42,99 €
An easy-to-read and authoritative new study guide for the updated CompTIA Tech+ certification exam
In the newly updated third edition of the CompTIA Tech+ Study Guide: Exam FC0-U71, veteran IT professional and tech trainer Quentin Docter delivers an up-to-date resource for effectively and efficiently preparing for the popular new introductory Tech+ certification from CompTIA. This Sybex Study Guide is the gold-standard exam prep roadmap, offering complete coverage of every exam domain, including IT concepts and terminology, infrastructure, applications and software development, data and database fundamentals, security, and more.
Perfect for practicing and aspiring entry-level IT pros as well as those preparing to take the CompTIA Tech+ test, this book includes complementary access to online learning resources, two practice exams, flashcards, and practice questions with answer explanations. You'll also find:
The new, entry-level CompTIA Tech+ certification has been created to get you ready for further certification paths, like the A+, Security+, and Network+ credentials, and prepare you for an exciting career in tech. Whether you're an IT beginner or you've already begun your tech journey and are looking for a refresher on foundational concepts, CompTIA Tech+ Study Guide: Exam FC0-U71 is the book you've been waiting for.
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 1159
Veröffentlichungsjahr: 2024
Cover
Table of Contents
Title Page
Copyright
Dedication
Acknowledgments
About the Author
About the Technical Editor
Table of Exercises
Introduction
What Is the CompTIA Tech+ Certification?
Exam Objectives
How to Contact the Publisher
Assessment Test
Answers to the Assessment Test
Chapter 1: Core Hardware Components
Introducing Internal Components
Exploring Motherboards, Processors, and Memory
Exploring Storage and Expansion Devices
Exploring Power and Cooling
Summary
Exam Essentials
Chapter 1 Lab
Review Questions
Chapter 2: Peripherals and Connectors
Installing and Configuring Audio and Video Devices
Understanding External Storage and Communications Connectors
Understanding Input, Output, and Power Devices
Understanding Installation Basics
Summary
Exam Essentials
Chapter 2 Lab
Review Questions
Chapter 3: Computing Devices and the Internet of Things
Exploring Larger Computing Devices
Understanding the Internet of Things
Summary
Exam Essentials
Chapter 3 Lab
Review Questions
Chapter 4: Operating Systems
Operating System Fundamentals
Managing an Operating System
Summary
Exam Essentials
Chapter 4 Lab
Review Questions
Chapter 5: Software Applications
Understanding Application Installation and Management
Exploring Common Application Types
Using Web Browsers
Summary
Exam Essentials
Chapter 5 Lab
Review Questions
Chapter 6: Software Development
Exploring Programming Languages
Understanding Programming Concepts and Techniques
Summary
Exam Essentials
Review Questions
Chapter 7: Database Fundamentals
Understanding Databases
Summary
Exam Essentials
Chapter 7 Lab
Review Questions
Chapter 8: Networking Concepts and Technologies
Exploring Connection Types and Features
Understanding Network Connectivity Essentials
Setting Up a Small Wireless Network
Summary
Exam Essentials
Chapter 8 Lab
Review Questions
Chapter 9: Cloud Computing and Artificial Intelligence
Understanding Virtualization and Cloud Computing
Exploring Artificial Intelligence
Summary
Exam Essentials
Chapter 9 Lab
Review Questions
Chapter 10: Security Concepts and Threats
Understanding Hackers and Motives
Understanding Security Threats
Understanding Access Control
Summary
Exam Essentials
Chapter 10 Lab
Review Questions
Chapter 11: Security Best Practices
Understanding Security Best Practices
Summary
Exam Essentials
Chapter 11 Lab
Review Questions
Chapter 12: Data Continuity and Computer Support
Understanding Data Continuity
Exploring Computer Support Concepts
Summary
Exam Essentials
Chapter 12 Lab
Review Questions
Appendix A: Answers to Written Labs
Chapter 1 Lab Answers
Chapter 2 Lab Answers
Chapter 3 Lab Answers
Chapter 4 Lab Answers
Chapter 5 Lab Answers
Chapter 6 Lab Answers
Chapter 7 Lab Answers
Chapter 8 Lab Answers
Chapter 9 Lab Answers
Chapter 10 Lab Answers
Chapter 11 Lab Answers
Chapter 12 Lab Answers
Appendix B: Answers to Review Questions
Chapter 1: Core Hardware Components
Chapter 2: Peripherals and Connectors
Chapter 3: Computing Devices and the Internet of Things
Chapter 4: Operating Systems
Chapter 5: Software Applications
Chapter 6: Software Development
Chapter 7: Database Fundamentals
Chapter 8: Networking Concepts and Technologies
Chapter 9: Cloud Computing and Artificial Intelligence
Chapter 10: Security Concepts and Threats
Chapter 11: Security Best Practices
Chapter 12: Data Continuity and Computer Support
Index
End User License Agreement
Chapter 1
TABLE 1.1 Motherboard form factors
TABLE 1.2 Bit and byte conversions
TABLE 1.3 Optical discs and their capacities
TABLE 1.4 Shopping comparison
Chapter 2
TABLE 2.1 Smart TV specifications
TABLE 2.2 USB specifications
TABLE 2.3 Thunderbolt standards
TABLE 2.4 Summary of connectors
Chapter 3
