CompTIA Fundamentals

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

1.6 Explain the troubleshooting methodology

1. Identify the problem + Gather information + Duplicate the problem, if possible + Question users + Identify symptoms + Determine if anything has changed + Approach multiple problems individually 2. Research knowledge base/Internet, if applicable 3. Establish a theory of probable cause + Question the obvious + Consider multiple approaches + Divide and conquer 4. Test the theory to determine cause + One the theory is confirmed (root cause), determine the next steps to resolve the problem + If the theory is not confirmed, establish a new theory or escalate 5. Establish a plan of action to resolve the problem and identify potential effects + repair + replace + ignore 6. Implement the solution or escalate as necessary 7. Verify full system functionality and, if applicable, implement preventive measures 8. Document finding/lessons learned, actions and outcomes

4.2 Given a scenario, use programming organizational techniques and interpret logic (Operators)

== is equal to (returns TRUE if both conditions are the same != is not equal to < less than > greater than <= and >= less than or equal to and greater than or equal to AND - if both conditions are TRUE, then the whole statement is TRUE OR - if either condition is TRUE, then the whole statement is TRUE XOR - if either condition is TRUE but not both, then the whole statement is TRUE

3.1 Explain the purpose of operating systems (App management)

Application management - describes the various ways to perform additional configuration and application management Configuring application compatibility + details tab is useful for troubleshooting, as it will let you know whether you are running a version with the latest patches + compatibility tab is used to run the program in a compatibility mode and adjust the display settings Repairing and uninstalling software - if a program stops working, the best solution is usually to uninstall then reinstall it + repair option is quicker and preserves you custom settings + change option lets you add/remove optional components

1.2 Compare and contrast fundamental data types and their characteristics

Characters - a single textual character (letter, symbol, numerical character) + can't perform mathematical operations on it + example a, D, 7, $, @, # Strings - collection of text characters. No real limit on the amount of storage that can be used + example XYZ, Hello World Integers - whole #'s that consume 1 - 8 bytes of storage + example 5, 21, 65536 Floats - supports decimal fractions or whole #'s and consumes 4 - 8 bytes of storage + example 4.1, 26.4, 5.62 Boolean - these are special numeric data types indicating that something is either TRUE or FALSE (with a 1 or 0) and consume 1 byte of storage

3.5 Given a scenario, configure and use web browsers (caching/clearing cache, deactivate client side scripting, browsers add-ons, private browsing, proxy settings)

Clearing cache - is done from the browser's settings dialog or configuration page Deactivate client-side scripting - can be disabled in some browsers by configuring settings, but others, don't allow scripting to be disabled + script blocker add-on provides more control over which websites are allowed to run scripts Extension - add functionality to the browser bu running scripts to interact with the pages you are looking at + you can view installed add-ons and choose to remove or enable/disable them using the browser setting button or menu Plug-in - designed to play some sort of content embedded in a web page, such as flash, sliverlight. + more limited than an extension because it can only interact with the multimedia object placed on the page Private browsing - doesn't store cookies or temporary files and doesn't add pages to the history list Proxy settings - can be configured as a firewall and apply other types of content filtering rules

4.1 Compare and contrast programming language categories (Compiled, Interpreted, Query, Assembly)

Compiled - code must be transform into a executable binary language before it can run. Compiling converts the source code that you wrote to machine code. Machine code is the instructions converted to strings of ones and zeros for the CPU to process + runs more quickly then interpreted + need to recompile the source code to be able to run it on a different platform + compiled languages (C++, C#, COBOL, PASCAL) Interpreted - runs within the context of an interpreter, which converts the code into machine code at runtime + no compiling needed + runs more slowly + cross platform + interpreter can either be part of the OS or provided as a virtual machine + scripting languages (JavaScript, Perl, and Python) Query - languages such as SQL, are designed to retrieve specific records from a dataset. + no compiling needed Assembly - machine code in human-readable text. + specific to a particular hardware architecture + used by specialist trying to solve a very particular problem with an application

5.1 Explain database concepts and the purpose of a database (Usage of database, Records, Storage)

Database - is an organized collection of information + consist of tables organized into columns and rows + rows represent a separate record in the database + create involves defining what information the database with store, where it will be hosted, and how it will be accessed by the clients + import/input involves records either being input and updated manually, using some type of form, or data might be imported from another source + storage (data persistence) needs to store data persistently and securely + queries allow the user to specify criteria to match values in one or more fields and choose which fields to display in the results so that only information of interest is selected + reports are a means of formatting and summarizing the records returned by a query so that the information is easy to read and interpret

