78
ITE v6.0 1 Certifications Available After Taking this Course Your Path to Success

Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

  • Upload
    ngominh

  • View
    215

  • Download
    2

Embed Size (px)

Citation preview

Page 1: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 1

Certifications Available After Taking this Course

Your Path to Success

Page 2: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 2

Certification Value– The More The Better

Technical certifications are worth more than degrees in this field The number of certifications impact salary and jobs Certifications lead to job promotions and raises

Page 3: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 3

Future IT Worker Demand

Remains one of the most in-demand professions available Needed in all industries Companies are adding new

tech support workers Hiring by non-IT companies has

generally outpaced those of IT companies 10-to-1 Focus on “talent”

• #1- Certifications• #2- Job experience• #3- Degreed candidates

IT Department Staffing

TechTarget's IT Salary Survey 2015

Page 4: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 4

Since 1982, the Computing Technology Industry Association (CompTIA), has been dedicated to advancing the global interests of information technology (IT) professionals and companies including manufacturers, distributors, resellers, and educational institutions.

Page 5: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 5

CompTIA A+ Certification

International industry credential Validates the knowledge of computer service technicians with

the equivalent of 500 hours of hands-on experience The standard in foundation-level Vendor-neutral certification Held by 1,000,000+ IT professionals

More information available at:http://certification.comptia.org/certifications/a

Page 6: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 6

CompTIA A+ Certification

Jobs that use CompTIA A+:• Technical support specialist• Field service technician• IT support technician• IT support administrator• IT support specialist• General entry-level IT positions

Page 7: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 7

CompTIA A+ Certification

The latest version is CompTIA A+ (900 series) requires two exams to become certified:

• CompTIA A+ Exam #1 covers the fundamentals of computer technology, installation and configuration of PCs, laptops and related hardware, and basic networking.

• CompTIA A+ Exam #2 covers the skills required to install and configure PC operating systems, as well as configuring common features for mobile operating systems.

Certifications are valid for three years from the date the candidate becomes certified.

Page 8: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 8

CompTIA A+ Certification Security: Supporting and securing access to data by properly using

authentication, access control and encryption for an organization. Help desk and technical support professionals form one of the first lines of defense for any organization.

Networking: Applying core concepts and protocols such as IPv4, IPv6, DHCP, and subnet mask to set up and support wired and wireless networks.

Operating Systems: Working with mobile, server and traditional operating systems from Android and iOS to Windows and Linux.

IT Operations: Utilizing the basics of virtualization, cloud computing, desktop imaging and deployment to support today’s IT infrastructures.

Troubleshooting: Following and using decision trees for diagnosing, resolving and documenting common hardware and software issues across a variety of devices.

Technical Support: Applying principles of customer service to help resolve IT issues.

Page 9: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 9

Exam #1 (220-901)

This exam will cover:

Exam Domains Percentage1.0 Hardware 34%2.0 Networking 21%3.0 Mobile Devices 17%4.0 Hardware & Network Troubleshooting 28%

100%

Page 10: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 10

Exam #2 (220-902)

This exam will cover:

Exam Domains Percentage1.0 Windows Operating Systems 29%2.0 Other OS’s & Technologies 12%3.0 Security 22%4.0 Software Troubleshooting 24%5.0 Operational Procedures 13%

100%

Page 11: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 11

CompTIA IT Fundamentals The CompTIA IT Fundamentals exam is designed to help you

learn more about the world of information technology (IT). It’s ideal if you’re considering a career in IT or if you work in an allied field that requires a broad understanding of IT. CompTIA IT Fundamentals can also be a stepping stone to more advanced certifications such as CompTIA A+. The IT Fundamentals exam builds an understanding of these

topics: • Identify and explain basic computer components • Set up a basic workstation• Conduct basic software installation• Establish basic network connectivity • Identify compatibility issues• Identify/prevent basic security risks• Understand safety and preventative maintenance of computers

