ITCNA1-12
BLOCK 1 notes
WEEK 1
Objectives:
1. Explain cable types and connectors
2. Install and configure motherboards
3. Explain legacy cable types
Explain Cable Types and Connectors
Personal Computers:
● Peripheral Devices: Input (keyboard, mouse), output (monitor, speakers), external
storage.
● System Case/Chassis: Houses motherboard, CPU, memory modules, adapter
cards, fixed disks, power supply unit.
● Tower Form Factor: Vertical orientation, placed on desk or floor.
Opening a Desktop Case:
● Remove side cover by sliding the panel from its housing.
● Cases might have screws, retaining clips, and anti-tamper mechanisms.
● Front panel access: removable media drives, power switch, LEDs.
● Rear panel access: PSU sockets, I/O ports, adapter card slots.
Peripheral Devices:
● I/O Ports: Connect devices via peripheral cables, designed for specific devices
(e.g., graphics port for monitors).
● External Ports: Positioned at the rear or front, provided on motherboard or
expansion card.
Interfaces, Ports, and Connectors:
● Hardware Port: External connection point for a bus interface.
● Bus: Transfers data to and from devices.
● Connector: Part of the cable inserted into a port, often keyed or reversible to
prevent incorrect insertion.
Binary Data Storage and Transfer Units:
● Bit (b): Binary digit, value 0 or 1.
● Byte (B): 8 bits.
● Transfer Rates: Kilobits (Kb/s), Kilobytes (KB/s), Megabits (Mb/s), Megabytes
(MB/s), Gigabits (Gb/s), Gigabytes (GB/s).
Universal Serial Bus (USB) Cables:
● USB Classes: Human interface, mass storage, printer, audio devices.
● Host Controller: Manages multiple ports, up to 127 connected devices.
USB Standards and Connector Types:
● Type A: Flat rectangle, connects to host/peripheral devices.
● Type B: Square with a beveled top, connects to large devices.
● Type B Mini/Micro: Smaller connectors for early digital cameras, smartphones,
tablets.
● Cable Length and Power: Limits on cable length (3m for Low Speed, 5m for
High Speed), USB can supply power to connected devices.
HDMI and DisplayPort Video Cables:
● HDMI: Widely used, supports video/audio, HDCP, various resolutions.
● DisplayPort: Royalty-free, supports 4K, audio, content protection, similar to
HDMI.
Thunderbolt and Lightning Cables:
● Thunderbolt: Used for display and general peripheral interfaces, compatible with
DisplayPort.
● Lightning: Proprietary to Apple, reversible, used for connecting Apple mobile
devices to PCs.
SATA Hard Drive Cables:
● SATA: Standard for internal storage drives, 7-pin data connector, 15-pin power
connector.
● Molex Power Connectors: Legacy components connect to PSU via 4-pin Molex
connectors.
● External SATA (eSATA): Standard for peripheral drives, not compatible with
internal SATA cables.
Install and Configure Motherboards
Motherboard Functions:
● CPU: Executes instructions.
● System Memory (RAM): Stores running programs, volatile.
● Bus Interfaces: Connect components, synchronized by the system clock.
● Clock Speeds: Measured in MHz or GHz, clock multipliers produce different
timing signals.
● Motherboard Manufacturers: AOpen, ASRock, ASUS, Biostar, EVGA,
Gigabyte, Intel, MSI.
Electrical Safety and ESD:
● Safety: Disconnect PC from power, ensure internal components are drained of
charge.
● Electrostatic Discharge (ESD): Use anti-ESD equipment, handle components
by edges.
Motherboard Connectors:
● CPU Sockets: Distinctive square shape, covered by heat sink and fan.
● System Memory Slots: Use RAM, packaged as DIMMs, fitted to motherboard
slots.
● Storage Connectors: Connect fixed disks (SSD or HDD) inside the PC case.
WEEK 2
Objectives:
1. Install and configure power supplies and cooling
2. Select and install storage devices
3. Install and configure system memory
4. Install and configure CPUs
1. Install and Configure Power Supplies and Cooling
Power Supply Units (PSUs)
● Function: Convert AC to DC voltage, regulate voltage levels, and dissipate heat
through a fan.
