CompTIA+IT+Fundamentals++ (FCO U61) +Study+Guide
CompTIA+IT+Fundamentals++ (FCO U61) +Study+Guide
(Study Notes)
● Introduction
o IT Fundamentals+ gives you an introduction to a wide variety of basic knowledge
and skills from across the information technology industry
o It is a broad certification exam, that provides you with an overview of hardware,
software, networking, data, software development, databases, and cybersecurity
o This is considered a pre-career certification to help you determine if you have
the aptitude and interest to work in IT and cybersecurity in the future
o This certification will verify the successful candidate has the knowledge and skills
required to identify and explain the following
▪ Basics of Computing
▪ IT Infrastructure
▪ Software Development
▪ Database Use
▪ Installing and Removing Software
▪ Establishing Basic Network Connectivity
▪ Identifying and Preventing Basic Security Risks
o Information Technology (IT)
▪ The utilization and management of technology and systems to store,
retrieve, transmit, and protect information for various purposes
o CompTIA IT Fundamentals+ consists of 6 domains or areas of knowledge
▪ 17% of IT Concepts and Terminology
▪ 22% of Infrastructure
▪ 18% of Applications and Software
▪ 12% of Software Development
▪ 11% of Database Fundamentals
▪ 20% of Security
o IT Fundamentals+ has a maximum of 75 questions over the course of 60 minutes
o To pass the CompTIA IT Fundamentals+ (FC0-U61) exam, score at least 650
points out of 900 points that are available on the exam
1
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
o In order for you to take the exam, you will have to pay an exam fee by buying an
exam voucher
▪ You can purchase the exam voucher in store.comptia.org and buying it
directly from the CompTIA store
▪ Save 10% off your exam voucher by buying it at
diontraining.com/vouchers
o 4 tips for success in this course
▪ Turn on closed captioning
▪ Control the playback speed
▪ Join our FB group
● facebook.com/groups/diontraining
▪ Download and print the study guide
● Exam Tips
o There will be no trick questions
▪ Always be on the lookout for distractors or red herrings
▪ At least one of the four listed possible answer choices that are written to
try and distract you from the correct answer
o Pay close attention to words in bold, italics, or all uppercase
o Answer the questions based on CompTIA IT Fundamentals+ knowledge
▪ In the world of project management, there is often not a 100% correct
answer to every question you face in your daily work
▪ When in doubt, choose the answer that is correct for the highest number
of situations
o Understand the key concepts of the test questions
o Do not memorize the terms word for word, try to understand them instead
o During the exam, the answers will be from multiple-choice style questions
2
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
o Please don’t try to simply memorize the questions, but instead take the time to
understand the why behind them
o Make sure that you watched the videos, took the quizzes, did the labs, and
finished the practice exams
▪ If you’ve done all and don’t see the progress part at the top going from 0
to 100, that means something’s wrong
▪ If you think you’ve done everything and it still doesn’t show 100%, please
email us at [email protected]
o Once you have the course completion letter, you are eligible for our 60-Day
100% Pass Guarantee
3
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
4
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
▪Hexadecimal Notation
● Employs base-16, which uses 16 distinct symbols (0–9 for the first
ten and A–F for the remaining six)
● Hexadecimal is commonly used in computer programming,
memory addressing, and debugging processes
o Why is it important to understand notational systems?
▪ Data Storage and Manipulation
● By utilizing binary, computers can represent and manipulate
complex information, including numbers, characters, images, and
videos
▪ Programming and Software Development
● Programmers frequently encounter hexadecimal values when
working with memory addresses, color codes, and machine code
instructions
▪ Interfacing with Humans
● It enables programmers and users to communicate with
computers in a familiar numerical system
● Decimal notation allows us to input and interpret data using
conventional numerical methods, making computers more
accessible and user-friendly
● Decimal Notation
o Decimal Notation (Base-10)
▪ Essential numerical system that forms the foundation of everyday
mathematical operations
▪ The decimal notation is so named after the Latin word decimus, meaning
tenth because it utilizes ten distinct symbols, from 0 to 9, to represent all
possible numbers
o One of the key strengths of the decimal system lies in its simplicity and
intuitiveness
o Decimal notation is used in various programming languages and in databases for
storing and manipulating numerical data
o Decimal notation is the cornerstone of the numerical world
● Binary Notation
o Binary Notation (Base-2)
▪ Fundamental numerical system that underpins the digital world
o Binary notation is characterized by the use of two distinct symbols, 0 and 1
5
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
● Hexadecimal Notation
o Hexadecimal Notation (Base-16)
▪ Characterized by the use of sixteen distinct symbols to represent all
possible numbers (digits from 0 to 9 and letters from A to F)
o Each digit's position in a hexadecimal number represents a certain power of 16
such as 16^0 (or 1), 16^1 (or 16), and so on
o Hexadecimal system lies in compactness and compatibility with binary notation
▪ The binary number 1010 corresponds to 10 in decimal which is the
equivalent to the hexadecimal digit A
o Understanding hexadecimal notation is crucial for working with various aspects
of digital technology
▪ Network Protocols
▪ Encryption Algorithms
▪ Unique Identifiers (MAC/UUID)
o Hexadecimal and binary treats leading 0s as "filler"
o Often you will see binary written with 4 digits each time for clarity, and we just
use extra 0s on the left to "pad the number" to become 4 digits
▪ Binary written with 4 digits (0 = 0000; 1 = 0001)
HEX DEC BIN
0 0 0000
1 1 0001
2 2 0010
3 3 0011
4 4 0100
5 5 0101
6 6 0110
7 7 0111
8 8 1000
6
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
9 9 1001
A 10 1010
B 11 1011
C 12 1100
D 13 1101
E 14 1110
F 15 1111
o Hexadecimal (Base-16)
▪ 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, a, b, c, d, e, f
● Units of Measure
o bit (Binary Digit)
▪ Smallest unit of data in computing, which can hold a value of 0 or 1
o byte
▪ Equivalent to 8 bits and another basic unit of data
o Nibble
▪ Term for a single hexadecimal character
o As we move up the scale, we encounter kilobytes (KB), megabytes (MB),
gigabytes (GB), terabytes (TB), and petabytes (PB)
▪ Each unit is approximately 1000 times larger than the previous one
● 1 MB = 1,000 KB
● 1GB = 1,000 MB
● 1 TB = 1,000 GB
● 1 PB = 1,000 TB
o It's important to note that in the realm of digital storage, these units represent
powers of 2 rather than powers of 10
▪ This is where kibibytes (KiB), mebibytes (MiB), and gibibytes (GiB) come
in
● For example, 1 KiB = 1,024 bytes
o When data is transferred between components in the computer or between
computers over a network, we have something called data transfer rates
▪ kilobits per second (Kbps) = 1,000 bits per second
▪ megabits per second (Mbps) = 1,000 kilobits per second
▪ gigabits per second (Gbps)
▪ terabits per second (Tbps)
o Remember that we use bytes when talking about data storage,
but we use bits when talking about data transfer
▪ Data transfer is measured in bits using the little b
7
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
● Data Types
o Data Type
▪ Defines the kind of data that can be stored and manipulated within a
program
o 5 Most Commonly Used Data Types
▪ Integers
● Represent whole numbers, both positive and negative, without
any decimal component
▪ Floating-point Numbers
● Used to represent real numbers (decimal or fractions)
● Floating-point numbers are used when more precision is needed
▪ Boolean Values
● Represent the logical values of TRUE and FALSE
● Boolean values are used in programming to control the flow of a
program and consume one bit of storage
▪ Characters
● Used to represent individual letters, digits, punctuation marks, or
any other symbol that can be represented in text
● In most programming languages, characters are defined using
single quotes, like 'a' or '1'
● Characters consume one byte of storage and cannot be used for
math operations
▪ Strings
● Sequences of characters used to represent and manipulate text
● In most programming languages, strings are defined using double
quotes, like "Hello, World!"