Page 12: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 12

CompTIA IT Fundamentals (FC0-U51)

The exam will cover:

Exam Domains Percentage1.0 Software 21%2.0 Hardware 18%3.0 Security 21%4.0 Networking 16%5.0 Basic IT Literacy 24%

100%

Page 13: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 13

Microsoft Technology Associate (MTA)

The Microsoft Technology Associate (MTA) is Microsoft’s newest suite of technology certification exams that validate fundamental knowledge needed to begin building a career using Microsoft technologies. This program provides an appropriate entry point to a future career in technology and assumes some hands-on experience or training but does not assume on-the-job experience. The Windows Operating System Fundamentals exam builds an

understanding of these topics: • Operating System Configurations• Installing and Upgrading Client Systems• Managing Applications• Managing Files and Folders• Managing Devices• Operating System Maintenance

Page 14: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 14

MTA: Windows Operating System Fundamentals (98-349) This exam will cover:

Exam Domains Percentage1.0 Understanding OS Configurations 20%2.0 Installing and Upgrading Client Systems 20%3.0 Managing Applications 15%4.0 Managing Files and Folders 15%5.0 Managing Devices 15%6.0 Understanding OS Maintenance 15%

100%

Page 15: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 15

Page 16: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 16

Chapter 1:Introduction to the Personal Computer

IT Essentials v6.0

Page 17: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 17

Chapter 1 - Sections & Objectives

1.1 Personal Computer Systems Explain how personal computer systems work together

1.2 Select Computer Components Select appropriate computer components

1.3 Configurations for Specialized Computer Systems Explain how hardware is configured for task-specific

computers

Page 18: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 18

1.1 Personal Computer Systems

Page 19: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 19

Basic Personal Computer System

A computer system consists of hardware and software components. Hardware is the physical equipment such as the case,

storage drives, keyboards, monitors, cables, speakers, and printers. Software is the operating

system and programs.• The operating system

instructs the computer how to operate.

• Programs or applications perform different functions.

Page 20: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 20

Cases

The size and layout of a case is called a form factor. Influences the motherboard and power supply form factor

choice Must allow for good air flow Available in different sizes Provides protection and support for internal components. Should be durable, easy to service, and have enough room

for expansion.

NOTE: Select a case that matches the physical dimensions of the power supply and motherboard.

Page 21: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 21

Power Supplies Provides power to all computer components. Must be chosen based on current and future

needs. Deliver different voltage levels to meet

different internal component needs. Converts AC power from the wall socket into

low voltage DC power. Must provide enough power for the installed

components and future additions. Input voltage selector on the back of the

power supply. Power Supply Wattage

• W = V x A

Page 22: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 22

Four Basic Units of Electricity Voltage (V) is a measure of the force required to push electrons

through a circuit. Voltage is measured in volts (V). A computer power supply usually produces several different voltages. Current (I) is a measure of the amount of electrons going

through a circuit. Current is measured in amperes, or amps (A). Computer power supplies deliver different amperages for each output voltage. Power (P) is voltage multiplied by current. The measurement is

called watts (W). Watts is the work required to move electrons through a circuit multiplied by the number of electrons flowing through a circuit per second. Computer power supplies are rated in watts. Resistance (R) is the opposition to the flow of current in a

circuit. Resistance is measured in ohms (Ω). Lower resistance allows more current to flow through a circuit.

Page 23: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 23

Ohm’s Law

There is a basic equation that expresses how three of the terms relate to each other. It states that voltage is equal to the current multiplied by the resistance. This is known as Ohm's Law. V = IR In an electrical system, power (P) is equal to the voltage

multiplied by the current. P = VI A power supply is rated (measured) in watts and is

calculated by W = A X V. A power supply should support 20 to 25 percent more wattage

than all the attached components require.