2.4 Compare and contrast common internet service types (fiber optics, cable, DSL, Wireless)

Fiber optics - perform much better over long distances and are not affected by noise in the way that electrical signals over copper cable are + fiber to the home (FTTH) requires substantial investment by the telecom providers and is not widely available + fiber to the curb (FTTC) is a compromise and is widely deployed in rural/urban areas Cable - combine a fiber optic core network with coax links to customer premises equipment + coax is another type of copper cable but manufactured in a different way to twisted pair Digital Subscriber Line (DSL) - modem/router is connected to the telephone line using a with RJ-11 connectors between the WAN port on the router and the telephone point + uses high frequency ranges that voice calls don't use Wireless Radio frequency - is a means of provisioning a wireless local network using WiFi standard equipment Satellite - can relay signals between sites directly or via another satellite. + wide area of coverage + latency problems (4-5x then land link) Cellular - use radio transmissions but at greater range than WiFi

3.1 Explain the purpose of of operating systems (Disk management, Process management/scheduling, Memory management, Access control/protection)

Disk Management - GUI tool used to format mass storage devices (disks and USB drives) and manage partitions + partitions allow a single disk to be divided into multiple different logical areas Process Management - main unit governing a program and managing the memory resources allocated to it by the OS. A process may contain one or more threads, which are parts of the program scheduled for execution by the CPU + Task manager allows the user to shut down processes that are not responding Memory Management - the OS will do the best job it can with the resources available + System memory is volatile (needs power) and is provided by Random Access Memory (RAM) + Mass storage preserve data when the system is turned off and can either be a hard disk or a solid state drive (SSD) Access Control/Protection - computing device/information can only be used by an authorized person + Least privilege and user account control states that users should have only sufficient permissions required to perform task and no more

3.1 Explain the purpose of of operating systems (Embedded, Firmware, Virtualization)

Embedded - computer/appliance designed for a very specific function, static environment + Embedded OS are static (no changes) and are much more reliable and stable then desktop and server OS + Cannot tolerate reboots or crashes and have response times that are predictable and use Real Time OS Firmware - provides all functions for interacting with the device + Firmware is not designed to be continually changed Hypervisor or Virtual Machine Monitor (VMM) - manages the virtual machine environment and facilitates interaction with the host hardware and network + Virtualization, mean multiple OS can be installed and run simultaneously on a single computer (VMware) + Type 1 (bare metal) installed directly on the computer and interacts directly with its hardware + Type 2 installed within a host OS and the host OS has control over the hardware

6.7 Explain business continuity concepts (backup considerations [data, location])

File backups - you configure the backup software to select certain folders or individual files to include in the backup job and a schedule for performing the backup Critical data - not all critical data may be stored in files within a user folder or shared folder + could be stored in a settings file outside of the normal data areas or be located withing a database or message store. + might include confidential, proprietary, and/or personal information, you need to make sure you still follow the same security policies and access controls as the original Database -database backup requires the use of software dedicated to that purpose + replication is a cope (or mirror) of the database host on a separate server + snapshot based backup might be useful for keeping historical administrative errors that cannot be corrected through transaction rollbacks OS backups - makes a copy of the OS and installed applications so that a workstation or server can be recovered without having to manually reinstall software and reconfigure settings + bare metal backup is one that can applied directly to a partitioned drive without the separate step fo reinstalling the OS Stored locally Cloud storage Onsite vs. off-site

3.2 Compare and contrast components of an operating system (File systems and features)

File systems Windows system New Technology File System (NTFS) - supports larger partitions (2 TB) and an addressing scheme (64-bit) + supports extended attributes, allowing for file-level security permissions, compression, and encryption + more stable and secure than FAT File Allocation Table (FAT) - used in older versions of windows (32-bit) and supports a file size of 4 GB + used for formatting most removable drives and disk as it provides the best compatibility between different types of computers and devices Apple system Hierarchical file system (HFS) - Linux Ext4 - 64-bit file system with support for journaling, which means that the file system tracks changes, giving better reliability and less chance of file corruption in the event of crashes or power outages + ext4 is the latest version and delivers the best performance Features Compression - file system automatically reduces the amount of disk space taken up by a file system Encryption - automatically encrypts data in a file when it is save, meaning the data on the drive is protected even if the disk is stolen and installed in another computer system Permissions - system maintains an access control list for each file or folder object Journaling - system tracks changes or intended changes in a log Limitations - file systems have limits in terms of their maximum capacity and the size of individual files Naming rules - old file systems limit the size of a file name to eight characters + three character extensions., modern file systems support longer file names File management Folders/directories + Linux calls them directors + Windows calls them folders File types and extensions + last part of the file name represents an extension, which describes what type of file it is and is used by Windows to associate the file with an application Permissions + full control allows the user to do anything with the object + modify allows the user to do most things with an object but not to change its permissions or owner + read/list/execute allows the user to view the contents of a file or folder or start a program + write allows a user to read a file and change it, or create a file within a folder, but not to delete it