● Compatibility: Ensure PSU compatibility with system case and motherboard
(form factor: usually ATX).
● Voltage: Check PSU compatibility with input voltage (dual voltage or fixed
voltage types).
● Wattage Rating: Ensure PSU meets the power requirements of all PC
components (standard: 200-300 W for desktops, 500 W or more for gaming
PCs).
Power Supply Connectors
● Types: P1 connector (motherboard power), Molex, SATA, and 4/6/8-pin
connectors.
● Modular PSUs: Detachable cables to minimize clutter.
● Redundant PSUs: Failover power supplies, often hot-swappable, used in
servers.
Cooling Systems
● Fan Cooling: Essential for dissipating heat from components, especially CPUs.
Includes heat sinks and thermal paste/pads.
● Heat Sinks: Passive cooling devices with fins to increase surface area for heat
dissipation.
● Liquid Cooling: More effective for high-performance PCs. Uses water loops,
water blocks, radiators, and fans to manage heat.
2. Select and Install Storage Devices
Mass Storage Devices
● Types: Magnetic (HDDs), optical (CDs/DVDs/BDs), and solid-state (SSDs).
● Form Factors: 5.25", 3.5", and 2.5" drives installed in respective drive bays.
● Factors for Selection: Reliability, performance (sequential vs. random access),
and use case (e.g., OS, database, media streaming).
Solid-State Drives (SSDs)
● Technology: Uses flash memory, faster than HDDs, less susceptible to
mechanical failure.
● Wear Levelling: Evenly distributes writes to prolong drive life.
Hard Disk Drives (HDDs)
● Technology: Stores data on spinning platters with read/write heads. Sectors and
tracks organize data.
RAID (Redundant Array of Independent Disks)
● Purpose: Provides fault tolerance by using multiple disks. RAID levels (0-6, 10)
define the type of fault tolerance and performance.
● Implementation: Can be software-based (OS) or hardware-based (dedicated
controller).
Removable Storage Drives
● Types: Flash drives, memory cards, optical drives.
● Usage: Portable storage for transferring data between systems, expanding
device storage, or archiving data.
3. Install and Configure System Memory
System RAM
● Function: Supports CPU operations by storing instructions and data temporarily.
● Volatile Memory: Loses data when powered off.
● Capacity: Measured in GB, impacts multitasking and large file processing
capability.
Virtual Memory
● Purpose: Extends RAM capacity by using disk storage. Slower than RAM but
helps manage large workloads.
4. Install and Configure CPUs
CPU Installation
● Compatibility: Ensure CPU matches motherboard socket type.
● Thermal Management: Use thermal paste and proper cooling solutions to
prevent overheating.
Tips for Test Preparation:
● Understand Key Concepts: Focus on the fundamental roles of each component
and their compatibility requirements.
● Diagram Connections: Visualize power supply connectors, cooling systems,
and storage device installations.
● Practice Installation: Review step-by-step procedures for installing power
supplies, storage devices, memory, and CPUs.
● Review RAID Levels: Understand different RAID configurations and their
benefits.
● Cooling Solutions: Compare the effectiveness of fan vs. liquid cooling systems
WEEK 3
Study Notes for Chapter 3: Troubleshooting PC Hardware
Objectives
1. Apply troubleshooting methodology
2. Configure BIOS/UEFI
3. Troubleshoot power and disk issues
4. Troubleshoot system and display issues
Troubleshooting Methodology
Best Practice Methodology
● Develop general troubleshooting skills for new and unexpected situations.
● Understand that problems have causes, symptoms, and consequences.
CompTIA's A+ Troubleshooting Model
1. Identify the problem
○ Gather information from the user.
○ Identify user changes and perform backups before changes.
○ Inquire about environmental or infrastructure changes.
2. Establish a theory of probable cause
○ Conduct external or internal research based on symptoms if necessary.
3. Test the theory to determine the cause
○ Confirm the theory and determine next steps to resolve the problem.
○ If not confirmed, re-establish a new theory or escalate.