Page 24: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 24

Motherboard

Backbone of the computer Interconnects computer

components The motherboard is the

main printed circuit board. Contains the buses, or electrical

pathways found in a computer. Buses allow data to travel among the various components. Accommodates CPU, RAM, expansion slots, heat sink/fan

assembly, BIOS chip, chip set, sockets, internal and external connectors, various ports, and the embedded wires that interconnect the motherboard components. Main power uses a 20. or 24-pin connector.

Page 25: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 25

Chipset Controls the communications and interactions

between the CPU and other components on the motherboard

• System performance• System limitations• How much memory can be added to

a motherboard Most chip sets are divided into two distinct

components: • Northbridge controls

• Access to the RAM• Access to video card• Access to the CPU• The speed the CPU can communicate

• Southbridge controls• Communication between the CPU and the expansion ports (hard

drives, sound card, USB ports, and other I/O ports)

Page 26: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 26

Motherboard Form Factors

The form factor of motherboards pertains to the size and shape of the board. It also describes the physical layout of the different

components and devices on the motherboard. Various form factors exist for motherboards.

Page 27: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 27

Central Processing Unit (CPU)

The CPU is known as the brain of the computer. It is also referred to as the processor. The CPU executes a program, which is a sequence of stored

instructions. Two major CPU architectures related to instruction sets:

• Reduced Instruction Set Computer (RISC) • Complex Instruction Set Computer (CISC)

Page 28: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 28

Central Processing Unit (Continued) Some CPUs incorporate hyperthreading or

hypertransport to enhance the performance of the CPU. The amount of data that a CPU can process at one time

depends on the size of the processor data bus. Speed of the CPU is measured in cycles per second-

megahertz (MHz) or gigahertz (GHz). Overclocking is a technique used to make a processor

work at a faster speed than its original specification.

Page 29: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 29

Central Processing Unit (Continued)

The latest processor technology has resulted in CPU manufacturers finding ways to incorporate more than one CPU core onto a single chip.

• Dual Core CPU - Two cores inside a single CPU• Triple Core CPU - Three cores inside a single CPU• Quad Core CPU - Four cores inside a single CPU• Hexa-Core CPU - Six cores inside a single CPU• Octa-Core CPU - Eight cores inside a single CPU

Page 30: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 30

Cooling Systems Dissipates the heat generated by

computer components. Electronic components generate

heat. Too much heat can damage components. A case fan makes the cooling

process more efficient. A heat sink draws heat away from

the core of the CPU. A fan on top of the heat sink moves the heat away from the CPU. Fans can be dedicated to cool the

Graphics-processing unit (GPU).

Case Fan

CPU Fan

Page 31: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 31

ROM and RAM Read-only memory (ROM)

• Basic instructions for booting the computer and loading the operating system are stored in ROM.

• ROM chips retain their contents even when the computer is powered down.

Random-access memory (RAM)• RAM is temporary storage for data and programs that are

being accessed by the CPU.• RAM is volatile memory, which means that the contents are

erased when the computer is powered off.• More RAM means more capacity to hold and process large

programs and files, as well as enhance system performance.

Page 32: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 32

Memory Modules Memory modules are memory chips that have been soldered on to a

special circuit board for easy installation and removal. Dual Inline Package (DIP) is an individual memory chip. Single Inline Memory Module (SIMM) is a small circuit board that holds

several memory chips. Dual Inline Memory Module (DIMM) is a circuit board that holds SDRAM,

DDR SDRAM, and DDR2 SDRAM chips. RAM Bus Inline Memory Module (RIMM) is a circuit board that holds

RDRAM chips. Small Outline DIMM (SODIMM) is a smaller, more condensed version of

DIMM which provides random access data storage that is ideal for use in laptops, printers, and other devices where conserving space is desirable.

The speed of memory has a direct impact on how much data a processor can process because faster memory improves the performance of the processor. As processor speed increases, memory speed must also increase.

Page 33: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 33

Cache and Error Checking Cache

• SRAM is used as cache memory to store the most frequently used data.