● Strings cannot be used for mathematical calculations
8
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
● Representing Data
o American Standard Code for Information Interchange (ASCII)
▪ Developed in the 1960s as one of the first character encoding standards,
and it uses 7 bits to represent each character
9
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
▪ Unicode
● Represent a vast array of characters from virtually all languages
and symbol sets
o ASCII laid the groundwork for character encoding, Unicode expanded upon it to
accommodate the diverse range of characters and symbols
10
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
● Intellectual Property
o Intellectual Property (IP)
▪ Creations of the mind, such as inventions, literary and artistic works,
designs, symbols, names, and images used in commerce
o Intellectual property is protected by law through copyrights, trademarks, and
patents, which enable people to earn recognition or financial benefit from their
inventions or creations
▪ Copyrights
● Legal term used to describe the rights that creators have over
their literary and artistic works
● It is usually demonstrated using the © sign and the year of the
copyright being issued
● Copyrights typically lasts for the life of the author plus 15 to 70
years after their death
11
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
● Digital Products
o Digital Products
▪ Intangible assets that exist in some kind of digital format
o Some hosted products can have fairly expensive infrastructure costs
o Digital Rights Management (DRM)
▪ Systematic approach to copyright protection for digital products
▪ DRM encrypts the content of a digital product and allowing access only to
those who have the necessary decryption keys
▪ DRM ensures that those who create and distribute digital products can
control and monetize their use, encouraging continued innovation and
creativity in the digital space
12
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
13
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
14
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
● Data Analytics
o Data in its raw form, is a collection of numbers, characters, and facts that, in
isolation, may not make much sense
o When this data is processed and organized, it transforms into information
o Information is data that has been given context
o Data Analytics
▪ Involves applying statistical analysis and logical techniques to interpret,
transform, and summarize data
o Insights
▪ Provide a deeper understanding of why something is happening and can
predict what might happen in the future
o Data analytics is a crucial process that transforms raw data into valuable insights
15
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
Types of Computers
● Overview of a Computer
o A computer can be essentially divided into two major components
▪ Hardware
● Represents the tangible parts of a computer, which is all of the
things thing you can see and touch
▪ Software
● The coded instructions that guide the hardware's operations
● Software is more intangible, because it is made up of a series of 1s
and 0s instead of physical components
o Central Processing Unit (CPU)
▪ Microprocessor that interprets and carries out most of the instructions
from the computer's hardware and software
o Random Access Memory (RAM)
▪ Used to perform temporary storage functions in the computer and it is
used heavily by the central processing unit
o Storage Devices
▪ Used for long-term storage, because unlike RAM, the data stored in these
hard disk drives and solid state drives remains intact even when the
computer's power is turned off
o Motherboard
▪ Used to connect all the computer's components together to ensure that
they can communicate with each other
o Power Supply Unit (PSU)
▪ It takes electrical power from a home or office wall outlet and converts it
into a form that the computer's components can use
o Peripheral Devices
▪ Hardware elements that we, as humans, interact with directly with, such
as the monitor, keyboard, mouse, printer, and speakers
o Software can be broadly categorized into two types
▪ System Software
● Responsible for managing and controlling the computer hardware
▪ Application Software
● Designed to help users complete some kind of productive task
o By using both, application software, and the operating system software, the
computer can almost magically execute complex instructions incredibly quickly
16
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
o Fetch-Decode-Execute
▪ The CPU fetches an instruction from the system's memory (or RAM),
decodes what operation it needs to perform, and then executes that
operation
o The true magic of computers lies in their ability to rapidly execute complex
instructions by undertaking a wide variety of tasks using the Fetch-Decode-
Execute cycle
17
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
● Laptops
o Laptops
▪ Compact, all-in-one computing devices designed for portability and
convenience
o Underneath the keyboard and touchpad lies all of the internal components that
make the laptop function
o Central Processing Unit (CPU) carries out most of the processing inside the
laptop, interpreting and executing instructions from the computer's hardware
and software
o Random Access Memory (RAM) provides the processor with a quick-access
workspace for carrying out tasks
o Storage in laptops comes in either of two primary formats
▪ Hard Disk Drives
▪ Solid-State Drives
o SSDs have become more common in laptops due to their speed and reliability
18
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
o Laptops also contain batteries, which is a key feature that sets them apart from
desktops
o For most laptops on the market these days, it is common to see battery lives of
10-12 hours
o Laptops or notebook computers are incredibly versatile devices, designed to
offer convenience and mobility
o Understanding the requirements is critical when choosing a laptop
● Servers
o Server
▪ Powerful computer designed to manage, store, send and process data
24/7
o Servers are typically constructed to handle higher workloads, service multiple
users or devices simultaneously, and prioritize reliability and uptime
o Servers contain key components similar to those in a desktop computer
▪ Central Processing Unit (CPU)
▪ Memory (RAM)
▪ Storage (HDDs or SSDs)
o A server's central processing unit is often stronger than that of a standard
desktop, capable of managing larger computational loads
o Servers typically have a larger RAM capacity than personal computers
o Storage is also a vital part of any server setup
o Redundant Array of Inexpensive Devices (RAID)
▪ They combine multiple individual hard drives or solid state devices into a
single logical device used by the server, allowing multiple copies of each
file to be stored in the array and provides better redundancy and fault
tolerance
o Servers run specialized operating systems designed to manage network
resources and services
▪ Some examples include
● Windows Server
● Linux Distributions (CentOS or Ubuntu Server)
● UNIX Operating System
o Servers are often categorized by their purpose or use case
▪ For instance, web servers host websites, mail servers manage email
traffic, database servers store and manage large datasets, and file
servers store files and manage access to them
19
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
20
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
21
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
22
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
● Xeon
• They offer robust performance and advanced features like
error-correcting code memory, larger amounts of cache,
and multiple CPU support
▪ AMD Processors
● Ryzen and Threadripper
• High-performance CPUs designed for gaming and content
creation
● Ryzen Mobile
• Designed for laptops, offering excellent performance and
power efficiency
● Epyc
• Designed for servers and data centers
o ARM (Advanced RISC Machine) begs the question as to what RISC means
▪ RISC (Reduced Instruction Set Computer) is a type of microprocessor
architecture that utilizes a small, highly-optimized set of instructions
rather than the highly-specialized set of instructions typically found in
other architectures
▪ ARM processors are widely used in mobile devices due to their power
efficiency
o Multiprocessing
▪ Allows a processor to execute multiple tasks simultaneously
o Multiple-Core
▪ Have two or more processing cores, effectively multiplying the processing
power
o Remember, processors are the brains behind our computers, executing
instructions and processing data
● Processor Features
o Processors
▪ Processors execute instructions and process data by performing basic
arithmetic, logical, control, and input/output operations
▪ These operations are carried out by
● Arithmetic Logic Unit (or ALU)
• Performs integer arithmetic and logical operations
● Floating Point Unit (or FPU)
• Responsible for floating-point operations that involve
numbers with fractions
23
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
o The instruction set refers to the basic set of commands a processor can execute
▪ 32-bit processor can handle 32 bits of data at once, while a 64-bit
processor can handle 64 bits
▪ 32-bit system can only address 4GB of memory, while 64-bit processors
can address 16 exabytes of memory
o Integrated Graphics Processor
▪ Provide adequate performance for basic tasks and light gaming, and
helps to reduce power consumption and cost
o Clock Speed
▪ Measured in gigahertz (GHz) to indicate how many instructions a
processor can execute per second
o Bus Speed
▪ Refers to how fast the processor can communicate with other
components in the system
o Hyper-Threading (HT)
▪ Innovative technology implemented in select Intel processors, enabling a
single processor core to manage multiple threads of execution
simultaneously
▪ This technology works by creating virtual cores within a physical core,
allowing it to handle multiple threads concurrently
▪ Hyper-Threading is particularly beneficial in scenarios where applications
involve a high degree of parallelism
● Multitasking
● Virtualization
24
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
● Multimedia Editing
● Scientific Simulations
o Virtualization Technology (VT)
▪ Improves the performance of software virtualization solutions, allowing
multiple operating systems to run simultaneously on the same machine,
each with its own set of resources
▪ Virtualization minimizes latency and overhead
▪ Virtualization Technology is widely utilized in various domains
● Server Consolidation
● Cloud Computing
● Software Development
● Testing Environments
o Remember, processors are the brains behind our computers, executing
instructions and processing data
25
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
● Storage Components
o Fixed Storage
▪ It provides a permanent place to store data and applications, unlike
volatile memory like RAM
▪ The most common types of fixed storage
● Hard Disk Drive (HDD)
• Utilizes magnetic storage technology to read and write
data
• The presence of moving parts, such as spinning disks and
read/write heads, can introduce latency and slower data
access times compared to solid-state drives (SSDs)
26
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
● System Bus
o System Bus
▪ Critical component in computer architecture, serving as the primary
communication channel between the various components of a computer
system
o The system bus is composed of three types of buses
▪ Data Bus transfers actual data between components
▪ Address Bus carries information about where the data should be sent
▪ Control Bus carries control signals, managing and directing the use of the
data and address buses
27
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
o The system bus plays a crucial role in enabling communication between the
Central Processing Unit (CPU), Memory, and Input/Output (I/O) devices
o Over the years, different types of system buses have been developed, each with
varying speeds and functionalities
▪ Some of these include
● Peripheral Component Interconnect (PCI)
• Hardware bus used for attaching peripheral devices to a
computer
● Accelerated Graphics Port (AGP)
• Was specifically designed to handle the demands of high-
performance 3D graphics in the mid-1990s
• Even at its fastest speeds, AGP 8x only offered a
bandwidth of 2.1 GB/s
● Peripheral Component Interconnect Express (PCIe)
• PCIe uses a serial interface with higher data transfer rates
that provides a dedicated connection between devices
• PCIe can use x1, x2, x8, or x16 lanes depending on the size
of the slot
• PCIe 3.0, released in 2010, further doubles this speed to 1
GB/s per lane
o The system bus is a fundamental component of any computer system, enabling
communication between the various parts
● System Cooling
o System cooling is a critical aspect that ensures the optimal performance and
longevity of hardware components
o System Cooling
▪ The process of dissipating heat produced by electronic components to
keep them within a safe operating temperature
o There are two main types of cooling methods
▪ Passive Cooling
● It relies on conduction, convection, or radiation to dissipate heat
● Heatsinks are a common example of passive cooling
• These heat sinks are bulky metal structures with fins that
increase surface area to facilitate heat dissipation
▪ Active Cooling
● Uses power and includes components that move, like fans or
pumps to cool down the system
28
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
29
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