4. Establish a plan of action and implement the solution
○ Refer to vendor’s instructions for guidance.
5. Verify full-system functionality and implement preventive measures
6. Document findings, actions, and outcomes
Configure BIOS/UEFI
● BIOS and UEFI
○ Firmware is specialized program code stored in flash memory, closely tied
to hardware device functions.
○ BIOS: Supports 32-bit operation and limited functionality.
○ UEFI: Supports 64-bit CPU operation, full GUI, mouse operation,
networking, and better boot security.
A basic input/output system or BIOS is a program that is fixed and embedded on a
device’s microprocessor and it helps initialize hardware operations and also assists in
managing the data flow to and from the operating system (OS) at the time of bootup.
The objective of the Unified Extensible Firmware Interface (UEFI) is to make the older
PC BIOS's technological difficulties less severe (BasuMallick, 2022). An essential
security element in the modern world of today is BIOS/UEFI password protection. It
secures the security of your system by preventing unauthorized users from changing
your hardware settings and it enhances the pre-boot security due to an additional layer
of protection that it adds to the system before the OS loads. If there is no password
protection, hackers or unauthorized users could change one’s system settings,
compromise its performance or cause permanent damage.
BIOS/UEFI is the firmware of the computer. In order to provide an additional degree of
security, password protection works by requesting a password before allowing access
to BIOS/UEFI settings.
System Settings Configuration
● Access the system firmware setup program via a keystroke during the boot
process (e.g., Esc, Del, F1, F2, F10, F12).
Explore BIOS Settings
● Boot and device options
● USB permissions
● Fan considerations
● Boot passwords and secure boot
● Trusted platform modules and encryption
● Hardware security modules
Troubleshooting Power and Disk Issues
Troubleshoot Power Issues
● Check if LEDs are lit and fans are running.
● Test with other equipment to ensure the power circuit is functional.
● Check PSU cabling and connectors.
● Use a multimeter to check fuse resistance or swap with a known good fuse.
● Disconnect extra devices to test for PSU underpowering.
● Test PSU using a multimeter or power supply tester.
Troubleshoot POST Issues
● Ensure cabling and connections are correct.
● Remove or reseat adapter cards if POST is not running.
● Check for faulty interfaces and devices.
● Verify PSU and CPU functionality.
● Use manufacturer’s resources to interpret beep codes for POST errors.
Troubleshoot Boot Issues
● Ensure correct boot device order.
● Check for power and data cable connections.
● Test boot sector integrity (MBR/GPT).
● Address OS errors and crash screens using error codes and memory dumps.
● Verify drive reliability and performance using SMART and vendor utilities.
Troubleshoot Drive Availability
● Monitor for unusual noises, constant LED activity, or BSODs.
● Use recovery utilities for data loss or corruption.
Troubleshoot RAID Failure
● Replace failed disks promptly, using RAID configuration utilities.
● Address controller failure by installing a new controller or importing disks into
another system.
Troubleshooting System and Display Issues
Component Issues
● Diagnose symptoms like system lockups, intermittent shutdowns, continuous
rebooting, OS blue screen/Kernel panic errors, and application crashes.
● Check for software issues, disk/file corruption, or malware.
● Address thermal problems, power supply issues, or faulty memory, CPU, or
motherboard.
● Use vendor-supplied diagnostic programs for hardware-level errors.
Display Issues
● Verify display connections and functionality.
● Address GPU or driver issues.
WEEK 4
Study Notes for Chapter 4: Comparing Local Network Hardware
Study Objectives:
1. Identify different types of network hardware.
2. Understand the functions of various network devices.
3. Compare the features and capabilities of different network devices.
4. Learn about the selection criteria for network hardware.
1. Types of Network Hardware:
● Network Interface Cards (NICs):
○ Function: Allow computers to connect to a network.
○ Types: Ethernet NICs, Wireless NICs.
○ Features: Speed (10/100/1000 Mbps), Wired/Wireless, Bus Type (PCIe, USB).
● Hubs:
○ Function: Basic device to connect multiple computers in a network.
○ Characteristics: Broadcasts data to all ports, leading to collisions and
inefficiency.
