E N D
The CompTIA Strata IT Fundamentals certificate program offers individuals a broad introduction to computing technology and serves as a critical stepping stone to advanced technical learning and IT skills. The exam measures an individual's knowledge of basic IT terminology and skills, such as setting up a basic PC work station, installing software, identifying compatibility issues and recognizing and preventing basic security risks. Course Overview: CompTIA Strata
Course Objectives: CompTIA Strata
Which of the following protocols is primarily focused on the transfer of large files? Questions Samples: A. HTTP B. FTP C. SMTP D. DNS A. To secure the files B. To eliminate duplicate files C. To index files for searching D. To reduce the size of files A. Evenly space out equipment to avoid an increased temperature in one area of the room. B. Eliminate using raised flooring in the data center. C. Place most servers in the middle of the data center allowing cool air to flow around them. D. Install cooling in the corners of the data center so cool air can circle the room. Which of the following BEST explains the purpose of file compression? Which of the following can save energy consumption in a data center? CompTIA Strata
Technology and Computer Hardware Basics CompTIA Strata
Types of Computers: CompTIA Strata
Hardware Components/ Input Devices: Is the collection of physical elements that constitute a computer system. Computer hardware refers to the physical parts or components of a computer such as monitor, keyboard, Computer data storage, hard drive disk, mouse, system unit (graphic cards, sound cards, memory, motherboard and chips), etc. all of which are physical objects that you can actually touch. CompTIA Strata
Hardware Components/ Output Devices: CompTIA Strata
Hardware Components/ Storage Devices: Hardware Components..... CompTIA Strata
Central Processing Unit CompTIA Strata
PGA Central Processing Unit LGA CompTIA Strata
Memory CompTIA Strata
Memory CompTIA Strata
Memory DIMM SODIMM CompTIA Strata
Hard Disk CompTIA Strata
Hard Disk PATA SATA CompTIA Strata
Computer Measurement Units In computing and telecommunications, a unit of information is the capacity of some standard data storage system or communication channel, used to measure the capacities of other systems and channels. CompTIA Strata
Types of Ports: CompTIA Strata
Types of Ports: CompTIA Strata
Multi-Card reader would be best to use to view media from different camera manufactures CompTIA Strata
Here are some safety tips that you have to consider when installing upgrade components: • 1-Wear short sleeves ,roll up you sleeve • 2-Remove jewelry • 3-Use an Antistatic wrist strap • 4-Dissconect the power to the PC CompTIA Strata
Peripherals and Networking • Network is a group of two or more computers that are connected in order to share data resources, network can connect computers that are physically near to each other (LAN) or computers that are halfway around the world from one another (WAN). • File sharing • Printer Sharing CompTIA Strata
Network Devices: CompTIA Strata
Wireless Networking Wireless networking uses radio(sound) waves to transmit data, much like a cordless telephone. There are several wireless networking technologies, but the most popular of these is Wireless Fidelity. On organization called IEEE controls the various wireless networking standards and it’s shown in the 802.11 range of numbering ,below is the IEEE 802.11 Wireless networking standards: CompTIA Strata
Ad Hoc Wireless Networking/ Definitions: • Ad Hoc Wireless Network = a wireless network with no central hub or concentrator. For example, PC to PC. • Infrastructure Wireless Network = a wireless network with a central hub or concentrator (access point). For example, PC to AP to PC. CompTIA Strata
What you need to know about Ad Hoc Wireless Sometimes called peer-to-peer Sometimes called IBSS (Independent Basic Service Set) Not used every day Great for meetings or gaming A neat example of wireless in action Fixed amount of bandwidth is available Ad Hoc has a theoretical maximum bandwidth of 11Mbps, whether it is 802.11b or g. Ad Hoc has especially bad issues with "hidden node" (where not all nodes can hear each other - in more detail later) Dr. Tahseen Al-Doori
What you need to know about Ad Hoc Wireless….cont. Windows file sharing, or some other application must be enabled Firewalls can get in the way of applications You can use Automatic Private IP Addressing (APIPA) for IP addresses 169.54 network Dr. Tahseen Al-Doori
Site Survey To get the best performance out of your wireless network, you must both ensure that your access points (AP) are in the most optimal locations and that other radio emitters, which can cause interference, are kept to a minimum. This requires you to periodically perform site surveys of your wireless spectrum. Depending on the scale of your installation, there are a number of tools available for the task, such as software that walks you through the site survey process. But no matter what size network you will have, you'll need to follow these basic steps: Dr. Tahseen Al-Doori