TABLE 3.1 Laptop hardware replacement considerations
TABLE 3.2 Meta Quest 3 hardware requirements
TABLE 3.3 Gaming console specifications
Chapter 4
TABLE 4.1 Selected macOS releases
TABLE 4.2 macOS versions
TABLE 4.3 Selected Windows versions
TABLE 4.4 iOS versions and features
TABLE 4.5 Selected versions of Android OS
TABLE 4.6 Common file systems
Chapter 5
TABLE 5.1 Common executable file extensions
TABLE 5.2 Word processing file extensions
TABLE 5.3 File compression formats
Chapter 6
TABLE 6.1 Converting binary to decimal
TABLE 6.2 Sample ASCII codes
TABLE 6.3 Interpreter vs. compiler
TABLE 6.4 Common data types
Chapter 7
TABLE 7.1 Primary and foreign keys
TABLE 7.2 Predefined database roles
Chapter 8
TABLE 8.1 Common Internet connection types and speeds
TABLE 8.2 Cable types and characteristics
TABLE 8.3 802.11 standards
TABLE 8.4 Common port numbers
TABLE 8.5 Cloud provider personal plans
Chapter 9
TABLE 9.1 Cloud computing pros and cons
TABLE 9.2 Availability downtime
Chapter 1
FIGURE 1.1 A motherboard
FIGURE 1.2 Northbridge and Southbridge
FIGURE 1.3 CPU sockets
FIGURE 1.4 DIMM slots
FIGURE 1.5 SODIMM slots
FIGURE 1.6 PCI expansion slots
FIGURE 1.7 An AGP slot compared to a PCI slot
FIGURE 1.8 PCIe expansion slots
FIGURE 1.9 IDE hard drive connectors
FIGURE 1.10 SATA hard drive connectors
FIGURE 1.11 A 24-pin ATX power connector
FIGURE 1.12 A BIOS chip on a motherboard
FIGURE 1.13 BIOS settings
FIGURE 1.14 Motherboard back panel
FIGURE 1.15 Intel Core i7 processor
FIGURE 1.16 Calculator in Programmer view
FIGURE 1.17 About your PC
FIGURE 1.18 Virtual memory
FIGURE 1.19 Memory module form factors
FIGURE 1.20 Inside a hard drive
FIGURE 1.21 PATA/IDE and SATA hard drives
FIGURE 1.22 PATA and SATA data cables
FIGURE 1.23 PCIe NVMe SSD
FIGURE 1.24 M.2 NVMe SSD
FIGURE 1.25 M.2 connector on motherboard
FIGURE 1.26 M.2 slot protective cover
FIGURE 1.27 Two USB flash drives
FIGURE 1.28 Installed disk drives
FIGURE 1.29 Hard disk properties
FIGURE 1.30 Disk drives
FIGURE 1.31 A DVD-ROM
FIGURE 1.32 An EVGA GeForce video card
FIGURE 1.33 A legacy sound card
FIGURE 1.34 A wireless desktop NIC
FIGURE 1.35 A modem
FIGURE 1.36 A desktop power supply
FIGURE 1.37 Power supply in the case
FIGURE 1.38 A 20-pin ATX power connector
FIGURE 1.39 Peripheral power connectors
FIGURE 1.40 Laptop power supply
FIGURE 1.41 System unit airflow
FIGURE 1.42 CPU heat sink
Chapter 2
FIGURE 2.1 Audio connectors
FIGURE 2.2 Sound card with game port
FIGURE 2.3 A USB headset
FIGURE 2.4 VGA connectors
FIGURE 2.5 DVI connector
FIGURE 2.6 USB-C (top) and USB-A (bottom) connectors
FIGURE 2.7 HDMI cable and connector
FIGURE 2.8 DisplayPort port and connector
FIGURE 2.9 Two Thunderbolt ports
FIGURE 2.10 Video adjustment keys including F4 (LCD toggle), F7 (dim), and F...
FIGURE 2.11 Function (Fn) key
FIGURE 2.12 Laptop video toggle
FIGURE 2.13 Display Settings
FIGURE 2.14 Multiple displays
FIGURE 2.15 Multiple display options
FIGURE 2.16 Scale & Layout
FIGURE 2.17 A flash drive
FIGURE 2.18 SD memory cards
FIGURE 2.19 SD memory card slot and USB port
FIGURE 2.20 External hard drive
FIGURE 2.21 Netgear NAS device
FIGURE 2.22 mini DisplayPort on a MacBook Pro
FIGURE 2.23 Lightning cable
FIGURE 2.24 RJ11 and RJ45 connectors
FIGURE 2.25 SFP connector
FIGURE 2.26 RJ45 crimper
FIGURE 2.27 A TRENDnet cable tester
FIGURE 2.28 RJ11 and RJ45 ports
FIGURE 2.29 Wireless USB receiver
FIGURE 2.30 Keyboard and mouse PS/2 ports
FIGURE 2.31 A natural keyboard
FIGURE 2.32 Language & Region Settings
FIGURE 2.33 Language & Region options
FIGURE 2.34 Wireless optical mouse
FIGURE 2.35 Touchpad
FIGURE 2.36 Touchpad settings
FIGURE 2.37 Mouse settings
FIGURE 2.38 Mouse Properties window
FIGURE 2.39 Pointer Options tab
FIGURE 2.40 An uninterruptible power supply
FIGURE 2.41 The back of an uninterruptible power supply
FIGURE 2.42 Inkjet printer cartridges
FIGURE 2.43 Laser printer toner cartridges in a printer
FIGURE 2.44 Laser printer with lid ajar to reveal scanning glass
FIGURE 2.45 HP Scan utility
FIGURE 2.46 Back-panel connectors, including serial and parallel ports
FIGURE 2.47 Parallel cable
FIGURE 2.48 Printers & Scanners
FIGURE 2.49 Managing a printer
FIGURE 2.50 Printer properties
FIGURE 2.51 Printing preferences
FIGURE 2.52 Adding a new printer
FIGURE 2.53 Entering the IP address of the printer
FIGURE 2.54 HP ePrint configuration
Chapter 3
FIGURE 3.1 Laptop AC power adapter
FIGURE 3.2 Polarity symbols
FIGURE 3.3 A docking station
FIGURE 3.4 Cable lock
FIGURE 3.5 Cable lock insertion point
FIGURE 3.6 Audio adjustment keys F7 (quieter), F8 (louder), and F9 (micropho...
FIGURE 3.7 Point stick and touchpad on a laptop
FIGURE 3.8 Home screens for (a) iOS 17 and (b) Android 13 home screens
FIGURE 3.9 Portrait mode
FIGURE 3.10 Landscape mode
FIGURE 3.11 iOS security lock
FIGURE 3.12 iPhone Settings
FIGURE 3.13 Face ID & Passcode
FIGURE 3.14 Android Settings
FIGURE 3.15 Screen lock type
FIGURE 3.16 Identification numbers in (a) iOS and (b) Android
FIGURE 3.17 SIM tray and chip
FIGURE 3.18 iOS Settings
FIGURE 3.19 Wi-Fi is off.
FIGURE 3.20 Wi-Fi is on, with available networks.
