CompTIA Tech+ Study Guide - Quentin Docter - E-Book

CompTIA Tech+ Study Guide E-Book

Quentin Docter

0,0
42,99 €

-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.

Mehr erfahren.
Beschreibung

An easy-to-read and authoritative new study guide for the updated CompTIA Tech+ certification exam

In the newly updated third edition of the CompTIA Tech+ Study Guide: Exam FC0-U71, veteran IT professional and tech trainer Quentin Docter delivers an up-to-date resource for effectively and efficiently preparing for the popular new introductory Tech+ certification from CompTIA. This Sybex Study Guide is the gold-standard exam prep roadmap, offering complete coverage of every exam domain, including IT concepts and terminology, infrastructure, applications and software development, data and database fundamentals, security, and more.

Perfect for practicing and aspiring entry-level IT pros as well as those preparing to take the CompTIA Tech+ test, this book includes complementary access to online learning resources, two practice exams, flashcards, and practice questions with answer explanations. You'll also find:

  • Optimized learning resources to get you up to speed as fast as possible
  • Exam resources designed to reduce test anxiety and familiarize you with testing procedure and content
  • One full year of access to the Sybex online learning environment, complete with real-world examples and scenarios, objective maps, and a glossary of useful terminology

The new, entry-level CompTIA Tech+ certification has been created to get you ready for further certification paths, like the A+, Security+, and Network+ credentials, and prepare you for an exciting career in tech. Whether you're an IT beginner or you've already begun your tech journey and are looking for a refresher on foundational concepts, CompTIA Tech+ Study Guide: Exam FC0-U71 is the book you've been waiting for.

Sie lesen das E-Book in den Legimi-Apps auf:

Android
iOS
von Legimi
zertifizierten E-Readern

Seitenzahl: 1159

Veröffentlichungsjahr: 2024

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Table of Contents

Cover

Table of Contents

Title Page

Copyright

Dedication

Acknowledgments

About the Author

About the Technical Editor

Table of Exercises

Introduction

What Is the CompTIA Tech+ Certification?