• SRAM provides the processor with faster access to the data than retrieving it from the slower DRAM, or main memory.

Error Checking• Memory errors occur when the data is not stored correctly in

the RAM chips. • The computer uses different methods to detect and correct

data errors in memory• Nonparity• Parity• ECC

Page 34: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 34

Internal PC Components (Cont.) Adapter Cards and Expansion Slots

• Adapter Cards extend computer functionality• Adapter Cards connect to the motherboard

through Expansion Slots Storage Devices

• Designed to permanently store user data, user applications and the Operating System

• Can be internal or external to the computer Video Ports

• Connects a video system to an external display device such as a monitor or projector

• Video systems are often designed as an adapter card.

General Ports• Provide connectivity between the motherboard and

various external devices such as printers, external storage and video cameras.

Page 35: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 35

External Ports and Cables

Video Ports and Related Cables• A few different standards govern video traffic between the computer and external

video devices.• HDMI and DisplayPort are examples of video ports that require a specific cable to

operate. Other Ports and Related Cables

• Motherboards have a number of other ports used for device connectivity; USB is a common example.

Adapters and Converters• Adapters and converters can be a solution if a motherboard does not have the proper

port to connect to a device.• Adapters do not usually process the signal; they simply redirect it to another pin.• Converters are more likely to process and transform the signal, converting it to be

accepted by an existing port.

Page 36: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 36

Adapter Cards

Adapter cards increase the functionality of a computer by adding controllers for specific devices or by replacing malfunctioning ports. Examples of adapter cards:

• Sound adapter and video adapter• USB, parallel, and serial ports• Network Interface Card (NIC),

wireless NIC, and modem adapter

Page 37: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 37

Adapter Cards Adapter cards increase the functionality of a computer by

adding controllers for specific devices or by replacing malfunctioning ports. Common Adaptor Cards include:

RAID CardNetwork Interface Card

USB Ports

Parallel & Serial Ports

Sound Card Video Card

Page 38: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 38

Adapter Cards Types of expansion slots:

• Peripheral Component Interconnect (PCI)

• Advanced Graphics Port (AGP)

• PCI-Express

Page 39: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 39

Storage Drives The hard disk drive (HDD) is a magnetic storage device used to

read or write information. They may be fixed or removable (tape drive). HDD storage capacity is measured in gigabytes (GB)

or terabytes (TB). Magnetic hard drives have drive motors designed to spin magnetic

platters and move the drive heads. Speed is measured in revolutions per minute. Common speeds are

5400rpm, 7200rpm, 10,000rpm. Solid state drives (SSDs) do not have moving parts, which results

in faster access to data, improved performance, higher reliability, reduced power usage.

A floppy disk drive (FDD) is storage device that uses removable 3.5 inch floppy disks that can store up to 1.44 MB of data.

Page 40: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 40

Optical Drives, Flash Drives and Drive Interfaces An optical drive is a storage device that uses lasers

to read data on the optical media. The three types are CD, DVD, and BD (Blu-ray). A flash drive is a removable storage device that

connects to a USB port. A flash drive uses a type of memory that requires no power to maintain the data. Common drive interfaces are:

• Integrated Drive Electronics (IDE)• Enhanced Integrated Drive Electronics (EIDE)• Parallel ATA (PATA)• Serial ATA (SATA) and External SATA (eSATA)• Small Computer System Interface (SCSI)

Page 41: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 41

Hard Drive Connectors PATA (Parallel ATA) hard drives

• Originally, called ATA (Advanced Technology Attachment).• With the introduction of SATA, ATA was renamed to PATA.• Can use a 40-pin / 80-conductor cable or a 40-pin / 40-conductor

cable. SATA (Serial ATA) hard drives

• Connect to the motherboard using a serial interface.

• Have a higher data-transfer rate than PATA drives.