FIGURE 3.21 Android connections
FIGURE 3.22 Wi-Fi networks
FIGURE 3.23 Wi-Fi network configuration
FIGURE 3.24 Airplane mode on iOS 17
FIGURE 3.25 iPhone Control Center
FIGURE 3.26 Android quick settings
FIGURE 3.27 Apple App Store
FIGURE 3.28 Google Play Store
FIGURE 3.29 iOS 17 cellular data options
FIGURE 3.30 Android Mobile Networks
FIGURE 3.31 Android Data Usage
FIGURE 3.32 iCloud configuration
FIGURE 3.33 iTunes sync
FIGURE 3.34 Accounts And Backup on Android
FIGURE 3.35 Google Drive backup options
FIGURE 3.36 A basic Kindle e-reader
FIGURE 3.37 Pokémon Go
FIGURE 3.38 Meta Quest 3
FIGURE 3.39 Pong
FIGURE 3.40 Amazon Echo Hub home assistant
FIGURE 3.41 Roku Ultra and Amazon Fire
FIGURE 3.42 ecobee smart thermostat
FIGURE 3.43 Café smart coffee maker
Chapter 4
FIGURE 4.1 The operating system interacts with hardware.
FIGURE 4.2 ENIAC
FIGURE 4.3 The first PC graphical user interface
FIGURE 4.4 Windows Performance Monitor
FIGURE 4.5 Lubuntu desktop
FIGURE 4.6 macOS Sonoma
FIGURE 4.7 Windows 3.11 Program Manager
FIGURE 4.8 Windows 95 desktop
FIGURE 4.9 Windows 8.1 Start screen
FIGURE 4.10 Google ChromeOS
FIGURE 4.11 iOS 17 home screen
FIGURE 4.12 Android 13 home screen
FIGURE 4.13 User accounts in Windows 11
FIGURE 4.14 Users & Groups in macOS
FIGURE 4.15 Lubuntu user and group settings
FIGURE 4.16 Adding a user account
FIGURE 4.17 Create a user
FIGURE 4.18 User Account Control
FIGURE 4.19 Making changes to your user account
FIGURE 4.20 User Account Control Settings
FIGURE 4.21 Programs And Features
FIGURE 4.22 Task Manager
FIGURE 4.23 Task Scheduler
FIGURE 4.24 Create a basic task
FIGURE 4.25 Starting a program
FIGURE 4.26 Services tab of Task Manager
FIGURE 4.27 Services management console
FIGURE 4.28 Bluetooth & Devices in Windows Settings
FIGURE 4.29 Device Manager
FIGURE 4.30 Driver details
FIGURE 4.31 Disk Management
FIGURE 4.32 Windows command prompt
FIGURE 4.33 Command prompt help
FIGURE 4.34 App associations
FIGURE 4.35 C: Properties
FIGURE 4.36 Disk Cleanup
FIGURE 4.37 This PC window
FIGURE 4.38 Directories in the C: drive
FIGURE 4.39 Several folders and files
FIGURE 4.40 Right-clicking a file
FIGURE 4.41 File properties
FIGURE 4.42 File security
FIGURE 4.43 Test folder with
text1
file
FIGURE 4.44 File attributes in the command prompt
FIGURE 4.45 Advanced attributes
FIGURE 4.46 Browsing for a folder or file
FIGURE 4.47 VirtualBox preconfiguration
FIGURE 4.48 VirtualBox with a virtual drive
FIGURE 4.49 Lubuntu – Settings dialog
FIGURE 4.50 Lubuntu live session
FIGURE 4.51 Installing Lubuntu
Chapter 5
FIGURE 5.1 System requirements
FIGURE 5.2 Adobe reader download site
FIGURE 5.3 Third-party websites
FIGURE 5.4 Microsoft product key
FIGURE 5.5 Turning Windows features on or off
FIGURE 5.6 Uninstalling an application
FIGURE 5.7 Installed apps
FIGURE 5.8 Bluetooth & Devices window
FIGURE 5.9 Windows Update
FIGURE 5.10 Windows Installed updates
FIGURE 5.11 Device Manager
FIGURE 5.12 Updating Drivers screen
FIGURE 5.13 Driver management
FIGURE 5.14 Default Apps window
FIGURE 5.15 Choosing default apps by file type
FIGURE 5.16 Word document
FIGURE 5.17 Microsoft Excel
FIGURE 5.18 Microsoft PowerPoint
FIGURE 5.19 HR hiring process flowchart example
FIGURE 5.20 Norton 360
FIGURE 5.21 Norton 360 settings
FIGURE 5.22 Two ways to configure a screened subnet
FIGURE 5.23 Windows Defender Firewall
FIGURE 5.24 7-Zip file manager
FIGURE 5.25 7-Zip archive options
FIGURE 5.26 Creating a PDF file from Office 365
FIGURE 5.27 Viewing a PDF file
FIGURE 5.28 (a) Chrome and (b) Edge options menus
FIGURE 5.29 (a) Safari and (b) mobile Chrome options menus
FIGURE 5.30 About Google Chrome
FIGURE 5.31 Microsoft Edge version
FIGURE 5.32 Chrome add-ons/extensions
FIGURE 5.33 You and Google
FIGURE 5.34 Synchronization options
FIGURE 5.35 Manage What You Sync
FIGURE 5.36 Edge sync settings
FIGURE 5.37 Creating a bookmark
FIGURE 5.38 Chrome new tab with Bookmarks folder
FIGURE 5.39 Edge new tab with favorites
FIGURE 5.40 Chrome search engine
FIGURE 5.41 Chrome accessibility options
FIGURE 5.42 Chrome appearance settings
FIGURE 5.43 Chrome privacy and security
FIGURE 5.44 Clear Browsing Data
FIGURE 5.45 Pop-ups and redirects
FIGURE 5.46 Google Password Manager
FIGURE 5.47 Microsoft Wallet
FIGURE 5.48 Incognito browsing
FIGURE 5.49 InPrivate Browsing
Chapter 6
FIGURE 6.1 Calculator in Programmer view
FIGURE 6.2 Hello, world!
