ITF+ Student Guide PDF

Summary

This document is a CompTIA ITF+ study guide, not a past exam. It covers using computers, operating systems, IT, and troubleshooting, and is intended to help students prepare for their certification exam.

Full Transcript

Why Certify? The Official CompTIA ITF+ Student Guide CompTIA certifications help individuals build exceptional careers in...

Why Certify? The Official CompTIA ITF+ Student Guide CompTIA certifications help individuals build exceptional careers in information technology. Why should you certify? + To prove you have the knowledge and skills for problem solving + To make you more competitive and employable + To qualify you for increased compensation and/or promotions + To open up new career opportunities Visit comptiastore.com to purchase a voucher and schedule your certification exam PRACTICE Powerful Certification Exam Preparation CompTIA CertMaster Practice is an online companion tool to help you prepare for your The Official CompTIA ITF+ CompTIA certification exam. Featuring question-first design, real-time learning analytics, and content refreshers, CertMaster Practice quickly assesses what you already know and what you still need to learn. For those topics where you need more support, CertMaster Practice provides personalized remediation and feedback. As your learning guide, CertMaster Practice helps you: Student Guide Master information quickly Recall it when it counts Test with confidence Visit certification.comptia.org/training for more information Exam FC0-U61 Exam FC0-U61 ISBN-13 978-164274-087-5 ISBN-10 1-64274-087-X Ë|xHSLGOCy740875zv*:+:!:+:! Official CompTIA Content Series for CompTIA Performance Certifications CVR2. Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM Acknowledgements The Official CompTIA ITF+ Study Guide (Exam FC0‑U61) e ut PROJECT TEAM Thomas Reilly, Vice President Learning ib Katie Hoenicke, Director of Product Management tr James Chesterfield, Manager, Learning Content and Design Becky Mann, Senior Manager, Product Development is James Pengelly, Senior Manager, Product Development D DISCLAIMER While CompTIA, Inc. takes care to ensure the accuracy and quality of these materials, we cannot or guarantee their accuracy, and all materials are provided without any warranty whatsoever, including, but not limited to, the implied warranties of merchantability or fitness for a particular purpose. The use of screenshots, photographs of another entity's products, or another entity's product name or service in this e book is for editorial purposes only. No such use should be construed to imply sponsorship or endorsement at of the book by nor any affiliation of such entity with CompTIA. This courseware may contain links to sites on the Internet that are owned and operated by third parties (the "External Sites"). CompTIA is not responsible for the availability of, or the content located on or through, any External Site. Please contact lic CompTIA if you have any concerns regarding such links or External Sites. TRADEMARK NOTICES up CompTIA® and the CompTIA logo are registered trademarks of CompTIA, Inc., in the U.S. and other countries. All other product and service names used may be common law or registered trademarks of their respective proprietors. D COPYRIGHT NOTICE Copyright © 2019 CompTIA, Inc. All rights reserved. Screenshots used for illustrative purposes are the ot property of the software proprietor. Except as permitted under the Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or N retrieval system, without the prior written permission CompTIA, 3500 Lacey Road, Suite 100, Downers Grove, IL 60515-5439. o This book conveys no rights in the software or other products about which it was written; all use or licensing of such software or other products is the responsibility of the user according to terms and D conditions of the owner. If you believe that this book, related materials, or any other CompTIA materials are being reproduced or transmitted without permission, please call 1-866-835-8020 or help.comptia.org. Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM Table of Contents Table of Contents Course Introduction i Table of Contents....................................................................................... iii About This Course................................................................................... viii Module 1 / Using Computers 1 e Module 1 / Unit 1 ut Common Computing Devices 3 Information Technology.............................................................................. 4 ib Personal Computers (PC)........................................................................... 6 Mobile Devices......................................................................................... 10 tr Internet of Things (IoT) Devices................................................................ 11 is Module 1 / Unit 2 Using a Workstation 14 D Setting up a PC System............................................................................ 15 Ergonomic Concepts................................................................................ 17 or Navigating an OS..................................................................................... 18 Using Input Devices................................................................................. 26 Recognizing Desktop Icons...................................................................... 30 Working with Windows............................................................................. 31 e at Module 1 / Unit 3 Using an OS 39 lic Functions of an Operating System............................................................ 40 Types of Operating System...................................................................... 42 Virtualization............................................................................................ 44 up Microsoft Windows................................................................................... 46 Apple macOS and iOS............................................................................. 49 Linux, Chrome, and Android..................................................................... 51 D File Explorer............................................................................................. 53 Windows Settings and Control Panel........................................................ 55 Using a Web Browser............................................................................... 58 ot Module 1 / Unit 4 Managing an OS 65 N Management Interfaces............................................................................ 66 o Process and Service Management............................................................ 67 Memory and Disk Management................................................................ 70 D Command Line Interfaces......................................................................... 73 Access Control and Protection.................................................................. 74 Module 1 / Unit 5 Troubleshooting and Support 85 Support and Troubleshooting.................................................................... 