fi for wired and wireless home networking and Internet connectivity. Web cameras and microphones are also available as peripherals. The main difference to a workstation is that a console is designed to be operated by a gaming pad rather than a keyboard and mouse, though these are often also available as options. A gaming console would use an HD (High Definition) TV for a display. The market for consoles is dominated by Sony (PlayStation), Microsoft (Xbox), and Nintendo (Wii and Switch). There are also handheld game consoles, such as Nintendo's 3DS and Switch, LICENSED FOR USE ONLY BY: AMOYA and Sony's WILSON Vita. These · 60028402 come · NOV with Wi-Fi to 14 2024 connect to the Internet or to other consoles. Page 12 Common Computing Devices Review Questions / Module 1 / Unit 1 / Common Computing Devices Answer these questions to test what you have learned in this unit. 1) True or false? All types of computers use CPU and system memory. 2) What type of computer is most likely to need peripheral devices? 3) What type of computer is best suited for using in a job where you have to make notes and be able to move around easily? 4) Why don't laptops make good servers? 5) Why isn't a smartphone a good tool for writing a report? 6) What type(s) of IoT appliance are less likely to be controlled via a home automation hub? LICENSED FOR USE ONLY BY: AMOYA WILSON · 60028402 · NOV 14 2024 Page 13 Module 1 / Unit 2 Module 1 / Unit 2 Using a Workstation Objectives On completion of this unit, you will be able to: □ Set up a computer system with regard for safety and healthy working practices. □ Navigate an OS and use input devices effectively. Syllabus Objectives and Content Examples This unit does not cover specific exam domain objectives or content examples. LICENSED FOR USE ONLY BY: AMOYA WILSON · 60028402 · NOV 14 2024 Page 14 Setting up a PC System Using a Workstation When you install a computer system, you need to consider the following: Is the environment suitable for the computer? Dust, dirt, heat (or extreme cold), and dampness can be very damaging to computers. Is the installation safe for yourself and passers-by? The main risks associated with computer equipment are electrical and trip hazards. Is the installation healthy to use? Improper use of computers, notably the mouse and keyboard, is associated with a number of health risks. Setting up a Personal Computer Given the above, you should perform the following basic steps when setting up a computer. 1) If the computer has just been delivered, check the contents of the box, read the instruction manual, and allow at least 30–60 minutes for the components to adjust to room temperature. There is a slight risk from condensation if you unpack a computer and start it immediately. 2) Read the manufacturer's setup and safety guidelines and plan the installation of the computer to comply with them. 3) Position the monitor and system unit so that cables can be tucked away neatly and do not cross any walkways. When lifting a heavy object such as a monitor, take care to protect your back. Ensure that any object placed on a desk is not at risk of toppling. 4) Ensure there is adequate air flow around the monitor, system unit, and larger peripherals, such as a printer or scanner. 5) Check that the screen is not exposed to excessive glare from windows or lighting and that equipment is not in direct sunlight. 6) Adjust the monitor, chair, and position of the mouse and keyboard so that the user can sit and type comfortably. 7) Connect each peripheral to the computer using an appropriate cable. Inspect each cable and connector for any sign of visible damage before plugging it in. Use any available cable management features to keep wiring tidy and ensure it does not pose a trip hazard. LICENSED FOR USE ONLY BY: AMOYA WILSON · 60028402 · NOV 14 2024 Page 15 Module 1 / Unit 2 Built-in cable management such as on this flat-panel monitor make it less likely trailing wires will cause an accident. You will learn how to identify ports and connectors in Unit 3.2. 8) Connect the power cables from the monitor, system unit, and any peripherals to electrical outlets, again checking that the cables are undamaged and the plugs are fitted with fuses of the correct rating. Ensure that the electrical outlets are not overloaded. 9) Switch on any peripherals connected to the computer that you want to use then switch on the system unit. You start a computer by pressing the power switch, which will be marked by the following symbol:. If the computer does not start, check that a power cable connects the back of the computer to a wall socket and that the socket is switched on. Setting up a Laptop You should follow the same basic principles when using a laptop for the first time. Read the instruction manual and let the system acclimatize if it has just been delivered. You will probably have to insert the battery pack, which should clip into a slot on the underside of the laptop. When you use the laptop for the first time, you will probably have to connect it to the building power supply using the supplied AC adapter to charge the battery. Obviously, you can use a laptop without connecting any peripherals, unlike a desktop computer, but there may be some optional components to plug in. When you have set up the laptop as explained in the documentation, use the LICENSED FOR USE ONLY catch BY: AMOYA on the WILSON lid to open · 60028402 it. Press · NOV the power 14or2024 switch key with the symbol and wait for the laptop to start. Page 16 Ergonomic Concepts Using a Workstation Ergonomics is the study of factors