FIGURE 6.3 “Hello, world!” JavaScript alert
FIGURE 6.4 Flowchart
Chapter 7
FIGURE 7.1 Simple data in a worksheet
FIGURE 7.2 Simple data in Access
FIGURE 7.3 Logical relational database schema
FIGURE 7.4 Logical schema with primary keys
FIGURE 7.5 Microsoft Access table
FIGURE 7.6 Form in Microsoft Access
FIGURE 7.7 Microsoft Access
FIGURE 7.8 Empty database
FIGURE 7.9 Two tables
FIGURE 7.10 Get External Data window
FIGURE 7.11
Imported Customers
table
FIGURE 7.12 Backing up a database
FIGURE 7.13 Installing Northwind
FIGURE 7.14 Customer details
Chapter 8
FIGURE 8.1 A DSL modem
FIGURE 8.2 The back of the DSL modem
FIGURE 8.3 iOS (a) and Android (b) hotspot configuration
FIGURE 8.4 Bluetooth USB adapter
FIGURE 8.5 Infrared port
FIGURE 8.6 Eight-port switch
FIGURE 8.7 Sample network with routers and switches
FIGURE 8.8 A wireless router
FIGURE 8.9 DoD model and the TCP/IP protocol suite
FIGURE 8.10 IPv6 address
FIGURE 8.11
ipconfig /all
output
FIGURE 8.12
tracert
output
FIGURE 8.13 NETGEAR NAS device
FIGURE 8.14 Google Drive
FIGURE 8.15 Sharing a folder on Google Drive
FIGURE 8.16 Linksys Smart Wi-Fi
FIGURE 8.17 Linksys app home page
FIGURE 8.18 Wi-Fi Settings
FIGURE 8.19 Connectivity settings
FIGURE 8.20 iOS joining a wireless network
FIGURE 8.21 Android Wi-Fi settings
FIGURE 8.22 Guest network configuration
FIGURE 8.23 DHCP configuration
FIGURE 8.24 Firewall settings
FIGURE 8.25 Parental controls
Chapter 9
FIGURE 9.1 Type 1 and Type 2 hypervisors
FIGURE 9.2 Enabling Hyper-V
FIGURE 9.3 Microsoft Hyper-V Manager
FIGURE 9.4 Lubuntu guest OS
FIGURE 9.5 Common cloud service levels
FIGURE 9.6 Basic computing model
FIGURE 9.7 Basic AI computing model
FIGURE 9.8 A neural network
FIGURE 9.9 Chatbot on a website
FIGURE 9.10 ChatGPT
FIGURE 9.11 Craiyon AI art
FIGURE 9.12 Predictive AI suggestions
FIGURE 9.13 New Virtual Machine Wizard
Chapter 10
FIGURE 10.1 The CIA triad
FIGURE 10.2 Laptop privacy screen
Source:
StarTech.com
FIGURE 10.3 A laptop security cable
FIGURE 10.4 Cookie consent
FIGURE 10.5 Virus spreading from an infected system
FIGURE 10.6 Email viruses can spread quickly.
FIGURE 10.7 RSA SecurID
FIGURE 10.8 PingID
FIGURE 10.9 Security log in Event Viewer
FIGURE 10.10 Microsoft Edge site-viewing history
Chapter 11
FIGURE 11.1 Windows Update
FIGURE 11.2 An iOS update is available.
FIGURE 11.3 Android software update
FIGURE 11.4 Android (a) and iOS (b) security settings
FIGURE 11.5 Windows 11 Lock Screen window
FIGURE 11.6 Screen Saver Settings dialog box
FIGURE 11.7 Cable locks
FIGURE 11.8 USB locks
FIGURE 11.9 Disabling a USB port in Device Manager
FIGURE 11.10 Security And Maintenance screen
FIGURE 11.11 Printer driver search results
FIGURE 11.12 Windows Services
FIGURE 11.13 Bluetooth Support Service properties
FIGURE 11.14 AutoPlay options
FIGURE 11.15 Autofill in Chrome
FIGURE 11.16 Edge settings
FIGURE 11.17 SmartScreen filter
FIGURE 11.18 Chrome Privacy And Security settings
FIGURE 11.19 Folder permissions
FIGURE 11.20 Select Users Or Groups dialog box
FIGURE 11.21 User permissions
FIGURE 11.22 Advanced Attributes dialog box
FIGURE 11.23 Windows Certificate Manager
FIGURE 11.24 Certificate Export Wizard
FIGURE 11.25 The macOS FileVault
FIGURE 11.26 A VPN
Chapter 12
FIGURE 12.1 RAID 1 and RAID 5
FIGURE 12.2 Front and back of a UPS
FIGURE 12.3 Advanced file attributes
FIGURE 12.4 Windows Backup
FIGURE 12.5 Backup And Restore
FIGURE 12.6 Select a backup location
FIGURE 12.7 Schedule options
FIGURE 12.8 Restoring files
FIGURE 12.9 Adding the backup file
FIGURE 12.10 Recovery options
FIGURE 12.11 System Protection tab in System Properties
FIGURE 12.12 Choosing a restore point
FIGURE 12.13 System Configuration utility
FIGURE 12.14 Task Manager Startup apps
FIGURE 12.15 Event Viewer
FIGURE 12.16 Configuring an application for compatibility mode
FIGURE 12.17 Pinging the loopback address
FIGURE 12.18
ipconfig
results
FIGURE 12.19 Successful
ping
results
FIGURE 12.20 Successful
tracert
results
Cover
Table of Contents
Title Page
Copyright
Dedication
Acknowledgments
About the Author
About the Technical Editor
Table of Exercises
Introduction
Begin Reading
Appendix A: Answers to Written Labs
Appendix B: Answers to Review Questions
Index
End User License Agreement
i
v
vi
vii
ix
xi
xiii
xxiii
xxiv
xxv
xxvi
xxvii
xxviii
xxix
xxx
xxxi
xxxii
xxxiii
xxxiv
xxxv
xxxvi
xxxvii
xxxviii
xxxix
xl
xli
xlii
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
Third Edition
Quentin Docter
Copyright © 2025 by John Wiley & Sons, Inc. All rights, including for text and data mining, AI training, and similar technologies, are reserved.
Published by John Wiley & Sons, Inc., Hoboken, New Jersey.Published simultaneously in Canada and the United Kingdom.
ISBNs: 9781394288793 (paperback), 9781394288816 (ePDF), 9781394288809 (ePub)
No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4470, or on the web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at www.wiley.com/go/permission.
Trademarks: WILEY, the Wiley logo, and Sybex are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without written permission. CompTIA is a registered trademark of The Computing Technology Industry Association, Inc. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc. is not associated with any product or vendor mentioned in this book.
Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.