Exam Objectives

How to Contact the Publisher

Assessment Test

Answers to the Assessment Test

Chapter 1: Core Hardware Components

Introducing Internal Components

Exploring Motherboards, Processors, and Memory

Exploring Storage and Expansion Devices

Exploring Power and Cooling

Summary

Exam Essentials

Chapter 1 Lab

Review Questions

Chapter 2: Peripherals and Connectors

Installing and Configuring Audio and Video Devices

Understanding External Storage and Communications Connectors

Understanding Input, Output, and Power Devices

Understanding Installation Basics

Summary

Exam Essentials

Chapter 2 Lab

Review Questions

Chapter 3: Computing Devices and the Internet of Things

Exploring Larger Computing Devices

Understanding the Internet of Things

Summary

Exam Essentials

Chapter 3 Lab

Review Questions

Chapter 4: Operating Systems

Operating System Fundamentals

Managing an Operating System

Summary

Exam Essentials

Chapter 4 Lab

Review Questions

Chapter 5: Software Applications

Understanding Application Installation and Management

Exploring Common Application Types

Using Web Browsers

Summary

Exam Essentials

Chapter 5 Lab

Review Questions

Chapter 6: Software Development

Exploring Programming Languages

Understanding Programming Concepts and Techniques

Summary

Exam Essentials

Review Questions

Chapter 7: Database Fundamentals

Understanding Databases

Summary

Exam Essentials

Chapter 7 Lab

Review Questions

Chapter 8: Networking Concepts and Technologies

Exploring Connection Types and Features

Understanding Network Connectivity Essentials

Setting Up a Small Wireless Network

Summary

Exam Essentials

Chapter 8 Lab

Review Questions

Chapter 9: Cloud Computing and Artificial Intelligence

Understanding Virtualization and Cloud Computing

Exploring Artificial Intelligence

Summary

Exam Essentials

Chapter 9 Lab

Review Questions

Chapter 10: Security Concepts and Threats

Understanding Hackers and Motives

Understanding Security Threats

Understanding Access Control

Summary

Exam Essentials

Chapter 10 Lab

Review Questions

Chapter 11: Security Best Practices

Understanding Security Best Practices

Summary

Exam Essentials

Chapter 11 Lab

Review Questions

Chapter 12: Data Continuity and Computer Support

Understanding Data Continuity

Exploring Computer Support Concepts

Summary

Exam Essentials

Chapter 12 Lab

Review Questions

Appendix A: Answers to Written Labs

Chapter 1 Lab Answers

Chapter 2 Lab Answers

Chapter 3 Lab Answers

Chapter 4 Lab Answers

Chapter 5 Lab Answers

Chapter 6 Lab Answers

Chapter 7 Lab Answers

Chapter 8 Lab Answers

Chapter 9 Lab Answers

Chapter 10 Lab Answers

Chapter 11 Lab Answers

Chapter 12 Lab Answers

Appendix B: Answers to Review Questions

Chapter 1: Core Hardware Components

Chapter 2: Peripherals and Connectors

Chapter 3: Computing Devices and the Internet of Things

Chapter 4: Operating Systems

Chapter 5: Software Applications

Chapter 6: Software Development

Chapter 7: Database Fundamentals

Chapter 8: Networking Concepts and Technologies

Chapter 9: Cloud Computing and Artificial Intelligence

Chapter 10: Security Concepts and Threats

Chapter 11: Security Best Practices

Chapter 12: Data Continuity and Computer Support

Index

End User License Agreement

List of Tables

Chapter 1

TABLE 1.1 Motherboard form factors

TABLE 1.2 Bit and byte conversions

TABLE 1.3 Optical discs and their capacities

TABLE 1.4 Shopping comparison

Chapter 2

TABLE 2.1 Smart TV specifications

TABLE 2.2 USB specifications

TABLE 2.3 Thunderbolt standards

TABLE 2.4 Summary of connectors

Chapter 3

TABLE 3.1 Laptop hardware replacement considerations

TABLE 3.2 Meta Quest 3 hardware requirements

TABLE 3.3 Gaming console specifications

Chapter 4

TABLE 4.1 Selected macOS releases

TABLE 4.2 macOS versions

TABLE 4.3 Selected Windows versions

TABLE 4.4 iOS versions and features

TABLE 4.5 Selected versions of Android OS

TABLE 4.6 Common file systems

Chapter 5

TABLE 5.1 Common executable file extensions

TABLE 5.2 Word processing file extensions

TABLE 5.3 File compression formats

Chapter 6

TABLE 6.1 Converting binary to decimal

TABLE 6.2 Sample ASCII codes

TABLE 6.3 Interpreter vs. compiler

TABLE 6.4 Common data types

Chapter 7

TABLE 7.1 Primary and foreign keys

TABLE 7.2 Predefined database roles

Chapter 8

TABLE 8.1 Common Internet connection types and speeds

TABLE 8.2 Cable types and characteristics

TABLE 8.3 802.11 standards

TABLE 8.4 Common port numbers

TABLE 8.5 Cloud provider personal plans

Chapter 9

TABLE 9.1 Cloud computing pros and cons

TABLE 9.2 Availability downtime

List of Illustrations

Chapter 1

FIGURE 1.1 A motherboard

FIGURE 1.2 Northbridge and Southbridge

FIGURE 1.3 CPU sockets

FIGURE 1.4 DIMM slots

FIGURE 1.5 SODIMM slots

FIGURE 1.6 PCI expansion slots

FIGURE 1.7 An AGP slot compared to a PCI slot

FIGURE 1.8 PCIe expansion slots

FIGURE 1.9 IDE hard drive connectors

FIGURE 1.10 SATA hard drive connectors

FIGURE 1.11 A 24-pin ATX power connector

FIGURE 1.12 A BIOS chip on a motherboard

FIGURE 1.13 BIOS settings

FIGURE 1.14 Motherboard back panel

FIGURE 1.15 Intel Core i7 processor

FIGURE 1.16 Calculator in Programmer view

FIGURE 1.17 About your PC

FIGURE 1.18 Virtual memory

FIGURE 1.19 Memory module form factors

FIGURE 1.20 Inside a hard drive

FIGURE 1.21 PATA/IDE and SATA hard drives

FIGURE 1.22 PATA and SATA data cables

FIGURE 1.23 PCIe NVMe SSD

FIGURE 1.24 M.2 NVMe SSD

FIGURE 1.25 M.2 connector on motherboard

FIGURE 1.26 M.2 slot protective cover

FIGURE 1.27 Two USB flash drives

FIGURE 1.28 Installed disk drives

FIGURE 1.29 Hard disk properties

FIGURE 1.30 Disk drives

FIGURE 1.31 A DVD-ROM

FIGURE 1.32 An EVGA GeForce video card

FIGURE 1.33 A legacy sound card

FIGURE 1.34 A wireless desktop NIC

FIGURE 1.35 A modem

FIGURE 1.36 A desktop power supply

FIGURE 1.37 Power supply in the case

FIGURE 1.38 A 20-pin ATX power connector

FIGURE 1.39 Peripheral power connectors

FIGURE 1.40 Laptop power supply

FIGURE 1.41 System unit airflow

FIGURE 1.42 CPU heat sink

Chapter 2

FIGURE 2.1 Audio connectors

FIGURE 2.2 Sound card with game port

FIGURE 2.3 A USB headset

FIGURE 2.4 VGA connectors

FIGURE 2.5 DVI connector

FIGURE 2.6 USB-C (top) and USB-A (bottom) connectors

FIGURE 2.7 HDMI cable and connector

FIGURE 2.8 DisplayPort port and connector

FIGURE 2.9 Two Thunderbolt ports

FIGURE 2.10 Video adjustment keys including F4 (LCD toggle), F7 (dim), and F...

FIGURE 2.11 Function (Fn) key

FIGURE 2.12 Laptop video toggle

FIGURE 2.13 Display Settings

FIGURE 2.14 Multiple displays

FIGURE 2.15 Multiple display options

FIGURE 2.16 Scale & Layout

FIGURE 2.17 A flash drive

FIGURE 2.18 SD memory cards

FIGURE 2.19 SD memory card slot and USB port

FIGURE 2.20 External hard drive

FIGURE 2.21 Netgear NAS device

FIGURE 2.22 mini DisplayPort on a MacBook Pro

FIGURE 2.23 Lightning cable

FIGURE 2.24 RJ11 and RJ45 connectors

FIGURE 2.25 SFP connector

FIGURE 2.26 RJ45 crimper

FIGURE 2.27 A TRENDnet cable tester

FIGURE 2.28 RJ11 and RJ45 ports

FIGURE 2.29 Wireless USB receiver

FIGURE 2.30 Keyboard and mouse PS/2 ports

FIGURE 2.31 A natural keyboard

FIGURE 2.32 Language & Region Settings

FIGURE 2.33 Language & Region options

FIGURE 2.34 Wireless optical mouse

FIGURE 2.35 Touchpad

FIGURE 2.36 Touchpad settings

FIGURE 2.37 Mouse settings

FIGURE 2.38 Mouse Properties window

FIGURE 2.39 Pointer Options tab

FIGURE 2.40 An uninterruptible power supply

FIGURE 2.41 The back of an uninterruptible power supply

FIGURE 2.42 Inkjet printer cartridges

FIGURE 2.43 Laser printer toner cartridges in a printer

FIGURE 2.44 Laser printer with lid ajar to reveal scanning glass

FIGURE 2.45 HP Scan utility

FIGURE 2.46 Back-panel connectors, including serial and parallel ports

FIGURE 2.47 Parallel cable

FIGURE 2.48 Printers & Scanners

FIGURE 2.49 Managing a printer

FIGURE 2.50 Printer properties

FIGURE 2.51 Printing preferences

FIGURE 2.52 Adding a new printer

FIGURE 2.53 Entering the IP address of the printer

FIGURE 2.54 HP ePrint configuration

Chapter 3

FIGURE 3.1 Laptop AC power adapter

FIGURE 3.2 Polarity symbols

FIGURE 3.3 A docking station

FIGURE 3.4 Cable lock

FIGURE 3.5 Cable lock insertion point

FIGURE 3.6 Audio adjustment keys F7 (quieter), F8 (louder), and F9 (micropho...

FIGURE 3.7 Point stick and touchpad on a laptop

FIGURE 3.8 Home screens for (a) iOS 17 and (b) Android 13 home screens

FIGURE 3.9 Portrait mode

FIGURE 3.10 Landscape mode

FIGURE 3.11 iOS security lock

FIGURE 3.12 iPhone Settings

FIGURE 3.13 Face ID & Passcode

FIGURE 3.14 Android Settings

FIGURE 3.15 Screen lock type

FIGURE 3.16 Identification numbers in (a) iOS and (b) Android

FIGURE 3.17 SIM tray and chip

FIGURE 3.18 iOS Settings

FIGURE 3.19 Wi-Fi is off.

FIGURE 3.20 Wi-Fi is on, with available networks.

FIGURE 3.21 Android connections

FIGURE 3.22 Wi-Fi networks

FIGURE 3.23 Wi-Fi network configuration

FIGURE 3.24 Airplane mode on iOS 17

FIGURE 3.25 iPhone Control Center

FIGURE 3.26 Android quick settings

FIGURE 3.27 Apple App Store

FIGURE 3.28 Google Play Store

FIGURE 3.29 iOS 17 cellular data options

FIGURE 3.30 Android Mobile Networks

FIGURE 3.31 Android Data Usage

FIGURE 3.32 iCloud configuration

FIGURE 3.33 iTunes sync

FIGURE 3.34 Accounts And Backup on Android

FIGURE 3.35 Google Drive backup options

FIGURE 3.36 A basic Kindle e-reader

FIGURE 3.37 Pokémon Go

FIGURE 3.38 Meta Quest 3

FIGURE 3.39 Pong

FIGURE 3.40 Amazon Echo Hub home assistant

FIGURE 3.41 Roku Ultra and Amazon Fire

FIGURE 3.42 ecobee smart thermostat

FIGURE 3.43 Café smart coffee maker

Chapter 4

FIGURE 4.1 The operating system interacts with hardware.