affecting the performance of people at work. It is well established that a poor working environment can cause certain health problems and decrease productivity. Proper Keyboard and Mouse Placement Repetitive Strain Injury (RSI) is a condition that occurs when the same task is carried out repeatedly for a long period, making use of the same muscles continuously. Symptoms can include muscle pain, numbness, tingling, prickly heat, and loss of strength. RSI has been linked with the use of keyboards and mice. When you use a mouse, keep your wrist straight and rest your palm on the body of the mouse. When using a keyboard, keep your forearms parallel with the keyboard. It will help if you learn to touch-type. With both devices, avoid working with your wrists bent, do not hunch your shoulders or bend forward, and take frequent breaks, to stretch or walk around for instance. Ergonomically-designed work area. Photo by Glenn Carstens-Peters on Unsplash. Ergonomically designed, angled keyboards and molded mice are designed to reduce the risk of strain injury. Using a mouse mat makes the action of the mouse smoother and is therefore less straining. Sitting Position and Monitor Placement Sitting at a desk in a poor position can cause back pain. This is especially true if you sit for a long period without getting up and stretching. To help prevent back pain, monitors should be adjustable so that they can be positioned at the correct height and chairs should provide support for the back and neck. You should be able to sit up straight with the top of the monitor at or slightly below eye level. You should be able to rest your feet flat on the floor comfortably and your thighs should be parallel with the floor. You should be able to hold your forearms level with the desk. As you work, try to avoid hunching your shoulders forward and remember to LICENSED take FOR frequent USE ONLYbreaks to stretchWILSON BY: AMOYA your arms and legs. · NOV 14 2024 · 60028402 Page 17 Module 1 / Unit 2 Position the monitor so that you can sit up straight. Photo by Samule Sun on Unsplash. If you need to type a lot of text from a source document, use a copyholder to position the source text at eye-level rather than flat on the desk. For more detailed advice, read HP's Safety & Comfort Guide at hp.com/ergo. Navigating an OS The main function of an operating system such as Microsoft Windows is to provide a stable environment for different software applications to work together. The operating system controls access to the computer hardware; applications software can only access the computer hardware via functions of the OS. An OS provides tools for configuring the hardware, such as the Settings app in Windows. The OS also provides file management tools and can include a number of utilities. For example, Windows includes a text editor (Notepad), picture editor (Paint), a word processor (WordPad), a calculator, some games, and so on. CompTIA ITF+ is a vendor-neutral exam, so you will not be asked detailed questions on how Windows works. The practical elements in this course are to help you learn to use an operating system and use Microsoft Windows 10 as an example. If you use a different version of Windows at home (or even a different operating system), you should find that many of the skills you learn are transferable, with a bit of effort. One of the first set of tasks to master is to be able to sign in to Windows, start applications, and use the features of the desktop. LICENSED FOR USE ONLY BY: AMOYA WILSON · 60028402 · NOV 14 2024 Page 18 Signing in to Windows Using a Workstation Some text or a logo may be displayed on-screen while the computer starts up ("boots"). The computer performs a Power-On Self-Test (POST) to check that the main components work and then loads Windows. After a minute or so, a screen prompting you to sign in to the computer is displayed. A sign in means that changes you make to the desktop are saved as your own personal settings. It may also give you access to resources on a computer network. At work, you will be given a sign in ID (a user name and password) by your IT Department. At home you will create user accounts for yourself and your family. Signing in using a password that only you know means that you are authenticated as the valid owner of the computer account. See Unit 1.3 for more details on creating accounts. 1) When Windows 10 has loaded, the Lock Screen is displayed. Press a key, click the mouse, or (if you have a touchscreen) swipe to open the sign in prompt. Windows 10 lock screen—press a key or click with the mouse to start sign in. Screenshot used with permission from Microsoft. On an enterprise network or earlier version of Windows, you may need to press CTRL+ALT+DEL to access the sign in prompt. LICENSED FOR USE ONLY BY: AMOYA WILSON · 60028402 · NOV 14 2024 Page 19 Module 1 / Unit 2 2) The sign in prompt displays the last user account that accessed the machine. If necessary, click the icon representing your account on the left of the display. Windows sign in screen. Enter a password or click the appropriate user icon to sign in with a different account. Each account is represented by its own name and, optionally, a picture. Screenshot used with permission from Microsoft. 3) With your user name shown, type your password into the box. What you type will be shown as black dots so that no one else can see your password. Note that the password is case-sensitive. 