CompTIA A+ 220-1201 Full Course - NEW for 2025! (FREE)

Exam Preparation and Course Overview

  • The course is specifically designed for the CompTIA A+ 220-1101 exam objectives.
  • The course covers all exam objectives, including both basic and in-depth topics.
  • Feedback is encouraged for future course improvements.

A+ Core 1 (220-1101) Test Details

  • Maximum of 90 questions: Multiple choice and performance-based.
  • Test length: 90 minutes.
  • Recommended experience: 12 months of hands-on experience as a help desk support technician (although not always necessary).
  • Passing score: 675 out of 900.
  • Exam Domains:
    • 13% Mobile Devices
    • 23% Networking
    • 25% Hardware
    • 11% Virtualization and Cloud Computing
    • 28% Hardware and Network Troubleshooting

Mobile Device Repair: Battery Replacement

  • Power off laptop and disconnect AC adapter.
  • Use an anti-static mat and wrist strap for ESD protection.
  • Refer to the laptop service manual to locate the battery compartment.
  • Determine if the battery is removable externally or requires disassembly.
  • Proper ESD protection, including an anti-static wrist strap, to prevent damage to sensitive components.
  • After installation, allow the new battery to charge fully before first use to properly calibrate it.

Mobile Device Repair: Keyboard Replacement

  • Power off laptop, disconnect AC adapter, and remove the battery.
  • Document and carefully remove screws, bezels, or trim pieces.
  • Disconnect the keyboard ribbon cable, use proper technique, typically releasing a Z-connector latch to avoid damaging the cable or connector.
  • Test all keys before reassembling remaining components.
  • Allow adequate time due to varying difficulty levels.

Mobile Device Repair: RAM Replacement

  • Power off laptop, unplug the AC adapter, and remove the battery.
  • Locate the RAM access panel, usually on the bottom of the laptop, also check under the keyboard.
  • When installing new RAM modules, align the notch 30 to 45-degree angle.
  • Verify new RAM is recognized in BIOS/UEFI and by the operating system.
  • Be cautious with proprietary RAM; some RAM is soldered onto the motherboard, requiring motherboard replacement.

Mobile Device Repair: SSD Replacement

  • Power off laptop, disconnect AC adapter, and remove the battery.
  • Access the storage compartment by removing the appropriate access panel via the service manual.
  • Create a backup of existing drive data and prepare installation media for the operating system if needed.
  • Initialize the disk, create partitions, and format the drive before installing the operating system

Mobile Device Repair: HDD Replacement

  • Power off laptop, disconnect the AC adapter, and remove the battery.
  • Locate and remove the hard drive access panel.
  • Backup all important data from your old drive and ensure you have the necessary operating system installation media available.
  • Initialize the disk, create partitions, and format the drive during operating system installation
  • Know what type of drive is being replaced to ensure correct component installation.

Mobile Device Repair: Wireless Card Replacement

  • Power off laptop, disconnect AC adapter, and remove the battery.
  • Locate the wireless card compartment.
  • Carefully disconnect the antenna wires.
  • Insert the new wireless card at a 30-degree angle into the PCI, mini PCIe, or M.2 slot before securing it with the retention screw.
  • Install specific device drivers for full functionality of the new wireless card.

Mobile Device Repair: Biometric Replacement

  • Power off laptop, disconnect AC adapter, and remove the battery.
  • Document location of ribbon cables and check both sides of the system board.
  • Install required device drivers and security software for biometric authentication.
  • Configure the biometric device through the operating system security settings or dedicated biometric enrollment software.

Mobile Device Repair: NFC Replacement

  • Power off laptop, disconnect AC adapter, and remove the battery.
  • Consult the service manual to locate the NFC module.
  • Note the routing path and connection method.
  • Install required device drivers and test functionality using NFC-enabled devices or cards.

Mobile Device Repair: Wi-Fi Antenna Connector Replacement

  • Mobile devices Wi-Fi antennas are typically internal and built into the frame or around the edges of the screen.
  • Antennas are connected to the wireless network interface via small coaxial connectors, often U.FL or MHF types.
  • Proper placement is critical to maintain signal strength and avoid interference from other components.
  • Replace or receive antennas requires care to avoid damaging delicate connectors or cables.
  • Antenna issues can cause weak Wi-Fi signals, drop connections, or failure to detect networks.