● Switches:
○ Function: Connects devices in a network and uses MAC addresses to forward
data to the correct destination.
○ Features: Layer 2 devices, reduce collisions, more efficient than hubs.
● Routers:
○ Function: Connects multiple networks and routes data packets between them.
○ Features: Layer 3 devices, support for various protocols (IP, ICMP), NAT,
DHCP.
● Access Points (APs):
○ Function: Allow wireless devices to connect to a wired network.
○ Features: Supports Wi-Fi standards (802.11 a/b/g/n/ac), can extend network
coverage.
● Modems:
○ Function: Modulate and demodulate signals for data transmission over phone
lines or cable.
○ Types: DSL modems, Cable modems.
● Firewalls:
○ Function: Protect networks by controlling incoming and outgoing traffic based on
security rules.
○ Types: Hardware firewalls, Software firewalls.
2. Functions of Various Network Devices:
● NICs: Enable devices to communicate over a network.
● Hubs: Simple connection devices; not intelligent.
● Switches: Efficient data forwarding using MAC addresses; reduce network congestion.
● Routers: Route data between different networks; manage traffic.
● APs: Facilitate wireless connectivity.
● Modems: Convert digital signals to analog for transmission.
● Firewalls: Secure networks from unauthorized access.
3. Comparison of Network Devices:
● Hubs vs. Switches:
○ Hubs: Cheaper, less efficient, higher collision rates.
○ Switches: More expensive, highly efficient, reduced collision rates.
● Routers vs. Switches:
○ Routers: Inter-network communication, more complex, support for routing
protocols.
○ Switches: Intra-network communication, simpler, only for forwarding data within
a network.
● Wired vs. Wireless NICs:
○ Wired: Stable connection, higher speeds.
○ Wireless: Convenience, mobility, potential interference issues.
4. Selection Criteria for Network Hardware:
● Performance Requirements:
○ Bandwidth, latency, and speed requirements.
● Network Size:
○ Number of devices to be connected.
● Scalability:
○ Ability to expand the network.
● Budget:
○ Cost considerations.
● Security:
○ Security features needed (e.g., firewalls, encryption).
● Compatibility:
○ Compatibility with existing network infrastructure.
Important Concepts:
● Layer 2 Devices: Operate on the data link layer (e.g., switches).
● Layer 3 Devices: Operate on the network layer (e.g., routers).
● Collision Domain: Network segment where data packets can collide.
● Broadcast Domain: Network segment where a broadcast is forwarded.
Week 5
Study Objectives
1. Compare Internet Connection Types
2. Use Basic TCP/IP Concepts
3. Compare Protocols and Ports
4. Compare Network Configuration Concepts
Internet Connection Types
Internet Structure:
● The Internet is a global network of networks, connected by high-bandwidth fiber optic
links at Internet Exchange Points (IXPs).
● Internet Service Providers (ISPs) establish high-speed links between their networks
using transit and peering arrangements.
Types of Internet Connections:
1. Digital Subscriber Line (DSL):
○ Uses the public switched telephone network (PSTN).
○ Variants include Asymmetric DSL (ADSL) and Symmetric DSL (SDSL).
○ ADSL offers higher download speeds than upload speeds.
○ Uses a DSL modem connected to telephone cabling.
2. Cable Modems:
○ Part of Cable Access TV (CATV) services.
○ Combines fiber optic core with copper coaxial cables.
○ Uses DOCSIS standards to provide high-speed Internet.
○ Cable modem connects to a router via an RJ45 port.
3. Fiber to the Curb (FTTC) and Fiber to the Premises (FTTP):
○ FTTC: Extends fiber optic links to a curbside cabinet, with copper wiring to the
premises.
○ FTTP: Runs fiber optic cable directly to the premises.
○ Uses Optical Network Terminals (ONTs) to convert signals.
4. Fixed Wireless Internet:
○ Uses radio signals to provide internet access.
○ Ideal for rural or hard-to-wire areas.
○ Satellite Internet uses geostationary satellites but has high latency.
5. Cellular Radio Internet:
○ Utilizes cellular networks (3G, 4G, 5G) for Internet access.