86 Identifying the Problem............................................................................. 87 Understanding the Problem...................................................................... 89 Resolving and Documenting the Problem.................................................. 91 Page iii Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM Table of Contents Troubleshooting PC Issues....................................................................... 94 Getting Support........................................................................................ 95 Using a Search Engine............................................................................. 98 Module 1 / Summary Using Computers 105 Module 2 / Using Apps and Databases 107 Module 2 / Unit 1 e Using Data Types and Units 109 ut Notational Systems................................................................................. 110 Units of Measure.................................................................................... 112 ib Data Types............................................................................................. 114 Data Representation............................................................................... 115 The Value of Data................................................................................... 117 tr Intellectual Property................................................................................ 118 Data-driven Business Decisions.............................................................. 121 is Module 2 / Unit 2 D Using Apps 124 Installing Applications............................................................................. 125 or Application Management......................................................................... 127 Managing Software Licensing................................................................. 130 Productivity Software.............................................................................. 132 Collaboration Software............................................................................ 134 e Business Software.................................................................................. 137 at Module 2 / Unit 3 Programming and App Development 144 lic Programming Logic................................................................................ 145 Programming Languages........................................................................ 148 up Programming Concepts.......................................................................... 151 Object-Oriented Programming................................................................. 155 Scripting Languages............................................................................... 156 D Application Platforms and Delivery.......................................................... 158 Module 2 / Unit 4 ot Using Databases 178 Database Concepts................................................................................ 179 N Database Structures............................................................................... 181 Relational Methods................................................................................. 185 o Database Access Methods...................................................................... 187 Application Architecture Models.............................................................. 188 D Module 2 / Summary Using Apps and Databases 205 Page iv Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM Module 3 / Using Computer Hardware 207 Table of Contents Module 3 / Unit 1 System Components 209 Selecting a Computer............................................................................. 210 Motherboard Components...................................................................... 212 Processors............................................................................................. 213 Features of Processors.......................................................................... 214 System and Expansion Bus Technologies............................................... 216 System Cooling...................................................................................... 218 e BIOS and UEFI System Firmware........................................................... 220 ut Module 3 / Unit 2 Using Device Interfaces 225 ib Computer Port and Connector Types...................................................... 226 USB and Firewire................................................................................... 227 tr Graphics Devices................................................................................... 229 Graphic Device Interfaces....................................................................... 230 is Input Devices......................................................................................... 233 Configuring Peripherals.......................................................................... 236 D Bluetooth............................................................................................... 239 RF and Near Field Communications (NFC)............................................. 241 Networking Interfaces............................................................................. 241 Module 3 / Unit 3 Using Peripheral Devices or 249 e Installing and Uninstalling Peripherals..................................................... 250 at Display Devices..................................................................................... 254 Display Settings..................................................................................... 257 Multimedia Ports and Devices................................................................. 261 lic Printer Types......................................................................................... 264 Installing and Configuring a Printer......................................................... 265 Scanners and Cameras.......................................................................... 268 up Module 3 / Unit 4 Using Storage Devices 276 D System Memory..................................................................................... 277 Mass Storage Devices............................................................................ 279 ot Optical Discs and Drives......................................................................... 281 Removable Flash Memory Devices......................................................... 284 N Module 3 / Unit 5 Using File Systems 289 o Managing the File System...................................................................... 290 D Folders and Directories.......................................................................... 293 File Explorer........................................................................................... 295 Files...................................................................................................... 298 File Attributes and Permissions............................................................... 