Mobile Device Repair: Camera and Webcam Replacement

  • Cameras and webcams in mobile devices are typically modular and connected via ribbon cables or small connectors.
  • Most devices have front-facing selfie and rear-facing main cameras.
  • Replacing a camera often requires removing the screen or back panel.
  • Camera modules are fragile and can be damaged by static or improper handling.
  • Common camera issues include blurry images, failure to open, or app crashes during use.

Mobile Device Repair: Microphone Replacement

  • Microphones in mobile devices are small, sensitive components often embedded in the frame or near charging ports.
  • They are typically soldered to the motherboard or connected via flex cables.
  • Some devices have multiple microphones for noise cancellation and voice clarity.
  • Replacing a microphone may require heat, soldering tools, or specialized equipment.
  • Symptoms of a faulty microphone include no audio input, muffled sound, or failure during calls.

Mobile Devices: USB and Accessories

  • USB, especially USB-C and micro USB, are the standard interface for charging and data transfer on mobile devices.
  • USB supports connectivity for accessories like keyboards, flash drives, game controllers, and docking stations via USB OTG (On-The-Go)
    • USB Type-A
    • Modem
    • Ethernet (RJ45 connector)
    • USB Type-C
    • DisplayPort
    • HDMI
    • Thunderbolt
    • USB Micro-B
    • Lightening
    • USB Mini-B
    • USB Type Mini-A
    • Audio connectors for microphones and headphones
  • USB-C
    • universal reversible connector used for power delivery, data transfer, and video output.
    • enables connection to various accessories like external displays, storage devices, and docking stations.
  • USB 3:1 is wonderful.
  • Micro USB and mini USB
    • Widely used before USB-C became the standard.
    • Mini USB is mostly obsolete but may appear in legacy devices like cameras or GPS units.
  • Lightning connector
    • Proprietary interface developed by Apple for iPhones, iPads, and iPods.
    • Gradually transitioning to USB-C on newer devices, but Lightning is still widely used.

Mobile Devices: NFC and Bluetooth

  • NFC (Near Field Communication)
    • Short-range wireless communication technology (under 4 cm).
    • Enables functions like contactless payments, data exchange, and pairing with other devices.
    • Commonly used in mobile wallets like Apple Pay and Google Pay.
  • Bluetooth
    • A short-range wireless technology used to connect devices like headphones, keyboards, and smartwatches.
    • Pairing is required to establish a secure connection between devices.
    • Versions (e.g. 4.0, 5.0) offer different ranges, speeds, and power efficiency.
    • Commonly used for hands-free calling, wireless audio, and data exchange.

Mobile Devices: Tethering, Hotspot, and Stylus

  • Tethering and Hotspot
    • Tethering allows a mobile device to share its internet connection with other devices.
    • A mobile hotspot uses cellular data to create a Wi-Fi network.
    • USB tethering offers a stable and fast connection but requires a cable.
    • Bluetooth tethering uses less power but is slower.
  • Stylus
    • An input device used for touchscreens, offering precise control for writing, drawing, and navigation.
    • Active styluses include features like pressure sensitivity, palm rejection, and Bluetooth connectivity.
    • Passive styluses mimic a fingertip and don't require power or pairing.

Mobile Devices: Headsets, Speakers, and Webcams

  • Headsets
    • Can connect to mobile devices via wired 3.5 mm jack, USB-C, or wireless Bluetooth methods.
    • Used for audio output and often include built-in microphones.
    • Common on devices without a 3.5 mm audio jack.
  • Speakers
    • Can connect to mobile devices via Bluetooth, 3.5 mm jack, USB-C, or Lightning connectors.
    • Bluetooth speakers offer wireless convenience and portability but require pairing.
    • Wired speakers provide more stable connections and don't rely on batteries.
  • Webcam
    • Most mobile devices have built-in webcams for video calls and recording.
    • External webcams can connect via USB-C or Lightning for enhanced video quality.
    • Webcams are used in video conferencing apps like Zoom, Teams, and FaceTime. (Also 2.0/3.0)

Mobile Devices: Docking Stations and Port Replicators

  • Docking stations
    • Expand a mobile device's connectivity to peripherals like monitors, keyboards, storage, and power.
    • Commonly connect via USB-C or proprietary ports, supporting data, video, and charging simultaneously.
    • Simplify transitioning between mobile and desktop-like setups.
  • Port replicator
    • Similar to a docking station, but often with fewer features, it provides additional ports to a mobile device.
    • Common ports include USB-A, HDMI, VGA, audio jacks, and Ethernet.
    • Portable and ideal for users who need basic peripheral expansion.