○ Suitable for mobile devices and some IoT devices.
Routers and Firewalls:
● Routers connect local networks to the Internet using IP addresses.
● Firewalls control traffic between networks using rules (Access Control Lists - ACLs).
Basic TCP/IP Concepts
TCP/IP Suite:
● A set of protocols allowing networked hosts to communicate.
● Divided into layers, with lower layers encapsulating data from higher layers.
IPv4 Addressing:
● IPv4 addresses are 32-bit numbers, often represented in dotted decimal notation (e.g.,
192.168.0.1).
● Consists of a network ID and a host ID.
● Subnet masks distinguish between the network and host portions of an IP address
(e.g., /24 or 255.255.255.0).
IPv4 Forwarding:
● Hosts use subnet masks to determine if a destination IP is on the same network.
● Packets are forwarded to a default gateway if the destination is on a different network.
Public and Private Addressing:
● Public IP addresses are unique and provided by ISPs.
● Private IP addresses (e.g., 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16) are used within
private networks.
● Network Address Translation (NAT) and proxy servers allow private addresses to access
the Internet.
IPv4 Host Configuration:
● Hosts need an IP address and subnet mask to communicate.
● Additional configurations (e.g., default gateway, DNS) are required for full Internet
access.
Protocols and Ports
Common Protocols and Ports:
● Protocols define rules for data communication.
● Each protocol operates on specific ports (e.g., HTTP on port 80, HTTPS on port 443,
FTP on ports 20 and 21).
● Understanding protocol and port assignments is crucial for configuring and securing
networks.
Network Configuration Concepts
Network Segmentation:
● Dividing a network into smaller segments (subnets) improves performance and security.
● Routers and firewalls are used to manage traffic between segments.
IP Address Assignment:
● Static vs. dynamic IP addressing.
● Dynamic Host Configuration Protocol (DHCP) automates IP address assignment.
DNS and Name Resolution:
● Domain Name System (DNS) translates domain names to IP addresses.
● Essential for accessing websites and online services.
WEEK 6
Comparing Network Types
1. Local Area Network (LAN):
○ Group of computers connected by cabling and network switches at a single
location.
○ Can span a single floor, building, or multiple nearby buildings.
○ Owned and managed by the organization.
○ Can include both wired (Ethernet) and wireless (Wi-Fi) segments.
2. Wide Area Network (WAN):
○ Spans multiple geographic locations.
○ Example: The Internet.
○ Uses cabling and equipment leased from ISPs to connect LAN sites.
3. Metropolitan Area Network (MAN):
○ Covers an area equivalent to a city.
○ Larger than a LAN but smaller than a WAN.
4. Personal Area Network (PAN):
○ Connects devices over a short range (few meters).
○ Used for data sharing between personal devices (e.g., PC, mobile devices,
wearables).
5. Small Office Home Office (SOHO):
○ Business-oriented network possibly using centralized servers and networking
appliances.
○ Often uses a single networking appliance for LAN and Internet connectivity.
6. Datacenters and Storage Area Networks (SANs):
○ Datacenters: Dedicated sites for server resources with high availability.
○ SANs: Isolated networks for storage devices accessed by application servers.
Comparing Network Hardware
1. Network Interface Cards (NICs):
○ Establish Ethernet communications using copper or fiber optic cables.
○ Provide physical connection through transceiver ports.
○ Use MAC addresses for framing and addressing data.
2. Patch Panels:
○ Connect computers to wall ports and network switches.
○ Use IDC punch-down blocks and RJ45 ports.
○ Simplify changes in network connections.
3. Hubs:
○ Connect multiple computers in a network by repeating incoming transmissions.
○ Create a collision domain where all devices share the same bandwidth.
○ Operate in half-duplex mode.
4. Switches:
○ Forward data frames to specific ports based on MAC addresses.
○ Eliminate collision domains by providing full-duplex connections.
○ Unmanaged switches work out of the box; managed switches offer advanced
configurations.
5. Power over Ethernet (PoE):
○ Supplies power to devices (e.g., VoIP phones, cameras) over data cables.
○ More efficient than using individual AC adapters.