● Storage Devices
o Random Access Memory (RAM)
▪ Which is volatile, meaning it only retains data while the power is on
▪ RAM comes in different types
● Dynamic RAM (DRAM) which stores data bits in an electrical cell
● Synchronous DRAM (SDRAM) which is synchronized to the
system bus, allowing for more efficient data transfer
● Double Data Rate SDRAM (DDR SDRAM, or DDR) which transfers
data twice per clock cycle, and therefore has faster speeds than
older styles of RAM
o Hard Disk Drives (HDDs)
▪ Non-volatile, they keep data even when power is off
▪ The capacity and speed of the HDD can vary, with the biggest currently
reaching up to 10TB
o Solid-State Drive (SSD)
▪ A type of storage that uses flash memory
▪ It can be used on their own or as part of a hybrid drive, working together
in combination with an HDD
o Optical Disc Drive
▪ Used for multimedia storage and can be written on and read by lasers in
an optical drive, and include technologies like CDs, DVDs, and Blu-ray
Discs
▪ Optical drives are rated based on their data transfer speed and can also
function as recorders and rewriters
o Flash Memory
▪ USB drives, or thumb drives, are very popular due to their portability and
ease of use
o Network Attached Storage (NAS)
▪ Dedicated server connected to a network, designed for storing data in a
central location
o Storage Area Network (SAN)
▪ High-speed network of storage devices that can also be accessed by
multiple servers
30
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
o Tape Storage
▪ Used more specifically in environments that need to store large amounts
of data for long periods
o Flash Arrays
▪ Storage systems exclusively composed of flash memory drives instead of
traditional spinning hard drives
o Redundant Array of Inexpensive Disks (RAID)
▪ Allows data to be distributed across multiple drives
● Graphic Devices
o Graphic Devices
▪ Essential components that transform abstract ones and zeros into the
colorful images and videos that we see on our computer screens
o Higher-quality graphics adapter known as a discrete GPU is used for 3D gaming
or intensive multimedia work
▪ There are several leading manufacturers of these high-performance
graphics adapters
● ATI and AMD
● NVIDIA
o Every image on your screen is actually made up of tiny dots known as pixels, or
picture elements
▪ The resolution of the image is the number of these pixels lined up
horizontally and vertically
▪ Each of these pixels can be a different color, and the total number of
colors an image supports is called its color depth
o Refresh Rate
▪ Measured in Hertz (Hz), determines how many times your display
updates with new information per second
▪ More pixels, more colors, or a faster refresh rate all require more
bandwidth
o Video Graphics Array (VGA)
▪ Defined a resolution of 640x480 pixels with 16 colors at a refresh rate of
60 Hz
o Many PC widescreen display formats use a 16:10 ratio to leave room for on-
screen controls above or below the main content
o VGA, SVGA, and XVGA all used a standard D-shaped 15-pin connector
31
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
o After VGA, a new adapter called DVI, or the Digital Visual Interface, was
introduced
▪ DVI came in three varieties
● DVI-A (Analog variant)
● DVI-D (Digital variant)
● DVI-I (Supported both analog and digital output)
o Most systems now use the High Definition Multimedia Interface connection
known as HDMI
▪ HDMI has become quite ubiquitous in display technologies, including
computer monitors and televisions because it offers both high-definition
video and audio in a single cable
o DisplayPort (or DP) is another type of connector commonly used with
computers to have higher resolutions
o Mini-DisplayPort offers high-definition video output up to 4K resolution, audio
output, and multi-stream transport for daisy-chaining multiple displays
o Integrated versus Discrete Graphic Processing Units (GPUs)
▪ Integrated means the graphics adapter is built into the same chip as the
CPU
● This design is compact and energy-efficient, but it doesn't offer
the best performance
▪ Discrete graphics cards offer superior performance
● For more graphically intensive tasks like 3D rendering or gaming,
discrete graphics cards, which are separate pieces of hardware,
offer superior performance
32
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
o Bluetooth
▪ Short-range, radio frequency-based technology has several classes, with
Class 2 being the most common for personal devices and supporting a
distance of about 30 feet or 10 meters
▪ Devices with Bluetooth 2.0 can transfer data at a maximum speed of 3
Mbps, which is fairly slow
▪ The latest version, Bluetooth 3, boasts a speed of up to 24 Mbps in
Highspeed mode
o Radio Frequency ID (RFID)
▪ Using specially-encoded tags, RFID allows objects to be scanned and
identified
● Passive RFID
• Only responds when scanned at close range, has been a
game-changer in various fields such as logistics and supply
chain management
● Active RFID
• Powered and have an impressive range of up to 100
meters
33
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
● Network Connections
o Registered Jack (RJ)
▪ Includes connections like RJ11 and RJ45, which are commonly used for
landline telephones (RJ11) and wired computer networks over Ethernet
(RJ45)
● RJ11 (Phone Lines and Voice Service)
• The smaller of the two connector types and it is
predominantly used for telephone systems
• The '11' in its name signifies the specification that defines
not just the physical aspects, such as size and shape, but
also the wiring standard
• An RJ11 connector typically has space for 6 conductors or
internal wires, but for most residential phones only use 2
or 4 of these slots
● RJ45 (Data and Digital Service)
• The larger sibling to an RJ11 connection and is widely used
in Ethernet and network cabling
• If you've ever plugged your computer into a network using
a cable, it's almost certainly an RJ45 connector you've
used
• RJ45 can accommodate more internal wires (8 conductors
to be exact), and this enabled it to support more complex
networking requirements and faster speeds needed for
internet connectivity
▪ Each conductor inside the cable is responsible for handling different
types of data communication
o Wireless Fidelity (Wi-Fi)
▪ Provides high-speed internet access within a particular range, typically
around 150 feet indoors but can vary based on the environment and the
specific equipment used
▪ It operates on two main frequency bands
● 2.4 GHz frequency has a greater range, but slower speeds
● 5 GHz frequency has faster speeds, but a shorter range
o Bluetooth
▪ Short-range connections between devices
▪ Creates a Personal Area Network (PAN), where devices can interact
within about 30 feet of each other
34
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
35
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
36
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
o Projectors
▪ Used to broadcast visual data onto a larger screen or surface, functioning
much like a monitor but on a larger scale, making them a popular choice
in educational classrooms and corporate board rooms
o Speakers
▪ They convert binary information into audible sound waves
o Printer
▪ Render our digital documents into physical forms, printing text and
images onto a range of materials including paper, card, and sometimes
fabric
o Although all output devices can be considered peripherals, not all peripherals are
output devices
o Multifunction peripherals, like all-in-one printers that can print, scan, and copy,
offer several functions in one device, making them a space-saving and cost-
effective solution
o Most peripherals connect to the computer via USB ports, but wireless
connectivity options like Bluetooth are increasingly common
o There are specialized types of output devices and peripherals designed to cater
to specific needs
▪ Braille embossers and screen reading software output digital content in a
tactile or audible format
▪ In the creative industry, graphic tablets and 3D printers turn digital
designs into visual artwork and physical objects, respectively
▪ In the realm of entertainment, VR headsets and game consoles deliver
immersive visual and auditory experiences
▪ MIDI controllers offer unique interfaces for digital audio workstations
▪ In healthcare, computer-controlled devices like pacemakers and
prosthetic limbs offer life-enhancing outputs
37
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
38
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
Networking Fundamentals
● Network Components
o Computer Network
▪ Complex systems that enable communication and data exchange
between multiple devices
▪ They consist of several key components
● Clients
• Devices that request and use resources provided by
servers
● Servers
• Powerful computers that provide resources or services to
clients
● Switches
• They connect multiple devices on a Local Area Network
(LAN), allowing them to communicate with each other
● Routers
• Devices that connect multiple networks together and
direct data traffic between them
● Modems
• Devices that modulate and demodulate signals, enabling
communication over cable or telephone lines
● Network Interface Cards (NICs)
• Hardware components that allow computers to connect to
a network
● Access Points
• Devices that create a Wireless Local Area Network (WLAN)
or a wireless connection point for devices on an existing
wired network
● Firewalls
• Security systems that monitor and control incoming and
outgoing network traffic based on predetermined security
rules
• Firewalls can be hardware or software-based
• There are different types of firewalls
▪ Packet-Filtering Firewalls check packets against a
set of filters
39
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
● LAN vs WAN
o Several Types of Networks
▪ Local Area Networks (LAN)
● Network that connects devices in a relatively small area, such as a
home, office, or a group of buildings
● LANs are typically owned, controlled, and managed by a single
person or organization
● They provide high-speed connectivity, enabling data transfer and
sharing of resources like printers, files, or applications among
connected devices
▪ Wide Area Networks (WAN)
● Span a large geographical area, often connecting LANs that are
miles apart
● WANs are typically used by businesses and government entities to
communicate and share resources among employees in
geographically dispersed locations
● WANs are usually slower than LANs due to the distance data must
travel and are often established using leased telecommunication
circuits
▪ Metropolitan Area Networks (MAN)
● Larger than LANs but smaller than WANs, they typically cover a
city or a town
▪ Campus Area Networks (CAN)
● Networks that cover a specific geographic area like a university
campus or a military base
▪ Personal Area Networks (PAN)
● PANs can be wired, like a connection between a computer and a
printer, or wireless, like Bluetooth networks
o Telecommunications companies provide the infrastructure that enables data
transmission across large distances
o Internet Service Providers (ISPs) provide services that enable individuals and
organizations to access the internet
40
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
● Network Communication
o Transmission Control Protocol/Internet Protocol (TCP/IP)
▪ Conceptual framework that defines how data should be packaged,
addressed, transmitted, routed, and received on the internet
41
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
● Network Addressing
o 2 types of addresses play a crucial role in ensuring effective communication
between devices
▪ Internet Protocol (IP) addresses
● Unique identifier assigned to each device connected to a network
that uses the Internet Protocol for communication
42
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
● LAN Communications
o Local Area Networks (LANs)
▪ Are the backbone of most organizational and home networks, enabling
communication between devices in a confined geographical area
o When we talk about LAN communication, we are really focused on three main
areas
▪ Media Access Control (MAC) addresses
● Unique identifiers assigned to each Network Interface Card (NIC)
by its manufacturer
● MAC addresses are hard-coded into the NIC and remain constant
43
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
● WAN Communications
o Wide Area Networks (WANs)
▪ Are integral to global communications, connecting Local Area Networks
(LANs) across cities, countries, or even continents
▪ WAN communications is made up of 2 main concepts
● Internet Protocol (IP) Addresses
• Unique identifiers assigned to each device on a network,
enabling them to communicate with other devices
● Routing
• The process of selecting the most appropriate path for
data packets to travel from a source device to a
destination device across a network
o When a device wants to send data to another device on a different network, it
first examines the destination IP address of the packet
o The routing process involves evaluating various factors
▪ Network Congestion
▪ Available Bandwidth
▪ Number of Hops (or the number of intermediate network devices the
packet needs to traverse)
o Routers
▪ Analyze the IP addresses of incoming packets and consult their routing
tables to determine the next hop for the packet
o IP Addresses and Routing are fundamental to WAN communications
44
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
45
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
46
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
● Accessing Websites
o HyperText Transfer Protocol (HTTP)
▪ Operates on port 80 and defines how messages are formatted and