For general information on our other products and services, please contact our Customer Care Department within the United States at (800) 762-2974, outside the United States at (317) 572- 3993. For product technical support, you can find answers to frequently asked questions or reach us via live chat at https://sybexsupport.wiley.com.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic formats. For more information about Wiley products, visit our web site at www.wiley.com.
Library of Congress Cataloging in Publication data available on request.
Cover image: © Jeremy Woodhouse/Getty Images, Inc.
Cover design: Wiley
In memory of Grandpa Joe, who fostered my love of technology and so much more
First and foremost, I need to thank my family. Without their support and patience, I would never be able to work on projects like this.
They say it takes a village to produce a book, and it always amazes me at the number of people who are involved. I have been fortunate to work with a great Sybex crew yet again. Liz Britten was the project manager. Thanks, Liz, for keeping us on track and answering all of my random questions. Kenyon Brown was the senior acquisitions editor for this book—thank you, Kenyon, for asking me to take on this book.
Chris Crayton, my technical editor, is the best in the business. Thank you, Chris, for always challenging me with ideas to improve the book, as well as catching my silly mistakes. In addition, Satish Gowrishankar, Saravanan Dakshinamurthy, and Hariharan Jayamoorthy all played excellent roles in ensuring the quality of this work. Thank you, gentlemen. To Liz Welch, my copy editor, thank you for correcting my grammar mistakes over and over again. I saw you fixing the same ones chapter after chapter—my grammar might not be the best, but at least I am consistent! Finally, Nancy Carrasco, thank you for being the final set of eyes to make sure we didn’t miss anything. I very much so appreciate you all!
Quentin Docter started in the IT industry as a tech support agent for Packard Bell in 1994. Since then he has worked in tech support, network administration, consulting, training, web development, and project management. During his career, he has achieved certifications from CompTIA (including Tech+, A+, and Cloud Essentials+), Microsoft, Cisco, Novell, and Sun Microsystems. He is the author of several books, including the CompTIA A+ Complete Study Guide from Sybex, 2022, an imprint of Wiley.
Chris Crayton, MCSE, CISSP, CASP+, PenTest+, CySA+, Cloud+, S+, N+, A+, ITF+, is a technical consultant, trainer, author, and industry-leading technical editor. He has worked as a computer technology and networking instructor, information security director, network administrator, network engineer, and PC specialist. Chris has served as technical editor and content contributor on numerous technical titles for several of the leading publishing companies. He has also been recognized with many professional and teaching awards.
Exercise 1.1
Converting Between Decimal and Other Numbering Systems
Exercise 1.2
Assessing Your Computer’s RAM and Virtual Memory in Windows 11
Exercise 1.3
Determining the Type of Installed RAM
Exercise 1.4
Examining Storage Drives in Windows 11
Exercise 2.1
Adjusting a Desktop Monitor
Exercise 2.2
Changing the Settings for Multiple Monitors
Exercise 2.3
Changing Your Keyboard Layout in Windows 11
Exercise 2.4
Disabling a Touchpad in Windows 11
Exercise 2.5
Configuring a Mouse in Windows 11
Exercise 2.6
Installing an IP Printer
Exercise 3.1
Changing Security Settings on iOS 17
Exercise 3.2
Changing Security Settings on Android 13
Exercise 4.1
Creating a User Account in Windows 11
Exercise 4.2
Changing Windows User Account Control
Exercise 4.3
Creating a Task with Task Scheduler
Exercise 4.4
Managing Storage Space in Windows
Exercise 4.5
Modifying File Attributes and Using the Command Prompt
Exercise 4.6
Manipulating Files in Windows
Exercise 4.7
Creating a Shortcut in Windows
Exercise 5.1
Installing and Uninstalling Operating System Features
Exercise 5.2
Installing 7-Zip
Exercise 5.3
Installing Free Applications
Exercise 5.4
Configuring Windows Update
Exercise 5.5
Using 7-Zip to Create an Archive
Exercise 5.6
Downloading and Installing Adobe Reader
Exercise 5.7
Managing Cache in Chrome
Exercise 5.8
Configuring the Chrome Pop-Up Blocker
Exercise 6.1
Converting Between Decimal and Other Numbering Systems
Exercise 6.2
Creating “Hello, World!” in HTML
Exercise 7.1
Creating a Database and Tables in Microsoft Access
Exercise 7.2
Importing Data from Excel to Access
Exercise 8.1
Pricing Internet Connectivity
Exercise 8.2
The Cost of Networking
Exercise 8.3
Finding Your IP Configuration Information in Windows
Exercise 9.1
Enabling Hyper-V in Windows 11
Exercise 9.2
Using Generative AI
Exercise 10.1
Testing Social Engineering
Exercise 11.1
Securing a Windows 11 PC from Unauthorized Local Use
Exercise 11.2
Starting and Stopping Services in Windows 11
Exercise 11.3
Configuring SmartScreen in Microsoft Edge
Exercise 11.4
Encrypting Local Folders in Windows 11
Exercise 11.5
Backing Up a Windows Security Certificate
Exercise 12.1
Setting Up a Backup in Windows 11
Exercise 12.2
Restoring Files in Windows 11
Exercise 12.3
Booting into Safe Mode in Windows 11
Exercise 12.4
Using System Restore in Windows 11
Exercise 12.5
Using the System Configuration Utility in Windows 11
Exercise 12.6
Creating a Desktop Shortcut for MSCONFIG
Exercise 12.7
Running an Application in Compatibility Mode
Exercise 12.8
Checking TCP/IP Connectivity
If you’re picking up this book, it means it’s likely that either you’re thinking about getting into the IT industry, or you are relatively new to it. Either way, you are probably getting advice from nearly everyone you meet. One of the common refrains you probably hear is “Get certified!” With so many certifications out there, you might wonder where to start—CompTIA Tech+ is that place.
Certification is one of the best things you can do for your career if you are working in, or want to break into, the IT profession, because it proves that you know what you’re talking about regarding the subjects in which you’re certified. It also powerfully endorses you as a professional in a way that’s similar to a physician being board certified in a certain area of expertise. It can add to your résumé and make you more attractive to potential employers and more valuable as an employee. Anything you can do to stay ahead of the competition—even standing out among your present colleagues—could make a big difference in whether or not you gain a promotion!