○ Allows network management software to control devices.
Comparing Network Cabling Types
1. Ethernet Cables:
○ Recognize suitable cabling options for different scenarios.
○ Support reliable network installations and testing.
Week 7:
Study Objectives:
1. Summarize client-side virtualization.
2. Summarize cloud concepts.
Client-side Virtualization:
● Virtualization Definition:
○ Virtualization separates multiple software environments from each other
and from the physical hardware.
○ Provides flexibility for deploying OS versions for testing and training.
○ Increases resource utilization and allows for centralized administration.
● Hypervisors:
○ Types of Hypervisors:
■ Type 1 (Bare Metal): Installed directly onto the hardware, e.g.,
VMware ESXi, Microsoft Hyper-V.
■ Type 2 (Hosted): Installed on a host OS, e.g., VMware
Workstation, Oracle VirtualBox.
○ Functions:
■ Emulate hardware resources and mediate access to avoid conflicts
between guest OSs.
■ Support different types of guest OSs.
● Uses for Virtualization:
○ Testing and Development:
■ Create isolated environments (sandboxes) for analysis.
○ Client-Side Virtualization:
■ Used on desktops/workstations where users interact directly with
the virtualization host.
● Container Virtualization:
○ Enforces resource separation at the OS level.
○ Known products: Docker.
○ Used for corporate workspaces on mobile devices.
● Resource Requirements:
○ CPU: Requires virtualization support (Intel VT-x or AMD-V) and features
like SLAT for improved performance.
○ System Memory: Needs sufficient memory for the host OS and each
guest OS (e.g., 4 GB RAM for a host and one Windows 10 guest).
○ Mass Storage: Each guest OS takes significant disk space (e.g., 20 GB
for Windows).
○ Networking: Virtual network environments for VM communication.
● Security Requirements:
○ Evaluate guest OS, host, and hypervisor security.
Cloud Concepts:
● Cloud Characteristics:
○ Differentiates cloud provisioning from on-premises or hosted client/server
networks.
● Common Cloud Service Models:
○ Infrastructure as a Service (IaaS): Provisioning IT resources like servers
and storage quickly (e.g., Amazon EC2, Microsoft Azure VMs).
○ Software as a Service (SaaS): Accessing software hosted on supplier's
servers on a pay-as-you-go basis (e.g., Microsoft Office 365, Google
Workspace).
○ Platform as a Service (PaaS): Deploying servers and storage
infrastructure along with a multi-tier web application/database platform
(e.g., Oracle Database, Microsoft Azure SQL Database).
● Hybrid Cloud:
○ Combines public, private, and community cloud solutions for specific use
cases.
● Desktop Virtualization:
○ Using VMs to provision corporate desktops, often replacing desktop
computers with thin clients that connect to VMs stored on company
servers or cloud infrastructure.
Key Points:
● Virtualization allows multiple OSs to run simultaneously on one computer.
● Hypervisors are essential for creating and managing VMs.
● Cloud services offer flexibility, scalability, and pay-per-use billing.
● Cloud service models (IaaS, SaaS, PaaS) cater to different IT resource needs.
Week 8:
Chapter 7: Virtualisation and Cloud Concepts
Objectives:
1. Summarize client-side virtualization.
2. Summarize cloud concepts.
Key Points:
Client-side Virtualization:
1. Virtualization:
○ Separates multiple software environments (OS, drivers, applications) from
each other and the physical hardware.
○ Benefits include flexibility in deploying OS versions, increased resource
utilization, and centralized management.
2. Hypervisors:
○ Type 1 (Bare Metal): Installed directly onto the hardware (e.g., VMware
ESXi, Microsoft Hyper-V).
○ Type 2 (Host-Based): Installed on a host OS (e.g., VMware Workstation,
Oracle Virtual Box).
○ Emulates hardware resources to avoid conflicts between guest OSs.
3. Uses for Virtualization:
○ Testing and development environments (e.g., sandboxing).
○ Running multiple OSs simultaneously on one computer.
○ Container Virtualization (e.g., Docker).
4. Resource Requirements:
○ CPU: Support for virtualization extensions (Intel VT-x, AMD-V, SLAT).
