Information Technology Course - Course Careers
Information Technology Course - Course Careers
1. Takes AC (110v) power from wall and transforms it in DC currents; filtered
2. Can be modular
NIC
1. network interface card
2. Where ethernet cable connects or wifi adapters
3. Great at specialized data
GPU
1. Has cpu and memory on it
2. Mini computer
Input vs output
1. Input = signals received form system
2. Output = signals sent from system
USB
1. Universal serial bus
2. C is best
3. B common in office
4. A common
Display connectors
1. Type C
2. Display port
3. HDMI
4. DVI (Old)
OS
1. File systems
a. windows
i. NTFS (NEW)
ii. FAT32 (OLD)
b. Apple
i. APFS
ii. MAC OS Extended
iii. EXFAT
c. Linux
i. Ext4
ii. Ext3 (old)
Networking
- Define
- A PC system that connects many PCs to share data and resources
- Why do they exist?
- Transfer data at light speeds
- Allows us to transfer data
- Routers
- Sends traffic between different networks as opposed to sending traffic between
computers on the same network.
- Computer with software that routes traffic
- Switches
- Sends traffic to different hosts on the same network as opposed to sending traffic
between different NETWORKS
- WAP (wireless access points)
- Wifi router
-
Subnet mask
1. Ip address have two parts
a. Network ID and Host ID
2. Subnet mask identifies which portion of the IP address is the network ID, the remainder
is the Host ID
3. To separate network vs host is to line them up vis binary code and whenever a #1
crosses with the IP address from the subnet, cross it out. What’s left is the host ID
4. Example 2: numbers doesn't always have to be 255 max
- unique Host All PCS on the same subnet (network) will share the
same network ID but each PC will have their ownID
- Different network and host ID; traffic will go through router to
communicate with other PCs
- CIDR Notation
- Short way of representing any IP with its subnet mask
- Ip address number/subnet number
- Subnet number = how many bits inside the subnet number
- Example = 24 bits or 1’s in the subnet number
-
-
- Loopback addresses
- All PCs use address space 127.0.0.0/8 to identify themself
- Use 127.0.0.1
- Allows a PC to confirm that it can use TCP/IP and allows for different
programs running on the same machine to communicate with each
other using IP
- Checks of network stack/hardware is working = a test
-
- Private IP addresses
- Assigned by IANA
- Memorize these
-
- On personal devices. IPv4 Address
- Ipconfig
- Public address space
- The rest of the IP rangers are public
- Assigned to devices/servers/endpoints on the internet
- What’s my IP
Mac Address
- Identifier: unique hardware ID on the network interface cards (NICS)
- 48 bit address; 6 pairs of characters
- Manufactures assign 1st 24 bit of MAC address; rest random
- Called Organizationally Unique Identifier, OUI = manufacture
-
- Layer 2 communication (data Link) that allows communication between devices
on the same local network.
- Static = MAC address never changes vs a IP address (dynamic)
The OSI model (framework on how communication with PCs happens over a network)
- The OSI Model is like a set of rules that helps computers communicate with each other
over a network.
- Imagine sending a letter to a friend far away. You have to write the letter, put it in
an envelope, address it, and then the mailman delivers it house by house until it
reaches your friend.
- Similarly, the OSI Model has seven steps (or layers) to ensure data from your
computer reaches another computer. These layers ensure data is properly
packaged, sent, and understood, like putting your letter through the right process
to reach your friend safely.
Layers
7. Application = layer 7
- This is like writing or reading the letter itself. It's the programs and
apps you use to send and receive network services, like web
browsers or email.
6. Presentation = layer 6
- This layer is like a translator. It converts messages from any
language into one the receiving computer can understand,
ensuring everyone gets the message clearly.
5. Session = layer 5
- Helps manage and maintain individual connections between a
web browser's multiple tabs and their respective web servers,
ensuring reliable and efficient communication during data
exchange.
4. Transport = layer 4
- TCP (all data or UDP (some data)Ports assigned. Picture a
special bubble wrap for your letter. It ensures your message is
split correctly, like breaking a story into chapters, and it helps
make sure every part is received and understood.
3. Network = layer 3
- This layer is like the mail sorter at the post office. It decides the
best route for your letter to take using addresses like IP
addresses.
2. Data Link = layer 2
- Like an address on an envelope, it helps deliver your letter to the
right apartment in a building. It uses MAC addresses to find
devices on the same network.
1. Physical = layer 1
- Medium of communication = ie a fiber cable
Cyber security
- Protection from bad stuff happening on their PCs or data
- CIA Triad
- Confieditaly
- Prevent wrong people seeing your sensitive information
- Integrity
- Maintaining accuracy of data
- Availability
- Making sure systems are available and accessible; redundancy
Cloud computing
- Delivery of computing services over the internet.
- You can rent servers, power, data databases from big companies via the cloud. Cost
effective for small businesses.
- Netflix for example is hosted on amazon cloud services
4. Nslookup
a. Used to figure out what a machine’s IP address is if you know the name, or what
the name is if you know the IP address. (many reasons for this)
i. Ipconfig (ifconfig on mac/linux)
ii. Ipconfig / all
1. Shows even more adapter information including DNS info
iii. Ipconfig / displaydns
1. Shows DNS cache (lists of names to IP mapping that your PC is
keeping track of). Stored;
a. User cant connect to a website, you flush the DNS
Azure
1. The cloud
a. Just a platform that will let you rent space in order to stor or process your own
data
i. Examples
1. Gmail
2. Docs
3. Drive
4. Icloud
5. Dropbox
b. Paid cloud providers
i. Offers more ways to store and process your data
1. Examples
a. Azure
b. Amazon webs service (AWS)
c. Google Cloud Provider (GCP)
d. Oracle Cloud Infrastructure
e. IDM Cloud
c. What can you do on the cloud
i. Pretty much anything you can do on your PC
ii. There's a lot of overlap between different providers
1. Not everybody knows how to use all the different services in these
cloud services. Even the people who work there.
a. Example: azure has more than 600 services
d. How does it work
i. It is pretty much resources on demand
1. Example
a. I need a virtual machine and a database
b. Azure says yes and charges for that service
c. And you can now use a VM
Azure hands on!
1. Create account
2. Tenant gets created = org
3. Can make a subscription within the tenant
a. Attached different billing cards for various uses
4. Within the subscription you can gace resource groups
5. In the resource groups you can use processes