FIGURE 4.2 ENIAC

FIGURE 4.3 The first PC graphical user interface

FIGURE 4.4 Windows Performance Monitor

FIGURE 4.5 Lubuntu desktop

FIGURE 4.6 macOS Sonoma

FIGURE 4.7 Windows 3.11 Program Manager

FIGURE 4.8 Windows 95 desktop

FIGURE 4.9 Windows 8.1 Start screen

FIGURE 4.10 Google ChromeOS

FIGURE 4.11 iOS 17 home screen

FIGURE 4.12 Android 13 home screen

FIGURE 4.13 User accounts in Windows 11

FIGURE 4.14 Users & Groups in macOS

FIGURE 4.15 Lubuntu user and group settings

FIGURE 4.16 Adding a user account

FIGURE 4.17 Create a user

FIGURE 4.18 User Account Control

FIGURE 4.19 Making changes to your user account

FIGURE 4.20 User Account Control Settings

FIGURE 4.21 Programs And Features

FIGURE 4.22 Task Manager

FIGURE 4.23 Task Scheduler

FIGURE 4.24 Create a basic task

FIGURE 4.25 Starting a program

FIGURE 4.26 Services tab of Task Manager

FIGURE 4.27 Services management console

FIGURE 4.28 Bluetooth & Devices in Windows Settings

FIGURE 4.29 Device Manager

FIGURE 4.30 Driver details

FIGURE 4.31 Disk Management

FIGURE 4.32 Windows command prompt

FIGURE 4.33 Command prompt help

FIGURE 4.34 App associations

FIGURE 4.35 C: Properties

FIGURE 4.36 Disk Cleanup

FIGURE 4.37 This PC window

FIGURE 4.38 Directories in the C: drive

FIGURE 4.39 Several folders and files

FIGURE 4.40 Right-clicking a file

FIGURE 4.41 File properties

FIGURE 4.42 File security

FIGURE 4.43 Test folder with

text1

file

FIGURE 4.44 File attributes in the command prompt

FIGURE 4.45 Advanced attributes

FIGURE 4.46 Browsing for a folder or file

FIGURE 4.47 VirtualBox preconfiguration

FIGURE 4.48 VirtualBox with a virtual drive

FIGURE 4.49 Lubuntu – Settings dialog

FIGURE 4.50 Lubuntu live session

FIGURE 4.51 Installing Lubuntu

Chapter 5

FIGURE 5.1 System requirements

FIGURE 5.2 Adobe reader download site

FIGURE 5.3 Third-party websites

FIGURE 5.4 Microsoft product key

FIGURE 5.5 Turning Windows features on or off

FIGURE 5.6 Uninstalling an application

FIGURE 5.7 Installed apps

FIGURE 5.8 Bluetooth & Devices window

FIGURE 5.9 Windows Update

FIGURE 5.10 Windows Installed updates

FIGURE 5.11 Device Manager

FIGURE 5.12 Updating Drivers screen

FIGURE 5.13 Driver management

FIGURE 5.14 Default Apps window

FIGURE 5.15 Choosing default apps by file type

FIGURE 5.16 Word document

FIGURE 5.17 Microsoft Excel

FIGURE 5.18 Microsoft PowerPoint

FIGURE 5.19 HR hiring process flowchart example

FIGURE 5.20 Norton 360

FIGURE 5.21 Norton 360 settings

FIGURE 5.22 Two ways to configure a screened subnet

FIGURE 5.23 Windows Defender Firewall

FIGURE 5.24 7-Zip file manager

FIGURE 5.25 7-Zip archive options

FIGURE 5.26 Creating a PDF file from Office 365

FIGURE 5.27 Viewing a PDF file

FIGURE 5.28 (a) Chrome and (b) Edge options menus

FIGURE 5.29 (a) Safari and (b) mobile Chrome options menus

FIGURE 5.30 About Google Chrome

FIGURE 5.31 Microsoft Edge version

FIGURE 5.32 Chrome add-ons/extensions

FIGURE 5.33 You and Google

FIGURE 5.34 Synchronization options

FIGURE 5.35 Manage What You Sync

FIGURE 5.36 Edge sync settings

FIGURE 5.37 Creating a bookmark

FIGURE 5.38 Chrome new tab with Bookmarks folder

FIGURE 5.39 Edge new tab with favorites

FIGURE 5.40 Chrome search engine

FIGURE 5.41 Chrome accessibility options

FIGURE 5.42 Chrome appearance settings

FIGURE 5.43 Chrome privacy and security

FIGURE 5.44 Clear Browsing Data

FIGURE 5.45 Pop-ups and redirects

FIGURE 5.46 Google Password Manager

FIGURE 5.47 Microsoft Wallet

FIGURE 5.48 Incognito browsing

FIGURE 5.49 InPrivate Browsing

Chapter 6

FIGURE 6.1 Calculator in Programmer view

FIGURE 6.2 Hello, world!