304 Searching for Folders and Files.............................................................. 307 File Types and Extensions...................................................................... 310 Module 3 / Summary Using Computer Hardware 325 Page v Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM Table of Contents Module 4 / Using Networks 327 Module 4 / Unit 1 Networking Concepts 329 Network Components............................................................................. 330 TCP/IP................................................................................................... 332 Internet Protocol..................................................................................... 335 Packet Delivery and Forwarding.............................................................. 337 DNS and URLs....................................................................................... 338 Internet Application Services................................................................... 341 e Module 4 / Unit 2 ut Connecting to a Network 346 ib Internet Service Types............................................................................ 347 Wireless Internet Services...................................................................... 349 Setting Up a Wireless Network................................................................ 351 tr Configuring a Wireless Client.................................................................. 355 Connecting to an Enterprise Network...................................................... 356 is Module 4 / Unit 3 D Secure Web Browsing 365 Safe Browsing Practices......................................................................... 366 or Configuring Browser Security.................................................................. 368 Managing Cookies and PII...................................................................... 372 Digital Certificates and Anti-phishing....................................................... 377 Enabling a Firewall................................................................................. 378 e at Module 4 / Unit 4 Using Shared Storage 386 lic Local Network Sharing and Storage........................................................ 387 Windows File Sharing............................................................................. 389 Hosted Sharing and Storage................................................................... 393 up Backups................................................................................................. 397 Windows Backup.................................................................................... 400 D Module 4 / Unit 5 Using Mobile Devices 410 ot Using a Mobile Device............................................................................ 411 Mobile Applications and App Stores........................................................ 414 Network Connectivity.............................................................................. 415 N Email Configuration................................................................................ 417 Synchronization and Data Transfer......................................................... 418 o Module 4 / Summary D Using Networks 421 Page vi Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM Module 5 / Security Concepts 423 Table of Contents Module 5 / Unit 1 Security Concerns 425 Computer Security Basics....................................................................... 426 Social Engineering................................................................................. 429 Business Continuity................................................................................ 432 Disaster Recovery.................................................................................. 435 Module 5 / Unit 2 e Using Best Practices 437 ut Securing Devices................................................................................... 438 Malware................................................................................................. 439 ib Preventing Malware Infections................................................................ 443 Spam..................................................................................................... 448 Software Sources and Patch Management.............................................. 452 tr Module 5 / Unit 3 is Using Access Controls 461 D Access Controls..................................................................................... 462 User Account Types............................................................................... 464 Authentication Factors............................................................................ 465 or Uses of Encryption................................................................................. 470 Password Cracking and Management..................................................... 473 Module 5 / Unit 4 e Behavioral Security Concepts 477 at Policies and Procedures......................................................................... 478 Handling Confidential Information........................................................... 479 lic Acceptable Use Policies......................................................................... 480 Expectations of Privacy.......................................................................... 482 up Module 5 / Summary Managing Security 485 D Taking the Exam 487 ot Career Advice 497 N Glossary 507 o D Index 531 Page vii Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM About This Course About This Course CompTIA ITF+ (IT Fundamentals) Certification is the essential qualification for beginning a career in IT Support. CompTIA (comptia.org) is a not-for-profit trade association set up in 1982 to advance the interests of IT professionals and companies. It is most well-known for its vendor-neutral IT certifications. The CompTIA ITF+ exam will certify the successful candidate has the knowledge and skills required to identify and explain the basics of e computing, IT infrastructure, software development and database use. In ut addition, candidates will demonstrate their knowledge to install software, establish basic network connectivity and identify/prevent basic security risks. Further, this exam will assess the candidate’s knowledge in the areas of ib troubleshooting theory and preventative maintenance of devices. This exam is intended for candidates who are advanced end users, are considering a tr career in IT, and are interested in pursuing professional-level certifications, such as A+. is CompTIA ITF+ Exam Objectives Blueprint D This course will prepare you to take the FC0-U61 exam to obtain the ITF+ certification and help you to learn some of the basic principles and techniques or of providing PC, mobile, applications, and network support. e Course Outcomes at This course and the ITF+ certification are designed as the starting point for a career in IT support. Obtaining ITF+ certification will show that you have the lic aptitude to pursue a professional-level certification, such as CompTIA A+. Completing this course