• Smaller data cable allows for improved airflow.• Uses a 7 pin connector• eSATA or external SATA

Page 42: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 42

Small Computer Systems Interface (SCSI) SCSI (Small Computer Systems Interface) hard drives

• use a 50-pin, 68-pin, or 80-pin connector. • Up to 15 SCSI drives can be connected to a SCSI drive controller. • Usually used for hard drives and for tape storage .• Ideal for high-end computers,

including network servers that require high transfer speeds and reliability.

• SCSI devices are connected in a series, forming a chain that is called a daisy chain.

• Each end of the daisy chain is terminated to prevent signal reflections and interference.

• Each device must have a unique SCSI ID.

Page 43: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 43

SCSI Types

Page 44: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 44

RAID Levels RAID provides a way to store data across multiple hard disks

for redundancy.RAID Level

Min # of Drives

Description

0 2 Data striping without redundancy (Highest performance)1 2 Disk mirroring (High performance and protection; all data is

duplicated)2 2 Error-Correcting Coding3 3 Byte-level data striping with dedicated parity4 3 Block-level data striping with dedicated parity5 3 Block-level data striping with distributed parity (combination of

data striping and parity; data can be rebuilt with information from the other drives)

6 4 Independent Data Disks with Double Parity0/1 4 Combination of data striping and mirroring

10 4 Mirrored set in a striped set

Page 45: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 45

Internal Cables

Power supply connectors- SATA, Molex, and Berg. Front panel cables connect the case buttons and lights to

the motherboard. Data cables connect drives to the drive controller.

• Floppy disk drive (FDD) data cable• PATA (IDE) data cable (40 conductor)• PATA (EIDE) data cable (80 conductor)• SATA data cable (internal)• eSATA data cable (external)• SCSI data cable

Page 46: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 46

Video Ports and Cables A video port connects a monitor cable to a computer. Video ports

and connector types:• DVI, Displayport, RCA, DB-15, BNC, RJ-45, MiniHDMI, Din-6

Display cables transfer video signals from the computer to display devices. Display cable types:

• High-Definition Multimedia Interface (HDMI) – transfers video and audio signals

• DVI-Connector for digital video• Video Graphics Array (VGA)-connector of analog video• Thunderbolt-connects to devices using the Mini Display Port

adapter• Component/RGB• Composite, S-Video• Coaxial-F Type connector• Ethernet

Page 47: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 47

Ports and Cables Serial ports transmit one bit of data at a time.

Uses a DB-9 or DB-25 connector. USB is a standard interface for connecting hot-

swappable peripheral devices to a computer. Some devices can also be powered through the USB port. FireWire is a high-speed, hot-swappable

interface that can support up to 63 devices. Some devices can also be powered through the FireWire port. (IEEE-1394) A parallel cable is used to connect parallel

devices, such as a printer or scanner, and can transmit 8 bits of data at one time. (IEEE-1284)

Page 48: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 48

Ports and Cables (Continued) A SCSI port can transmit data at rates in excess of

320 Mbps and can support up to 15 devices. SCSI devices must be terminated at the endpoints of the SCSI chain. A network port, also known as an RJ-45 port,

connects a computer to a network. The maximum length of network cable is 328 feet (100 m). A telephone port (RJ11) is used to connect a

modem to a telephone outlet. A BNC connects data networks over coaxial cable. A PS/2 port connects a keyboard or a mouse to a

computer. The PS/2 port is a 6-pin mini-DIN female connector. An audio port connects audio devices to the

computer. A video port connects a monitor cable to a computer.

Page 49: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 49

Input Devices

Input devices are used to enter data or instructions into a computer:

• Mouse and Keyboard • KVM switch • Gamepad and joystick• Digital camera• Digital video camera • Biometric authentication device • Touch screen • Scanner

Page 50: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 50

Output Devices Monitors and Projectors:

• Cathode-ray tube (CRT) has three electron beams. Each beam directs colored phosphor on the screen that glows either red, blue, or green.