FIGURE 6.3 “Hello, world!” JavaScript alert

FIGURE 6.4 Flowchart

Chapter 7

FIGURE 7.1 Simple data in a worksheet

FIGURE 7.2 Simple data in Access

FIGURE 7.3 Logical relational database schema

FIGURE 7.4 Logical schema with primary keys

FIGURE 7.5 Microsoft Access table

FIGURE 7.6 Form in Microsoft Access

FIGURE 7.7 Microsoft Access

FIGURE 7.8 Empty database

FIGURE 7.9 Two tables

FIGURE 7.10 Get External Data window

FIGURE 7.11

Imported Customers

table

FIGURE 7.12 Backing up a database

FIGURE 7.13 Installing Northwind

FIGURE 7.14 Customer details

Chapter 8

FIGURE 8.1 A DSL modem

FIGURE 8.2 The back of the DSL modem

FIGURE 8.3 iOS (a) and Android (b) hotspot configuration

FIGURE 8.4 Bluetooth USB adapter

FIGURE 8.5 Infrared port

FIGURE 8.6 Eight-port switch

FIGURE 8.7 Sample network with routers and switches

FIGURE 8.8 A wireless router

FIGURE 8.9 DoD model and the TCP/IP protocol suite

FIGURE 8.10 IPv6 address

FIGURE 8.11

ipconfig /all

output

FIGURE 8.12

tracert

output

FIGURE 8.13 NETGEAR NAS device

FIGURE 8.14 Google Drive

FIGURE 8.15 Sharing a folder on Google Drive

FIGURE 8.16 Linksys Smart Wi-Fi

FIGURE 8.17 Linksys app home page

FIGURE 8.18 Wi-Fi Settings

FIGURE 8.19 Connectivity settings

FIGURE 8.20 iOS joining a wireless network

FIGURE 8.21 Android Wi-Fi settings

FIGURE 8.22 Guest network configuration

FIGURE 8.23 DHCP configuration

FIGURE 8.24 Firewall settings

FIGURE 8.25 Parental controls

Chapter 9

FIGURE 9.1 Type 1 and Type 2 hypervisors

FIGURE 9.2 Enabling Hyper-V

FIGURE 9.3 Microsoft Hyper-V Manager

FIGURE 9.4 Lubuntu guest OS

FIGURE 9.5 Common cloud service levels

FIGURE 9.6 Basic computing model

FIGURE 9.7 Basic AI computing model

FIGURE 9.8 A neural network

FIGURE 9.9 Chatbot on a website

FIGURE 9.10 ChatGPT

FIGURE 9.11 Craiyon AI art

FIGURE 9.12 Predictive AI suggestions

FIGURE 9.13 New Virtual Machine Wizard

Chapter 10

FIGURE 10.1 The CIA triad

FIGURE 10.2 Laptop privacy screen

Source:

StarTech.com

FIGURE 10.3 A laptop security cable

FIGURE 10.4 Cookie consent

FIGURE 10.5 Virus spreading from an infected system

FIGURE 10.6 Email viruses can spread quickly.

FIGURE 10.7 RSA SecurID

FIGURE 10.8 PingID

FIGURE 10.9 Security log in Event Viewer

FIGURE 10.10 Microsoft Edge site-viewing history

Chapter 11

FIGURE 11.1 Windows Update

FIGURE 11.2 An iOS update is available.

FIGURE 11.3 Android software update

FIGURE 11.4 Android (a) and iOS (b) security settings

FIGURE 11.5 Windows 11 Lock Screen window

FIGURE 11.6 Screen Saver Settings dialog box

FIGURE 11.7 Cable locks

FIGURE 11.8 USB locks

FIGURE 11.9 Disabling a USB port in Device Manager

FIGURE 11.10 Security And Maintenance screen

FIGURE 11.11 Printer driver search results

FIGURE 11.12 Windows Services

FIGURE 11.13 Bluetooth Support Service properties

FIGURE 11.14 AutoPlay options

FIGURE 11.15 Autofill in Chrome

FIGURE 11.16 Edge settings

FIGURE 11.17 SmartScreen filter

FIGURE 11.18 Chrome Privacy And Security settings

FIGURE 11.19 Folder permissions

FIGURE 11.20 Select Users Or Groups dialog box

FIGURE 11.21 User permissions

FIGURE 11.22 Advanced Attributes dialog box

FIGURE 11.23 Windows Certificate Manager

FIGURE 11.24 Certificate Export Wizard

FIGURE 11.25 The macOS FileVault

FIGURE 11.26 A VPN

Chapter 12

FIGURE 12.1 RAID 1 and RAID 5

FIGURE 12.2 Front and back of a UPS

FIGURE 12.3 Advanced file attributes

FIGURE 12.4 Windows Backup

FIGURE 12.5 Backup And Restore

FIGURE 12.6 Select a backup location

FIGURE 12.7 Schedule options

FIGURE 12.8 Restoring files

FIGURE 12.9 Adding the backup file

FIGURE 12.10 Recovery options

FIGURE 12.11 System Protection tab in System Properties

FIGURE 12.12 Choosing a restore point

FIGURE 12.13 System Configuration utility

FIGURE 12.14 Task Manager Startup apps

FIGURE 12.15 Event Viewer

FIGURE 12.16 Configuring an application for compatibility mode

FIGURE 12.17 Pinging the loopback address

FIGURE 12.18

ipconfig

results

FIGURE 12.19 Successful

ping

results

FIGURE 12.20 Successful

tracert

results

Guide

Cover

Table of Contents

Title Page

Copyright

Dedication

Acknowledgments

About the Author

About the Technical Editor

Table of Exercises

Introduction

Begin Reading

Appendix A: Answers to Written Labs

Appendix B: Answers to Review Questions

Index

End User License Agreement

Pages

i

v

vi

vii

ix

xi

xiii

xxiii

xxiv

xxv

xxvi

xxvii

xxviii

xxix

xxx

xxxi

xxxii

xxxiii

xxxiv

xxxv

xxxvi

xxxvii

xxxviii

xxxix

xl

xli

xlii

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40

41

42

43

44

45

46

47

48

49

50

51

52

53

54

55

56

57

58

59

60

61

62

63

64

65

67

68

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

102

103

104

105

106

107

108

109

110

111

112

113

114

115

116

117

118

119

120

121

122

123

124

125

126

127

128

129

130

131

132

133

134

135

136

137

138

139

140

141

142

143

144

145

146

147

148

149

150

151

152

153

154

155

156

157

158

159

160

161

162

163

164

165

166

167

168

169

170

171

172

173

174

175

176

177

178

179

180

181

182

183

184

185

186

187

188

189

190

191

192

193

194

195

196

197

198

199

200

201

202

203

204

205

206

207

208

209

210

211

212

213

214

215

216

217

218

219

220

221

222

223

224

225

226

227

228

229

230

231

232

233

234

235

236

237

238

239

240

241

242

243

244

245

246

247

248

249

250

251

252

253

254

255

256

257

258

259

260

261

262

263

264

265

266

267

268

269

270

271

272

273

275

276

277

278

279

280

281

282

283

284

285

286

287

288

289

290

291

292

293

294

295

296

297

298

299

300

301

302

303

304

305

306

307

308

309

310

311

312

313

314

315

316

317

318

319

320

321

322

323

324

325

326

327

328

329

330

331

332

333

334

335

336

337

338

339

340

341

342

343

344

345

346

347

348

349

350

351

353

354

355

356

357

358

359

360

361

362

363

364

365

366

367

368

369

370

371

372

373

374

375

376

377

378

379

380

381

382

383

385

386

387

388

389

390

391

392

393

394

395

396

397

398

399

400

401

402

403

404

405

406

407

408

409

410

411

412

413

414

415

416

417

418

419

420

421

422

423

424

425

426

427

428

429

430

431

432

433

434

435

436

437

438

439

440

441

442

443

444

445

446

447

448

449

450

451

452

453

454

455

456

457

458

459

460

461

462

463

464

465

466

467

468

469

470

471

472

473

474

475

476

477

478

479

480

481

482

483

485

486

487

488

489

490

491

492

493

494

495

496

497

498

499

500

501

502

503

504

505

506

507

508

509

510

511

512

513

514

515

517

518

519

520

521

522

523

524

525

526

527

528

529

530

531

532

533

534

535

536

537

538

539

540

541

542

543

544

545

546

547

548

549

550

551

552

553

554

555

556

557

558

559

560

561

562

563

564

565

566

567

568

569

570

571

572

573

574

575

576

577

578

579

580

581

582

583

584

585

586

587

588

589

590

591

592

593

594

595

596

597

598

599

600

601

602

603

604

605

606

607

608

609

610

611

612

613

614

615

616

617

618

619

620

621

622

623

624

625

626

627

628

629

630

631

632

633

634

635

636

637

638

639

640

641

642

643

644

645

646

647

648

649

650

651

652

653

654

655

656

657

658

659

660

661

662

663

664

665

666

667

668

669

670

671

672

673

674

675

676

677

678

679

680

681

682

683

684

685

686

687

688

689

690

691

692

693

694

695

696

697

698

699

700

701

702

703

704

705

706

707

708

709

710

711

712

713

714

715

716

717

718

719

720

721

722

723

724

725

726

727

 