4) Point to the arrow button then click once (or press ENTER). Windows will start and, after a few seconds, the desktop is shown. Windows 10 uses a feature called Windows Hello to provide support for sign in by using a PIN or by using biometrics, such as fingerprint scanning or facial recognition. You can configure Windows Hello in Settings, provided that you have appropriate hardware installed for supporting the biometric authentication mechanisms you want to use. See Unit 5.3 for more information about different authentication methods. LICENSED FOR USE ONLY BY: AMOYA WILSON · 60028402 · NOV 14 2024 Page 20 Using the Desktop and Taskbar Using a Workstation The desktop contains several tools to help you start and switch between software applications. The desktop itself can contain shortcut icons used to open applications, folders, and files. Windows 10 desktop showing 1) Shortcut icon; 2) Start button; 3) Start Screen with apps and tiles; 4) Programs pinned to the taskbar; 5) Notification area. Screenshot used with permission from Microsoft. The taskbar is principally used to manage open windows (applications and files). It is usually positioned at the bottom of the desktop and may only appear when you point the mouse at the bottom of the screen. If the taskbar is not locked (using taskbar settings), it can be dragged to different sides of the screen and resized using the mouse. The Automatically hide the taskbar in desktop mode setting makes the taskbar disappear unless the cursor is pointing at it. When you run applications, each program appears as an icon on the taskbar. You can click the icons to switch between windows. Alternatively, hold the ALT key then press TAB to cycle through the windows or on a touch-enabled screen, swipe from the left edge. You can also click the Task View button to list running programs. This is located to the right of the search box on the taskbar. LICENSED FOR USE ONLY BY: AMOYA WILSON · 60028402 · NOV 14 2024 Page 21 Module 1 / Unit 2 Each icon has a shortcut menu, allowing you to close the program or access recently used documents. Pointing at an icon shows a preview of any open windows, which you can select by clicking. Right-clicking an icon exposes a context menu which you can use to perform functions that relate to that icon. For example, right-clicking the icon for Microsoft Word exposes pinned and recently opened document files. The taskbar also contains "pinned" icons for frequently used programs, such as email and web browser. Pinned items always remain on the taskbar. A program with open windows is shown with a highlight. You can add, remove, or reposition pinned items by dragging and dropping. Notification area in Windows 10. Screenshot used with permission from Microsoft. The Notification Area on the right-hand side of the taskbar displays the current time and icons for programs that run without a window, such as anti- virus software, the volume control, battery meter, network status, and so on. These icons have shortcut menus for enabling, disabling, and configuring the related application or setting. You can configure what displays in the notification area and also control application notification settings. On a touchscreen, swiping in from the right of the screen is another way of showing notifications. LICENSED FOR USE ONLY BY: AMOYA WILSON · 60028402 · NOV 14 2024 Page 22 Using the Start Screen Using a Workstation The Start Screen in Windows 10, or Start Menu in earlier versions, is used to manage apps and PC settings and launch desktop software applications. It is accessed by clicking the Start button on the left-hand side of the taskbar or by pressing the START key. Windows 10 Start Screen in Tablet mode. Screenshot used with permission from Microsoft. The Start screen displays in full screen mode if your computer is in tablet mode, otherwise, it displays as a menu. Tablet mode is selected automatically (by default) on hybrid laptop/tablet devices. For example, removing the keyboard from a Microsoft Surface tablet or folding the screen of an HP X360 device over through 360 degrees puts Windows 10 into tablet mode. You can use Windows 10 settings to manually select tablet mode and to configure these automatic behaviors. To display all applications in tablet mode, click the All apps icon on the upper left of the display. In desktop mode, all applications are displayed in Start on the left side without intervention by the user. LICENSED FOR USE ONLY BY: AMOYA WILSON · 60028402 · NOV 14 2024 Page 23 Module 1 / Unit 2 Viewing installed apps from the Start Screen in Windows 10 in tablet mode. Screenshot used with permission from Microsoft. Apps are installed and managed by using the Microsoft Store app. Desktop software programs are managed with Control Panel. See Unit 2.2 for more information about different types of software. Any app, program, or file can be launched from the Start Screen by typing its name and selecting the icon from the list of search results. The Search box is on the taskbar next to Start. LICENSED FOR USE ONLY BY: AMOYA WILSON · 60028402 · NOV 14 2024 Launching applications by using search. Screenshot used with permission from Microsoft. Page 24 Customizing the Start Screen and Taskbar Using a Workstation You can configure the look and behavior of the tiles showing in Start. Select Start > All Apps, right-click the application you want to configure, and select Pin to Start. After a tile is pinned, you can configure it. Right-click the tile and then choose from the following options: Unpin from Start. Resize (Select from Small, Medium, Large, and Wide). Uninstall. More (for Microsoft Store apps)—select from Turn Live Tile Off, Pin to taskbar, Rate and review, Share. More (for desktop