• Liquid crystal display (LCD) is commonly used in laptops and some projectors. LCD comes in two forms, active matrix and passive matrix.

• A light-emitting diode (LED) display is an LCD display that uses LED backlighting to light the display.

• An Organic LED (OLED) display uses a layer of organic material that responds to electrical stimulus to emit light.

Page 51: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 51

Output Devices (Continued) Printers and Fax Machines are output

devices that create hard copies of computer files. Scanners create electronic file versions of

paper documents. Speakers and headphones are output

devices for reproducing audio signals.

Speakers

Headphones

Page 52: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 52

Output Devices (continued)

Monitors and Projectors:• Plasma - Plasma displays are another type of flat panel

monitor • Digital light processing (DLP) is a technology used in

projectors.• Several factors are involved in Monitor Resolution –Pixel, Dot

Pitch, Contrast Ratio, Refresh rate, Interlace/Non-Interlace, Horizontal vertical color, Aspect ratio, Native resolution.

• Monitor Resolution refers to the level of image detail that can be reproduced. Higher resolution settings produce better image quality.

• Contrast ratio is the difference in the intensity of light between the brightest white and darkest black that can be displayed.

Page 53: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 53

1.2 Select Computer Components

Page 54: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 54

Select PC Components

Select the Motherboard, CPU, Case and Memory

• CPU, memory, motherboard and case choices are inter-related.

• The motherboard should support all customer required applications and still fit properly in the case.

• The case should host the motherboard, the proper power supply and provide good airflow for the internal components.

• The CPU must be compatible with motherboard CPU slot and voltage; it should be compatible with the chosen memory speed for maximum performance.

• The memory must also be compatible with motherboard memory slots and voltage.

• The amount of memory will depend on the type of applications requested by the customer.

Page 55: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 55

Select PC Components (Cont.) Select the Case and Fans

• Case and fans must be chosen to maximize internal airflow.

• The fans must fit the case and be within the power limits provided by the power supply.

Select the Power Supply• The power supply should be selected based on the

maximum amount of power required by all the internal components.

• Remember that some components will draw more power while under heavy load.

Select Adapter Cards• Make sure the motherboard has compatible

expansion slots to support the adapter cards.• The motherboard must also have enough expansion

slots to receive all the required adapter cards.• Customer needs will define what adapter cards must

be procured and installed.

Page 56: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 56

Select PC Components (Cont.)

Select Hard Drives• Important hard drive factors to be considered are

speed, storage space and communication interface type.

• The drive’s underlying technology (HDD vs SSD) directly impacts speed.

Select a Media Reader• The media reader must be compatible with customer

media. Select Optical Drives

• Make sure the drive is compatible with customer media.

• Other factors to consider are speed, communication interface type and the ability to write to the media.

Page 57: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 57

Select PC Components (Cont.)

Select External Storage• Important factors when selecting external storage

are storage space, speed and communication interface.

• Make sure the computer has enough ports to accommodate the external devices and peripherals.

• Note: Some external devices do not require an external power supply but rely on a second USB port for power.

Select I/O Devices• The selection of I/O devices is application specific

and will depend on customer requirements.• Make sure the computer has enough

communication ports and that they are compatible with the types required by the I/O devices.

Page 58: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 58

Selecting Case and Power Supply

Determine the customer's needs before making any purchases or performing upgrades. The computer case, power

supply, and motherboard must have the same form factor. The computer case must have the

appropriate number of internal drive locations. When purchasing a new computer case and power supply

separately, ensure that all of the components will fit into the new case (form factor) and that the power supply (wattage) is powerful enough to operate all of the components.

Page 59: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 59

Selecting a Motherboard When selecting a replacement motherboard, make sure it

supports the case, CPU, RAM, video adapter, and other adapter cards. The socket and chip set on the motherboard must be

compatible with the CPU. The motherboard must accommodate the existing heat

sink/fan assembly. The existing power supply must have connections that fit the

new motherboard. The number and type of expansion slots

must match the existing adapter cards. The new motherboard must physically

fit into the current computer case.