○ Memory: Sufficient RAM for both the host and guest OSs.
○ Storage: Adequate disk space for VM images and snapshots.
○ Networking: Virtual network environments for communication between
VMs.
5. Security Considerations:
○ Security requirements for guest OS, host, and hypervisor.
Cloud Concepts:
1. Cloud Computing:
○ Provides IT infrastructure over the Internet with pay-per-use billing.
○ Includes services such as IaaS, PaaS, and SaaS.
2. Software-Defined Networking (SDN):
○ Divides network functions into application, control, and infrastructure
layers.
○ Uses APIs to automate network provisioning and deprovisioning.
Chapter 8: Mobile Devices
Objectives:
1. Set up mobile devices and peripherals.
2. Configure mobile device apps.
3. Install and configure laptop hardware.
4. Troubleshoot mobile device issues.
Key Points:
Mobile Device Setup:
1. Display Types:
○ LCD: Common in mobile devices, includes TFT, TN, IPS, and VA
technologies.
○ Touchscreen Integration: Combines display and input functionalities.
2. Configuring Apps and Hardware:
○ Setting up device settings and app configurations.
○ Installing and configuring laptop components.
Troubleshooting Mobile Devices:
1. Connectivity Issues:
○ Check for airplane mode or disabled radios.
○ Ensure antenna connections are secure.
○ Replace batteries for wireless peripherals if needed.
2. Malware Issues:
○ Identify signs of malware (e.g., unresponsive apps, excessive power drain,
unexpected data usage).
○ Monitor data usage and check app legitimacy.
WEEK 9:
1. Mobile Display Types:
● LCD (Liquid Crystal Display): Requires illumination, typically provided by LEDs.
● OLED (Organic LED): Does not require a backlight and offers better contrast
ratios, thinner panels, and lower power consumption.
2. Display Components:
● Digitizers: Convert analog touch input to digital instructions; modern devices use
capacitive digitizers for multitouch support.
● Rotating and Removable Screens: Enabled by accelerometers and gyroscopes
for portrait and landscape orientation.
3. Mobile Device Accessories:
● Touchpads/Trackpads: Used for pointer control, support multitouch.
● Touch Pens: Provide precise control for handwriting and drawing.
● Microphone, Speakers, Camera: Integrated for audio/video input and output.
4. Networking:
● Wi-Fi: Enabling/disabling Wi-Fi, Airplane Mode, antenna placement.
● Cellular Data: Connecting via cellular radio, data rates, and charges, especially
for international roaming.
Chapter 9: Supporting Print Devices
1. Printer Drivers and Page Description Languages (PDLs):
● PDLs: Create raster files from print commands, supporting features like scalable
fonts and vector graphics.
● Common PDLs include Adobe PostScript, HP Printer Control Language (PCL),
and Microsoft's XML Paper Specification (XPS).
2. Printer Security:
● User Authentication: Prevents unauthorized use of network printers by
configuring user authentication on print shares.
3. Printer Properties:
● Printer Configurations: Setting up printing configurations, preferences, and
sharing options.
4. Network Printing:
● Driver Installation: Suitable drivers required for different OS clients; Plug and
Play (PnP) typically handles this automatically.
Week 10
Configuring Windows: Objectives
1. Configure Windows user settings.
2. Configure Windows system settings.
Configure Windows User Settings
Windows Interfaces
● Operating System (OS): Provides the interface between hardware, application
programs, and the user. Handles system functions such as interaction with hardware
and input/output.
● Graphical User Interface (GUI): Makes computers easier to use by non-technical
users. Windows utilizes a GUI.
Windows Settings and Control Panel
● Windows Settings App and Control Panel: Main interfaces for administering
Windows, configuring options, user accounts, and managing devices and software.
● Registry: Holds all Windows configuration data.
Accounts Settings
● User Account: Controls access to the computer, protected by authentication.
● Profile: Contains default folders for personal documents, pictures, videos, and music.
● Administrator Account: Has privileges to change any aspect of the system
configuration.
● Standard Users: Have privileges only on their profile.