will also help you acquire the knowledge and skills to up set up and use a computer at home securely and keep it in good working order and to provide informal support for PCs and simple computer networks to your colleagues in a small business. D On course completion, you will be able to: ot Set up a computer workstation and use basic software applications. N Explain the functions and types of devices used within a computer system. Apply basic computer maintenance and support principles. o D Describe some principles of software and database development. Configure computers and mobile devices to connect to home networks and to the Internet. Identify security issues affecting the use of computers and networks. Page viii Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM Target Audience and Course Prerequisites About This Course CompTIA ITF+ is aimed at those considering a career in IT and computer- related fields. Consequently, there are no special prerequisites to start this course. We have made the assumption that you don't know much about how computers or software work, or even how to use them. Some experience with using a keyboard and mouse will be helpful but is not essential. About the Course Material e The CompTIA ITF+ exam contains assessment items based on objectives and ut example content listed in the exam blueprint, published by CompTIA. The objectives are divided into six domains, as listed below: ib CompTIA ITF+ Certification Domains Weighting tr 1.0 IT Concepts and Terminology 17% 2.0 Infrastructure 22% is 3.0 Applications and Software 18% D 4.0 Software Development 12% 5.0 Database Fundamentals 11% 6.0 Security or 20% This course is divided into five modules, each covering a different subject e area. Each module is organized into several units, containing related topics for at study. Module 1 / Using Computers lic Module 2 / Using Apps and Databases up Module 3 / Using Computer Hardware Module 4 / Using Networks D Module 5 / Security Concepts ot As you can see, the course modules do not map directly to the CompTIA exam domains. Instead, we try to present topics and technologies in the order that N will make it easiest for you to understand them. Each module and each unit starts with a list of the CompTIA domain objectives and content examples that will be covered so that you can track what you are learning against the original o CompTIA syllabus. Each unit in a module is focused on explaining the exam D objectives and content examples. Each unit has a set of review questions designed to test your knowledge of the topics covered in the unit. At the back of the book there is an index to help you look up key terms and concepts from the course and a glossary of terms and concepts used. Page ix Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM About This Course The following symbols are used to indicate different features in the course book: Icon Meaning A tip or warning about a feature or topic. A reference to another unit or to a website where more information on a topic can be found. e Review questions to help test what you have learned. ut A hands-on lab exercise for you to practice skills ib learned during the lesson. tr is D or e at lic up D ot N o D Page x Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM Completing the Labs About This Course The practical lab exercises in this book are designed to be completed on a typical home computer running Microsoft Windows 10 Spring Creators Update (1803). You should note some conventions used in the lab instructions: Text in bold refers to a command or part of a dialog. Text in Bold, Courier font represents something you should type. e ut Text in COURIER FONT CAPITALS represents a key or key combo. For example, CTRL+C means press the CTRL and C keys at the same time. ib Finding a Job tr The CompTIA ITF+ certification is a great thing to have to prove to employers is that you know the basics of Information Technology and support, but it is not a golden ticket into employment. To get a job, you need to know where to look, D how to write an effective resume and application letter, how to prepare for an interview, and generally how to impress potential employers. or Knowing where to start when looking for a job can be daunting, so the last section of the course contains a guide to help you research the local job market, write a resume and application letter, and prepare for an interview. e at There's also advice on the next steps you might take in your career in IT support. lic Four Steps to Getting Certified up This training material can help you prepare for and pass a related CompTIA certification exam or exams. In order to achieve CompTIA certification, you must register for and pass a CompTIA certification exam or exams. In order to D become CompTIA certified, you must: 1) Review the certification objectives at ot certification.comptia.org/certifications/it-fundamentals to make sure you know what is covered in the exam. N 2) After you have studied for the certification, use the "Taking the Exam" chapter to find tips on booking the test, the format of the exam, and what to o expect. You can also take a free assessment and sample test from D CompTIA at certification.comptia.org/training/practice-questions to get an idea what type of questions might be on the exam. 3) Purchase an exam voucher on the CompTIA Marketplace, which is located at help.comptia.org. 4) Select a certification exam provider and schedule a time to take your exam. You can find exam providers at www.pearsonvue.com/comptia/. Page xi Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM About This Course Visit CompTIA online at comptia.org to learn more about getting CompTIA certified. CompTIA Career Pathway This course will particularly benefit you in pursuing a career in supporting desktop personal computer users, in job roles such as Support Engineer, Maintenance Engineer, Desktop Engineer, Computer Administrator, or PC Support Analyst. e CompTIA offers a number of credentials that form a foundation for your career ut in technology and allow you to pursue specific areas of concentration. Depending on the path you choose to take, CompTIA certifications help you ib build upon your skills and knowledge, supporting learning throughout your entire career. tr is D or e at lic up D View the CompTIA career pathway at certification.comptia.org/why-certify/roadmap. ot N o D Page xii Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM Module 1 / Using Computers Using Computers The following CompTIA ITF+ domain objectives and examples are covered in this module: CompTIA ITF+ Certification Domains Weighting 1.0 IT Concepts and Terminology 17% 2.0 Infrastructure 22% e 3.0 Applications and Software 18% ut 4.0 Software Development 12% 5.0 Database Fundamentals 11% ib 6.0 Security 20% tr is Refer To Domain Objectives/Examples Unit 1.1 / Common 1.3 Illustrate the basics of computing and D Computing Devices processing. Input Processing Output Storage 2.6 Compare and contrast common computing or devices and their purposes. Mobile phones Tablets Laptops Workstations Servers Gaming consoles IoT (Home e appliances, Home automation devices, Thermostats, Security systems, Modern cars, IP at cameras, Streaming media devices, Medical devices) lic Unit 1.2 / Using a This unit does not cover specific exam domain Workstation objectives or content examples. Unit 1.3 / Using an 3.1 Explain the purpose of operating systems. up OS Interface between applications and hardware Types of OS (Mobile device OS, Workstation OS, Server OS, Embedded OS, Firmware, Hypervisor [Type 1]) D Unit 1.4 / Managing 3.1 Manage applications and software. an OS Disk management Process ot management/scheduling (Kill process/end task) Memory management Access control/protection 3.2 Compare and contrast components of an N operating system. Services Processes Utilities (Task scheduling) Interfaces (Console/command line, GUI) o D Page 1 Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM Module 1 / Unit 1 Refer To Domain Objectives/Examples Unit 1.5 / 1.6 Explain the troubleshooting methodology. Troubleshooting and Identify the problem (Gather information, Duplicate Support the problem, if possible, Question users, Identify symptoms, Determine if anything has changed, Approach multiple problems individually) Research knowledge base/Internet, if applicable Establish a theory of probable cause (Question the obvious, Consider multiple approaches, Divide and conquer) Test the theory to determine the cause (Once the theory is confirmed [confirmed root e cause], determine the next steps to resolve the ut problem, If the theory is not confirmed, establish a new theory or escalate) Establish a plan of action to resolve the problem and identify potential effects ib Implement the solution or escalate as necessary Verify full system functionality and, if applicable, tr implement preventive measures Document findings/lessons learned, actions and outcomes is D or e at lic up D ot N o D Page 2 Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM Module 1 / Unit 1 Common Computing Devices Common Computing Devices Objectives On completion of this unit, you will be able to: □ Describe the basics of how a computer processes data. e Describe the functions and capabilities of types of computing devices, such ut □ as PCs, servers, mobiles, and home automation. ib Syllabus Objectives and Content Examples tr This unit covers the following exam domain objectives and content examples: is □ 1.3 Illustrate the basics of computing and processing. Input Processing Output Storage D □ 2.6 Compare and contrast common computing devices and their purposes. or Mobile phones Tablets Laptops Workstations Servers Gaming consoles IoT (Home appliances, Home automation devices, Thermostats, Security systems, Modern cars, IP cameras, Streaming media devices, e Medical devices) at lic up D ot N o D Page 3 Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM Module 1 / Unit 1 Information Technology An Information Technology (IT) system is one that processes, stores, and transfers information. Information can take many different forms including words, numbers, pictures, sound, or video. These can all be represented in an IT system using nothing more complicated than the binary digits one and zero. When information is stored and processed like this, it is often referred to as data. An IT system could use computers, the telecommunications network, and other programmable electronic devices. In fact, because of the importance of e communications in IT, the term ICT (Information and Communications ut Technology) is often used in preference to IT. We live in an "Information Age." The effective use of information is regarded as ib the defining element of the 21st century, as important as the industrial revolution before it. Computers and software programs enable us to process tr data and perform certain tasks much more quickly than we could ourselves. IT systems are very flexible and can be made to perform a variety of different is tasks. IT networks, such as the global Internet, allow us to distribute and share information quickly. D Computer Hardware and Software or A computer is a system that manipulates data according to a set of instructions. Three elements are required for a computer to perform useful e tasks: hardware, software, and the computer's user. at The devices and components that make up a computer system are called hardware. Many parts are contained within the computer's case. Other lic parts are connected to the computer and are referred to as peripheral devices. Most peripherals allow information to be entered (input) and up retrieved (output). The instructions that a computer follows come from software (computer programs). A basic software environment is established by the computer's D Operating System (OS). Software applications, such as word processors, spreadsheet programs, and payroll programs, can be installed within the OS ot to extend the range of things that the computer can be used to do. Having different software applications means that the same hardware can be put to a variety of uses. N Software provides an interface for the user to control the computer o system. The user creates data files by inputting information and selecting commands from the interface. D Basics of Computing and Processing A good way to understand the functions of the different components of the PC is to think of them working as interfaces. Input and output hardware devices, such as a mouse and a monitor, provide an interface between the user and the computer; the operating system provides an interface between hardware components and software applications. In general terms, this works as follows: Page 4 Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM When a user selects a command (perhaps using a mouse to click an icon Common Computing Devices on the application toolbar), the software application receives the command and, using the functions of the operating system, converts it into a series of instructions, which are stored in system memory, commonly referred to as Random Access Memory (RAM). Similarly, when a user types using the keyboard or scans a picture, the input is converted to digital data and stored in memory. The Central Processing Unit (CPU) retrieves each instruction or data file from memory and processes it. e The CPU then writes the result back to memory and directs other ut components to perform actions. For example, it may instruct the display subsystem to update the image shown to the user or the storage ib subsystem to save data to a disk. tr We'll discuss the types and features of system components such is as the CPU and RAM in detail in Unit 3.1. D All the instructions and data processed by a computer are ultimately represented as strings of 1s and 0s. These 1s and 0s are represented as on or off states in the transistors that make up CPU and RAM components. A CPU or can process billions of these binary instructions per second, which gives it the illusion of being able to "think." e Input, Output, Processing, and Storage at The four functions listed above represent most of the ways that data moves lic through a computer system: Input—the computer receives data