In this book, you’ll find out what the Tech+ exam is all about because each chapter covers a part of the exam. I’ve included some great review questions at the end of each chapter to help crystallize the information you learned and solidly prepare you to ace the exam. This book covers more than just the exam, though. I believe in providing my students with a foundation of IT knowledge that will prepare them for real jobs, not just to pass a test. After all, life is not a multiple-choice test with the answers clearly laid out in front of you!
A really cool thing about working in IT is that it’s constantly evolving, so there are always new things to learn and fresh challenges to master. Once you obtain your Tech+ certification and discover that you’re interested in taking it further by getting into more complex topics (and making more money), the CompTIA A+ certification is definitely your next step.
Tech+ is a certification developed by the Computing Technology Industry Association (CompTIA) that exists to provide resources and education for the computer and technology community. This is the same body that developed the A+ exam for PC technicians, Network+ for networking experts, and Security+ for security practitioners.
Way back in 1995, members of the organization got together to develop a new certification that tests skills for IT. To ensure industrywide support, it was sponsored by many past and present IT industry leaders like these:
Compaq Computers
Digital Equipment Corporation (a part of Compaq)
IBM
Lotus
Microsoft
Novell
TSS
U.S. Robotics
US West
Wave Technologies
The Tech+ exam was designed to test the skills of those with little to no experience in the field but who want to show that they have a broad general understanding of core IT topics. It tests areas such as computer hardware, operating systems and applications, basic networking, security, and setting up and maintaining a computer.
Because CompTIA is a well-respected developer of vendor-neutral industry certifications, becoming Tech+ certified proves that you have a base level of knowledge in the specific areas tested by the Tech+ objectives.
Four major benefits are associated with becoming Tech+ certified:
Proof of Professional Achievement
Computer professionals are pretty competitive when it comes to collecting more certifications than their peers. And because the Tech+ certification broadly covers the entire field of computers, it’s a great stepping-stone to prove that you have what it takes to succeed in this industry. Because it’s rare to gain something that’s worth a lot with little effort, I’ll be honest—preparing for the Tech+ exam isn’t exactly a lazy day at the beach. But passing the test is worth it because it will get the attention of potential employers.
Opportunity for Advancement
We all like to get ahead in our careers—advancement results in more responsibility and prestige, and it usually means a fatter paycheck, greater opportunities, and added options. In the IT sector, a great way to make sure all that good stuff happens is by earning a lot of technology certifications, including Tech+.
Fulfillment of Training Requirements
Tech+, because of its wide-reaching industry support, is recognized as a baseline of computer knowledge. This can potentially fulfill IT-related training requirements set forth by your company.
Customer Confidence
As companies discover the CompTIA advantage, they will undoubtedly require qualified staff to achieve these certifications. Many companies outsource their work to consulting firms with experience working with security. Firms that have certified staff have a definite advantage over firms that don’t.
As this book goes to press, Pearson VUE is the sole Tech+ exam provider. The following is the necessary contact information and exam-specific details for registering. Exam pricing might vary by country or by CompTIA membership.
Vendor
Website
Phone Number
Pearson VUE
https://home.pearsonvue.com/comptia
U.S. and Canada: 877-551-PLUS (7587)
When you schedule the exam, you’ll receive instructions regarding appointment and cancellation procedures, ID requirements, and information about the testing center location. In addition, you’ll receive a registration and payment confirmation letter. Exams can be scheduled up to six weeks out or as late as the next day (or, in some cases, even the same day).
Exam prices and codes may vary based on the country in which the exam is administered. For detailed pricing and exam registration procedures, refer to CompTIA’s website at www.comptia.org.
After you’ve successfully passed your Tech+ exam, CompTIA will award you a certification. Within four to six weeks of passing the exam, you’ll receive your official CompTIA Tech+ certificate and ID card. (If you don’t receive these within eight weeks of taking the test, contact CompTIA directly using the information found in your registration packet.)
Here are some general tips for taking your exam successfully:
Bring two forms of ID with you. One must be a photo ID, such as a driver’s license. The other can be a major credit card or a passport. Both forms must include a signature.
Arrive early at the exam center so you can relax and review your study materials, particularly tables and lists of exam-related information. Once you are ready to enter the testing room, you will need to leave everything outside; you won’t be able to bring any materials into the testing area.
Read the questions carefully. Don’t be tempted to jump to an early conclusion. Make sure you know exactly what each question is asking.
Don’t leave any unanswered questions. Unanswered questions are scored against you. There will be questions with multiple correct responses. When there is more than one correct answer, a message at the bottom of the screen will prompt you either to “choose two” or “choose all that apply.” Be sure to read the messages displayed to know how many correct answers you must choose.
When answering multiple-choice questions about which you’re unsure, use a process of elimination to get rid of the obviously incorrect answers first. Doing so will improve your odds if you need to make an educated guess.
On form-based tests (nonadaptive), because the hard questions will take the most time, save them for last. You can move forward and backward through the exam.
For the latest pricing on the exams and updates to the registration procedures, visit CompTIA’s website at
www.comptia.org
.
You—if want to pass the Tech+ exam and pass it confidently! This book is chock-full of the exact information you need and directly maps to Tech+ exam objectives (listed later in this introduction), so if you use it to study for the exam, your odds of passing shoot way up.
In addition to including every bit of knowledge you need to learn to pass the exam, I’ve included some really great tips and solid wisdom to equip you even further to work successfully in the real IT world.
This book covers everything you need to know to pass the CompTIA Tech+ exam. But in addition to studying the book, it’s a good idea to practice on actual computers if you can.
Here’s a list of the 12 chapters in this book:
Chapter 1, “Core Hardware Components”
This chapter introduces you to the core insides of a computer, specifically motherboards, processors, memory, storage, expansion slots, power, and cooling systems.
Chapter 2, “Peripherals and Connectors”
While core hardware is important, users can truly customize their computer experience by adding peripheral hardware. To connect all of those toys to your system, you need to know which connectors to use, and this chapter teaches you all of that.
Chapter 3, “Computing Devices and the Internet of Things”
Now that you’ve learned about all of the individual hardware components, how do they all work together? This chapter discusses features of servers, workstations, laptops, tablets, smartphones, and gaming consoles. It also introduces the Internet of Things (IoT), which can turn practically anything into a device.