CompTIA® Tech+®Study Guide

Exam FC0-U71

 

Third Edition

 

Quentin Docter

 

 

 

Copyright © 2025 by John Wiley & Sons, Inc. All rights, including for text and data mining, AI training, and similar technologies, are reserved.

Published by John Wiley & Sons, Inc., Hoboken, New Jersey.Published simultaneously in Canada and the United Kingdom.

ISBNs: 9781394288793 (paperback), 9781394288816 (ePDF), 9781394288809 (ePub)

No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4470, or on the web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at www.wiley.com/go/permission.

Trademarks: WILEY, the Wiley logo, and Sybex are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without written permission. CompTIA is a registered trademark of The Computing Technology Industry Association, Inc. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc. is not associated with any product or vendor mentioned in this book.

Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.

For general information on our other products and services, please contact our Customer Care Department within the United States at (800) 762-2974, outside the United States at (317) 572- 3993. For product technical support, you can find answers to frequently asked questions or reach us via live chat at https://sybexsupport.wiley.com.

Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic formats. For more information about Wiley products, visit our web site at www.wiley.com.

Library of Congress Cataloging in Publication data available on request.

Cover image: © Jeremy Woodhouse/Getty Images, Inc.

Cover design: Wiley

 

 

 

 

In memory of Grandpa Joe, who fostered my love of technology and so much more

Acknowledgments

First and foremost, I need to thank my family. Without their support and patience, I would never be able to work on projects like this.

They say it takes a village to produce a book, and it always amazes me at the number of people who are involved. I have been fortunate to work with a great Sybex crew yet again. Liz Britten was the project manager. Thanks, Liz, for keeping us on track and answering all of my random questions. Kenyon Brown was the senior acquisitions editor for this book—thank you, Kenyon, for asking me to take on this book.

Chris Crayton, my technical editor, is the best in the business. Thank you, Chris, for always challenging me with ideas to improve the book, as well as catching my silly mistakes. In addition, Satish Gowrishankar, Saravanan Dakshinamurthy, and Hariharan Jayamoorthy all played excellent roles in ensuring the quality of this work. Thank you, gentlemen. To Liz Welch, my copy editor, thank you for correcting my grammar mistakes over and over again. I saw you fixing the same ones chapter after chapter—my grammar might not be the best, but at least I am consistent! Finally, Nancy Carrasco, thank you for being the final set of eyes to make sure we didn’t miss anything. I very much so appreciate you all!

About the Author

Quentin Docter started in the IT industry as a tech support agent for Packard Bell in 1994. Since then he has worked in tech support, network administration, consulting, training, web development, and project management. During his career, he has achieved certifications from CompTIA (including Tech+, A+, and Cloud Essentials+), Microsoft, Cisco, Novell, and Sun Microsystems. He is the author of several books, including the CompTIA A+ Complete Study Guide from Sybex, 2022, an imprint of Wiley.

About the Technical Editor

Chris Crayton, MCSE, CISSP, CASP+, PenTest+, CySA+, Cloud+, S+, N+, A+, ITF+, is a technical consultant, trainer, author, and industry-leading technical editor. He has worked as a computer technology and networking instructor, information security director, network administrator, network engineer, and PC specialist. Chris has served as technical editor and content contributor on numerous technical titles for several of the leading publishing companies. He has also been recognized with many professional and teaching awards.

Table of Exercises

Exercise 1.1

Converting Between Decimal and Other Numbering Systems

Exercise 1.2

Assessing Your Computer’s RAM and Virtual Memory in Windows 11

Exercise 1.3

Determining the Type of Installed RAM

Exercise 1.4

Examining Storage Drives in Windows 11

Exercise 2.1

Adjusting a Desktop Monitor

Exercise 2.2

Changing the Settings for Multiple Monitors

Exercise 2.3

Changing Your Keyboard Layout in Windows 11

Exercise 2.4

Disabling a Touchpad in Windows 11

Exercise 2.5

Configuring a Mouse in Windows 11

Exercise 2.6

Installing an IP Printer

Exercise 3.1

Changing Security Settings on iOS 17

Exercise 3.2

Changing Security Settings on Android 13

Exercise 4.1

Creating a User Account in Windows 11

Exercise 4.2

Changing Windows User Account Control

Exercise 4.3

Creating a Task with Task Scheduler

Exercise 4.4

Managing Storage Space in Windows

Exercise 4.5

Modifying File Attributes and Using the Command Prompt

Exercise 4.6

Manipulating Files in Windows

Exercise 4.7

Creating a Shortcut in Windows

Exercise 5.1

Installing and Uninstalling Operating System Features

Exercise 5.2

Installing 7-Zip

Exercise 5.3

Installing Free Applications

Exercise 5.4

Configuring Windows Update

Exercise 5.5

Using 7-Zip to Create an Archive

Exercise 5.6

Downloading and Installing Adobe Reader

Exercise 5.7

Managing Cache in Chrome

Exercise 5.8

Configuring the Chrome Pop-Up Blocker

Exercise 6.1

Converting Between Decimal and Other Numbering Systems

Exercise 6.2

Creating “Hello, World!” in HTML

Exercise 7.1

Creating a Database and Tables in Microsoft Access

Exercise 7.2

Importing Data from Excel to Access

Exercise 8.1

Pricing Internet Connectivity

Exercise 8.2

The Cost of Networking

Exercise 8.3

Finding Your IP Configuration Information in Windows

Exercise 9.1

Enabling Hyper-V in Windows 11

Exercise 9.2

Using Generative AI

Exercise 10.1

Testing Social Engineering

Exercise 11.1

Securing a Windows 11 PC from Unauthorized Local Use

Exercise 11.2

Starting and Stopping Services in Windows 11

Exercise 11.3

Configuring SmartScreen in Microsoft Edge

Exercise 11.4

Encrypting Local Folders in Windows 11

Exercise 11.5

Backing Up a Windows Security Certificate

Exercise 12.1

Setting Up a Backup in Windows 11

Exercise 12.2

Restoring Files in Windows 11

Exercise 12.3

Booting into Safe Mode in Windows 11

Exercise 12.4

Using System Restore in Windows 11

Exercise 12.5

Using the System Configuration Utility in Windows 11

Exercise 12.6

Creating a Desktop Shortcut for MSCONFIG

Exercise 12.7

Running an Application in Compatibility Mode

Exercise 12.8

Checking TCP/IP Connectivity

Introduction

If you’re picking up this book, it means it’s likely that either you’re thinking about getting into the IT industry, or you are relatively new to it. Either way, you are probably getting advice from nearly everyone you meet. One of the common refrains you probably hear is “Get certified!” With so many certifications out there, you might wonder where to start—CompTIA Tech+ is that place.