2.7 Explain basic networking concepts (Firewall)

Firewall - restricts access to a computer or network to a defined list of host and applications Packet filtering firewalls - filter network data packets as they try to pass into or out of the machine + can be applied to IP addresses or port numbers Advanced firewall (stateful inspection) - can analyze the contents of network data packets, so long as they are not encrypted, and block them if any suspicious signatures are detected and identify suspicious patterns of activity Hardware firewall - is a dedicated appliance with the firewall installed as firmware. Software firewall - is installed as an application on a workstation or server. + most internet routers also feature a built-in firewall, configured via the web management interface Host firewall (personal) - may be installed on a client PC to protect it

5.1 Explain database concepts and the purpose of a database (Flat file vs database)

Flat file - useful for simple task and use by a single person or small work groups + all the information is stored within a single table + not offer high enough speed for the volumes of transactions on enterprise-lvl systems Database + databases consequently support a wider variety of data formats + manage multiple tables and link the fields in different tables to create complex schemas + can support tens, hundreds or thousands, or even millions of users concurrently + scalabiliy (expand usage without increasing cost) + access control

4.2 Given a scenario, use programming organizational techniques and interpret logic [Organizational techniques (flow chart, sequence) , Logic components]

Flow chart concepts - is used to visualize the code and to better understand the process + write better code Sequences - instructions for your computer to perform Branching - is an instruction to your computer to execute a different sequence of instructions + used to control the flow within your program Looping - similar to branches in as much as they deviate from the initial program path according to some sort of logic condition. However, with a loop, you instruct your computer to perform, or repeat, a task until a condition is met

4.3 Explain database concepts and the purpose (Functions, Objects)

Functions - enable you to create segments of code that you will reuse + key difference between a procedure and a function is that the latter can return a value to whatever call it, whereas a procedure cannot Properties - allow external code to ask the object to show or change the value of one of its fields Attributes - values and data types that define the object + stored within an object as fields or private variables Methods - define what you can do to an object

2.1 Classify common types of input/output device interfaces (Graphic devices)

Graphic Devices Video Graphic Array (VGA) - as a standard for the resolution and color depth of computer displays + 640x480 with 16 colors at 60 Hz High Definition Multimedia Interface (HDMI) - most widely used graphic device interface + supports both video and audio digital streams, plus remote control and digital content protection + Mini and Micro HDMI's too Digital Visual Interface (DVI) - is a high-quality digital interface designed for flat panel display equipment + Single or dual link (has more bandwidth available) DisplayPort - is a royalty-free standard intended to "complement" HDMI + Mini-DisplayPort developed by Apple Networking Interfaces Telephone Connector (RJ-11) - you will encounter RJ-11 ports on the DSL (Digital Subscriber Line) modem/router appliance used to connect a home network to the internet Ethernet Connector (RJ-45) - these ports will be marked "LAN" (local area network) Near Field Communications (NFC) - is a peer-to-peer version of RFID; that is , an NFC device can work as both tag and reader to exchange information with other NFC devices + used in contactless payment options + can also be used to configure other types of connection like pairing Bluetooth

6.2 Explain methods to secure devices and best practices (securing devices)

Host firewall (Personal) - may be installed on a client PC to protect it Safe browsing practices

4.3 Explain database concepts and the purpose (Identifiers, Containers)

Identifiers - used in a program to access a program element, such as a stored value, class, method, or interface + variable contains a value that can change during the execution of the program (any data type) + constants are a specific identifier that contains a value that cannot be change within the program Container - special type of identifier that can reference multiple values or elements + arrays can be multidimensional, which you can visualize as like a table with multiple columns - elements must be same data type - cannot be resized + vectors can grow or shrink in size as elements are added or removed

1.3 Illustrate the basics of computing and processing

Input - the computer receives data entered by the user through peripheral devices, such as mice, keyboard, scanners, cameras, and microphone Processing - the data is written to memory and manipulated by the CPU, acting on instructions from the operating system and application software Output - the processed data is shown or played to the user through an output device, such as a monitor or loudspeaker system Storage - the data may be written to different types of storage devices, such as hard disks or optical discs, because data stored in most types of system memory is only preserved while the computer is powered on