transmitted between web servers and web browsers
▪ HTTP protocol uses a client-server model, where the client sends
requests for resources and the server responds with the requested
content
▪ The messages exchanged between the client and server follow a specific
structure
● Request Header
● Optional Request Body (POST Requests)
● Response Header
● Response Body
o HyperText Transfer Protocol Secure (HTTPS)
▪ Secure variant of HTTP that operates on port 443 and is specifically
designed to provide secure communication over the Internet
▪ HTTPS employs encryption protocols, such as Secure Sockets Layer (SSL)
or Transport Layer Security (TLS), to establish a secure connection
between the client and the server
● This encryption ensures that sensitive information exchanged
during the browsing session
• Login Credentials
• Personal Data
• Financial Details
● The use of encryption in HTTPS is crucial for ensuring data
integrity and privacy
47
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
● Accessing Email
o Within the vast array of over 64,000 ports available for device communication,
three critical protocols stand out
▪ Post Office Protocol Version 3 (POP3)
● Operates on port 110 and is widely used for retrieving emails
from a mail server
● POP3 removes the email from the server once it has been
successfully downloaded
▪ Internet Message Access Protocol (IMAP)
● Operates on port 143 and allows multiple email clients to manage
the same mailbox while keeping the email stored on the server
● Actions performed on one device are synchronized across all
connected devices
▪ Simple Mail Transfer Protocol (SMTP)
● Operates on port 25 and serves as the standard protocol for
sending emails across the Internet
48
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
49
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
Implementing Networks
50
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
o The interaction between your modem and the cable network is based on a
technology standard known as DOCSIS (Data Over Cable Service Interface
Specification)
▪ DOCSIS 3.0 supports download speeds of up to 1.2 Gigabits per second
o Each type of Internet service - whether it's DSL, Fiber, or Cable - requires a
specific kind of modem or modem/router
o Advantages of using cable internet
▪ Widely available
● Cable companies use the same infrastructure for Internet service
that they use for cable TV, it's relatively simple for them to offer
Internet service to existing cable customers
▪ Speed
● Often faster than DSL, satellite, cellular, and other types of
Internet connections, especially when it comes to download
speeds
● This makes it ideal for activities that require a lot of bandwidth,
like streaming high-definition videos, playing online games, or
downloading large files
o Disadvantages of using cable internet
▪ Expensive
▪ Not available anywhere
● Although it's widely available, it's not available everywhere
● Rural areas, in particular, may not have access to cable Internet
▪ May experience a slowdown during peak usage periods
o Despite these potential drawbacks, cable Internet is still a powerful, fast, and
reliable option for Internet service
51
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
o The most common type of DSL service you'll encounter is called Asymmetric DSL
or ADSL
▪ The term "asymmetric" comes from the fact that the download speed or
'downlink' is faster than the upload speed or 'uplink'
▪ The quality of your telephone wiring and your distance from the local
telephone exchange can greatly influence your actual internet speed
● The further from the exchange, the slower the internet speed
o DSL, though prevalent, comes in various forms and flavors
▪ Besides the aforementioned ADSL, there are variations like ADSL2 and
ADSL2+ which offer increased speed and performance
o One of the most important benefits of DSL is its widespread availability
▪ This has made it a go-to choice for rural or remote locations that are
typically underserved by other broadband options
o DSL has proven as a versatile and reliable choice for internet service
o So remember, DSL internet service, with its varying forms and wide availability,
continues to play a crucial role in keeping us connected in today's digital age, but
it is starting to show its age
52
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
53
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
o One of Wi-Fi 6's most notable features is its enhanced performance in crowded
environments
▪ With the implementation of new technologies such as Orthogonal
Frequency-Division Multiple Access (OFDMA) and Multi-User, Multiple
Input, Multiple Output (MU-MIMO)
o When it comes to Wireless Networks, the focus really is on Wi-Fi and its various
versions, speed capabilities, and potential interference concerns
54
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
55
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
Operating Systems
56
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
▪ The operating system also provides utilities for users to easily search for,
copy, move, and delete files
o So remember, when it comes to the functions of an operating system, there are
a couple of main ones you need to be aware of
▪ The ability to provide an interface between the user and the computer
▪ The ability to provide an interface between the software applications and
the hardware
▪ Monitor the system’s health and functionality
▪ Perform data management
57
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
● Microsoft Windows
o Windows
▪ Graphical operating system developed and published by Microsoft
▪ Different versions of Windows
● Windows 1.01
● Windows 2.01
● Windows 3.01
● Windows 95
● Windows 98
● Windows 2000
● Windows ME
● Windows XP
● Windows Vista
● Windows 7
● Windows 8
● Windows 8.1
● Windows 10
● Windows 11
o Windows also has a server-based version called Windows Server
▪ Windows Server 2012
▪ Windows Server 2016
▪ Windows Server 2019
▪ Windows Server 2022
o Servers get 10 years of support whereas workstations usually get around 5 years
of support
58
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
● Apple's macOS
o macOS
▪ Operating system used on Mac computers, built by Apple
● iMac
● Mac Desktop
● MacBook
▪ macOS was previously called OSX
▪ mac, just like Linux, is based on Unix
o Different code names of macOS
▪ Cheetah
▪ Puma
▪ Jaguar
▪ Panther
▪ Tiger
▪ Leopard
▪ Snow Leopard
▪ Lion
▪ Mountain Lion
▪ Yosemite
▪ El Capitan
▪ Sierra
▪ High Sierra
▪ Mojave
▪ Catalina
▪ Big Sur
▪ Monterey
▪ Ventura
o macOS or OS X are desktop operating system that only operates on Apple
devices
o macOS is considered a proprietary piece of software
59
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
● Apple's iOS
o iOS and iPad OS were developed by Apple for their smartphones and tablets
o iOS is also derived from Unix
▪ It can only be run on iPhones
o Apple releases a new version each year
o iOS provides free unlimited updates
o iPadOS was developed as a fork of the main iOS branch
o iPadOS and iOS share a lot of the same code underneath them
▪ Both are developed by Apple
▪ Both are a proprietary code base
▪ iPadOS supports multitasking of applications
● Linux
o Linux is a family of open-source Unix-like operating systems based on the Linux
kernel
o 3 Main Types of Systems Inside Linux
▪ Red Hat
▪ Debian
▪ SUSE
o Ubuntu is a Debian-based Linux distribution
o Fedora and CentOS are Red Hat-based distributions
o Open Source Software
▪ A type of software where a user can download, modify, use, and
distribute the source code
o Proprietary Software
▪ A type of software where the original developer owns and controls the
source code
o Linus Torvalds created the first version of Linux in 1994
o Beasite, the BSD Daemon, is the generic mascot of the BSD/UNIX operating
system
o Bell Laboratories created Unix back in the 1960s
o Unix is a proprietary operating system used for servers and mainframes
o SUSE and Red Hat use a subscription model
o The openSUSE, Fedora, and CentOS distributions are free to use, but do not
include vendor support
o Fedora, Debian, Mint, Arch, and CentOS are community supported distributions
60
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
o When it comes to Linux distributions, there are 2 different formats for lifecycle
support
▪ Standard
● Standard release models have version numbers associated with
them
● Even number releases with Ubuntu are long term support
releases with 5 years of support
● Odd number releases are considered interim releases and only
come with 9 months of support
▪ Rolling
● Updates continually come out in a rolling based model, so there is
no long term support
o It is important to get comfortable using Linux at a basic level
o 80% of the servers on the Internet use Linux
● ChromeOS
o Developed to run specifically on laptops and desktop hardware created by
Google
o This hardware was designed to keep costs very low
o Chrome OS devices have built-in virus protection and firewalls
▪ It is extremely safe and secure
▪ These systems are able to do automatic updates
o Things to remember when it comes to ChromeOS
▪ Proprietary operating system created by Google
▪ Designed to run on specific hardware
▪ Stripped down operating system
▪ Primarily uses web applications and supports Android apps
● Android
o Android OS is a specific operating system that was designed to be able to
support the smartphone and tablet market
▪ It was designed to be open source and is based on Linux
o Android is used on every smartphone that is not an Apple product
o iOS only operates on Apple hardware
o Android has about 72% of the market share when it comes to mobile operating
systems
o The first version of Android came out in September of 2008
61
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
o Android versions are named after a dessert food such as Snow Cone, Red Velvet
Cake, Quince Tart, and more
o Android 13 will be called Tiramisu
o Mobile operating systems only last around two to three years before needing
updates
o Most mobile devices only have 3-5 years of backward support
o Keep this in mind when looking at the end-of-life of products
o Things to remember when it comes to Android
▪ Android is based on Linux
▪ Each manufacturer can make their own version of Android
62
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
63
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
64
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
o Services work behind the scenes to support the operation of your computer and
run processes that handle essential tasks for you
▪ These services operate independently of the user's session and can start
up even before a user logs into the computer
▪ Services power many parts of the Windows operating system, enabling
functions like
● Sign-in
● Network Browsing
● File Indexing
o A process is an application or program that runs in a computer's memory and is
processed by the CPU
o Services are processes that work behind the scenes and are not directly used by
the end user
65
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
o Disk Management
▪ Allows to format disks and manage partitions so that sections of a disk
may be treated by the operating system as separate drives
▪ Disk Management utility provides a summary of attached drives and their
partitions
▪ Each partition has a file system installed
● There are different file systems and each one offers various
advantages and disadvantages, so they are often used for specific
purposes
• For example
▪ NTFS offers security permissions
and system recovery options
▪ FAT32 broader compatibility, but it lacks the
advanced features of NTFS
o Regular maintenance can help optimize disk usage
▪ Clean temporary files
▪ Uninstall unused software
▪ Defragment disk
o Memory and disk management are essential to reaching faster computer
performance
66
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
67
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
o Setting permissions at the folder level applies those permissions to all files within
that folder
▪ In Windows, these file and folder permissions are accessed by
● Right-click on a file or folder
● Select ‘Properties’
● Navigate to the ‘Security’ tab
o Always ensure to only give out the necessary permissions
● Device Management
o Device Management
▪ Centers around managing software drivers to interface with the
hardware devices
o Drivers ensure that the hardware and software are in sync and working together
o You might also come across devices that need special configuration or
maintenance, like Network-Attached Storage (NAS) devices
▪ This configuration might involve
● Setting up user accounts
● Managing file sharing settings
● Updating firmware
68
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
● Disk Partitions
o Disk Partitions
▪ Divisions of a Hard Disk Drive (HDD) or Solid-State Drive (SSD), each
acting as a separate logical unit of separation within a single physical
drive
o Partitions can be created during Windows Setup when installing a fresh copy, or
through Disk Management when the OS is already up and running
o In the context of Windows, disk partitions are often referred to as 'drives'
▪ Each partition is assigned a unique drive letter (like C:, D:, etc.) for easy
identification and access
▪ The primary partition is typically labeled as the C: drive, and this is where
the Windows operating system is usually installed
▪ If the system files in the C: drive become corrupted, the data in other
partitions remain unaffected
69
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
70