Certification is one of the best things you can do for your career if you are working in, or want to break into, the IT profession, because it proves that you know what you’re talking about regarding the subjects in which you’re certified. It also powerfully endorses you as a professional in a way that’s similar to a physician being board certified in a certain area of expertise. It can add to your résumé and make you more attractive to potential employers and more valuable as an employee. Anything you can do to stay ahead of the competition—even standing out among your present colleagues—could make a big difference in whether or not you gain a promotion!

In this book, you’ll find out what the Tech+ exam is all about because each chapter covers a part of the exam. I’ve included some great review questions at the end of each chapter to help crystallize the information you learned and solidly prepare you to ace the exam. This book covers more than just the exam, though. I believe in providing my students with a foundation of IT knowledge that will prepare them for real jobs, not just to pass a test. After all, life is not a multiple-choice test with the answers clearly laid out in front of you!

A really cool thing about working in IT is that it’s constantly evolving, so there are always new things to learn and fresh challenges to master. Once you obtain your Tech+ certification and discover that you’re interested in taking it further by getting into more complex topics (and making more money), the CompTIA A+ certification is definitely your next step.

What Is the CompTIA Tech+ Certification?

Tech+ is a certification developed by the Computing Technology Industry Association (CompTIA) that exists to provide resources and education for the computer and technology community. This is the same body that developed the A+ exam for PC technicians, Network+ for networking experts, and Security+ for security practitioners.

Way back in 1995, members of the organization got together to develop a new certification that tests skills for IT. To ensure industrywide support, it was sponsored by many past and present IT industry leaders like these:

Compaq Computers

Digital Equipment Corporation (a part of Compaq)

IBM

Lotus

Microsoft

Novell

TSS

U.S. Robotics

US West

Wave Technologies

The Tech+ exam was designed to test the skills of those with little to no experience in the field but who want to show that they have a broad general understanding of core IT topics. It tests areas such as computer hardware, operating systems and applications, basic networking, security, and setting up and maintaining a computer.

Why Become Tech+ Certified?

Because CompTIA is a well-respected developer of vendor-neutral industry certifications, becoming Tech+ certified proves that you have a base level of knowledge in the specific areas tested by the Tech+ objectives.

Four major benefits are associated with becoming Tech+ certified:

Proof of Professional Achievement

Computer professionals are pretty competitive when it comes to collecting more certifications than their peers. And because the Tech+ certification broadly covers the entire field of computers, it’s a great stepping-stone to prove that you have what it takes to succeed in this industry. Because it’s rare to gain something that’s worth a lot with little effort, I’ll be honest—preparing for the Tech+ exam isn’t exactly a lazy day at the beach. But passing the test is worth it because it will get the attention of potential employers.

Opportunity for Advancement

We all like to get ahead in our careers—advancement results in more responsibility and prestige, and it usually means a fatter paycheck, greater opportunities, and added options. In the IT sector, a great way to make sure all that good stuff happens is by earning a lot of technology certifications, including Tech+.

Fulfillment of Training Requirements

Tech+, because of its wide-reaching industry support, is recognized as a baseline of computer knowledge. This can potentially fulfill IT-related training requirements set forth by your company.

Customer Confidence

As companies discover the CompTIA advantage, they will undoubtedly require qualified staff to achieve these certifications. Many companies outsource their work to consulting firms with experience working with security. Firms that have certified staff have a definite advantage over firms that don’t.

How to Become Tech+ Certified

As this book goes to press, Pearson VUE is the sole Tech+ exam provider. The following is the necessary contact information and exam-specific details for registering. Exam pricing might vary by country or by CompTIA membership.

Vendor

Website

Phone Number

Pearson VUE

https://home.pearsonvue.com/comptia

U.S. and Canada: 877-551-PLUS (7587)

When you schedule the exam, you’ll receive instructions regarding appointment and cancellation procedures, ID requirements, and information about the testing center location. In addition, you’ll receive a registration and payment confirmation letter. Exams can be scheduled up to six weeks out or as late as the next day (or, in some cases, even the same day).

  Exam prices and codes may vary based on the country in which the exam is administered. For detailed pricing and exam registration procedures, refer to CompTIA’s website at www.comptia.org.

After you’ve successfully passed your Tech+ exam, CompTIA will award you a certification. Within four to six weeks of passing the exam, you’ll receive your official CompTIA Tech+ certificate and ID card. (If you don’t receive these within eight weeks of taking the test, contact CompTIA directly using the information found in your registration packet.)

Tips for Taking the Tech+ Exam

Here are some general tips for taking your exam successfully:

Bring two forms of ID with you. One must be a photo ID, such as a driver’s license. The other can be a major credit card or a passport. Both forms must include a signature.

Arrive early at the exam center so you can relax and review your study materials, particularly tables and lists of exam-related information. Once you are ready to enter the testing room, you will need to leave everything outside; you won’t be able to bring any materials into the testing area.

Read the questions carefully. Don’t be tempted to jump to an early conclusion. Make sure you know exactly what each question is asking.

Don’t leave any unanswered questions. Unanswered questions are scored against you. There will be questions with multiple correct responses. When there is more than one correct answer, a message at the bottom of the screen will prompt you either to “choose two” or “choose all that apply.” Be sure to read the messages displayed to know how many correct answers you must choose.

When answering multiple-choice questions about which you’re unsure, use a process of elimination to get rid of the obviously incorrect answers first. Doing so will improve your odds if you need to make an educated guess.

On form-based tests (nonadaptive), because the hard questions will take the most time, save them for last. You can move forward and backward through the exam.

For the latest pricing on the exams and updates to the registration procedures, visit CompTIA’s website at

www.comptia.org

.

Who Should Read This Book?

You—if want to pass the Tech+ exam and pass it confidently! This book is chock-full of the exact information you need and directly maps to Tech+ exam objectives (listed later in this introduction), so if you use it to study for the exam, your odds of passing shoot way up.

In addition to including every bit of knowledge you need to learn to pass the exam, I’ve included some really great tips and solid wisdom to equip you even further to work successfully in the real IT world.

What Does This Book Cover?

This book covers everything you need to know to pass the CompTIA Tech+ exam. But in addition to studying the book, it’s a good idea to practice on actual computers if you can.