Mobile Devices: Trackpads, Drawing Pads, and Basic Mobile Networks

  • Trackpad drawing pad
    • Trackpads provide touch-based cursor control and are common in laptops and detachable keyboards.
    • Drawing pads or graphics tablets connect via USB or Bluetooth and offer stylus input.
    • Enhance control and productivity, especially for creative or professional uses.
  • Wireless and cellular data networks. Configuration
    • Mobile devices use Wi-Fi and cellular (3G, 4G, 5G) networks for internet access.
    • Cellular data networks require a SIM card and a service plan to access carrier networks.
    • Wi-Fi connects to local networks using SSID and encryption like WPA2 or WPA3.

Mobile Devices: 3G, 4G, 5G, Hotspot, and Wi-Fi

  • 3G, 4G, and 5G
    • Generations of mobile cellular networks with increasing speed and efficiency.
    • 4G (LTE) provides faster internet suitable for streaming and video calls.
    • 5G offers significantly higher speeds, lower latency, and better support for high-bandwidth applications.
  • Hotspot
    • Allows a device to share its cellular data connection via Wi-Fi.
    • Configuration options include setting SSID, security, and data usage limits.
  • Wi-Fi
    • Allows mobile devices to connect to wireless local networks (WLANs) for internet access.
    • Memorize clearing network settings
    • Wi-Fi settings also include static IP, DNS configuration, and proxy setup.

Mobile Devices: SIM, Bluetooth, and GPS

  • SIM/eSIM
    • SIM cards store subscriber information and enable carrier access to a cellular network.
    • eSIM is a digital version embedded in the device and programmable via software.
    • Configuration may include activating the SIM, setting the correct APN, and enabling roaming.
  • Bluetooth
    • Must be turned on in device settings to enable wireless
      • Set the device to discoverable mode, put the accessory in pairing mode, and the mobile device scans for and displays nearby Bluetooth devices for selection.
      • After pairing, test connectivity by using the device by playing audio or transferring files.
  • GPS services
    • Enables location tracking and navigation on mobile devices.
    • Uses satellite signals and can be enhanced by Wi-Fi, Bluetooth, and cellular networks.

Mobile Devices: Corporate Device Configuration

  • Mobile Device Management (MDM)
    • Allows IT administrators to configure, secure, and manage corporate mobile devices remotely.
    • Devices can be enrolled in MDM through user credentials, QR codes, or automated deployment tools.
    • MDM enforces policies like password requirements, encryption, and remote wipe capabilities. BYOD is included as well
  • MDM policy
    • Enforces security and usage policies to protect corporate data.
    • Non-compliant devices can be blocked, quarantined, or remotely wiped.
  • Corporate applications
    • Allows the remote installation, updating, and management of corporate applications on mobile devices.
    • Corporate apps are often containerized to separate work data from personal or BYOD devices.

Mobile Devices: Data Caps, Business Mail, and Cloud Storage

  • Data caps
    • Limit the amount of mobile data a user can use within a billing cycle.
    • Can restrict syncing to Wi-Fi only to avoid using cellular data.
    • Exceeding data caps may result in extra charges or throttled speeds.
  • Calendar and contact synchronization
    • Allows mobile devices to stay updated with cloud-based or server-stored data. Troubleshoot!!!
  • Business mail sync
    • Ensures real-time access to corporate email on mobile devices.
    • Involves entering server settings, login credentials, and selecting sync frequency.
  • Cloud storage sync
    • Keeps files and data updated across devices using services like Google Drive, OneDrive, iCloud, or Dropbox.
    • Users can select which files or folders to sync to save space and manage data usage.
    • Proper login credentials and permissions are required for successful cloud sync.