Page 60: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 60

Selecting a CPU

Replace the CPU when it fails or is no longer adequate for the current applications. Make sure the CPU is compatible with the existing

motherboard:• The new CPU must use the same socket type or slot type and

chip set. • The BIOS must support the new CPU. • The new CPU may require a different heat sink/fan assembly. • Make sure the correct voltage is maintained.• Use manufacturers' websites to investigate the compatibility

between CPUs and other devices.

Page 61: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 61

CPU Features and Classification

Multi-core processors - RAM is shared between the processors Cache memory - L1, L2, and L3 (primarily uses SRAM) Speed of a processor - maximum speed without errors Front Side Bus (FSB) - path between the CPU and chip set,

expansion cards, and RAM 32-bit and 64-bit - number of instructions handled by the

processor at one time

Page 62: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 62

Selecting Heat Sink/Fan and Case FanHeat sink/fan

assembly considerations:

• Socket type • Motherboard physical

specifications • Case size • Physical environment

Case fan considerations:

• Case size• Fan speed• Number of components in

the case• Physical environment• Number of mounting

places available• Location of mounting

places available• Electrical connections

Page 63: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 63

Selecting RAM

New RAM may be needed when an application locks up or the computer displays frequent error messages

When selecting new RAM, check the compatibility with the current motherboard.

The speed of the new RAM must be the same or faster than the existing RAM.

Dual Data Rate (DDR) memory doubles the front side bus speed.

Page 64: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 64

Selecting Adapter Cards

Adapter (or expansion) cards add extra functionality to a computer. Before purchasing an adapter card, check:

• Is there an open expansion slot?• Is the adapter card compatible with the open

slot?• What are the customer’s current and future

needs? • What are the possible configuration options?

If the motherboard does not have compatible expansion slots, external devices are an option:

• Are USB or FireWire versions of the external device available?

• Does the computer have an open USB or FireWire port?

Page 65: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 65

Selecting Hard Drives, Tape Drives, and Floppy Drives These all use a magnetic medium for storing data The signs that a hard drive is failing and should be replaced

as soon as possible:• Unusual noises• Error messages• Corrupt data or

applications Replacement options:

• Solid State Drives• Optical Drives• External Storage• Hard Drive• Floppy Disk Drive (limited use)

Page 66: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 66

Selecting Solid State Drives

Solid State Drives (SSD) use static RAM instead of magnetic platters to store data. SSDs are highly reliable because they have no moving parts. Considerations when selecting:

• Cost• Internal or external• Case location• System compatibility• Power requirements• Speed• Capacity

Page 67: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 67

Selecting Media Readers

Media Reader - device that reads and writes to different types of media cards, found in a digital camera, smart phone, or MP3 player. Considerations when selecting:

• Internal or external• Type of connector used• Type of media cards supported

Page 68: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 68

Selecting Optical Drives

An optical drive uses a laser to read and write data to and from optical media. CD-ROM drive can only read CDs. CD-RW can read and write to CDs. DVD-ROM drive can only read DVDs and CDs DVD-RW can read and write to DVDs and CDs. DVDs hold

significantly more data than CDs A Blu-ray reader (BD-R) can only read Blu-ray Discs, DVDs,

and CDs. A Blu-ray writer (BD-RE) can read and write to Blu-ray

Discs and DVDs. Blu-ray Discs hold significantly more data than DVDs.