Step1: Step2: Have a blueprint or floor plan(s) of the areas you want the wireless network to cover. Some software products can work off these floor plans directly. Look at your plans and identify major building obstacles such as walls, halls, elevators and floors that will block radio signals. Also note where your users will be located -- and where they won't -- to determine coverage areas. Determine where you can locate APs based on power and cabling that you can run to connect the AP to the rest of the network. Remember that you shouldn't place APs close to metal or concrete walls and you should put them as close to the ceiling as possible. CompTIA Strata
Step3: Step4: Estimate the total number of APs needed for your overall coverage. A good rule of thumb is one AP can cover a circle with a 100-foot radius. This will give you preliminary AP locations that you can use at the beginning of your survey. If you already have some APs, note their locations on your floor plans. Run the survey tool. Make sure to use the same AP model for the survey that is used in your actual infrastructure. CompTIA Strata
Step5: Step6: Relocate APs and retest, depending on the results of your survey. Document your findings. Record the locations and log your signal readings and data rates observed for future reference. CompTIA Strata
IP Addresses Each device on a network has a unique IP address which consists of four numbers(each between 0 and 255) separated by periods like this:192.168.3.3 IP addressees can be assigned to the device Statically, Dynamically or thought the OS. CompTIA Strata
To figure out the your PC IP address, you can type the command “ipconfig” in the command prom CompTIA Strata
TCP Ports Having different ports assigned to different kinds of data makes it possible for the OS to sort out the incoming data from the network and deliver it to the appropriate application, the table below summarizes some of the most common ports and their assigned protocol: CompTIA Strata
Compatibility Issues and Common Errors CompTIA Strata
Compatibility Issues and Common Errors/ Hardware If you work with computers for any length of time, you’re likely to have some type of problem that needs to be resolved. If you get involved in IT support, your job will be to help other people resolve problems with computers, so it’s important to have a basic understanding of what to look for and what to do. The following table illustrates some of those problems and the most likely reasons why they occurred. CompTIA Strata
When windows wont start normally, you can often boot into safe mode by pressing the Key F8 once you restart your PC CompTIA Strata
You can use the “ping” command to troubleshoot Network connectivity CompTIA Strata
When upgrading the operating system the following factors should be taken under consideration: • 1-Application Compatibility • 2-Minimum Hardware Requirements CompTIA Strata
Troubleshooting Operational Problems CompTIA Strata
If Windows wont start normally or if it runs poorly all of the sudden after previously running fairly well, it’s often easier to revert to a System Restore than to spend time trying to pinpoint what happened CompTIA Strata
Software Installation and Functions CompTIA Strata
Computer software, or just software, is any set of machine-readable instructions (most often in the form of a computer program) that directs a computer's processor to perform specific operations. The term is used to contrast with computer hardware, the physical objects (processor and related devices) that carry out the instructions. Software: CompTIA Strata
Software Types CompTIA Strata
Some Software Tools CompTIA Strata
Security Risks and Prevention CompTIA Strata
Security: Defining the Threats More and more people are starting to use the internet for more than just e-mail anymore. Buying and selling, blogging, social networking, stock market trading, and even students are using it for research. But along with the perks of having such a vast library of knowledge, comes the ever increasing dangers that come from the internet, dangers such as : • Worms • Exploit vulnerability in software • Self-propagate • Often target high-visibility applications, exploiting identified vulnerabilities • Trojan Horses • Masquerade as legitimate application (e.g. screen saver) while performing covert function • May be used to launch DoS attacks • Logic bomb: Trojan horse triggered by event such as date CompTIA Strata
Security: Defining the Threats……cont • Spyware Software that gathers information about computer and user, such as: • User keystrokes • Copies of emails, instant messages • Screen snapshots • Other usage information • Adware Adware is a tool used by advertisers to popup advertisements based on your searches and the websites you visit. It’s not really intrusive, but can potentially cause harm to your computer. Adware is generally easy to remove, but also very easy to get. CompTIA Strata
Security: Defining the Threats……cont • Malware Malware comes in many forms. Generally injected unknowingly by you, Malware can be devastating to your computer system. Most malware is capable of shutting down even the best Antivirus/spyware/adware protection software you can buy • Phishing Technique to gather username and password by designing websites that looks identical to that of an online banking website • Social Engineering An attack that involves people, not computers. A social engineering attack is one in which the attacker convinces a victim to provide information that can be used to launch an attack, such as a password. CompTIA Strata