Networking: Ports

  • Port 20 and 21: FTP (File Transfer Protocol)
    • Uses TCP port 21 for control commands and TCP port 20 for data transfer.
    • Standard protocol used to upload, download, and manage files on remote servers.
  • Port 22: Secure Shell (SSH) *Uses TCP port 22 to establish secure encrypted connections over a network.
    • Commonly used for remote command-line access to servers and network devices.
  • Port 23: Telnet
    • Uses TCP port 23 to provide remote command-line access to devices over a network.
    • It is not secure; data, including usernames, is sent in plain text.
  • Port 25: Simple Mail Transfer Protocol (SMTP)
    • Uses TCP port 25 to send email between mail servers.
    • Primarily used for outgoing email transmission, not for retrieving email.
  • Port 53: DNS (Domain Name System)
    • Uses port 53 with both UDP for standard queries and TCP for zone transfers and large queries.
  • UDP port 67 (server) and UDP port 68 (client); DHCP (Dynamic Host Configuration Protocol)
    • Automatically assigns IP addresses, subnet masks, gateways, and DNS servers to clients.
  • Port 80: HTTP
    • Uses TCP port 80 to transfer web pages and other content over the internet. Unencrypted.
  • Port 110: Post Office Protocol 3 (POP3)
    • Uses TCP port 110 to retrieve email from a remote mail server to a local client.
    • Downloads emails and typically removes them from the server after retrieval.
  • Port 143: Internet Message Access Protocol (IMAP)
    • Uses TCP port 143 to retrieve and manage email messages from a mail server.
    • Leaves emails on the server, allowing access from multiple devices.
  • Ports 137 and 139: NetBIOS and NetBT
    • Port 137 (UDP) is used for NetBIOS Name Service (NBNS). Resolves NetBIOS names to IP addresses.
    • Port 139 (TCP) is used for NetBIOS Session Service. Enables file and printer sharing.
  • Port 389: LDAP (Lightweight Directory Access Protocol)
    • Uses TCP and UDP port 389 for accessing and managing directory services over a network.
    • Commonly used for centralized authentication, such as verifying usernames and passwords.
  • Port 443: HTTPS
    • Hypertext Transfer Protocol Secure uses port 443 to provide secure communication between web browsers and servers.
    • Encrypts data using SSL (Secure Sockets Layer) or TLS (Transport Layer Security). Protect info from eavesdropping and tampering.
  • Port 445: Server Message Block (SMB)
    • and Common Internet File System (CIFS) uses TCP port 445 for file + printer sharing on windows networks. It allows devices to read, write and manage files over the network.
  • Port 3389: Remote Desktop Protocol (RDP)
    • Uses TCP and UDP port 3389 to provide remote access to desktops and servers.
    • Allows users to view and control a remote computer desktop as if they were physically present.

Wireless Technologies, Frequencies, and Regulatory Channels

  • 2.4 GHz band: Widely used in Wi-Fi networks (802.11b/g/n).
    • Offers longer range and better penetration through walls.
    • Supports fewer non-overlapping channels (typically three).
    • Susceptible to interference from common household devices.
  • 5 GHz frequency: Used in Wi-Fi standards like 802.11a/n/ac.
    • Provides faster data rates and supports more non-overlapping channels than 2.4 GHz.
    • Has a shorter range and less wall penetration due to higher frequency.
    • Experiences less interference from common household devices.
  • 6 GHz: Introduced with Wi-Fi 6E is an extension of 802.11ax. Has more bandwidth and less interference due to less crowded spectrum. Has a shorter range and limited wall penetration compared to 2.4 GHz and 5 GHz.
  • Channel Width: 20 MHz, 40 MHz, 80 MHz, 160 MHz. Wider bandwidth means more throughput.
  • Regulatory channels
    • Wireless channels are regulated by country-specific agencies like the FCC (US) and ETSI (Europe).
    • 2.4 GHz typically has 11-14 channels, but only three are non-overlapping (1, 6, 11).