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
71
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
72
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
▪ .ppt/.pptx
● These are used by Microsoft PowerPoint
● PPT is the older format from 2003 and older versions, while PPTX
is used in Microsoft PowerPoint 2007 and newer versions
▪ .pdf
● the Portable Document Format which is a universal file format
that preserves the fonts, images, graphics, and layout of any
source document
o Image and Picture Files
▪ .jpg/.jpeg
● the Joint Pictures Expert Group is widely used for photographic
images
● It is known for its lossy compression and the ability to select a
compression level
▪ .gif
● Graphics Interchange Format
● GIF is commonly used for animated images and is known for its
lossless compression. Some people pronounce this GIF (like GIFT)
while others say it as JIF
▪ .tiff
● Tagged Image File Format
● TIFF is a high-quality graphic format often used for professional
printing and it can also utilize lossless or JPEG compression
▪ .png
● Portable Network Graphics
● PNG (pronounced PING) supports lossless data compression and
transparency
▪ .bmp
● Bitmap file
● This is an uncompressed Windows only format that is not widely
used these days
o Video Files
▪ .mpg
● An early MPEG standard with lossy compression
▪ .mp4
● A widely used MPEG-4 standard format that acts as a container
for audio and video streams, often using the H.264 codec
73
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
▪ .flv
● A container format for Flash Video, which is declining in use due
to lack of support on Apple devices and the rise of HTML5
▪ .wmv
● A video container format developed by Microsoft, compatible
with many media players and usable for DVD and Blu-ray discs
▪ .avi
● A legacy, Windows-only video format with limited ongoing use
o Audio Files
▪ .mp3
● Developed from MPEG, is a popular format for distributing music
and is supported by most media players, but it uses lossy
compression, discarding some audio information
▪ .aac
● Developed from MPEG, is a successor to MP3 and is widely
supported
▪ .m4a
● An audio-only format derived from MPEG-4, usually uses AAC
compression but can use other methods, including lossless ones
▪ .flac
● A free lossless audio codec that compresses file size without
discarding audio data, but it's not as widely supported by media
players
▪ .wav
● An early Windows audio file format, is not widely supported by
media players but is often used by audio editing applications
o Executable Files
▪ .exe
● The standard program file in Windows
● If you are running an application like Google Chrome or Microsoft
Word, it's file has a .exe file extension
▪ .msi
● A Windows Installer file used for installing and uninstalling
software applications in Windows
▪ .app
● The file extension for applications in macOS
● Essentially, it is the macOS equivalent of a Windows exe file
74
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
o Script Files
▪ .bat
● A batch file and this is a text-based file that contains different
scripting code to run other command line applications in the
Windows command line interface
▪ .cmd
● A CMD file consists of a script containing one or multiple
commands in the form of plain text that are run in order to
execute various tasks
▪ .vbs
● A Visual Basic script file that contains commands for the visual
basic programming language to execute
▪ .js
● A JavaScript file and contains JavaScript code that is used to
render websites and perform backend logic for websites
▪ .ps1
● A PowerShell script file that allows multiple cmdlets to be
executed from a single script
o Compressed and Disk Image Files
▪ .zip
● Developed for the PKZIP utility, it's now natively supported by
Windows, Mac OS X, and Linux, meaning these OS can create and
extract files without third-party applications
▪ .tar
● Originally a UNIX format for writing to magnetic tape, it's still used
with gzip compression (tgz or .tar.gz) as a compressed file format
for UNIX, Linux, and macOS
▪ .rar
● A proprietary format used by the WinRAR compression program
▪ .7z
● An archive type created and opened using the open-source 7-Zip
compression utility
▪ .gz
● An archive type created and opened by the gzip utility, freely
available for UNIX and Linux computers
▪ .iso
● A file format used by optical media, with the main formats being
ISO 9660 (used by CDs) and UDF (used by DVDs and Blu-Ray Discs)
75
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
76
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
Software Applications
● Productivity Software
o Productivity Software
▪ Tools that are engineered with the primary objective of enhancing
efficiency and efficacy for both individuals and organizations
o Different Types of Productivity Software
▪ Word Processors
● These tools provide a wide range of features to help users create,
edit, and format text-based documents
● You can apply different fonts and styles, check spelling and
grammar, insert images or tables, and much more
▪ Spreadsheet Programs
● These tools provide a wide range of features to help users create,
edit, and format text-based documents
● You can apply different fonts and styles, check spelling and
grammar, insert images or tables, and much more
▪ Presentation Platforms
● These tools provide a platform to create, edit, and display
information in a slide show format
● They offer features to include text, graphics, animations, and
multimedia to craft dynamic and visually appealing presentations
▪ Web Browsers
● Web browsers are mainly used for accessing the Internet, but
they also fall under the umbrella of productivity software because
they provide a platform for users to retrieve, present, and
traverse information resources on the World Wide Web
▪ Visual Diagramming Tools
● Visual diagramming tools, such as Microsoft Visio or Google
Drawings, are a type of productivity software that enables users
to create a variety of diagrams and flowcharts
● These tools are especially useful in business and technical
environments where visual representations can aid in
understanding and decision-making
77
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
● Collaboration Software
o Collaboration Software
▪ Enhance communication, increase team productivity, and enable
seamless cooperation among individuals and teams in different
geographical locations
o Email
▪ Provides a platform for exchanging messages, files, and other content
over the Internet (Microsoft Outlook, Google's Gmail, or Apple Mail)
▪ Email is asynchronous, which enables communication across time zones
and schedules
▪ Email provides features for managing contacts and calendars
o Conferencing Software, Video Teleconferencing (VTC), and Telepresence
▪ These software tools have become indispensable for companies to keep
their teams connected
▪ These platforms also offer additional collaborative features like screen
sharing, virtual whiteboards, and breakout rooms, further enhancing
teamwork and collaboration among participants
o Instant Messaging and Voice Over IP (VoIP)
▪ Provides instant connectivity, allowing for quick information exchange
and immediate responses, ideal for fast-paced, collaborative
environments
o Online Workspace
▪ Serves as centralized platforms where teams can collaborate, manage
projects, and share resources
o Remote Desktop and Screen Sharing
▪ Allows users to access and control a computer or network from a remote
location
o Document Sharing and Collaborative Editing Tools
▪ Enables multiple users to access, edit, and comment on documents
simultaneously
78
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
● Business Software
o Business Applications
▪ Pivotal tools for streamline operations, enhance efficiency, and propel
overall business performance
▪ Our main focus will be on key types of business applications
● Database Software
• Think of a database as a large, organized bookshelf of
information, and the database software as the librarian
who knows exactly where each book is and can retrieve it
in no time
• Software tools like Microsoft SQL Server or Oracle
Database serve this role, helping businesses store,
organize, retrieve, and manage data
● Project Management Software
• They help project managers and teams work together,
meet their goals on time, manage resources, and control
costs
• These tools allow teams to assign tasks, track time, and
monitor progress, ensuring that everyone is marching to
the same beat
● Accounting Software
• Used to keep track of income and expenses, manage
invoices, compute taxes, run payroll, and generate
financial reports
• Tools like QuickBooks, Xero, or Zoho Books serve as a
business's personal accountant and help to manage
financial tasks
● Business-specific Applications
• Created to meet the special requirements of distinct
businesses or professions
• Computer-aided design or CAD software, like AutoCAD,
helps professionals like engineers or architects to create
precise 3D models and technical drawings
79
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
● Software Licensing
o End-User License Agreement (EULA)
▪ Legal contract between the software developer or vendor and the end
user
o Different Types of Software Licenses
▪ Single-User License
● Permits one user to install the software on a single machine
▪ Group/Site License
● Allows a specified number of users, or users within a particular
geographic location, to use the software
▪ Concurrent License
● Type of license that limits the number of users who can use the
software at the same time
o Difference Between Open-Source and Proprietary Software
▪ Open-source Software
● Software with publicly available source code for users to view,
modify, and distribute (Linux OS and Apache web server)
▪ Proprietary Software
● Keeps its source code under tight wraps and treats it as protected
information from the manufacturer
o Subscription Software
▪ Involves a recurring payment to continue using the software
o One-Time Purchase Software
▪ A single upfront purchase is required, following which the program can
be used continuously
o Product Keys and Serial Numbers
▪ When you purchase software, especially proprietary software, you'll
often be given a unique code, known as a product key or serial number
▪ The code serves as proof of license to install and use the software on the
user's system
80
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
81
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
• Disadvantage
▪ You cannot use the software if you are not
connected to the network
o Software as a Service (SaaS)
▪ Hosted on a provider's servers and accessed over the internet
▪ SaaS can access software and data from any device with an internet
connection
o Software installation is a vital process that brings functionality to your hardware
and enables a multitude of tasks on your computer
▪ Different Installation Methods
● Desktop App (Locally Installed or Network Hosted)
● Through digital distribution platforms (Microsoft Store/Apple
Store)
● Cloud-hosted Software (SaaS)
82
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
83
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
Web Browsing
● Malware
o Malware
▪ Variety of harmful or intrusive software designed to damage, disrupt, or
gain unauthorized access to computer systems, often without the user's
knowledge
o Different Types of Malware
▪ Viruses
● A computer virus is a type of malware that replicates itself by
modifying other computer programs and inserting its own code
▪ Worms
● Typically spread across networks by exploiting vulnerabilities,
consuming bandwidth, and potentially causing damage by
overloading networks or taking down servers
▪ Trojan Horses
● Harmful pieces of software that look legitimate or hide within
legitimate software
▪ Ransomware
● Type of malware that encrypts the user's files and demands a
ransom to restore access
▪ Adware
● Short for advertising-supported software, automatically delivers
advertisements
▪ Spyware
● Type of malware that secretly observes the user's activity and
collects personal information
o Some Symptoms of Malware Infections
▪ Unexpected pop-up ads
● Spyware often generates pop-up ads that might seem unrelated
to the site you're visiting
▪ New toolbars, extensions, or plugins in your browser
● Spyware can install these components to monitor your online
activity
▪ Redirected browser homepage
● Your browser's homepage might change without your consent,
directing you to unwanted sites
84
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
85
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
86
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
● Private Browsing
o Private Browsing
▪ Offers a way to browse the internet without leaving a lot of traces related
to the activity on the device
o Cookies
▪ Small files that websites store on the device to remember information
about the user
● First-party cookies are generated by the website where the user
is directly visiting
● Third-party cookies are created by a domain different from the
one the user is visiting
▪ Many people like to deny the use of cookies or will "clear their cookies"
frequently
▪ Some malware, viruses, and trojans focus on stealing cookies from the
system as a way to again access to sensitive information
▪ Any sensitive information should only be stored in secure cookies
87
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
o Trackers
▪ Often embedded in cookies and are used by websites and advertisers to
collect data about a user's browsing habits and preferences
o Caching
▪ Method used by web browsers to store copies of web pages, images, and
other resources on the device