Here’s a list of the 12 chapters in this book:

Chapter 1, “Core Hardware Components”

This chapter introduces you to the core insides of a computer, specifically motherboards, processors, memory, storage, expansion slots, power, and cooling systems.

Chapter 2, “Peripherals and Connectors”

While core hardware is important, users can truly customize their computer experience by adding peripheral hardware. To connect all of those toys to your system, you need to know which connectors to use, and this chapter teaches you all of that.

Chapter 3, “Computing Devices and the Internet of Things”

Now that you’ve learned about all of the individual hardware components, how do they all work together? This chapter discusses features of servers, workstations, laptops, tablets, smartphones, and gaming consoles. It also introduces the Internet of Things (IoT), which can turn practically anything into a device.

Chapter 4, “Operating Systems”

Without an operating system, computer hardware makes a pretty good doorstop. The operating system is the most critical piece of software on a computer, because it coordinates the efforts of the hardware and provides an interface for the user to interact with the machine.

Chapter 5, “Software Applications”

This chapter covers a variety of common application types that reside on computers, such as productivity software, collaboration software, utility software, and web browsers. It also teaches you about software management and the proper ways to install, uninstall, and manage applications.

Chapter 6, “Software Development”

Have you ever wondered how applications get created? This chapter will teach you the characteristics of several classes of programming languages. You will also see examples of code, programming logic, and organizational methods.

Chapter 7, “Database Fundamentals”

Databases are a key part of computing systems today. Data is the new currency, and therefore databases are like a bank vault. This chapter walks you through database concepts and structures, and it shows you some methods to interact with databases.

Chapter 8, “Networking Concepts and Technologies”

Who doesn’t want to get on the Internet? Wireless networks are popular today as a method to get Internet connectivity. You’ll learn about key networking technologies and how to configure a wireless router in this chapter.

Chapter 9, “Cloud Computing and Artificial Intelligence”

These are two of the biggest trends in IT today, the cloud and AI. First you will learn what the cloud is, and isn’t (for example, it’s neither fluffy nor in the sky). Then you will learn how AI works and explore different AI applications.

Chapter 10, “Security Concepts and Threats”

The downside to computers is that it seems like hackers are everywhere. This chapter will introduce you to common threats posed by would-be attackers so you know how to avoid them. It also introduces a security framework and access control concepts.

Chapter 11, “Security Best Practices”

This chapter builds on

Chapter 10

by showing you how to set up your system to protect it against attacks. You will learn about hardening devices, managing users, and using data encryption.

Chapter 12, “Data Continuity and Computer Support”

Inevitably, computers will run into problems—it’s the nature of electronic components. This chapter will show you how to troubleshoot any issues that pop up.

Warning

: After reading this chapter, all of your family members will call on you for technical support (if they don’t already)! This chapter also shows you how to plan for eventual computer problems so that you don’t totally lose your data.

What’s Included in the Book

I’ve included the following study tools throughout the book:

Assessment Test

At the end of this introduction is an Assessment Test that you can use to check your readiness for the exam. Take this test before you start reading the book; it will help you determine the areas where you might need to brush up. The answers to the Assessment Test questions appear on a separate page after the last question of the test. Each answer includes an explanation and a note telling you the chapter in which the material appears.

Objective Map and Opening List of Objectives

Just before the Assessment Test, you’ll find a detailed exam objective map, showing you where each of the CompTIA exam objectives is covered in this book. In addition, each chapter opens with a list of the exam objectives it covers. Use these to see exactly where each of the exam topics is covered.

Exam Essentials

Each chapter, just after the summary, includes a number of exam essentials. These are the key topics that you should take from the chapter in terms of areas to focus on when preparing for the exam.

Lab Exercises

Each chapter includes a hands-on lab to give you more experience. These exercises map to the exam objectives. Some ask specific questions, and you can find the answers to those questions in

Appendix A

.

Chapter Review Questions

To test your knowledge as you progress through the book, there are 20 review questions at the end of each chapter. As you finish each chapter, answer the review questions and then check your answers—the correct answers and explanations are in

Appendix B

. You can go back to reread the section that deals with each question you got wrong in order to ensure that you answer correctly the next time you’re tested on the material.

 Go to http://www.wiley.com/go/sybextestprep to register and gain access to this interactive online learning environment and test bank with study tools.

Interactive Online Learning Environment and Test Bank

The interactive online learning environment that accompanies CompTIA Tech+ Study Guide: Exam FC0-U71, Third Edition, provides a test bank with study tools to help you prepare for the certification exam and increase your chances of passing it the first time! The test bank includes the following:

Sample Tests

All of the questions in this book are provided, including the Assessment Test, which you’ll find at the end of this introduction, and the review questions at the end of each chapter. In addition, there are two Practice Exams with more than 60 questions each. Use these questions to test your knowledge of the study guide material. The online test bank runs on multiple devices.

Flashcards

Questions are provided in digital flashcard format (a question followed by a single correct answer). You can use the flashcards to reinforce your learning and provide last-minute test prep before the exam.

Other Study Tools

A glossary of key terms from this book and their definitions is available as a fully searchable PDF.

  Like all exams, the Tech+ certification from CompTIA is updated periodically and may eventually be retired or replaced. At some point after CompTIA is no longer offering this exam, the old editions of our books and online tools will be retired. If you have purchased this book after the exam was retired, or are attempting to register in the Sybex online learning environment after the exam was retired, please know that we make no guarantees that this exam’s online Sybex tools will be available once the exam is no longer available.

How to Use This Book

If you want a solid foundation for the serious effort of preparing for the Tech+ exam, then look no further because I’ve spent countless hours putting together this book with the sole intention of helping you to pass it!

This book is loaded with valuable information, and you will get the most out of your study time if you understand how I put the book together. Here’s a list that describes how to approach studying:

Take the Assessment Test immediately following this introduction. (The answers are at the end of the test, but no peeking!) It’s okay if you don’t know any of the answers—that’s what this book is for. Carefully read over the explanations for any question you get wrong, and make note of the chapters where that material is covered.

Study each chapter carefully, making sure you fully understand the information and the exam objectives listed at the beginning of each one. Again, pay extra-close attention to any chapter that includes material covered in questions you missed on the Assessment Test.

Complete the lab exercise at the end of each chapter. Do

not

skip these exercises. One reason is that they directly map to the CompTIA objectives and reinforce the material. Another reason is that it gives you hands-on experience, which is crucial.

Answer all the review questions related to each chapter. Specifically, note any questions that confuse you, and study the corresponding sections of the book again. And don’t just skim these questions—make sure you understand each answer completely.

Try your hand at the Practice Exams. The more questions you practice, the better you will be when you sit for the real exam.

Test yourself using all of the electronic flashcards. This is a new and updated flashcard program to help you prepare for the latest CompTIA Tech+ exam, and it is a really great study tool.