Privacy Settings
● Privacy Settings: Govern what usage data Windows collects and device functions for
specific apps.
● Data Collection and App Permissions: Toggles determine what data collection and
app permissions are allowed.
File Explorer
● File Management: Performed using File Explorer which allows opening, copying,
moving, renaming, viewing, and deleting files and folders.
● System Objects: Include User Account, OneDrive, This PC, Network, and Recycle Bin.
Drives and Folders
● Drives: Represent physical disks or partitions, shared network folders, or removable
discs.
● Root Directory: Represented by the backslash ( \ ).
Configure Windows System Settings
Administrative Tools
● Administrative Tools in Control Panel: Provide interfaces for managing advanced
configuration settings.
● Microsoft Management Console (MMC): Contains snap-ins for modifying advanced
settings for subsystems.
Important Consoles
● Computer Management (compmgmt.msc): Schedules tasks and configures local
users, groups, disks, services, and devices.
● Defragment and Optimize Drives (dfrgui.exe): Maintains disk performance by
optimizing file storage patterns.
● Disk Cleanup (cleanmgr.exe): Regains disk capacity by deleting unwanted files.
● Event Viewer (eventvwr.msc): Reviews system, security, and application logs.
● Local Security Policy (secpol.msc): Views and edits security settings.
● Resource Monitor (resmon.exe) and Performance Monitoring (perfmon.msc): View
and log performance statistics.
● Registry Editor (regedit.exe): Manually edits the Windows configuration database.
● Services Console (services.msc): Starts, stops, and pauses background processes.
● Task Scheduler (taskschd.msc): Runs software and scripts according to calendar or
event triggers.
Management Shortcuts
● Shortcut Methods: Pressing START+X or right-clicking the Start button shows a
shortcut menu with links to management utilities. The Instant Search box on the Start
menu can execute programs and configuration options.
● Run Dialog (START+R): Used to execute a program with switches that modify its
operation.
● Shortcut Menus: Contain links to configuration tools, such as System settings and
Computer Management console.
Additional Context for Each Topic
● Windows 10 and Windows 11 Desktops: It's important to explore user configuration
settings for both.
● Network Settings: Managing network status, IP address properties, adapter devices,
and network profiles.
● Windows Defender Firewall: Determines which processes, protocols, and hosts are
allowed to communicate with the local computer.
● Internet Options: Configuration settings for Microsoft's Internet Explorer, important for
legacy internal websites.
WEEK 11
Chapter 11: Managing Windows
Use Performance and Troubleshooting Tools
● Task Manager (taskmgr.exe): Monitors key system resources and processes.
Accessible via CTRL+SHIFT+ESC, right-clicking the taskbar, or CTRL+ALT+DEL.
○ Processes Tab: View and manage running processes and their resource usage.
○ Performance Tab: Detailed information about CPU, memory, disk, network, and
GPU usage.
○ Users Tab: View and manage logged-in users and their resource usage.
○ Startup Tab: Manage programs that run at startup and their impact on boot
times.
○ Services Tab: Monitor and manage background services.
Performance Monitoring
● CPU and GPU Monitoring: Shows core and logical processor usage, system uptime,
and process/thread/handle counts. GPU page reports graphics memory usage.
● Memory Monitoring: Reports memory slot usage, speed, and detailed usage statistics
(in use, committed, cached, paged pool, non-paged pool).
● Disk Monitoring: Reports type and capacity of disks, along with active time, response
time, and read/write speeds.
● Network Monitoring: Reports send and receive throughput, IP address, MAC address,
and wireless connection details (SSID, 802.11 standard, signal strength).
Disk Maintenance Tools
● Disk Cleanup (cleanmgr.exe): Frees up disk space by deleting unnecessary files like
those in the Recycle Bin, temporary files, and system caches.
● Disk Optimizer: Maintains disk performance by optimizing file storage patterns,
particularly important for SSDs with TRIM operations.
Management Consoles
● Local Users and Groups Console (lusrmgr.msc): Advanced interface for managing
user accounts and security groups.
● Certificate Manager (certmgr.msc): Manages digital certificates used for
authentication, encryption, and digital signatures.