▪ Clearing the cache can help protect a user's privacy
o Private browsing only removes the locally stored information
o In a private browsing session, your history is not saved, so you won't need to
worry about clearing it
88
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
● Digital Certificates
o Digital Certificate (SSL Certificate/Identity Certificate)
▪ Electronic documents used to prove the ownership of a public key
o Digital certificates work based on a Public Key Infrastructure (PKI)
o A valid digital certificate is one that the client trusts, is signed by a trusted CA,
and is not expired
o An invalid digital certificate may not be trusted, may be incorrectly signed, or
may be expired
o Digital certificates play a crucial role in securing online communications
▪ These digital certificates provide a way to verify the identities of parties
involved in a communication and enable the use of encryption to protect
the data being exchanged
● Proxy Settings
o Proxy Server
▪ Any kind of device that acts as a gateway between the client PC and the
Internet
▪ Why using a proxy server is necessary
● See what things people are accessing
● Content filtering
● Cache the pages as people are going there
o Most proxy servers are going to be used in corporate environments
89
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
Troubleshooting Methodology
● Identify the Problem
o Identifying the Problem
▪ Involves gathering information, understanding user reports, and
investigating symptoms to gain a clear understanding of the issue
● Information Gathering
• It is essential to gather as much information as possible
• This involves collecting relevant data and details about the
problem
▪ Error messages
● Make a note of any error messages that
appear on the screen or are recorded in the
system event logs
▪ System behavior
● Observe and document the abnormal
behavior of the system or application
experiencing the issue
▪ Recent changes
● Determine if any recent changes were
made to the system
▪ User reports
● Gather information from users who have
experienced the problem
▪ Logs and diagnostic tools
● Consult system logs, performance
monitoring tools, or any diagnostic tools to
extract additional information
● Symptom Analysis
• To get a deeper understanding of its causes and effects by
duplicating the problem, you can perform controlled tests
and further analyze the issue to
▪ Isolate the problem
● Identify the specific system, application, or
component that is exhibiting the issue
▪ Follow the user’s steps
● Reproduce the steps that users followed to
encounter the problem
90
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
▪ Document observations
● Pay attention to the exact symptoms, error
messages, or system behaviors that occur
during the replication process
● Questioning Users
• By engaging in effective questioning techniques, you can
uncover important details and provide more insights into
the problem you're troubleshooting
▪ Use active listening
● Give full attention to users and make them
feel heard
▪ Ask open-ended questions
● Ask questions that invite users to provide
detailed explanations rather than “yes” or
“no” answers
▪ Make specific inquiries of the users
● Seek clarification on any unclear statements
made by users
▪ Create a timeline of events
● Ask users to describe the sequence of
events leading up to the problem
● Identify the symptoms associated with this problem
• Symptoms are these observable indications of the issue
▪ Document observed symptoms
● Compile a list of all the symptoms and
abnormal behaviors associated with the
problem
▪ Categorize the symptoms
● Group similar symptom to identify patterns
or commonalities
▪ Prioritize the symptoms
● Determine the critical symptoms that have
the most significant impact on system
functionality or user experience
91
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
● Research
o Research plays a vital role in the troubleshooting methodology as it helps expand
your knowledge, identify potential solutions, and gain insights from others who
have encountered similar issues
▪ Utilize knowledge base and internet resources
● Internal knowledge bases may contain troubleshooting guides,
FAQs, and solutions to system-specific problems
▪ Conduct research in a systematic manner
● Define keywords to identify relevant keywords related to the
problem or symptoms
▪ Review similar cases and solutions
● Explore case studies or technical articles that detail real-world
troubleshooting scenarios
▪ Organize and document findings for future reference
● You should maintain a log or document where you can record
relevant information
• Links
• Potential solutions
• Insights
● When using external information or solutions, ensure to properly
attribute them
● Establish a Theory
o Establish a Theory
▪ Helps narrow down the potential sources of the problem and further
guide the investigation
o Some effective strategies for identifying the probable cause of an issue
▪ Question the obvious
● Do not make assumptions based on the initial observations
● Explore multiple avenues and not get fixated on a single
hypothesis
▪ Consider multiple approaches
● You should use all three types of thinking
• Analytical
• Creative
• Collaborative
● Seek input and perspectives from colleagues or SMEs
92
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
▪ Divide-and-Conquer Technique
● Identify sub-components, then evaluate each individually
● Examine each sub-component separately to determine how it
affects the overall problem
● Identify commonalities or patterns among the sub-components
▪ Refine and prioritize theories
● Assess the evidence gathered during the research and testing
phases
o Remember the principle of Occam's Razor, which suggests that the simplest
explanation is often the most likely
▪ Prioritize theories that require fewer assumptions and minimizes the
complexities
▪ If the principle of Occam's Razor does not work, iterate and adapt
93
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
94
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
● Evaluation Criteria
• Define the criteria for evaluating the success of the plan of
action
● Documentation
• Emphasizes the importance of documenting all actions
taken, decisions made, and outcomes achieved
▪ We need to Implement the Plan of Action
● The plan must remain adaptable and flexible in the face of
unexpected challenges or changes
● Continuously track the progress against the established timeline
and objectives
● Document the final outcome, including the actions taken and the
results achieved
95
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
96
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
97
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
98
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
99
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
Software Development
● Pseudocode
o Pseudocode
▪ Method of planning which allows programmers to plan out their code in
a format that is easier to understand
▪ Writing pseudocode begins with outlining the goals of the program
o Why is pseudocode important in good coding practices?
▪ It enhances clarity
▪ It simplifies debugging
▪ It promotes communication
▪ It facilitates translation into multiple programming languages
o Keep your pseudocode simple and readable
o Pseudocode use contributes to writing code that is logical, efficient, and easier
to debug
100
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
● Programming Languages
o Assembly
▪ More precise, low-level approach
o Compiled or Interpreted
▪ High-level, easier to write and read
o Query
▪ Data handling
o Assembly Languages
▪ Low-level programming languages that parallel machine language
▪ This machine language is the fundamental language directly interpreted
by computer hardware
▪ The capabilities of Assembly languages, especially in optimizing for
speed, size, or specific hardware instructions, make them indispensable
in certain programming projects
o Compiled Languages
▪ Designed to be more human-readable and are then translated into
machine code through the use of a compiler
▪ Notable examples of compiled languages include C, C++, and Rust
▪ Compiled languages offer efficiency since they are executed directly by
the computer's hardware
o Interpreted Languages
▪ Not converted into machine code, they are executed line by line by an
interpreter
▪ Prominent examples of interpreted languages include Python, Ruby, and
JavaScript
▪ Interpreted languages are typically slower than their compiled
counterparts, but they offer enhanced flexibility and are easier to master
o Query Languages
▪ Query languages empower us to create, retrieve, update, and delete
data from database systems
▪ Designed to interact with data stored in relational databases, offering
efficient and effective data management capabilities
▪ The most prevalent example is SQL (which is the Structured Query
Language)
101
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
102
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
o Looping
▪ The heart of the code and keeps the action going continually
▪ It allows you to perform an action or a series of actions multiple times,
saving you from having to write repetitive code
● Operators
o Operator
▪ Allows the program to make decisions, comparisons, and carry out
arithmetic operations
o Comparison Operator
▪ Compares two values and, based on that comparison, they return a
boolean value, either TRUE or FALSE
● Equal to (==)
• Tests if the values on either side are equal
● Not equal to (!=)
• Checks if the values on either side are not equal
● Less than (<) and Greater than (>)
• Test if one value is less than or greater than the other,
respectively
● Less than or equal to (<=) and Greater than or equal to (>=)
• Test if one value is less than or equal to, or greater than or
equal to, the other, respectively
o Logical Operator
▪ Allows to test multiple conditions at once
● AND (&&)
• Returns TRUE if both conditions being compared are TRUE
● OR (||)
• Returns TRUE if either of the conditions being compared
are TRUE
● XOR (^)
• Returns TRUE if exactly one of the conditions is TRUE, but
not both
● NOT (!)
• If a condition is TRUE, NOT makes it FALSE, and vice versa
103
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
104
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
105
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
Databases
● Functions of a Database
o Database
▪ Structured set of data, designed to store, manage, and retrieve
information
o Data Creation
▪ Involves generating and adding new entries to the database
o Data Import/Data Input
▪ Process of adding data to the database from external sources
o Data Storage
▪ Databases store vast amounts of information in a structured manner and
makes that data easy to manage and retrieve
o Database Query
▪ Process of requesting specific information from a database
▪ Queries can range from simple requests for a specific record to complex
queries that involve multiple tables and conditions
o Reporting
▪ Involves presenting data from the database in a structured and
understandable format
o CRUD stands for Create, Read, Update, and Delete, which are the four basic
functions of persistent storage in a database
▪ Create
● Creates and adds new records to the database
▪ Read
● Retrieves or reads data from the database
▪ Update
● Modifies existing data in the database
▪ Delete
● Removes data from the database
o CRUD operations are fundamental to any system that interacts with a database
o It is important to remember that databases play a vital role in data management,
providing a structured and efficient way to create, import, store, query, and
report data
106
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
● Benefits of a Database
o The ability to store, manage, and analyze data effectively can provide significant
advantages in a business context, and this is where databases come into play
o Databases offer numerous benefits over traditional flat file systems like
spreadsheets
▪ Concurrent Usage
● In a multi-user environment, several users can access and work on
the same data simultaneously without conflict
▪ Scalability
● Highly scalable and can handle increasing amounts of data and
user load efficiently
▪Speed
● Uses indexing, partitioning, and other techniques to ensure fast
data retrieval, even when dealing with large volumes of data
▪ Support for a Variety of Data Types
● Supports a wide variety of data types, including text, numbers,
dates, binary data, and more
▪ Records and Storage
● Databases have functions dedicated to the creation, reading,
updating, and deletion of records using CRUD functions
● Any changes to the data require manual intervention
o Database
▪ Designed to handle large volumes of data efficiently, used to organize
data into tables, with relationships between them, and allows for more
complex and flexible data structures
● Database Structures
o The structure of a database determines how data is stored, organized, and
manipulated
o Structured Databases
▪ Characterized by a highly organized structure that stores data in tables,
with each table consisting of rows and columns
▪ These relational databases use Structured Query Language (SQL) for data
manipulation and queries
▪ Some examples of relational databases include MySQL, PostgreSQL, and
Oracle Database
107
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
o Semi-Structured Databases
▪ Even without rigid structure, they possess some level of organization by
storing data in a way that allows for more flexibility
▪ Semi-structured databases are beneficial when dealing with data that