Chapter 4, “Operating Systems”
Without an operating system, computer hardware makes a pretty good doorstop. The operating system is the most critical piece of software on a computer, because it coordinates the efforts of the hardware and provides an interface for the user to interact with the machine.
Chapter 5, “Software Applications”
This chapter covers a variety of common application types that reside on computers, such as productivity software, collaboration software, utility software, and web browsers. It also teaches you about software management and the proper ways to install, uninstall, and manage applications.
Chapter 6, “Software Development”
Have you ever wondered how applications get created? This chapter will teach you the characteristics of several classes of programming languages. You will also see examples of code, programming logic, and organizational methods.
Chapter 7, “Database Fundamentals”
Databases are a key part of computing systems today. Data is the new currency, and therefore databases are like a bank vault. This chapter walks you through database concepts and structures, and it shows you some methods to interact with databases.
Chapter 8, “Networking Concepts and Technologies”
Who doesn’t want to get on the Internet? Wireless networks are popular today as a method to get Internet connectivity. You’ll learn about key networking technologies and how to configure a wireless router in this chapter.
Chapter 9, “Cloud Computing and Artificial Intelligence”
These are two of the biggest trends in IT today, the cloud and AI. First you will learn what the cloud is, and isn’t (for example, it’s neither fluffy nor in the sky). Then you will learn how AI works and explore different AI applications.
Chapter 10, “Security Concepts and Threats”
The downside to computers is that it seems like hackers are everywhere. This chapter will introduce you to common threats posed by would-be attackers so you know how to avoid them. It also introduces a security framework and access control concepts.
Chapter 11, “Security Best Practices”
This chapter builds on
Chapter 10
by showing you how to set up your system to protect it against attacks. You will learn about hardening devices, managing users, and using data encryption.
Chapter 12, “Data Continuity and Computer Support”
Inevitably, computers will run into problems—it’s the nature of electronic components. This chapter will show you how to troubleshoot any issues that pop up.
Warning
: After reading this chapter, all of your family members will call on you for technical support (if they don’t already)! This chapter also shows you how to plan for eventual computer problems so that you don’t totally lose your data.
I’ve included the following study tools throughout the book:
Assessment Test
At the end of this introduction is an Assessment Test that you can use to check your readiness for the exam. Take this test before you start reading the book; it will help you determine the areas where you might need to brush up. The answers to the Assessment Test questions appear on a separate page after the last question of the test. Each answer includes an explanation and a note telling you the chapter in which the material appears.
Objective Map and Opening List of Objectives
Just before the Assessment Test, you’ll find a detailed exam objective map, showing you where each of the CompTIA exam objectives is covered in this book. In addition, each chapter opens with a list of the exam objectives it covers. Use these to see exactly where each of the exam topics is covered.
Exam Essentials
Each chapter, just after the summary, includes a number of exam essentials. These are the key topics that you should take from the chapter in terms of areas to focus on when preparing for the exam.
Lab Exercises
Each chapter includes a hands-on lab to give you more experience. These exercises map to the exam objectives. Some ask specific questions, and you can find the answers to those questions in
Appendix A
.
Chapter Review Questions
To test your knowledge as you progress through the book, there are 20 review questions at the end of each chapter. As you finish each chapter, answer the review questions and then check your answers—the correct answers and explanations are in
Appendix B
. You can go back to reread the section that deals with each question you got wrong in order to ensure that you answer correctly the next time you’re tested on the material.
Go to http://www.wiley.com/go/sybextestprep to register and gain access to this interactive online learning environment and test bank with study tools.
The interactive online learning environment that accompanies CompTIA Tech+ Study Guide: Exam FC0-U71, Third Edition, provides a test bank with study tools to help you prepare for the certification exam and increase your chances of passing it the first time! The test bank includes the following:
Sample Tests
All of the questions in this book are provided, including the Assessment Test, which you’ll find at the end of this introduction, and the review questions at the end of each chapter. In addition, there are two Practice Exams with more than 60 questions each. Use these questions to test your knowledge of the study guide material. The online test bank runs on multiple devices.
Flashcards
Questions are provided in digital flashcard format (a question followed by a single correct answer). You can use the flashcards to reinforce your learning and provide last-minute test prep before the exam.
Other Study Tools
A glossary of key terms from this book and their definitions is available as a fully searchable PDF.
Like all exams, the Tech+ certification from CompTIA is updated periodically and may eventually be retired or replaced. At some point after CompTIA is no longer offering this exam, the old editions of our books and online tools will be retired. If you have purchased this book after the exam was retired, or are attempting to register in the Sybex online learning environment after the exam was retired, please know that we make no guarantees that this exam’s online Sybex tools will be available once the exam is no longer available.
If you want a solid foundation for the serious effort of preparing for the Tech+ exam, then look no further because I’ve spent countless hours putting together this book with the sole intention of helping you to pass it!
This book is loaded with valuable information, and you will get the most out of your study time if you understand how I put the book together. Here’s a list that describes how to approach studying:
Take the Assessment Test immediately following this introduction. (The answers are at the end of the test, but no peeking!) It’s okay if you don’t know any of the answers—that’s what this book is for. Carefully read over the explanations for any question you get wrong, and make note of the chapters where that material is covered.
Study each chapter carefully, making sure you fully understand the information and the exam objectives listed at the beginning of each one. Again, pay extra-close attention to any chapter that includes material covered in questions you missed on the Assessment Test.
Complete the lab exercise at the end of each chapter. Do
not
skip these exercises. One reason is that they directly map to the CompTIA objectives and reinforce the material. Another reason is that it gives you hands-on experience, which is crucial.
Answer all the review questions related to each chapter. Specifically, note any questions that confuse you, and study the corresponding sections of the book again. And don’t just skim these questions—make sure you understand each answer completely.
Try your hand at the Practice Exams. The more questions you practice, the better you will be when you sit for the real exam.
Test yourself using all of the electronic flashcards. This is a new and updated flashcard program to help you prepare for the latest CompTIA Tech+ exam, and it is a really great study tool.
Learning every bit of the material in this book is going to require you to apply yourself with a good measure of discipline. So, try to set aside the same time period every day to study, and select a comfortable and quiet place to do so. If you work hard, you will be surprised at how quickly you learn this material.
If you follow the steps listed here and study with the Review Questions, Practice Exams, electronic flashcards, and all of the written labs, I’m confident you have a great chance of passing the CompTIA Tech+ exam. However, studying for the Tech+ exam is a little like training for a marathon—if you don’t go for a good run every day, you’re not likely to finish very well.