1.4 Explain the value of data and information (Intellectual property, Copyright, Trademark, Patent, Digital products)

Intellectual property - most valuable information asset that an organization owns Copyright - does not apply to an ideas, names, phrases, or titles + last 15 - 70 years depending on nature + can be transferred or sold Trademark - applies to a name and/or logo + must register + must be distinctive with the industry in which the company is selling good/services Patent - applies to an idea so long as the idea is original, useful, and distinctive + no automatic protection , as there is for copyright + must register both nationally and internationally Digital products - is one that is sold or distributed as binary computer data (software, eBooks, music) + digital rights management (DRM) enforces "pay-per-use" + authorize and deauthorize devices when they change ( spotify, Netflix, hbogo) + data represents more than just encoded #'s and letters + data is an asset

3.4 Explain methods of application architecture and delivery (application delivery methods)

Locally installed - it executes within the computer's memory and is processed by the local CPU and is saved locally + does need network access unless it wants to use network features Local network hosted - it executes on a network server and can be accessed using a remote terminal or viewer + model does not need internet access + drawback is that if there is no local network connection or the local network is heavily congested, users will not be able to use the application Cloud hosted - similar to the local network model except that clients connect to the application servers over the internet + flexibility in terms of provisioning the app to clients located in different regions + data files saved on the cloud + drawback is that clients and cloud services must both have a reliable internet connection

3.6 Compare and general application concepts and uses (Licensing, Software installation best practices)

Managing software licensing + single use can only installed on one computer * activated with product key + group use/site agreed # of computers for an unlimited amount of employees + concurrent means that the company can allow only a set # of users access it at one time + serial # is used for technical support Subscriptions + pay a per-user monthly fee onetime purchase + upgrades would have a fee + Shareware - install for free for a limited time + Freeware - software that is available for free + Open source - code available to programmers so they can make it more stable and useful Software installation best practices + software is compatible with OS + computer hardware meets the apps recommended system requirements + special installation instructions or know issues + need valid agreement/license to install product advanced options - allows you to choose specific settings, feature sets and modules

4.1 Compare and contrast programming language categories (Markup Languages)

Markup language - not a programming language but a means of making data in a document accessible to a program by defining a series of nested tags that describe the structure and/or meaning of the tag content + tags tell a client application how to structure the doc html - is the top lvl parent element identifies the type of doc. All the other tags are nested within this one body - indicates the main part of the content as a page to show to the client. HTML files can also have head sections, which would not be shown as part of the page display h1 - indicates that the content is a heading lvl p - indicates the content is a paragraph lvl block a - indicates that the content links to another resource.

2.7 Explain basic networking concepts (Devices)

Modem/Router - connects the wired and wireless network clients to the internet via a WAN link Switch - connect four or eight computers together in an Ethernet LAN using RJ-45 network ports and twisted pair cabling Access point - creates a WiFi wireless network (WLAN) between computers and mobile devices equipped with suitable adapters and also switches communications between the wired and wireless network

2.3 Explain the purpose of common internal computing components (Motherboard, Firmware, RAM, ARM CPU, and 32-bit vs 64-but CPU)

Motherboard/system board - is a Printed Circuit Board (PCB) with some built-in processors (chipset), sockets and slots for upgradable components (CPU, RAM, adapter cards, disk drives), and wires (buses) to connect them together + motherboard determines the upgrade potential Firmware/BIOS is one example of PC firmware. It provides industry standard program code to get the essential components of the PC running and ensures that the design of each manufacturer's motherboard is PC compatible + firmware is a low-level operating system + newer motherboards (64-bit CPU) use UEFI Random Access Memory (RAM) - allows you to open more programs simultaneously and work on large files more efficiently + only works while power is on Advanced RISC Machine (ARM) CPU uses simple instructions processed very quickly + RISC stands for reduced instructions set computing + mobile phone + tablet 32-bit CPU are limited to addressing up to 4 GB + laptops + workstations + server 64-bit CPU can address 256 Terabytes (or more) + laptops + workstations + servers

2.5 Compare and contrast storage types (local network storage types, cloud storage service)

Network attached storage (NAS) - one or more hard drives housed in an enclosure with basic server firmware, usually running some form of Linux. + NAS appliance provides access to its storage devices using various file sharing protocols. File server (direct attached storage) - all computers have at least one internal hard disk, or SSD, for storing the OS and software applications + user data + when a computer shares an attached hard drive, or folder on an attached drive, it can be referred to as direct attaches storage (file server).