5 GHz Channel and Wireless Networking Standard

  • More channels and less interference because the 5 GHz is less crowded because it has more non-overlapping channels: 23 in some instances
  • 802.11a
    • Operates on the 5 GHz frequency band.
    • Supports data rates up to 54 megabits per second.
  • 802.11b
    • Operates on the 2.4 GHz frequency band.
    • Supports data rates up to 11 megabits per second.
  • 802.11g
    • Operates on the 2.4 GHz frequency band
    • Data rates up to 54 Mbps
  • 802.11n
    • Operates in both 2.4 GHz and 5 GHz bands.
    • Supports data rates up to 600 megabits per second.
  • 802.11ac
    • Operates exclusively in the 5 GHz frequency band.
    • Supports speeds up to 1 gigabit per second and beyond.
  • 802.11ax (Wi-Fi 6)
    • Operates in both 2.4 GHz and 5 GHz bands and optionally 6 GHz in Wi-Fi 6E.
    • Supports speeds up to 9.6 Gbps.
    • Improves performance in dense environments.

Lesser-Known Wireless Networking Standards and Summary of 802.11s

  • 802.11ay
    • 60 GHz band, extremely fast up to 7 Gbps but very short range.
    • Great for line-of-sight high-speed transfers, e.g., wireless docking
  • 802.11af (White-Fi)
    • TV white space frequencies, long-range low bandwidth rural internet applications.
  • 802.11ah (HaLow)
    • Sub-1 GHz frequencies, low power, long-range Internet of Things and smart devices.
    • Lower speeds but excellent penetration through walls.
  • 802.11be (Wi-Fi 7)
    • Upcoming, aiming for speeds of up to 46 gigabits per second,
    • Will use 320 MHz channels, multi-link operation, and 4096 QAM.
  • 802.11 family of ITU E standards for wireless local area networking.
    • You might want to screen cap the nice little display.
    • 802.11a/b/g/n/av and ax each offering different speeds, ranges, and frequencies.

Other Types of Wireless Technology and Common Server Roles and Services

  • RFID (Radio Frequency Identification)
    • Radio waves to identify and track objects wirelessly (e.g., Apple AirTags).
    • Operates at various frequency ranges: low (LF), high (HF), and ultra-high (UHF).
    • Common uses include inventory tracking, access control, and contactless identification.
  • DHCP server roles and services.
    • Assign IP addresses and network settings automatically.
    • Provide configuration details: subnet mask, default gateway, and DNS server addresses.
  • File share server role, file sharing protocols: SMB (Server Message Block), AFP (Apple Filing Protocol), & NFS (Network File System) on Mac/Linux.
    • Provides centralized storage and access to files over a network.
  • Print Servers. Common in environments with shared printers, offer central printer management, including driver updates and more.
  • Mail servers, use SMTP for sending and IMAP and POP3 for retrieving.
  • System information and event logging (SIlogs).

Different Servers Cont.

  • Web server
    • HTTP on port 80
    • HTTPS on port 443
  • AAA (Authentication, Authorization, and Accounting)
    • Authentication: Ensures users are who they claim to be (usernames, passwords).
    • Authorization: Determines what resources a user can access.
    • Accounting: Logs user activity.
  • Database servers SQL (Structured Query Language).
    • Stores, manages, and provides access to structured data.
  • Network Time Protocol (NTP) server
    • Synchronizes system clocks of devices across a network.
  • A spam gateway filters and blocks unwanted or malicious email.
  • Unified Threat Management (UTM) firewall AV IDS/IPS VPN content filtering.
    • Intrusion detection systems is IDS. Intrusion prevention systems is IPS.
  • Load Balancers Web Hosting traffic. Helps prevent server overload during high traffic or server failure.
  • Proxy server; a proxy server acts as an intermediary between a client and the internet
    • Can be used to filter content, cache web pages, and control internet usage.
  • SCADA Supervisory Control and Data Acquisition Industrial utility.
    • Industrial processes like manufacturing, utilities, etc.
  • Internet of Things. Internet of Things (such as Zigbee). For wireless connection for Internet of Things.

DNS and Spam Management

  • DNS A record maps a domain name to an IPv4 address. Quad A record maps a domain name to an IPv6 address.
  • CNAME record Maps one domain name or an alias to another canonical domain name.
  • MX Records Direct email to the correct mail server for a domain (not an IP address).
  • TXT Records Stores human readable text in DNS, often used for verification and security purposes.
  • Spam Management in DNS involves using DNS-based blacklists or DNSBL to filter spam emails. DNS blacklists list known spam IP addresses or domains, helping mail servers block unwanted messages.
  • DKIM Email Authentication Method Domain Keys Identified Mail.
  • SPF Record Sender Policy Framework Email Authentication, verifies sender IP addresses.
  • DMARC Domain-based Message Authentication, Reporting, and Conformance. DMARC helps protect against email spoofing and phishing attacks.

