Computer Science Study

Learn Everything

Comprehensive learning materials covering all computer science topics from A-Z

terminal
$ cs-mastery topics
Computer Science from A-Z
Interactive learning platform
$ cat topics.txt
- Hardware Fundamentals
- Operating Systems
- Networking & Security
$ ls # topics/ resources/ comptia/
$ ./start.sh
> |
Scroll Down

Computer Science Topics

Comprehensive coverage of all computer science concepts from CompTIA A+ certification.

Safety & Professionalism

Proper procedures, communication, and safety measures in IT environments.

Learn More

Visible Computer

Understanding the visible components of a computer system.

Learn More

CPU

Central Processing Unit architecture, features, and performance.

Learn More

RAM

Random Access Memory types, technologies, and configurations.

Learn More

Firmware

BIOS, UEFI, and firmware configuration settings.

Learn More

Motherboards

Form factors, components, and features of modern motherboards.

Learn More

Power Supplies

Power supply specifications, connectors, and troubleshooting.

Learn More

Mass Storage Technologies

HDDs, SSDs, NVMe, and other storage technologies.

Learn More

Implementing Mass Storage

RAID, partitioning, formatting, and storage implementation.

Learn More

Essential Peripherals

Keyboards, mice, monitors, and other essential peripherals.

Learn More

Installing & Upgrading OS

OS installation methods, requirements, and upgrade paths.

Learn More

Working with OS

Navigating and configuring operating system settings.

Learn More

Users, Groups & Permissions

User account management and permission systems.

Learn More

Maintaining & Optimizing OS

Performance tuning, maintenance tasks, and optimization.

Learn More

Command-Line Interface

Essential command-line tools and scripting.

Learn More

Troubleshooting OS

Diagnosing and resolving operating system issues.

Learn More

Display Technologies

Monitor types, resolutions, and display technologies.

Learn More

Essentials of Networking

Networking fundamentals, protocols, and models.

Learn More

Local Area Networking

LAN technologies, cabling, and network devices.

Learn More

Wireless Networking

Wi-Fi standards, security, and configuration.

Learn More

The Internet

Internet technologies, services, and protocols.

Learn More

Virtualization

Virtual machines, hypervisors, and cloud concepts.

Learn More

Portable Computing

Laptops, tablets, and mobile computing devices.

Learn More

Mobile Devices

Smartphones, tablets, and mobile operating systems.

Learn More

Securing Mobile Devices

Mobile device management and security practices.

Learn More

Printers & MFPs

Printer technologies, maintenance, and troubleshooting.

Learn More

Securing Computers

Security threats, malware protection, and best practices.

Learn More

Operating Procedures

IT documentation, change management, and best practices.

Learn More

Safety & Professionalism

Master the essential skills for maintaining safety, professionalism, and excellence in IT environments.

Core Professional Skills

Professional Appearance

  • Dress appropriately for the work environment
  • Maintain personal hygiene
  • Project confidence through body language

Professional Conduct

  • Effective communication with all stakeholders
  • Active listening and empathy
  • Timeliness and reliability

Technical Methodology

  • Structured troubleshooting approaches
  • Documentation and knowledge sharing
  • Continuous learning mindset

IT Professionalism Essentials

Communication Excellence

Verbal Communication

Master the art of technical translation by adapting your language to different audiences. For non-technical users, use simple analogies ("Think of RAM like a desk workspace - the bigger it is, the more projects you can have open at once"). For technical peers, be precise but concise. Always confirm understanding by asking follow-up questions like, "Does this make sense so far?" or "Would you like me to clarify any part of this?"

Written Communication

Professional writing follows the ABC principle: Accurate, Brief, Clear. Structure technical documentation with:

  • Problem statement (what's occurring)
  • Diagnosis (root cause analysis)
  • Solution steps (numbered instructions)
  • Prevention (how to avoid recurrence)
Status Reporting

Effective updates follow the 4P framework:

Progress

What's been accomplished since last update

Problems

Current blockers or unexpected issues

Plan

Next steps and timeline

Participation

What do you need to do now

Active Listening

Practice the LARA method for effective dialogue:

Listen without interrupting Acknowledge by paraphrasing Respond to emotional cues Ask clarifying questions

Safety Protocols

ESD Protection

Proper use of Anti-static mats, Wrist straps, and Anti-static bags when Handling / Storing or Shipping out sensitive components.


This is Greatly exaggerated in the IT / Tech world, Tho it is still a great risk that can occur

Emergency Preparedness

Acknowledgement of the nearest Fire exits, First Aid kits, and Emergency shutdown procedures.

Ergonomics

Proper workstation setup to prevent, Disorganization and Misstakes from Misplaced Screws or Small Components to Incorrect Wiring or Memory Alignment .


Maintaining a good and consistant stance / back position to reduces and prevents straining injuries. This is common during Warehouse Tasks or Actively doing Heavy Manual labour .

Equipment Handling

Make sure to use Safe lifting techniques and to know your limit. (Most of us are not Superman).


