1 / 62

CompTIA Strata IT Fundamentals

CompTIA Strata IT Fundamentals.

talasi
Télécharger la présentation

CompTIA Strata IT Fundamentals

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CompTIA Strata IT Fundamentals

  2. The CompTIA Strata IT Fundamentals certificate program offers individuals a broad introduction to computing technology and serves as a critical stepping stone to advanced technical learning and IT skills. The exam measures an individual's knowledge of basic IT terminology and skills, such as setting up a basic PC work station, installing software, identifying compatibility issues and recognizing and preventing basic security risks. Course Overview: CompTIA Strata

  3. Course Objectives: CompTIA Strata

  4. CompTIA Strata

  5. Which of the following protocols is primarily focused on the transfer of large files? Questions Samples: A. HTTP B. FTP C. SMTP D. DNS A. To secure the files B. To eliminate duplicate files C. To index files for searching D. To reduce the size of files A. Evenly space out equipment to avoid an increased temperature in one area of the room. B. Eliminate using raised flooring in the data center. C. Place most servers in the middle of the data center allowing cool air to flow around them. D. Install cooling in the corners of the data center so cool air can circle the room. Which of the following BEST explains the purpose of file compression? Which of the following can save energy consumption in a data center? CompTIA Strata

  6. Technology and Computer Hardware Basics CompTIA Strata

  7. Types of Computers: CompTIA Strata

  8. Hardware Components/ Input Devices: Is the collection of physical elements that constitute a computer system. Computer hardware refers to the physical parts or components of a computer such as monitor, keyboard, Computer data storage, hard drive disk, mouse, system unit (graphic cards, sound cards, memory, motherboard and chips), etc. all of which are physical objects that you can actually touch. CompTIA Strata

  9. Hardware Components/ Output Devices: CompTIA Strata

  10. Hardware Components/ Storage Devices: Hardware Components..... CompTIA Strata

  11. Central Processing Unit CompTIA Strata

  12. PGA Central Processing Unit LGA CompTIA Strata

  13. Memory CompTIA Strata

  14. Memory CompTIA Strata

  15. Memory DIMM SODIMM CompTIA Strata

  16. Hard Disk CompTIA Strata

  17. Hard Disk PATA SATA CompTIA Strata

  18. Computer Measurement Units In computing and telecommunications, a unit of information is the capacity of some standard data storage system or communication channel, used to measure the capacities of other systems and channels.  CompTIA Strata

  19. Types of Ports: CompTIA Strata

  20. Types of Ports: CompTIA Strata

  21. Multi-Card reader would be best to use to view media from different camera manufactures CompTIA Strata

  22. Here are some safety tips that you have to consider when installing upgrade components: • 1-Wear short sleeves ,roll up you sleeve • 2-Remove jewelry • 3-Use an Antistatic wrist strap • 4-Dissconect the power to the PC CompTIA Strata

  23. Peripherals and Networking • Network is a group of two or more computers that are connected in order to share data resources, network can connect computers that are physically near to each other (LAN) or computers that are halfway around the world from one another (WAN). • File sharing • Printer Sharing CompTIA Strata

  24. Network Devices: CompTIA Strata

  25. Wireless Networking Wireless networking uses radio(sound) waves to transmit data, much like a cordless telephone. There are several wireless networking technologies, but the most popular of these is Wireless Fidelity. On organization called IEEE controls the various wireless networking standards and it’s shown in the 802.11 range of numbering ,below is the IEEE 802.11 Wireless networking standards: CompTIA Strata

  26. Ad Hoc Wireless Networking/ Definitions: • Ad Hoc Wireless Network = a wireless network with no central hub or concentrator. For example, PC to PC. • Infrastructure Wireless Network = a wireless network with a central hub or concentrator (access point). For example, PC to AP to PC. CompTIA Strata

  27. What you need to know about Ad Hoc Wireless Sometimes called peer-to-peer Sometimes called IBSS (Independent Basic Service Set) Not used every day Great for meetings or gaming A neat example of wireless in action Fixed amount of bandwidth is available Ad Hoc has a theoretical maximum bandwidth of 11Mbps, whether it is 802.11b or g. Ad Hoc has especially bad issues with "hidden node" (where not all nodes can hear each other - in more detail later) Dr. Tahseen Al-Doori

  28. What you need to know about Ad Hoc Wireless….cont. Windows file sharing, or some other application must be enabled Firewalls can get in the way of applications You can use Automatic Private IP Addressing (APIPA) for IP addresses 169.54 network Dr. Tahseen Al-Doori

  29. Site Survey To get the best performance out of your wireless network, you must both ensure that your access points (AP) are in the most optimal locations and that other radio emitters, which can cause interference, are kept to a minimum. This requires you to periodically perform site surveys of your wireless spectrum. Depending on the scale of your installation, there are a number of tools available for the task, such as software that walks you through the site survey process. But no matter what size network you will have, you'll need to follow these basic steps: Dr. Tahseen Al-Doori