2.7 Explain basic networking concepts (basic of network communication, device addresses, basic protocols)

Network communication Basics of packet transmission - packet switching introduces the ability for one computer to forward information to another + to ensure information reaches the correct destination, each packet is addressed with a source and destination address and then transferred using any available pathway to the destination computer (router) + can utilize any available network path rather than a single, dedicated one + using numerous, small packets means that if some are lost or damaged during transmission, it is easier to resend just the small, lost packets than having to re-transmit the entire message + a packet switching protocol is described as "robust" because it can automatically recover from communication link failures Domain Name System (DNS) - is a hierarchical, client/server-based distributed database name management system + resolve resource names to IP addresses Local area network (LAN) - a network in a single location + equipment and cabling used on a LAN is owned and operated by the company or organization using the LAN Wide area network (WAN) - networks in different geographic locations but with shared links + likely to make use of a service provider Device addresses IP address - is used to logically identify each device (host) on a given network. + 32-bit binary value, with each value representing a byte value MAC address - is identified by the address of its network interface + 48-bit value expressed in hexadecimal notation Basic protocols HyperText transfer protocol (HTTP) - enables clients to request resources from an HTTP server. Email protocols Post office protocol v3 (POP3) - messages are usually deleted from the server when they are downloaded Internet message access protocol (IMAP) - supports permanent connections to a server and connecting multiple clients to the same mailbox simultaneously Simple mail transfer protocol (SMTP) - help deliver the message to the email server by contacting the DNS server (resolves recipient's address)

1.1 Compare and contrast notational systems

Notational system - is one used to represent different quantities or characters Binary - divide # by 2 till you get to 1 then right out remainders starting from the bottom Hexadecimal - divide # by 16 till you get 0 then right out remainders starting from the bottom + A(10), B(11)... F(15) Decimal - 12 (move decimal over two place, 2 is in 1's place and 1 is in 10's place) Data Representation (ASCII, Unicode) - American Standard Code for Information Interchange (ASCII), each # or character in a text file or string variable is represented by a seven-bit binary #. + With seven bits of binary, you can express 128 different values (0 - 127) - Unicode enable you to handle character data and express that data across platforms in a uniform way + A set of code charts that handle visual references + A data encoding method + A set of standard character encodings + A set of reference data files + Additional properties, including: * character properties * rules to handle normalization, rendering, display order (for languages that display right to left instead of left to right)

3.1 Explain the purpose of of operating systems (OS, Interface between app and hardware, Types of OS)

OS - provides interfaces between the hardware, application programs, and the user. The OS handles many of the basic system functions, such as interaction (shell) with the system hardware and input/output + a shell will allow the user to configure the computer hardware, install and manage software applications, and access programs and files Interface between app and hardware - OS software is built from a kernel of core functions with additional driver software and system utility applications + Each hardware component requires a driver to work and it's the OS's responsibility for identifying the components installed and loading drivers to enable the user to configure and use them Types of OS - Mobile (designed for handheld devices), Workstation (runs a traditional desktop PC or laptop), Server (run on servers in a business network and include software packages and licenses),

2.8 Given a scenario, install, configure and secure a basic wireless network (802.11a/b/g/n/ac, Best practices)

Older vs. newer standards 802.11a (1999) - transfer rate of 54 Mbps and bandwidth of 5 GHz 802.11b (1999) - transfer rate of 11 Mbps and bandwidth of 2.4 GHz 802.11g (2003) - transfer rate of 54 Mbps and bandwidth of 2.4 GHz 802.11n (2009) - transfer rate of 72.2/150 Mbps for sing/bonded channels and 2.4/5 GHz Speed limitations Interference - + there can be interference with other various devices, such as fluorescent lighting, microwave ovens, cordless phones etc attenuation - the distance between the wireless client (station) and access point determines the loss of strength of the signal Best practices Change Service Set ID (SSID) - it's a good idea to change the SSID from the default to something unique to your network Change default password - choose a strong password that cannot be cracked by password-guessing software. Use a long, memorable phrase of at least 12 characters Encrypted - scrambles the message being sent over the WLAN so that anyone intercepting them is not able to capture any valuable information + cipher, process used to scramble message + key, unique value that allows the recipient to decrypt a message Wired equivalent privacy (WEP) - this is an older standard. WEP is flawed and you would only select this if compatibility with legacy devices and software is imperative WiFi protected access (WPA) - uses the same weak RC4 (rivest cipher) cipher as WEP but adds a mechanism called the temporal key integrity protocol to it stronger WPA2 - this implements the 802.11i WLAN security standard. The main difference to WPA is the use fo the Advanced encryption standard cipher for encryption. AES is much stronger than RC4/TKIP. The only reason not to sue WPA2 is if it is not supported by devices on the network. In many cases, device that can support WPA can be made compatible with WPA2 with a firmware or driver upgrade.