Page 69: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 69

Selecting External Storage

External storage connects to an external port such as a USB, IEEE 1394, SCSI, or eSATA. Considerations when selecting:

• Port type• Storage capacity• Speed• Portability• Power requirements

Page 70: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 70

Selecting Input and Output Devices

FireWire (IEEE 1394) - Transfers data at 100, 200, or 400 Mbps and IEEE 1394b at 800 Mbps. Parallel (IEEE 1284) - Transfers data at a maximum speed

of 3 MBps. Serial (RS-232) - Early versions were limited to 20 Kbps, but

newer versions can reach transfer rates of 1.5 Mbps. SCSI (Ultra-320 SCSI) - Connects as many as 15 devices

with a transfer rate of 320 MBps. USB interface is widespread and used with many different

devices. USB (1.1) , USB 2.0 and USB 3.0. SATA interface is replacing IDE and EIDE as the standard

interface for hard drives. The eSATA (external SATA) connection can be hot-swappable.

Page 71: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 71

1.3 Configurations for Specialized Computer Systems

Page 72: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 72

Specialized Computer Systems Thick and Thin Clients

• Thin clients have little processing power and are designed to act as a terminal to a server (thick client).

• Thick clients have more powerful CPUs, more memory and their own storage. They serve as processing stations for thin clients.

CAx Workstations• Designed to support CAD and CAM applications.• Plenty of RAM, fast disks, powerful CPU and special

input devices are common resources. Audio and Video Editing Workstations

• Common editing workstation resources include much RAM, fast disks, powerful CPU and special adapter cards such as audio and video capture.

• Specialized video cards• Large and fast hard drives• Specialized audio cards

Page 73: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 73

Specialized Computer Systems (Cont.)

Virtualization Workstations• These workstations are designed to run virtual computers• Virtual computers use and share the workstation’s physical

resources such as CPU, memory and disks.• The selection of physical resources will depend on the number

and purpose of the virtual machines:• Amount of Ram• Number of CPU cores

Gaming PCs• Due to high resource requirements of modern games, gaming

PCs are very resource demanding.• A few requirements of gaming PCs are: top end CPU, lots of fast

RAM, fast disks, high performance input devices and audio systems.

Home Theatre PCs• These computers must be able to play various media formats

and, in some cases, receive TV signals.• Common HTPC requirements include powerful CPU, fast RAM,

large disks, fast NIC and video card with TV input.

Page 74: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 74

Specialized Computer Systems CAD or CAM (CAx) workstation

• Powerful processor• High-end video card• Maximum RAM

Audio and video editing workstation• Specialized audio card• Specialized video card • Large, fast hard drive• Dual monitors

Virtualization workstation• Maximum RAM • Maximum CPU cores

Page 75: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 75

Specialized Computer Systems Gaming PC

• Powerful processor• High-end video card• High-end sound card • High-end cooling• Large amounts of fast RAM • Fast storage• Gaming-specific hardware

Home Theater Personal Computer (HTPC) • Specialized cases and power supplies• Surround sound audio • HDMI output• TV tuners and cable cards• Specialized hard drive

Page 76: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 76

1.4 Chapter Summary

Page 77: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 77

This chapter introduced the components that comprise a personal computer system and what to consider when choosing upgrade components.

Information technology encompasses the use of computers, network hardware, and software to process, store, transmit, and retrieve information.

A personal computer system consists of hardware components and software applications.

The computer case and power supply must be chosen carefully to support the hardware inside the case and allow for the addition of components.

The internal components of a computer are selected for specific features and functions. All internal components must be compatible with the motherboard.

Use the correct type of ports and cables when connecting devices.

Typical input devices include the keyboard, mouse, touch screen, and digital cameras.

Typical output devices include monitors, printers, and speakers.

Cases, power supplies, the CPU and cooling system, RAM, hard drives, and adapter cards, must be upgraded when devices fail or no longer meet customer needs.

Specialized computers require hardware specific to operate. The type of hardware used in specialized computers is determined by how a customer works and what a customer wants to accomplish.

Chapter SummarySummary

Page 78: Certifications Available After Taking this Course v6.0 8 CompTIA A+ Certification Security: Supporting and securing access to data by properly using authentication, access control

ITE v6.0 78