IP Addressing, VLANs, and VPNs

  • DHCP

    • Lease is the temporary assignment of an IP address to client from the DHCP server
  • DHCP scope is the rage of IP addresses that assigns to clients

  • DHCP exclusions are specific IP addresses with a DHCP scope that are not assigned to clients

  • VLAN - Segregates network traffic

  • VPN -

  • Enables secure connection from any location over a public network to a private network. It uses encryption to secure connections (like over public Wi-Fi), making it resistant to attackers.

Network Hardware and Wireless/Cellular Networks

  • Routers: Connect different networks, provide NAT (Network Address Translation)
    • NAT allows multiple devices from LAN to share a single public IP address.
    • Firewall capabilities to filter bad traffic.
  • Switches connect devices within a network.
    • Operate using MAC addresses to forward to the correct device.
  • Managed vs Unmanaged switches
  • Access point - allows wireless devices to connect to a wired networks
  • Patch panels - organize and manage network cables in the same location
  • Firewall - monitor and control the network traffic based on security rules.

Power Over Ethernet Standards and Cable/DSL/Optical Internet

  • POE (Power over Ethernet) delivers data and electrical cable over network cables.
    • Power over Ethernet 802.3af delivers up to 15.4 W with 12.95 available
    • Power over Ethernet Plus 802.3at increases output to 30 W with 25 W available
    • Power over Ethernet (Type 3) 802.3bt delivers up to 60 W with 50-60 W available.
    • Power over Ethernet (Type 4) 802.3bt boosts delivery to 100W with 71-90 W available using four wire pairs supporting Class 7-8.
    • All types are compatible with CAT5 cabling; higher types require four-pair wiring.
  • Cable modem, DSL modem, Optical Terminal Network

Networking and Cabling Standards

  1. NIC
    • NIC hard ware to connect to network
  2. MAC Address
    • Hardcoded number (physical side of NIC)
    • Layer 2 is communication within our small network (switch looks at MAC address before forwarding information)
  3. IPV4 Private IP
    • Ranges 10.0.0.0 - 10.255.255.255, 172 -172.31.255.255, 192.168.0.0 - 192.168.255.255
  4. IPV4 Public Address
    • Can be routed on the internet
  5. IPV6
    * Latest version (3.4x10[38]) unique public IP.
    * Written by Colon: separated hexe numbers and separated 128 bits
  6. API PA
    • Allows device to be assigned. IP address when DHCP unable to see; assigns 169.254.0.0/17/255 subnets in the class B rage.
  7. Static VS Dynamic IP Addressing
    * Setting up IP address manually vs pulling all info from DHCP every time you leave Network
    * DHCP - Dynamic Host Configuration Protocol
    8. Subnet Masts. Sub divided into host and network. See example in power point
    9. Gateways: Devices that connect LAN to external. The router acts as the default gateway.

Network and Internet Types

  • Satellite
  • Fiber
  • Cable
  • DSL
  • cellular
    Wireless Internet Service (WISP)

More on Networks - Types of Networks

  • LAN - Local
  • WAN - Wide
  • PAN - Person
  • MAN - Metropolitian
  • SAN - Storage Area Network
  • WLAN - Wireless Local Area Network

Network Tools

  • Wi-Fi analyzers scan and troubleshoot wireless networks, identifying issues such as signal strength and interference. Find the best channel!
  • A toner probe, a signal passes through the paper, and the generator detects toner with a signal (also known as fox and hound).
  • Punchdown tool - the wires into the terminals. It pushed the network cables. They come with a bladded edge to trim as it gets pushed in to the part for connections for the tool connector.
  • Check for integrity and performance using a cable tester.
  • Loop back plug creates a loop data to where it comes from for functionality test
    TAP test access point: device used to monitor network traffic by creating a copy of the data passing though. This does not effect network performance or introduce packet loss.