Speaking of objectives, you’re probably pretty curious about them, right? CompTIA asked groups of IT professionals to fill out a survey rating the skills they felt were important in their jobs, and the results were grouped into objectives for the exam and divided into six domains.
This table gives you the extent by percentage in which each domain is represented on the actual examination.
Domain
% of Examination
1.0 IT Concepts and Terminology
13%
2.0 Infrastructure
24%
3.0 Applications and Software
18%
4.0 Software Development Concepts
13%
5.0 Data and Database Fundamentals
13%
6.0 Security
19%
Total
100%
Exam objectives are subject to change at any time without prior notice and at CompTIA’s sole discretion. Please visit CompTIA’s website (www.comptia.org) for the most current listing of exam objectives.
Objective
Chapter(s)
1.0 IT Concepts and Terminology
1.1 Explain the basics of computing.
1
1.2 Identify notational systems.
6
1.3 Compare and contrast common units of measure.
1
,
2
,
8
1.4 Explain the troubleshooting methodology.
12
2.0 Infrastructure
2.1 Explain common computing devices and their purposes.
3
2.2 Explain the purpose of common internal computing components.
1
2.3 Compare and contrast storage types.
1
,
2
,
8
2.4 Given a scenario install and configure common peripheral devices.
2
2.5 Compare and contrast common types of input/output device interfaces.
2
2.6 Compare and contrast virtualization and cloud technologies.
9
2.7 Compare and contrast Internet service types.
8
2.8 Identify basic networking concepts.
8
2.9 Explain the basic capabilities of a small wireless network.
8
3.0 Applications and Software
3.1 Identify components of an OS.
4
3.2 Explain the purpose of operating systems.
4
3.3 Explain the purpose and proper use of software.
5
3.4 Given a scenario, configure and use web browser features.
5
3.5 Identify common uses of artificial intelligence (AI).
9
4.0 Software Development Concepts
4.1 Compare and contrast programming language categories.
6
4.2 Identify fundamental data types and their characteristics.
6
4.3 Explain the purpose and use of programming concepts.
6
4.4 Identify programming organizational techniques and logic concepts.
6
5.0 Data and Database Fundamentals
5.1 Explain the value of data and information.
10
5.2 Explain database concepts and the purpose of a database.
7
5.3 Compare and contrast various database structures.
7
5.4 Explain basic data backup concepts.
12
6.0 Security
6.1 Explain fundamental security concepts and frameworks.
10
6.2 Explain methods to secure devices and security best practices.
5
,
11
6.3 Explain password best practices.
11
6.4 Identify common use cases for encryption.
11
6.5 Given a scenario, configure security settings for a small wireless network.
8
If you believe you have found a mistake in this book, please bring it to our attention. At John Wiley & Sons, we understand how important it is to provide our customers with accurate content, but even with our best efforts an error may occur.
In order to submit your possible errata, please email it to our Customer Service Team at [email protected] with the subject line “Possible Book Errata Submission.”
Which of the following optical discs will store the most data?
CD-ROM
DVD-ROM DL
DVD-ROM DS
RS-ROM
Which of the following devices are used to permanently store user data in a computer? (Choose two.)
HDD
RAM
ROM
SSD
Which of the following on your computer is considered firmware?
RAM
SSD
CMOS
BIOS
What was the first widely adopted video connector standard?
HDMI
VGA
USB
DVI
What type of removable storage is often used in digital cameras?
Flash drive
NAS
Memory card
Mobile media card
Which of the following network speeds provides the greatest throughput?
100 Gbps
100 Mbps
1 Kbps
1000 bps
Angela has an iPhone with a biometric scanner enabled. She powered the device off, and just turned it back on. What methods can she use to unlock her phone?
Facial recognition only
Passcode only
Facial recognition or passcode
Facial recognition, fingerprint ID, or passcode
You are setting up a new Wi-Fi connection on your iPad. What is the first step in the process?
Enter wireless password.
Verify Internet connection.
Verify wireless capabilities.
Locate SSID.
Turn on Wi-Fi.
What type of security is involved when pairing two Bluetooth devices together?
SSL certificates are exchanged.
A PIN is provided by the Bluetooth device.
The Bluetooth security layer negotiates the security mechanism.
There is no security involved.
You install a new video card into a computer but it only gives you basic resolution. A friend suggests you check the driver version. Where would you do that in Windows?
Device Manager
Video Card Manager
Task manager
Services Manager
Which Windows feature helps prevent against catastrophic system changes such as accidentally installing malware?
Application Manager
UAC
Encryption
Task Manager
If you buy a new Apple tablet computer, what operating system can you expect to find on it?
Android
iOS
iPadOS
macOS
Which of the following is not considered productivity software?
Spreadsheet software
Web browser
Online workspace
Visual diagramming software
Which of the following is the most legitimate place to download a software application from?
Perpetual website
Piracy website
OEM website
Third-party website
The cache in a web browser stores what?
The list of favorite websites
User configuration information
Private browsing settings
Temporary files
Which data type exists only in true and false states?
Binary
Boolean
Char
Float
Code that is not part of the functionality of the program but that is intended to be easy for people to read is called what?
Compiled
Interpreted
Commented
Pseudocode
Which of the following container types has a fixed length?
Constant
Array
Vector
String
When creating a relational database, what is the name of the rules and structure?
Forms
Tables
Schema
Constraints
Which of the following statements is true regarding a foreign key in a relational database?
They are required.
There can be only one per table.
They are automatically indexed.
Null values are allowed.
David, a database administrator, needs to remove a column from an existing database. Which command should he use?
ALTER
DELETE
DROP
REMOVE
You open your web browser and type in
www.google.com
, but your computer can’t find the website. Your neighbor’s computer finds it just fine. What is most likely the cause?
Incorrect DNS configuration.
Incorrect DHCP configuration.
Incorrect WPA2 configuration.
The website is down.
Your friend Marcos asks you which of the following are the most secure. What do you tell him?
802.11n
Infrared
Fiber-optic
UTP
Your need to set up a wireless router for a friend. He wants to be sure that his network is secure. Which wireless security method should you implement?
WPA2
WPA
WPA3
WEP
Which hypervisor is typically used in server-side virtualization?
Type 1