doesn't fit cleanly into the tables of a relational or structured database
o Unstructured Databases
▪ Designed to handle data without a predefined schema
▪ Word documents and PowerPoint presentations are great examples of
unstructured data
o Relational databases use a structured format with tables, rows, and columns
o Non-relational databases (NoSQL) do not rely on a standard table structure, and
they can handle structured, semi-structured, and unstructured data
o Remember, the choice between structured, semi-structured, and unstructured
databases, or relational and non-relational databases, depends largely on the
specific data needs of your organization
● Relational Databases
o Relational Databases
▪ They provide a structured and efficient way to store, retrieve, and
manipulate data
o Core Components of Relational Databases
▪ Schema
● A schema in a relational database is like a blueprint that defines
how data is organized and how the relations among them are
associated
▪ Tables
● A collection of data entries consisting of rows and columns
▪ Primary and Foreign Keys
● Essential elements in a relational database, and they are used to
establish and identify relationships between tables
● Primary Key
• Unique identifier for a record in a table that must contain
a unique value for each row of data and cannot contain
null values
● Foreign Key
• A field in a table that matches the primary key of another
table, and its used to link two tables together
108
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
▪ Constraints
● Rules enforced on data columns in a table
● Non-relational Databases
o Non-relational databases have emerged as a powerful tool for handling large
volumes of diverse data
o When it comes to non-relational databases, there are two types
▪ Key/Value Databases
● Type of non-relational database that stores and retrieves data as
a collection of key-value pairs
● In a key-value database, each data item is stored as a pair
consisting of a unique key and an associated value
● Key-value databases are often designed to prioritize speed and
efficiency
● Redis is a popular open-source key-value database that is widely
used in various applications
• It provides a simple yet powerful set of data structures
and commands for working with key-value pairs
• One common use case of Redis is caching
• By introducing Redis as a caching layer, the application can
store user profiles as key-value pairs, with the user ID as
the key and the profile data as the value
● Key-value databases allow for flexible data structures
▪ Document Databases
● Type of non-relational database that stores and retrieves data in a
document-oriented manner
● In a document database, data is stored in self-describing, semi-
structured documents, typically in JSON or BSON format
● Documents can contain nested fields, arrays, and key-value pairs,
providing a more natural representation of complex data
structures
● Document databases allow for schema flexibility, enabling the
storage of data with varying structures within the same collection
● MongoDB is a popular open-source document database that is
widely used in various applications
• MongoDB stores data in BSON (Binary JSON) format,
which is a binary representation of JSON documents
109
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
● Relational Methods
o Relational databases have been a cornerstone of data management for decades,
providing a structured and efficient way to store, retrieve, and manipulate data
▪ Central to their operation are two categories of methods
● Data Definition Methods (Data Definition Language)
• Subset of SQL used to define and manage database
structures
• The primary Data Definition Language commands include
▪ Create used to create a new table or a new
database
▪ Alter used to modify an existing database object,
such as a table
▪ Drop used to delete an entire table or database
▪ Create Index used to create an index on a table
● Data Manipulation Methods (Data Manipulation Language)
• Subset of SQL that is primarily used for adding, retrieving,
modifying, or deleting data in a database
• The primary Data Manipulation Language commands
include
▪ Insert used to insert data into a table
▪ Select used to retrieve data from a database for a
query
▪ Update used to modify existing data within a table
▪ Delete used to remove existing records from a
table
110
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
o SQL permissions are crucial for managing access to a database and ensuring data
security
▪ They determine who can access the database and what actions they can
perform, such as SELECT, INSERT, UPDATE, DELETE, and EXECUTE
o Permissions can be granted or revoked by database administrators to control
user access
o Proper management of SQL permissions helps prevent unauthorized access and
maintain data integrity
o The main difference between Data Definition Language (or DDL) and Data
Manipulation Language (or DML) lies in their functions within a database
▪ Data Definition Language (DDL)
● Creating, altering, and deleting
▪ Data Manipulation Language (DML)
● Inserting, selecting, updating, and deleting
111
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
Cybersecurity Fundamentals
112
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
● Confidentiality Concerns
o Confidentiality lies at the heart of data security, establishing the principle that
information should only be accessible to those who are authorized to view it
o Snooping
▪ Unauthorized access to another person’s data
o Eavesdropping
▪ Unlawful interception of information while being transmitted over a
computer network
o Wiretapping
▪ Involves the targeted interception of telephone lines or Internet-based
communications
o Social Engineering
▪ Leverages psychological manipulation to coax individuals into revealing
sensitive information
o Dumpster Diving
▪ Looks through someone's trash looking for discarded information that
could be useful or sensitive
● Integrity Concerns
o Data integrity forms a crucial pillar of information security, ensuring that data
remains unaltered, reliable, and consistent throughout its lifecycle
o When data is input or modified, it should only be allowed to change in approved
and authorized ways
o On-path Attack
▪ A malicious actor intercepts the communication between two
unsuspecting parties
▪ By eavesdropping, hijacking sessions, or modifying exchanged
information, the attacker can compromise data integrity
▪ Organizations must implement multi-layered security measures
o Replay Attack
▪ An adversary captures data during transmission
▪ Preemptive and reactive security measures are used in effective
countermeasures
o Impersonation
▪ Occurs when a malicious actor poses as a legitimate user to gain
unauthorized access or execute prohibited actions
▪ Organizations implement user awareness training programs
113
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
● Availability Concerns
o Availability
▪ Refers to the assurance that systems and data are accessible and
operational when needed
o Denial-of-Service (DoS) Attack
▪ Attempts to make a computer or network resource unavailable to its
intended users by overwhelming the target with a flood of Internet traffic
▪ Mitigating denial of service threats involves strategies like traffic filtering,
rate limiting, and IP allow listing
● Traffic Filtering
• Controls the packets allowed to enter or exit a network
based on attributes
● Rate Limiting
• Set up rate-limiting caps on the number of server requests
within a given time from a user or IP address
● IP Allow Listing
• Only traffic from trusted IP addresses is allowed to reach
particular services or servers
o Power Outage
▪ Occurs unexpectedly due to factors like natural disasters or equipment
failure and can result in systems being temporarily unavailable
o Hardware Failure
▪ Occurs unexpectedly due to age, defects, or user errors, leading to loss of
data or disruption of services
▪ To mitigate the risk of a hardware failure, it is essential to have
● Hardware Maintenance
● Monitoring Schedules
● Redundancy
114
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
● Spare Components
o Destruction
▪ Occurs due to natural disasters like earthquakes, floods, or man-made
incidents such as arson or sabotage
▪ To mitigate the risk of destruction, it is essential to have
● Off-site Backups
● Disaster Recovery Plans
● Insurance
o Service Outage
▪ Occurs because of software bugs to network failures, resulting in
temporary unavailability of services
▪ To ensure that services are quickly restored after an outage,
organizations need to have robust
● Incident Response Procedures
● System Health Checks
● Effective Communication Channels
● Social Engineering
o Social Engineering
▪ Manipulating people into giving up confidential information
o Phishing
▪ An attempt by cybercriminals posing as legitimate institutions, usually via
email, to obtain sensitive information from targeted individuals
▪ Phishing is deceptive and dangerous
▪ Look for red flags like poor spelling or grammar, generic greetings, and
emails that create a sense of urgency
o Spear Phishing
▪ Attacker tailors the attack and the messaging in emails to a specific
individual or organization
o Business Email Compromise (BEC)
▪ Attacker pose as a high-ranking executive or business partner
o Baiting
▪ Occurs when an attacker leaves a seemingly harmless device (a USB flash
drive) in an obvious location
o Pretexting
▪ An attacker creates a believable pretext, or false scenario, to steal
information
115
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
● AAA of Cybersecurity
o AAA of Cybersecurity
▪ Authentication
● Digital checkpoint which verifies the identities of users, devices,
or systems before getting access to a system's or network's
resources
● Authentication methods tend to be categorized in broad
categories
• Something you know (Ex. Password)
• Something you have (Ex. Token)
• Something you are (Ex. Fingerprint)
• Something you do (Ex. Way of walk)
• Somewhere you are (Ex. GPS Location)
▪ Authorization
● Authenticated users are authorized to use certain resources
● Discussion around access control lists, role-based access control,
and other authorization techniques help define these 'ticket
types' in our digital computing systems
● When performing authorization functions, use the principle of
least privilege to ensure that users are granted only the minimum
access levels needed to perform jobs
▪ Accounting/Auditing
● Used to track user activities and maintain records for future
reference or investigation
● Accounting is performed on systems and networks by using
system logs, network monitoring tools, and other auditing
methods
o Remember, the AAA of cybersecurity is established through Authentication,
Authorization, and Accounting
▪ Authentication involves verifying a user's identity
▪ Authorization used to manage access to resources and supports the
principle of least privilege
116
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
▪ Accounting used for auditing and monitoring your system and network
activities
● Business Continuity
o Business continuity is critical for any organization dependent on unimpeded
access to their applications, data, and services for their continued business
operations
o Whether the company's resources are hosted on-premises or in the cloud, it is
important that they can maintain uninterrupted access to their data
o Fault Tolerance
▪ Implementing fault tolerance is key to safeguarding against loss of access
to a computer system due to a component failure
o Contingency Planning
▪ Business continuity plans commence with an analysis of business
processes and assets to identify critical workflows, resources, and system
vulnerabilities
▪ Redundancy at the component and system level is typically part of these
plans
▪ Contingency planning is not limited to hardware systems
o Data Redundancy
▪ One of the best ways to maintain data redundancy is to use a RAID
● Redundant Array of Independent Disks (RAID)
• Offers a variety of fault-tolerant solutions, defined in
numbered levels, including RAID 1 (disk mirroring) and
RAID 5 (striping with parity)
o Network Redundancy
▪ It's common for a server to have multiple network cards installed to
provide fault tolerance for your network adapters
▪ Adapter teaming provides fault tolerance and load balancing
o Power Redundancy
▪ Servers and network appliances require a stable power supply to
operate, but power spikes, surges, brownouts, or blackouts can cause
potential failures for the systems
▪ Power redundancy systems, such as dual power supplies, redundant
circuits, an Uninterruptible Power Supply (or UPS), and backup power
generators can be implemented to protect against power loss and power
fluctuation events to provide you with better power redundancy
117
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
● Disaster Recovery
o Disaster Recovery concentrates on creating effective response workflows and
resources to address specific disaster scenarios
▪ These disasters could range from minor component failures and power
loss to more severe occurrences like natural or man-made disasters
o Security Concerns
▪ Disasters can expose an organization's sensitive data to various threats,
with potential repercussions on the integrity, confidentiality, and
availability of that data
▪ For each high-risk scenario, the organization should develop a
comprehensive plan
● This plan must precisely identify tasks, resources, and
responsibilities for responding to the disaster
● It must address questions such as
• How will staff be alerted to the disaster?