Learning every bit of the material in this book is going to require you to apply yourself with a good measure of discipline. So, try to set aside the same time period every day to study, and select a comfortable and quiet place to do so. If you work hard, you will be surprised at how quickly you learn this material.

If you follow the steps listed here and study with the Review Questions, Practice Exams, electronic flashcards, and all of the written labs, I’m confident you have a great chance of passing the CompTIA Tech+ exam. However, studying for the Tech+ exam is a little like training for a marathon—if you don’t go for a good run every day, you’re not likely to finish very well.

Exam Objectives

Speaking of objectives, you’re probably pretty curious about them, right? CompTIA asked groups of IT professionals to fill out a survey rating the skills they felt were important in their jobs, and the results were grouped into objectives for the exam and divided into six domains.

This table gives you the extent by percentage in which each domain is represented on the actual examination.

Domain

% of Examination

1.0 IT Concepts and Terminology

13%

2.0 Infrastructure

24%

3.0 Applications and Software

18%

4.0 Software Development Concepts

13%

5.0 Data and Database Fundamentals

13%

6.0 Security

19%

Total

100%

 Exam objectives are subject to change at any time without prior notice and at CompTIA’s sole discretion. Please visit CompTIA’s website (www.comptia.org) for the most current listing of exam objectives.

CompTIA Tech+ Study Guide

FC0-U71 Exam Objectives

Objective

Chapter(s)

1.0 IT Concepts and Terminology

1.1 Explain the basics of computing.

1

1.2 Identify notational systems.

6

1.3 Compare and contrast common units of measure.

1

,

2

,

8

1.4 Explain the troubleshooting methodology.

12

2.0 Infrastructure

2.1 Explain common computing devices and their purposes.

3

2.2 Explain the purpose of common internal computing components.

1

2.3 Compare and contrast storage types.

1

,

2

,

8

2.4 Given a scenario install and configure common peripheral devices.

2

2.5 Compare and contrast common types of input/output device interfaces.

2

2.6 Compare and contrast virtualization and cloud technologies.

9

2.7 Compare and contrast Internet service types.

8

2.8 Identify basic networking concepts.

8

2.9 Explain the basic capabilities of a small wireless network.

8

3.0 Applications and Software

3.1 Identify components of an OS.

4

3.2 Explain the purpose of operating systems.

4

3.3 Explain the purpose and proper use of software.

5

3.4 Given a scenario, configure and use web browser features.

5

3.5 Identify common uses of artificial intelligence (AI).

9

4.0 Software Development Concepts

4.1 Compare and contrast programming language categories.

6

4.2 Identify fundamental data types and their characteristics.

6

4.3 Explain the purpose and use of programming concepts.

6

4.4 Identify programming organizational techniques and logic concepts.

6

5.0 Data and Database Fundamentals

5.1 Explain the value of data and information.

10

5.2 Explain database concepts and the purpose of a database.

7

5.3 Compare and contrast various database structures.

7

5.4 Explain basic data backup concepts.

12

6.0 Security

6.1 Explain fundamental security concepts and frameworks.

10

6.2 Explain methods to secure devices and security best practices.

5

,

11

6.3 Explain password best practices.

11

6.4 Identify common use cases for encryption.

11

6.5 Given a scenario, configure security settings for a small wireless network.

8

How to Contact the Publisher

If you believe you have found a mistake in this book, please bring it to our attention. At John Wiley & Sons, we understand how important it is to provide our customers with accurate content, but even with our best efforts an error may occur.

In order to submit your possible errata, please email it to our Customer Service Team at [email protected] with the subject line “Possible Book Errata Submission.”

Assessment Test

Which of the following optical discs will store the most data?

CD-ROM

DVD-ROM DL

DVD-ROM DS

RS-ROM

Which of the following devices are used to permanently store user data in a computer? (Choose two.)

HDD

RAM

ROM

SSD

Which of the following on your computer is considered firmware?

RAM

SSD

CMOS

BIOS

What was the first widely adopted video connector standard?

HDMI

VGA

USB

DVI

What type of removable storage is often used in digital cameras?

Flash drive

NAS

Memory card

Mobile media card

Which of the following network speeds provides the greatest throughput?

100 Gbps

100 Mbps

1 Kbps

1000 bps

Angela has an iPhone with a biometric scanner enabled. She powered the device off, and just turned it back on. What methods can she use to unlock her phone?

Facial recognition only

Passcode only

Facial recognition or passcode

Facial recognition, fingerprint ID, or passcode

You are setting up a new Wi-Fi connection on your iPad. What is the first step in the process?

Enter wireless password.

Verify Internet connection.

Verify wireless capabilities.

Locate SSID.

Turn on Wi-Fi.

What type of security is involved when pairing two Bluetooth devices together?

SSL certificates are exchanged.

A PIN is provided by the Bluetooth device.

The Bluetooth security layer negotiates the security mechanism.

There is no security involved.

You install a new video card into a computer but it only gives you basic resolution. A friend suggests you check the driver version. Where would you do that in Windows?

Device Manager

Video Card Manager

Task manager

Services Manager

Which Windows feature helps prevent against catastrophic system changes such as accidentally installing malware?

Application Manager

UAC

Encryption

Task Manager

If you buy a new Apple tablet computer, what operating system can you expect to find on it?

Android

iOS

iPadOS

macOS

Which of the following is not considered productivity software?

Spreadsheet software

Web browser

Online workspace

Visual diagramming software

Which of the following is the most legitimate place to download a software application from?

Perpetual website

Piracy website

OEM website

Third-party website

The cache in a web browser stores what?

The list of favorite websites

User configuration information

Private browsing settings

Temporary files

Which data type exists only in true and false states?

Binary

Boolean

Char

Float

Code that is not part of the functionality of the program but that is intended to be easy for people to read is called what?

Compiled

Interpreted

Commented

Pseudocode

Which of the following container types has a fixed length?

Constant

Array

Vector

String

When creating a relational database, what is the name of the rules and structure?

Forms

Tables

Schema

Constraints

Which of the following statements is true regarding a foreign key in a relational database?

They are required.

There can be only one per table.

They are automatically indexed.

Null values are allowed.

David, a database administrator, needs to remove a column from an existing database. Which command should he use?

ALTER

DELETE

DROP

REMOVE

You open your web browser and type in

www.google.com

, but your computer can’t find the website. Your neighbor’s computer finds it just fine. What is most likely the cause?

Incorrect DNS configuration.

Incorrect DHCP configuration.

Incorrect WPA2 configuration.

The website is down.

Your friend Marcos asks you which of the following are the most secure. What do you tell him?

802.11n

Infrared

Fiber-optic

UTP

Your need to set up a wireless router for a friend. He wants to be sure that his network is secure. Which wireless security method should you implement?

WPA2

WPA

WPA3

WEP

Which hypervisor is typically used in server-side virtualization?

Type 1