  30. Step1: Step2: Have a blueprint or floor plan(s) of the areas you want the wireless network to cover. Some software products can work off these floor plans directly. Look at your plans and identify major building obstacles such as walls, halls, elevators and floors that will block radio signals. Also note where your users will be located -- and where they won't -- to determine coverage areas. Determine where you can locate APs based on power and cabling that you can run to connect the AP to the rest of the network. Remember that you shouldn't place APs close to metal or concrete walls and you should put them as close to the ceiling as possible. CompTIA Strata

  31. Step3: Step4: Estimate the total number of APs needed for your overall coverage. A good rule of thumb is one AP can cover a circle with a 100-foot radius. This will give you preliminary AP locations that you can use at the beginning of your survey. If you already have some APs, note their locations on your floor plans. Run the survey tool. Make sure to use the same AP model for the survey that is used in your actual infrastructure. CompTIA Strata

  32. Step5: Step6: Relocate APs and retest, depending on the results of your survey. Document your findings. Record the locations and log your signal readings and data rates observed for future reference. CompTIA Strata

  33. IP Addresses Each device on a network has a unique IP address which consists of four numbers(each between 0 and 255) separated by periods like this:192.168.3.3 IP addressees can be assigned to the device Statically, Dynamically or thought the OS. CompTIA Strata

  34. To figure out the your PC IP address, you can type the command “ipconfig” in the command prom CompTIA Strata

  35. TCP Ports Having different ports assigned to different kinds of data makes it possible for the OS to sort out the incoming data from the network and deliver it to the appropriate application, the table below summarizes some of the most common ports and their assigned protocol: CompTIA Strata

  36. Compatibility Issues and Common Errors CompTIA Strata

  37. Compatibility Issues and Common Errors/ Hardware If you work with computers for any length of time, you’re likely to have some type of problem that needs to be resolved. If you get involved in IT support, your job will be to help other people resolve problems with computers, so it’s important to have a basic understanding of what to look for and what to do. The following table illustrates some of those problems and the most likely reasons why they occurred. CompTIA Strata

  38. When windows wont start normally, you can often boot into safe mode by pressing the Key F8 once you restart your PC CompTIA Strata

  39. You can use the “ping” command to troubleshoot Network connectivity CompTIA Strata

  40. When upgrading the operating system the following factors should be taken under consideration: • 1-Application Compatibility • 2-Minimum Hardware Requirements CompTIA Strata

  41. Troubleshooting Operational Problems CompTIA Strata

  42. If Windows wont start normally or if it runs poorly all of the sudden after previously running fairly well, it’s often easier to revert to a System Restore than to spend time trying to pinpoint what happened CompTIA Strata

  43. Software Installation and Functions CompTIA Strata

  44. Computer software, or just software, is any set of machine-readable instructions (most often in the form of a computer program) that directs a computer's processor to perform specific operations. The term is used to contrast with computer hardware, the physical objects (processor and related devices) that carry out the instructions. Software: CompTIA Strata

  45. Software Types CompTIA Strata

  46. Some Software Tools CompTIA Strata

  47. Security Risks and Prevention CompTIA Strata

  48. Security: Defining the Threats More and more people are starting to use the internet for more than just e-mail anymore. Buying and selling, blogging, social networking, stock market trading, and even students are using it for research. But along with the perks of having such a vast library of knowledge, comes the ever increasing dangers that come from the internet, dangers such as : • Worms • Exploit vulnerability in software • Self-propagate • Often target high-visibility applications, exploiting identified vulnerabilities • Trojan Horses • Masquerade as legitimate application (e.g. screen saver) while performing covert function • May be used to launch DoS attacks • Logic bomb: Trojan horse triggered by event such as date CompTIA Strata

  49. Security: Defining the Threats……cont • Spyware Software that gathers information about computer and user, such as: • User keystrokes • Copies of emails, instant messages • Screen snapshots • Other usage information • Adware Adware is a tool used by advertisers to popup advertisements based on your searches and the websites you visit. It’s not really intrusive, but can potentially cause harm to your computer. Adware is generally easy to remove, but also very easy to get. CompTIA Strata

  50. Security: Defining the Threats……cont • Malware Malware comes in many forms. Generally injected unknowingly by you, Malware can be devastating to your computer system. Most malware is capable of shutting down even the best Antivirus/spyware/adware protection software you can buy • Phishing Technique to gather username and password by designing websites that looks identical to that of an online banking website • Social Engineering An attack that involves people, not computers. A social engineering attack is one in which the attacker convinces a victim to provide information that can be used to launch an attack, such as a password. CompTIA Strata

More Related