entered by the user through peripheral up devices, such as mice, keyboards, scanners, cameras, and microphones. Processing—the data is written to memory and manipulated by the CPU, D acting on instructions from the operating system and applications software. Output—the processed data is shown or played to the user through an ot output device, such as a monitor or loudspeaker system. N Storage—the data may be written to different types of storage devices, such as hard disks or optical discs, because data stored in most types of system memory is only preserved while the computer is powered on. o D Additionally, most computers are configured in networks, allowing them to exchange data. You can think of networking as a special class of input and output, but it is probably more helpful to conceive of it as a separate function. Page 5 Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM Module 1 / Unit 1 Personal Computers (PC) There are many different types of computer. Some of the first types of mainframe computers created in the 1960s and 1970s are unrecognizable from the sorts of desktop and laptop computers you may be familiar with. The term "Personal Computer" is generally understood to apply to versions of the IBM PC, developed in 1981. The IBM PC was based on a microprocessor or Central Processing Unit (CPU) designed by Intel. This is also called the x86 architecture or platform. This type of computer was fundamentally different to e mainframes as it was operated directly by the end user. ut While technologies and performance have completely transformed what we know as PCs from the boxes available in 1981, most workstation and laptop ib personal computers designed for home and office use are still based on the IBM PC design and x86 platform. As this PC platform matured, it came to be tr associated with use of Microsoft's Windows operating system software. Hardware and software development for PCs is often (but not exclusively) is undertaken with Windows compatibility in mind. D In the last couple of decades however, personal computers have become available as much smaller, more portable devices such as tablets and or smartphones. These devices can use different hardware platforms and operating systems. This has been coupled with the growth of the Internet as a global data communications network. As the miniaturization of electronics continues, many "ordinary" appliances and systems are being designed with e processing and communications capabilities, creating an Internet of Things at (IoT). lic Desktop and Workstation Computers up A workstation type of PC is housed in a case that can sit on or under a desk. Consequently, they are often referred to as desktop PCs or just as desktops. A desktop computer can be used independently by a single user to run D powerful software applications with many functions. It can also be used as a network client to access shared resources. ot N o D PC system showing processing and storage components (within case), input components (keyboard and mouse), and output components (display, speakers, printer). Image © 123rf.com. Page 6 Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM Common Computing Devices Sometimes the terms PC, desktop computer, and workstation are used interchangeably. Quite often however, the term workstation is used to mean a particularly powerful type of desktop computer. Some of a PC's components are attached to a motherboard contained within the computer's case. However, a desktop PC also requires the use of peripheral devices, connected to the motherboard via ports aligned to holes in the case. Some peripheral devices, such as a mouse and keyboard for input and a monitor for output, are essential. Others, such as speakers and e microphone or a printer, are optional. ut The advantage of desktops is that the basic design can be modified with higher or lower specified components and optional features, making a particular ib model better suited to different tasks. A workstation-class computer with higher specification components, such as CPU and system memory, will cost more tr but be able to process data faster. The computer's performance is largely determined by the following factors: is The speed of the CPU determines the basic speed of the computer. D More system memory makes it possible to run more applications simultaneously and process large amounts of data more quickly. or The capacity of the main storage drive determines how much data can be stored on the computer when it is switched off. e Optional components extend the range of things the computer can do (for at example, a sound card makes it possible to play audio while a webcam allows sound and video recording). lic The quality of peripherals such as the display, mouse, and keyboard make the computer more comfortable to use (this is referred to as ergonomics). up We are simplifying a bit here. In fact, the type and speed of the D main storage drive also has a big impact on system speed. Legacy hard drives were a serious performance bottleneck, but these are ot being replaced by solid state drives, which can work much more quickly. Storage devices are discussed in more detail in Unit 3.4. N The graphics subsystem is also an important performance factor. o D Page 7 Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM Module 1 / Unit 1 Desktop PCs can also be purchased as "all-in-one" units. All-in-one means that the computer components (except the keyboard and mouse) are contained within the monitor case. e ut ib tr is D or e at All-in-One PC—the system components are all contained within the monitor case. Image © 123rf.com. lic Servers up A server is any computer providing services to other computers, but usually the term server implies a powerful computer that supports a number of users simultaneously in a computer network. Most servers use the same type of D components as a desktop. The main difference is that the components are more powerful and more reliable, and consequently more expensive. If a ot desktop PC stops working, a single user may be unable to do their job; if a server computer stops working, tens or even hundreds of users may not be able to do their jobs. Consequently, servers need to be very reliable. This is N achieved by specifying high quality components and also by using extra copies of components for redundancy. This makes a server system fault tolerant. o Server systems are also, usually designed to be easy to expand and upgrade D with additional or improved components. Very often, server computers use a special type of case designed to fit into a steel rack shelving system. You should also understand that the term server can refer either to hardware or software. A hardware server may be running many software servers and sometimes different types of software servers. Examples of types of software servers include web servers, email Page 8 servers, database servers, authentication servers, and so on. Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM Laptops Common Computing Devices A laptop computer is one that integrates the display, system components, and input/output devices within a single, portable case (or chassis). e ut ib tr is D or Distinctive features of a laptop computer, including the built-in screen, Integrated keyboard, touchpad pointer control, and I/O ports (on both sides and rear of chassis). Image © 123rf.com. e at The main features distinguishing laptops from desktop PCs are: Size and weight—laptops weigh between 1 and 4 kg (2–9 lbs). lic Display type—laptops use flat-panel display technologies to provide lightweight, slimline screens that are built into the case. Laptop screen up sizes come in the ranges 11–14", 15–16", and 17"+. Input devices—the main input devices are integrated into the case, such D as a built-in keyboard, a touchpad instead of mouse, and/or a touchscreen. ot Power source—portable computers can be run from internal battery packs as well as from building power. N Components—laptops often use different system components (CPU, RAM, and graphics) that are smaller, lighter, and draw less power than desktop versions. o D Networking—portable computers use wireless radio technologies to connect to networks rather than cabled connections. Small laptops can also be described as notebooks and subnotebooks, while bigger models are often called "desktop replacements." The term Ultrabook is used for laptops meeting a particular Intel specification for performance, size/weight, and battery life. There are also hybrid laptops that can be used like a tablet (see below) as well as like a traditional laptop. Page 9 Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM Module 1 / Unit 1 PC and Laptop Vendors Most companies producing PCs and laptops are referred to as Original Equipment Manufacturers (OEM). This is because rather than making each component that goes into a PC, they source components such as CPUs and RAM modules from manufacturers and put them together as a branded PC system. While there are many vendors serving local and special interest markets, global PC manufacturing is dominated by Dell, Hewlett-Packard (HP)/Compaq, e Lenovo (previously IBM's PC division), Acer, and Huawei with Samsung, Sony, Toshiba, and Asus also strong in the laptop and hybrid markets. Another ut personal computer vendor, Apple, ship Macintosh computers with a different operating system (Apple Mac OS) and a different hardware platform to the IBM ib PC-compatible vendors. There are also chromebooks, laptops built to run Chrome OS and interface primarily with Google's web apps. tr The market for server computers is dominated by Dell, HP Enterprise (HPE), is and Lenovo. D Mobile Devices or Many of the uses of PCs and laptops have been superseded by smaller personal devices or by specialized devices. e at Smartphones and Tablets lic A smartphone is a device with roughly the same functionality as a personal computer that can be held in one hand. Previous handheld computers, known up as Personal Digital Assistants (PDA), and earlier types of mobile phones with some software functionality (feature phones), were hampered by clumsy user interfaces. Modern smartphones use touchscreen displays, making them much D easier to operate. Most smartphones have a screen size between 4.5" and 5.7". ot N o D Typical smartphone form factor. Image © 123rf.com. Prior to the Apple iPad, tablet PCs were usually laptops with touchscreens. The iPad defined a new form factor; smaller than a laptop and with no Page 10 keyboard. Tablet screens tend to be sized between 7” and 10”. Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM Common Computing Devices Smartphones sized between the 5" and 7" form factors are often called phablets. Many Windows mobile devices adopt a hybrid approach where a laptop can be converted into a tablet by flipping the screen. Microsoft's Surface Pro tablet is available with a detachable keyboard, which can also function as a cover for the screen. Other vendors are also producing "two-in-one" devices that can function as both a laptop and a tablet. e The main smartphone and tablet vendors are Apple and Samsung. Other ut vendors include LG, HTC, Huawei, Motorola/Lenovo, Microsoft, Nokia, Sony, and Amazon. ib Internet of Things (IoT) Devices tr is Aside from devices easily recognizable as "computers," your home and office D are quite likely populated by other consumer electronics devices connected to each other and to the Internet. The Internet of Things (IoT) refers to a world in which many different types of things are embedded with processing and or networking functionality. Processing and networking functionality can be provisioned by very small chips, so the "things" can range from motor vehicles and washing machines to clothing and birthday cards. e at Home Automation lic Pretty much anything from a clock to an alarm system or a refrigerator can be controlled over the Internet by home automation software, if the appliance or device is "smart." Often, sitting at the heart of this automation, is a hub to which up other devices connect. Hubs are usually controlled using voice recognition systems and smartphone apps. Some of the major vendors include Amazon (Alexa voice recognition), Samsung (S Voice), Apple (Siri), and Logitech (working D with either Alexa or Google Assistant), but there are many others. One of the critical points in building a "smart" or "digital" home or office solution is ot ensuring compatibility between the networking or communications standards supported by the hub and the appliances. Most devices support ordinary Wi-Fi N standards-based wireless networking, but some may require connectivity standards designed for low power use, such as Z-Wave, ZigBee, or Bluetooth LE. o Some of the specific home automation product categories include: D Thermostats—monitor and adjust your home or office Heating, Ventilation, and Air Conditioning (HVAC) controls from an app installed on your phone. Security systems—monitor and control alarms, locks, lighting, and videophone entry systems remotely. IP cameras—often used for security, these devices connect to Internet Protocol (IP)-based networks such as the Internet and support direct upload and sync to cloud storage for remote monitoring. Page 11 Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM Module 1 / Unit 1 Home appliances—check the contents of your refrigerator from your smartphone while out shopping or start the washing machine cycle so that it has finished just as you get back to your house. Streaming media—play content stored on a storage device through any smart speaker or TV connected to the home network. Modern Cars and Drones Modern motor vehicles use a substantial amount of electronics. As well as e computer systems to control the vehicle's engine and brakes, there may be ut embedded systems for in-vehicle entertainment and for navigation (sat-nav) using Global Positioning Systems (GPS) to identify the vehicle's precise ib location. Some vehicles are now, also fitted with a "black box," or event data recorder, that can log the car's telemetry (acceleration, braking, and position). tr There are also sophisticated systems to control the vehicle on behalf of the driver, including automatic