applications)—select from Pin to taskbar, Run as administrator, Open file location. Configuring tiles. Screenshot used with permission from Microsoft. Once you have pinned and configured your tiles on Start, you can group the tiles. If you want to create a new group for your tiles, drag one of the tiles to an unused area. Drag additional tiles to the new group. You can drag tiles between groups if you want to move them. Hover your mouse above the new group of tiles and type a name for your group. LICENSED FOR USE ONLY BY: AMOYA WILSON · 60028402 · NOV 14 2024 Page 25 Module 1 / Unit 2 You can set options for how the taskbar and Start Menu are displayed. Select Start > Settings > Personalization, and click Start or Taskbar as required. Configuring taskbar settings. Screenshot used with permission from Microsoft. Using Input Devices To operate a PC, you need to be familiar with the operation of input devices, such as a mouse, keyboard, and touchscreen. Using a Mouse or Touchpad The mouse or touchpad is used to select and move objects on the desktop and in windows. Moving the mouse (or moving your finger on a pad) moves the cursor. To select an object such as an icon, point to it with the cursor then click the main mouse button once. To open an object, double-click it with the main mouse button. You can configure the main mouse button as either the left or right button depending on whether you are right- or left-handed. See LICENSED FOR USE ONLY BY: AMOYA Unit 3.2WILSON for notes· 60028402 · NOV on configuring 14 2024 mouse properties. Page 26 Using a Workstation A touchpad will come with buttons and may also support tapping the surface of the pad to perform a mouse click. To select commands in menus and dialogs, point to the command or button and click the main mouse button once. To select the shortcut menu for an object, point the cursor at it then click with the second mouse button (right-click). Laptop touchpad—note the scroll areas and left and right buttons. Image © 123rf.com. To move an icon or window, point to it and hold down the main mouse button. Move the mouse to the target then release the button. This process is called Drag and Drop. To scroll within a window, rotate the scroll wheel or drag your finger in the marked scroll area of the touchpad. LICENSED FOR USE ONLY BY: AMOYA WILSON · 60028402 · NOV 14 2024 Page 27 Module 1 / Unit 2 Using a Keyboard The keyboard is used for simple typing and also to issue commands. Ideally, you should learn to touch type. This will make operating the computer more comfortable and efficient. To touch type, you use the A to F and J to ; keys as a "base" for your fingers. Once you have learned the position of the other keys, you can reach for them without looking. For example, you use the little finger on your left hand to press Q then return it to rest on A. Most keyboards designed for use with Latin scripts use the QWERTY key layout. There are different layouts though, such as the small differences between US and UK layouts, the Dvorak alternative layout for Latin script, and keyboards for different scripts, such as Cyrillic. It is important that the keyboard type is set correctly in the OS. See Unit 3.2 for notes on configuring keyboard properties. Additionally, hot keys or key combinations can be used to navigate between and around windows. If you are not familiar with a computer keyboard, take some time to identify some of the special keys: ENTER (or RETURN) is usually used to confirm a command. ESC can often be used to cancel a command. CTRL and ALT are often used with other keys to activate a special command. The ALT key also activates an application's menu. You can navigate menus using the underlined access keys or using the ARROW keys. Special keys on a PC keyboard. Image © 123rf.com. Menus in Windows 10 are not shown until you press the ALT key. Most other software applications show the menu all the time. LICENSED FOR USE ONLY BY: AMOYA WILSON · 60028402 · NOV 14 2024 Page 28 TAB can be used in a Using a Workstation window to move to the next pane. SHIFT+TAB moves back. Use the ARROW keys and the PAGE UP / DOWN, HOME, and END to navigate between icons or within a text file. The SHIFT key is used to type capitals or the superscript symbol shown on the key. You can toggle CAPS LOCK on and off to type in capitals without holding down SHIFT. You can also use the SHIFT key with the ARROW keys Press ALT to show menus and use the underlined access keys or arrow keys to navigate and ENTER to select an to select multiple icons. item. Screenshot used with permission from Microsoft. When NUM LOCK is off, the keypad works like the ARROW keys; when it is on, the keypad works like a calculator keypad. On a laptop keyboard, there might not be a separate numeric keypad. In this case, keypad functions marked on normal keys can be toggled on or off. Press START to display the Start Screen or Start Menu and enable Instant Search. Press SHORTCUT to display a context menu for the selected object. The function keys (F1, F2, and so on) perform special actions (for example, F1 always activates the help file for an application). BACKSPACE deletes the character to the left in a document or returns to the previous window. DELETE erases the character to the right or deletes an icon when working within a window. On a laptop, use the FN key to operate commands marked on other keys in a color accent. These perform laptop-specific functions, such as toggling the display or switching the wireless radio on or off. Using a Touchscreen Most portable devices can be

Use Quizgecko on...
Browser
Browser