3.4 Explain methods of application architecture and delivery (Application architecture models)

One tier (standalone) - the application front-end and processing logic and the database engine are all hosted on the same computer Two tier - client server application separates the database engine , or backend or data layer, from the presentation layer and the application layer, or business logic. + application and presentation layers are part of the client application and run on it Three tier - presentation and application layers are also split + presentation layer provides front-end and user interface and runs on client machine + application layer runs on servers that client connects to N-tier - used to mean either a two-tier or three-tier

2.1 Classify common types of input/output device interfaces (Networking and Peripheral Devices)

Peripheral device USB's - are plug-and-play. This means that when a device is connected via a port, Windows can identify the device and try to install a driver automatically + hot-swappable meaning that Windows can detect and configure a device without requiring a restart + Type A is for a connection to the host + Type B is for a connection to a device (Mini, Micro) + Type C a new reversible connector type + max transfer rate is 480 Mbps, however the 3.0 model can do 10 Gbps Firewire - competitor to USB, but never received mainstream support + supports hot-swapping + max transfer rate is 400 Mbps Thunderbolt - can be used as a display interface and as a general peripheral interface Bluetooth - is used for so-called Personal Area Network (PAN) to share data with devices + radio based technology but it is designed to work only over close range Radio Frequency ID (RFID) - is a means of tagging and tracking objects using specially encoding tags

2.2 Given a scenario, set up and install common peripheral devices to a laptop/PC. Devices (printer, scanner, camera, speaker, display), Installation types (plug-and-play vs. driver installation, Other required steps, IP-based peripherals, web-based configuration steps)

Plug-and-play installation - meaning that when you connect a new device, Windows identifies it and tries to install a device driver. IP-based - device is configured with an internet protocol (IP)

3.3 Explain the purpose and proper use of software

Productivity software - help users complete typical office task + common look and feel and sold in suites Web browser - % of workday is wasted, but the web gives you access to information, research, contact customers/suppliers Spreadsheet - used for many task including tracking and analyzing sales data and working reports Word processing - helps users to write and edit doc. Presentation - enables users to create sophisticated slide shows Visual diagramming - diagrams are an important means of communicating or recording ideas, this software helps with the creation of diagrams by providing templates Collaboration software - includes email, conference calling(Zoom), IM, online work spaces (google drive, remote desktop), and document sharing Business Software - designed to assist with a particular business process or consumer demand + database enables the user to store, organize, and retrieve information (Microsoft Access) +assists with the process by visualizing task timelines and dependencies and recording information about task properties and progress + project management breaks a project down into task and assigns responsibilities, resources, and timescales to ensure the completion Business-specific + custom made software that covers functions that cannot be performed by "of-the-shelf" software

4.2 Given a scenario, use programming organizational techniques and interpret logic (Organizational techniques (Pseudocode)

Pseudocode concepts + The main routine calls some subroutines. Each routine is completed by an "end routine" statement. This mean when the program reaches the last step of the main routine, it closes rather than flowing through to try to execute the first subroutine + When a subroutine complete, it can return to the point in the main routine from where it was called, and the main routine continues execution. Note that when we use structures such as this, we have to be very careful not to create infinite loops in the code by mistake + There is a conditional statement (IF) that means part of the code only executes when certain conditions are true or false + There are variables to store data input by the user + There are functions (sum, write) that we can assume are provided as features of the programming language. We don't need to code how to add two number together or write output to the display screen + There is a user interface that the program interacts with (prompting for input and displaying output)\ + It contains comments, preceded by the ' character. Comments are part of the programming code that are not executed by the computer but that help developer read and maintain the code

5.3 Summarize methods used to interface with databases

Relational Methods Data Manipulation Language (DML) - commands that insert or update records and extract information from records of viewing (a query) + SELECT enables you to define a query to retrieve data from a database + INSERT INTO Tablename adds a new row in a table in the database + DELETE FROM Tablename + UPDATE Tablename Data Definition Language (DDL) - commands that add to or modify the structure of the database + CREATE table/database can be used to add a new table to a database or to create a whole new one + ALTER table/database allows you to add, remove (drop), and modify table columns (fields) or properties of the whole database, such as its character set + DROP used to delete a table/database + permissions are used to for access control and can be ALTER + GRANT permission TO user + DENY permission TO user Database Access Methods + Direct/Manual access, admin has to connect and sign into a RDBMS database + Programmatic access, software application interacts with the database using SQL commands or using SQL commands stored as procedures in the database User interface/utility access + Query Report builder provides a GUI for users to selection actions to perform on the database and converts those selections to the SQL statements that will be executed + for users who don't want to learn SQL syntax Export/import + database dump is a copy of the database or table schema along with the records expressed as SQL statements. + backup are vital in insuring secure databases