collision detection and avoidance, and parking is assist. Companies are experimenting with fully-automated self-driving or autonomous vehicles. D Another rapidly developing sector is that of Unmanned Aerial Vehicles or (UAV). This sector ranges from full-size fixed wing aircraft to much smaller multi-rotor hover drones. e Medical Devices at Medical devices represent another class of devices where use of electronics to remotely monitor and configure the appliance is expanding rapidly. It is lic important to recognize that use of these devices is not confined to hospitals and clinics but includes portable devices such as cardiac monitors/defibrillators up and insulin pumps. These allow doctors and nurses to remotely monitor a patient and potentially to adjust dosage levels or other settings without the patient having to visit the care provider. D Gaming Consoles ot A gaming console contains many of the same components as a workstation. Gaming consoles have powerful CPUs and graphics processors, plus Ethernet N and Wi-Fi for wired and wireless home networking and Internet connectivity. Web cameras and microphones are also available as peripherals. The main o difference to a workstation is that a console is designed to be operated by a gaming pad rather than a keyboard and mouse, though these are often also D available as options. A gaming console would use an HD (High Definition) TV for a display. The market for consoles is dominated by Sony (PlayStation), Microsoft (Xbox), and Nintendo (Wii and Switch). There are also handheld game consoles, such as Nintendo's 3DS and Switch, and Sony's Vita. These come with Wi-Fi to connect to the Internet or to other consoles. Page 12 Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM Common Computing Devices Review Questions / Module 1 / Unit 1 / Common Computing Devices Answer these questions to test what you have learned in this unit. 1) True or false? All types of computers use CPU and system memory. e 2) What type of computer is most likely to need peripheral devices? ut 3) What type of computer is best suited for using in a job where you have to make notes and be able to move around easily? ib 4) Why don't laptops make good servers? tr 5) Why isn't a smartphone a good tool for writing a report? is 6) What type(s) of IoT appliance are less likely to be controlled via a home automation hub? D or e at lic up D ot N o D Page 13 Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM Module 1 / Unit 2 Module 1 / Unit 2 Using a Workstation Objectives On completion of this unit, you will be able to: □ Set up a computer system with regard for safety and healthy working e practices. ut □ Navigate an OS and use input devices effectively. ib Syllabus Objectives and Content Examples tr This unit does not cover specific exam domain objectives or content examples. is D or e at lic up D ot N o D Page 14 Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM Setting up a PC System Using a Workstation When you install a computer system, you need to consider the following: Is the environment suitable for the computer? Dust, dirt, heat (or extreme cold), and dampness can be very damaging to computers. Is the installation safe for yourself and passers-by? The main risks associated with computer equipment are electrical and trip hazards. e Is the installation healthy to use? Improper use of computers, notably the ut mouse and keyboard, is associated with a number of health risks. ib Setting up a Personal Computer tr Given the above, you should perform the following basic steps when setting up is a computer. D 1) If the computer has just been delivered, check the contents of the box, read the instruction manual, and allow at least 30–60 minutes for the components to adjust to room temperature. There is a slight risk from or condensation if you unpack a computer and start it immediately. 2) Read the manufacturer's setup and safety guidelines and plan the e installation of the computer to comply with them. at 3) Position the monitor and system unit so that cables can be tucked away neatly and do not cross any walkways. When lifting a heavy object such as lic a monitor, take care to protect your back. Ensure that any object placed on a desk is not at risk of toppling. up 4) Ensure there is adequate air flow around the monitor, system unit, and larger peripherals, such as a printer or scanner. D 5) Check that the screen is not exposed to excessive glare from windows or lighting and that equipment is not in direct sunlight. ot 6) Adjust the monitor, chair, and position of the mouse and keyboard so that the user can sit and type comfortably. N 7) Connect each peripheral to the computer using an appropriate cable. Inspect each cable and connector for any sign of visible damage before o plugging it in. Use any available cable management features to keep wiring tidy and ensure it does not pose a trip hazard. D Page 15 Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM Module 1 / Unit 2 e ut ib tr is D Built-in cable management such as on this flat-panel monitor make it less likely trailing wires will cause an accident. or You will learn how to identify ports and connectors in Unit 3.2. e 8) Connect the power cables from the monitor, system unit, and any peripherals to electrical outlets, again checking that the cables are at undamaged and the plugs are fitted with fuses of the correct rating. Ensure that the electrical outlets are not overloaded. lic 9) Switch on any peripherals connected to the computer that you want to use then switch on the system unit. up You start a computer by pressing the power switch, which will be marked by the following symbol:. If the computer does not start, check that a power D cable connects the back of the computer to a wall socket and that the socket is switched on. ot Setting up a Laptop N You should follow the same basic principles when using a laptop for the first time. Read the instruction manual and let the system acclimatize if it has just o been delivered. You will probably have to insert the battery pack, which should D clip into a slot on the underside of the laptop. When you use the laptop for the first time, you will probably have to connect it to the building power supply using the supplied AC adapter to charge the battery. Obviously, you can use a laptop without connecting any peripherals, unlike a desktop computer, but there may be some optional components to plug in. When you have set up the laptop as explained in the documentation, use the catch on the lid to open it. Press the power switch or key with the symbol and wait for the laptop to start. Page 16 Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM Ergonomic Concepts Using a Workstation Ergonomics is the study of factors affecting the performance of people at work. It is well established that a poor working environment can cause certain health problems and decrease productivity. Proper Keyboard and Mouse Placement e Repetitive Strain Injury (RSI) is a condition that occurs when the same task is ut carried out repeatedly for a long period, making use of the s

Use Quizgecko on...
Browser
Browser