Hardware: Displays Technologies

  • LCD (liquid crystal display) needs a backlight.
  • IPS Display; more accurate color for art.
  • TN- fast responds times but not color. Low cost.
  • Vertical Alignment Better contrast racio and darker blacks, improves the color, but is slower.
    alid-OLED displays; uses organic coumpounds that emit light (more flexible and efficient).
  • MiniED - better contract and brightness but at lower costs. Compared to OLED high end monitors.
  • Touch screen and Digitizer touch input into digital signals for the device to interpret: You will most likely need to know this term digitizer!
  • Inverter convert DC power from a laptop or power supply into AC display.
  • Pixel Density sharper images clearer screen.
  • Refresh rate how many times your Display upgrades is in hertez.
  • Screen resolution: number of pixels.
    *Color Garamuts, color that can reproduce, measured gainst color prices, sRGB, Adobe RGB, DCI-P3 need the big four

Copper, Fiber, and Other Cables

  • Copper network cable – Cat 5e, 6, 6a
    *RJ45.
  • T568A / B (two types and standards for wiring).
    *straight through or crossover cables.
  • Coaxial cables - Cable to TV and internet systems use F-type.
  • Shield Vs Unsheilded Twist
  • Direct Burial: Cable to go under ground or outdoor no conduit needed. Waterproof.
  • PlENUM: goes up ceilings and walls, Fire Resistant
  • Single Mods: fiber, long distant.
  • Multi-modes; fiber, short distance.
  • USB 2.0 type A, connects storage devices/Keyboard/Mice, low rate.
  • USB 3.0 type A connector, higher high-definition, fast transfer
    Serial USB Cable: old standards obsolete now.
    Molex cables, connection inside
  • eSATA Cables: used to connect extra drives to computer's SATA connector , faster data transfer.
    Adapters connect two different types
    RJ 11: Telephone wire to phone line
    RJ45 : Ethernet connector 8 pins
    F - Type : coaxial cables single wireless
    USB-C Reversible compact data cable

Computer Hardware Components

  • SO-DIMM are DIMMs are used in desktops with RAM.
  • Dual Rate (DDR).
  • Error correcting code.
  • Channel configurations, which are single channel, double-channel, and triple-channel, and a card channel.
  • Spindle speed: the higher the performance, the better RPM.
    *2.5 or 3.5 form factors; use 3.5 in desktops and 2.5 laptops for small
    NVMe - formfactor
  • RAID 0 - Striping
  • RAID 1 - Mirroring
  • RAID 5: Striped With One Distribute Parity (Need at least 3 Drives)
  • -RAID 1 - Mirrored With 1 Hot Spare
  • RAID10 Combo Of Mirrored and Striped Drives(Need At Least 4 Disk) Great Redundancy and Speed
  • Read slide for comparison, but RAID is a great technology!
  • Flash: portrayable memory drives.
  • Optical Device

Internal Component Specifications

  • MotherBoard Form factor
    • ATX and Micro (small scale).
      • ITX (limited expansion).
  • PCI / PCIE.
  • PC express - higher data.
  • - powerconnectors, 6, 8pins
  • - Molex - connectors, legacy.
  • RAM, speed and memory and size matters. Also the system constraints. Make sure what type
    AMD socket types (A12, 3 ,9, 4X
    Intel CPU socket type (Land Grid LGA)
    The Multi Soket is used in high processing work like work stations
    Multi Sokets need cooling and power supply.
    Note That AMD uses grids on mother board, intel on CPU board!

Hardware: Motherboard Security and Settings

  • BIOS/UEFI: BIOS = is traditional firmware interface that hardware component runs, UEFI = Is modern firmware that initializes hardware and features faster boots.
  • Boot Options = USB or HDD/SDD to boot
  • USB / Perimission Control used by device on setting, disable or not.
  • TPM: Trusted platform module; encryptions security features like Windows bitlocker on phone (hardware security) to protect against unauthorized access
  • HSM - Hardware security . is like TPM but is removable.

Hard/Software: Power , Cooling Factors

  • Factors: cooling fans and head sink to prevent overheat. use active or passive cooling.
  • Air Cooling vs: liquid Cooling (Liquid Coolers are more intense but can be costly/messy as the liquid gets old and gunked up or leaking) liquid cool requires maintenance!!
  • Secure Boots -> to precent malware and viruses.
  • Boot pass words: restrict access
  • Bios Passwords: is for the BIos not your user and boot password is
    • Temperature Monitoring - prevents overheating (fan control, check temperature ).
      Virtualization