• What procedures must they follow?
o Prioritization
▪ Disaster recovery plans step in to provide a roadmap, identifying
priorities for restoring particular systems first
o Data Restoration
▪ It is important to have a strategy in place to execute if a system goes
down and there's a possibility of data loss
▪ There are two main routes that you can tread here
● Restoring data from backup
● Switching to a failover system where data has already been
replicated
118
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
o Restoring Access
▪ Once the integrity of the failover or restored system has been verified,
it's time to re-open the gates for users and start processing transactions
again
o Remember, when it comes to the topic of Disaster Recovery, it is paramount that
organizations aim to recover their operations swiftly from a major disruption
119
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
AAA in Cybersecurity
● Authentication
o Authentication
▪ A process of verifying the identity of a user, machine, or system by
validating the credentials provided by the entity against the stored data
o To authenticate someone, you can use one of 5 different authentication factors
▪ Knowledge
● Most common factor of authentication and includes passwords,
PINs, and answers to secret questions
▪ Possession
● Involves a physical device that the user has, such as a hardware
token, smart card, or a mobile device that receives a one-time
password (or OTP)
▪ Inherence
● Includes any authentication factor is based on unique physical
characteristics of the user
• Fingerprint Scans
• Facial Recognition Scans
• Iris Scans
▪ Location
● Involves using the geographical location of the user as an
authentication method
▪ Behavior
● Based on actions that the user performs, which are unique to
them
o Various Types of Authentication Methods
▪ Single-Factor Authentication
● Involves the use of only one of the above-mentioned factors
▪ Two-Factor Authentication (2FA)
● Specifically involves the use of two factors
▪ Multi-Factor Authentication (MFA)
● Involves the use of two or more factors from the five different
authentication factor categories
● Multi-factor authentication is used to provide a higher level of
security than single-factor or a two-factor authentication
120
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
121
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
● Authorization
o Authorization
▪ Process that comes after authentication and involves granting or denying
permissions to authenticated users
o There are several models used to manage authorization in a system
▪ Discretionary Access Control (DAC)
● The owner of the information or resource decides who is allowed
to access it
▪ Role-based Access Control (RBAC)
● Access permissions are based on the roles of individual users
within an organization
▪ Mandatory Access Control (MAC)
● Policy-driven model where access rights are assigned based on
regulations determined by a central authority
▪ Rule-based Access Control
● Uses a set of approved and denied permissions that are applied to
all users
o Different User Account Types
▪ Administrative Account
● Highest level of access and can make system-wide changes
▪ Standard User Account
● Fewer permissions and are typically used for everyday tasks
▪ Guest User Account
● Least amount of access and is typically used for temporary or
infrequent users
o Every user should be using a standard user account for their daily tasks
o Group Accounts
▪ A way to manage multiple user accounts that need the same level of
access to specific resources
122
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
● Accounting
o Accounting
▪ Also known as auditing, a critical process that involves the systematic
tracking and recording of user activities on a system or network
o Accounting/Auditing is a key component of a robust cybersecurity framework
that provides
▪ Detailed record of user activities
▪ Investigating security incidents
▪ Ensuring policy compliance
▪ Aiding in system troubleshooting
o Logs
▪ Log entries provide a timestamped record of events and user activities
● Logs can include information such as
• Login attempts (both successful and unsuccessful)
• File access and modifications
• System configuration changes
• Network connections
o Tracking
▪ Involves the continuous monitoring and recording of user activities
▪ Tracking can help detect potential security threats
▪ Tracking often involves using logs, but logs are not considered to be
tracking
o Web Browsing History
▪ A form of accounting that records the websites a user visits
▪ Web browser history can be particularly useful in identifying potential
security risks
● Non-repudiation
o Non-repudiation
▪ Used to provide assurance of the integrity and origin of data by
preventing an entity from denying the authenticity of their actions
o There are many different mechanisms that can be used to provide non-
repudiation
▪ Video-based Mechanisms
● This is often achieved using surveillance cameras as used in
security systems
● These surveillance cameras are designed to monitor and record
activities in a specific area
123
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
▪ Biometric Data
● Biometric data, such as fingerprints or iris scans, are unique to
each individual
● When used for authentication, they provide strong non-
repudiation as it is extremely difficult for an individual to deny the
authenticity of their biometric data
▪ Digital Signatures
● Digital signatures are a common method of achieving non-
repudiation because they are also unique to each user and can be
verified by others
● When a document is digitally signed, it provides assurance that
the document came from the signer and has not been altered
since it was signed
▪ Receipts
● In digital transactions, receipts serve as a form of non-repudiation
● They provide proof of a completed transaction, including details
about the parties involved and the transaction itself
● Encryption
o Encryption
▪ Process of converting readable data, known as plain text, into an
unreadable format, known as cipher text, using an algorithm (known as a
cipher) and an encryption key
▪ There are many different types of encryption, but most can be classified
as either symmetric encryption or asymmetric encryption
● Symmetric Encryption
• Also known as private-key encryption, uses the same key
for both the encryption and decryption processes
• Some examples
▪ 3DES
▪ AES
▪ RC (Rivest Cipher)
▪ IDEA
▪ Blowfish/Twofish
▪ CAST
• Older encryption methods used keys that were between
32 and 64 bits long
124
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
125
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
● Data at Rest
o Data at Rest refers to data that is stored on physical or digital media and is not
actively being moved or processed
▪ This could include data stored on hard drives, SSDs, tapes, or even data
stored in the cloud
▪ The concept is, where ever that data is stored, or remains at rest, it needs
to also be protected, and that is where data at rest encryption comes into
play
o Data at Rest Mechanisms
▪ Encryption
● Even if an attacker gains access to the storage device, they won't
be able to understand the data without the decryption key, so it
will remain inaccessible and unreadable
▪ Access Controls
● Implementing strong access controls can prevent unauthorized
users from accessing the data
● This includes using strong passwords, the use of multi-factor
authentication, and limiting the number of users who have access
to the data
▪ Regular Audits
● Regularly auditing the data contained on a system and who has
access to it can help detect any potential security issues
● This includes checking for any unusual access patterns or changes
to the data, too
▪ Physical Security
● For data stored on physical media, physical security measures like
secure locks, surveillance cameras, and restricted access to server
rooms can help protect against theft or tampering
● Data in Transit
o Data in Transit
▪ Also known as data in motion, refers to data that is being transferred
over a network
▪ This could include sending an email, loading a website, or transferring a
file
126
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
127
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
128
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
129
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
● Preventing Malware
o Malware
▪ Refers to any software designed to cause damage to a computing device,
server, client, or computer network
▪ Malware includes a wide range of damaging software types, including
viruses, worms, ransomware, spyware, and trojans
o To prevent malware, we need to take several steps to enhance our digital
defenses
▪ Invest in robust, reliable, and updated antivirus or anti-malware tools
▪ Ensure that the operating systems and all of the software are regularly
updated
▪ Emails are also common delivery methods used by malware
▪ Always use a secure network connection
▪ Always use safe browsing habits
● Be careful when downloading software or other files, especially
from third-party websites, as these can contain malware
▪ Data Backups
▪ Consider user privileges and permissions on the system
o Remember that preventing malware involves a multifaceted approach
130
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
o Heuristic
▪ The software uses knowledge about the typical activities of viruses and
other malicious software to identify and block malicious-looking behavior
o Security software often comes in two variants
▪ Personal Security Suites
▪ Network Security Suites
o Most security software is now configured for on-access scanning
o When configuring the anti-malware software, configuring proper exceptions is
crucial
o Full system scans can impact your system's performance
o When a file is found to be infected with a virus, most of the time, the anti-virus
software will detect it and take the appropriate action
▪ Cleaning the file
▪ Deleting the file
▪ Quarantining the file
o Remember, anti-malware and anti-virus tools are essential for maintaining the
health and security of your systems
● Host-based Firewall
o Host-based Firewall
▪ Software firewall installed directly on a single computer, and is used to
regulate incoming and outgoing network traffic based on an applied rule
set and provide protection for the host machine from malicious network
activity
o A host-based firewall works by controlling network traffic using predefined
rulesets
o These host-based firewalls can prevent malware that may infiltrate a system and
begin communicating with an attacker or spreading itself to other systems on
the network
o Most host-based firewalls include features like Intrusion Detection Systems and
Intrusion Prevention Systems (also called IDS and IPS), which help to identify
and stop an attack in progress
o When configuring a host-based firewall, the strategy should be to implement the
principle of least privilege using the firewall
o Principle of Least Privilege
▪ A system should only allow the minimum necessary permissions for its
operations
131
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
132
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
Behavioral Security
● Policies and Procedures
o Policies
▪ Broad guidelines intended to assist organizations in their decision-making
process
▪ They define the 'what' and the 'why' - what is expected and why it is
important
o Procedures
▪ Provide step-by-step instructions for carrying out a particular task or
process, ensuring consistency and efficiency in operations
o Standards
▪ It sets a level of quality or attainment level needed to be reached, and
used to evaluate compliance with the policy
o Guidance
▪ Provides advice or recommendations on how to interpret or implement
policies, procedures, or standards
o Personnel Management Policies
▪ Guide how an organization manages its most valuable asset - its people
▪ They cover all aspects of the employee lifecycle, from recruitment to
operations to termination
o Operational Policies
▪ Governs the day-to-day operations of employees and they cover a wide
range of areas
▪ These policies govern the day-to-day operations of employees and they
cover a wide range of areas
● Work Hours
● Code of Conduct
● Health and Safety
● Performance Management
▪ Operation policies ensure a safe, productive, and respectful work
environment
▪ Operational policies encompass aspects like managing privileges,
handling data/information, responding to incidents, and regulating the
use of company resources such as internet access
133
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
● Privacy Policy
o Privacy Policy
▪ Legal document that outlines how a company collects, uses, discloses,
and manages a customer or client's data
o In the workplace, a privacy policy can extend to the use of corporate networks,
mobile apps, desktop software, and business software
▪ As an employee, when you use these resources, your activity may be
subject to monitoring and recording
134
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
135
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
▪ To protect your privacy, always use trusted file sharing platforms and be
selective about what you share and with whom
o Instant messaging is another popular way to keep in touch
▪ While these conversations are often private, remember that they can be
screenshotted or forwarded
▪ Use messaging apps with end-to-end encryption
136
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
Conclusion
● Conclusion
o 6 Domains of IT Fundamentals+
▪ Domain 1: IT Concepts and Terminology
● It makes up 17% of the exam
▪ Domain 2: Infrastructure
● It makes up 22% of the exam
▪ Domain 3: Applications and Software
• It makes up 18% of the exam
▪ Domain 4: Software Development
● It makes up 12% of the exam
▪ Domain 5: Database Fundamentals
● It makes up 11% of the exam
▪ Domain 6: Security
● It makes up 20% of the exam
o How do you sign up and schedule your exam?
▪ Pearson VUE
● You can take it at any Pearson VUE testing center worldwide, at
either a local testing center or online
● You can buy that exam voucher by going to Pearson Vue directly
when you're scheduling your exam at pearsonvue.com, or going
to the voucher store at lpi.org to buy it from their online store
● Pearson VUE and LPI have now created a capability for you to take
your certification exam online from the comfort of your home or
office, using the Pearson VUE OnVue testing system
▪ Dion Training
● If you'd like to pre-purchase your exam voucher before you
schedule the exam, you can actually save 10% off the price by
going to our website at diontraining.com/vouchers
● Currently, we carry vouchers for over 50 countries around the
world, and we are adding countries all the time
● As a LPI Platinum Partner, we receive a special discounted rate on
these exam vouchers and we pass those savings onto our
students when they order their exam vouchers from us
137
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
138
https://www.DionTraining.com
CompTIA IT Fundamentals+ (FCO-U61)
(Study Notes)
o When you take a practice exam, your goal is not to memorize the answer key
▪ You need to understand why the right answer was right and the wrong
answers are wrong
o Good luck, and we hope to see you again in a future course as you continue
upwards in your project management, IT, or cybersecurity career and continue
to climb the CompTIA certification ladder!
139
https://www.DionTraining.com