1.4 Explain the value of data and information (Security control, ROSI, Data, Information, Insight, Data capture and collection, Data correlation, Meaningful reporting)

Security control - mechanism designed to protect an information asset or processing system + designed to prevent, deter, detect, and/or recover + example of security controls (Backup + Access control + Permissions + Usage + Data encryption + Firewalls) Return on Security Investment (ROSI) - risk assessment used to work out how much the loss of data would cost you organization and how likely it is that data loss might occur + security controls should reduce both the impact and likelihood of losses, justifying the investment made Data - raw values Information - some lvl of summarization of the individual data points Insights - things that inform meaningful business decisions Data driven business decisions - can help a company become more efficient and develop better products and services Data capture and collection - data is stored in relational databases (traditional way), but is being replaced with semi-structured data warehouses Data correlation - analyzing a data set and finding connections and links between data points Meaningful reporting - information must be presented in ways that humans can analyze and interpret it (graph)

2.6 Compare and contrast common computing devices and their purposes (Server, Laptop, Smartphone, Tablet, Workstation)

Server - is any computer providing services to other computers, but usually implies a powerful computer that supports a number of users simultaneously in a computer network. Main difference between servers and desktops are number of users and components are more powerful and more reliable (more $$$) Laptops - integrates the display, system components, and input/output devices within a single, portable case. + Main features distinguishing laptops from desktops: Size and weight, display type, input devices, power source, components, networking Workstation (aka desktop) - can be used independently by a single user or as a network clients to access shared resources + the advantages of desktops is that the basic design can be modified with higher or lower specifications and optional features, making a particular model better suited to different tasks

3.2 Compare and contrast components of an OS

Service Management (service) - windows process that does not require any sort of user interaction and thus runs in the background + Services provide functionality for many parts of the OS, such as allowing sign in and browsing the network Processes - may contain one or more threads, which are parts of the program scheduled for execution by the CPU Console/Command Line (CLI) - displays a prompt, showing that it is ready to accept a command, the shell executes the command and then displays the output Graphical User Interface (GUI) - used today in most computer uses a mouse, keyboard, and/or touchscreen

2.6 Compare and contrast common computing devices and their purposes (Smartphone, Tablet, Gaming Console, Io T)

Smartphones - roughly the same functionality as a personal computer that is hand held Tablet - laptops with touchscreens. Smaller then a laptop and with no keyboard Gaming Consoles - same components as a desktop, the only difference being the gaming console is designed to be operated by a gaming pad rather than a keyboard and mouse Internet of Things (Io T) - world in which many different types of things are embedded with processing and network functionality. + Home automation - if a device is 'smart' it has a hub other devices can connect to via WiFi. + Example include thermostats, security systems, IP cameras, home appliances, streaming media + Modern Cars examples include, navigation using GPS, parking assistance, collision detection and avoidance, black box + Medical Devices examples include, cardiac monitors/defibrillators, insulin pumps

2.3 Explain the purpose of common internal computing components (Storage, GPU, Cooling, and wireless vs wired connect)

Storage (fixed disk) - include hard drives and solid state drives (SSD) store data when the computer is turned off + if there is not enough space, fewer programs and data files can be stored on the computer + if the disk is not fast enough, performance will suffer when the computer tries to load programs and data files into memory (read operations) or write data from memory to files + the computer may use part of the hard disk to supplement system RAM (virtual memory). if the computer does not have much system RAM, it helps for the hard disk to be fast otherwise accessing virtual memory often will reduce performance even more than usual Graphical Processing Unit (GPU) - display functions are often performed by a dedicated processor Cooling Heatsink - is a block of metal with fins. As the fins expose a larger surface area to the air around the components, a greater cooling effect by convection is achieved + passive cooling Heat Spreader - flat tube with liquid inside. As the component heats up the liquid, it moves to another part of the tube and is cooled down by a fan or other type of convection Liquid Based cooling - pumps water around the chassis + more effective coolant then air Fan + active cooling device Network Interface Card (NIC) Wired Network Connect - home network connected to router - business network connected to switch Wireless Network Connect + almost all workstation computers come with a NIC on the motherboard (onboard card) + servers may have additional NIC's supplied on expansion (or add-on) cards

5.2 Compare and contrast various database structures

Structured - enables you to more easily access the stored information and gives you flexibility over exactly what you access Semi-structured - lacks the structure of formal database architecture. Contains associated information called metadata that helps identify the data Non-structured - no rigid formatting of the data. + example (images, text files, word docs, PowerPoint) + easier to create + larger variety of data types Relational database - is a highly structured type of database. Information is organized in tables (known as relations). A table is defined with a number of fields, represented by the table columns. Each field can be a particular data types. Each row entered into the table represents a data record + use SQL to maintain and query data in the database + schema is the structure of the database in terms of the fields defined in each table and the relations between primary and foreign keys + tables + row/records + fields/columns + primary key is used to define the relationship between one table and another table in a database + foreign key is when a primary key in one table is referenced in another table, the column in known as + constraint on validation, properties, data types Garbage in, Garbage out (GIGO) - is very important that the values entered into fields conform are consistent with what information the field is suppose to store Non-relational database Key/value databases - are a means of storing the properties of objects w/o predetermining the fields used to define an object + example JavaScript Object Notation (JSON) Document databases - use of markup language such as XML (extensible markup language) to provide structure

3.5 Given a scenario, configure and use web browsers (certificates, popups blockers, scripting blockers, compatible browser for applications)

Valid certificates - show a padlock icon in the URL + highly trusted, the address bar is green Invalid certificates - the address bar is colored maroon and the site is blocked by a warning message Popup blockers - are a type of extension that allows you to have better control over advertising on a site Scripting blockers - provide more control over which websites are allowed to run scripts

2.2 Devices (External hard drive)

USB 2 (480 Mbps) - Many devices were release to this older standard and remain in use USB 3 and USB 3.1 (5-10 Gbps) - Widely supported on devices released in the last few years Thunderbolt 2 (20 Gbps) - Uses Mini Display port connector Thunderbolt 3 (40 Gbps) - Uses USB-C connector. Bandwidth only supported at up to 0.5 cabling

1.5 Compare and contrast common units of measure

Units of Measurement (computer storage/data transfer) Bit - basic unit of data that represents two values (0 or 1) Byte - eight bits Kilobyte (KB) - 1000 bytes (10^3) Megabyte (MB) - 1,000,000 bytes (1000^2) Gigabyte (GB) - 1,000,000,000 bytes (1000^3) Terabyte (TB) - 1,000,000,000,000 bytes (1000^4) Petabyte (PB) - 1,000,000,000,000,000 bytes (1000^5) Throughput Units - rate a connection can sustain is measured in bits per second (bps) + describes how much data is transferred over a link Kbps - 1000 bits/s (older computers) Mbps - 1,000,000 bits/s (residential WiFi) Gbps - 1,000,000,000 bits/s (latest PC's) Tbps - 1,000,000,000,000 bits/s (telecommunications links between data centers, cities, and countries) Processing Speed Units (computers's internal clock and the speed at which its processors work is measured in units of time called Hertz + 1 Hz represents one cycle per second Megahertz (Mhz) - 1 million cycles/s (older PC's) Gigahertz (GHz) - 1000 million cycles/s (current PC's)

2.5 Compare and contrast storage devices (volatile vs. non-volatile, local storage types,

Volatile - Non-volatile Random Access Memory (RAM) - main storage area for programs and data when the computer is running + much faster than accessing data in a mass storage system, such as a hard disk + volatile, meaning data is only retained in the memory chips while there is a power supply Hard drive (SSD, Spinning disk) - one of the most widely used type of mass storage device Solid State Drives - designed to replicate or supplement the function of the hard drive. + uses a type of non-volatile memory technology called flash memory + compared to spinning disk storage, flash memory is very small and light and much faster HDD (spinning disk) - the higher the RPM, the faster the drive Optical Disk and Drives - uses a laser to read data from the discs + compact disk (CD's), 700 MB + digital versatile discs (DVD's), 17 GB + blue ray disk (BD's), 25 GB per layer Optical drives - are rated according to their data transfer speed

3.6 Compare and contrast general application concepts and uses (single platform software vs cross platform software)

single platform - software that is optimized for a particular platform, it can perform better and be simpler to check for errors than cross platform + drawback is that "porting" the software to a different platform can be very difficult cross platform - software written for touch-based mobile devices and operating systems and can be very complicated + different hardware interfaces + wide range of display sizes, orientations, and resolutions + different browser vendors can make slightly different interpretations of open standards


Ensembles d'études connexes

Physiology Final exam (older material)

View Set

Med Surg - Exam 1 Rehab + Brain - sem 2

View Set