This is to ensure proper safe storage of hardware and to prevent injuries and Breaking Components.

IT Ethical Framework

Confidentiality

Protect: Customer data, passwords, and proprietary information. GDPR/HIPAA compliance ? Secure file disposal ? Need-to-know access

Integrity

Maintain: Truthful time reporting, accurate documentation, and transparent limitations. Disclose conflicts ? Reject bribes ? Credit others' work

Accountability

Own: Mistakes, system changes, and security incidents. Change logs ? Incident reports ? RCA documentation

Social Responsibility

Consider: Environmental impact, accessibility, and digital divide. E-waste recycling ? WCAG compliance ? Tech literacy programs

Legal Compliance

Adhere to: Licensing, copyright, and regulatory requirements. Software licenses ? Patent laws ? Export controls

AI Ethics

Ensure: Algorithmic fairness, transparency, and human oversight. Bias testing ? Explainable AI ? Human-in-the-loop

Responsibility

Uphold: System reliability, data backups, and disaster recovery. 99.9% uptime ? Backup verification ? Disaster recovery drills

Continuous Improvement

Pursue: Threat modeling, ethical hacking, and secure coding. CVE monitoring ? OWASP training ? Red team exercises

Professional Knowledge Check

What is the primary purpose of an ESD wrist strap?

When explaining technical issues to non-technical users, you should:

Professional Tip

Always carry a professional toolkit including:

  • ESD wrist strap
  • Multi-bit screwdriver
  • Flashlight
  • Network cable tester
  • Notepad and pen
  • USB diagnostic tools
  • Cable ties
  • Spare parts organizer

The Visible Computer

Understanding computer components, their connections, and how hardware and software work together.

How Computers Work

Input

Process

Storage

Output

Processing Components

  • CPU: Central Processing Unit (brain of the computer)
  • GPU: Graphics Processing Unit (handles visual data)
  • RAM: Temporary working memory
  • Motherboard: Central communication hub

Data Flow

Data moves through the system via buses and interfaces, with the CPU coordinating operations between components using electrical signals and binary code.

Power Conversion

The power supply converts AC to DC power at various voltages needed by different components.

Connectors & Ports

USB

Universal Serial Bus (A, C, etc.)

HDMI

Video/audio interface

Ethernet

RJ45 network connection

Audio Jack

3.5mm audio connection

Power

AC/DC power inputs

Thunderbolt

High-speed data/display

Connection Types

External:
  • USB
  • HDMI
  • Audio
Internal:
  • SATA
  • PCIe
  • M.2

Port Identification

Look for distinctive shapes, colors, and symbols near ports. Modern motherboards often color-code ports.

Note: USB-C is reversible but not all USB-C ports support the same features (Thunderbolt, power delivery, etc.)

Operating Systems

Core Functions

Process management and multitasking
Memory allocation and virtual memory
File system management
Security and access control
Device drivers and hardware abstraction

Common Features

Graphical Interface

Windows, icons, menus, and pointer (WIMP) with desktop metaphor

File Management

Hierarchical directory structure with file explorer

Networking

Built-in TCP/IP stack and network configuration tools

System Utilities

Disk management, task manager, and control panel

Major Operating Systems

Windows
macOS
Linux
Android
iOS
Server OS

Hardware Deep Dive

Motherboard
CPU
RAM
Storage
GPU
Cooling
PSU

Processor

  • Cores: 2-64+ processing units
  • Clock speed: GHz range
  • Cache: L1/L2/L3 memory
  • Architecture: x86, ARM, etc.

Memory

  • Types: DDR4, DDR5, LPDDR
  • Capacity: 4GB-2TB+
  • Speed: MHz-GHz range
  • Volatile vs non-volatile

Storage

  • HDD: Magnetic platters
  • SSD: Flash memory
  • NVMe: PCIe interface
  • Cloud: Remote storage

Graphics

  • Integrated: CPU-based
  • Discrete: Dedicated GPU
  • VRAM: Dedicated memory
  • APUs: Hybrid solutions

Software Deep Dive

Applications
Utilities
Drivers
Middleware
Operating System

System Software

  • Operating systems
  • Device drivers
  • Firmware
  • Utilities

Application Software

  • Productivity suites
  • Creative tools
  • Web browsers
  • Games

Cloud Services

  • SaaS: Software as a Service
  • PaaS: Platform as a Service
  • IaaS: Infrastructure as a Service
  • Web applications

Development

  • Programming languages
  • IDEs
  • Compilers
  • Debuggers

How Software Interacts

Applications make system calls to the OS for resources

OS manages hardware through drivers and firmware

Middleware provides services between applications

Virtual machines and containers abstract the hardware

File Systems & Paths

Windows

  • NTFS (New Technology FS)
  • FAT32 (legacy)
  • exFAT (external drives)
  • Paths: C:\Users\Name\File

macOS

  • APFS (Apple File System)
  • HFS+ (legacy)
  • Case-insensitive
  • Paths: /Users/Name/File

Linux

  • ext4 (common)
  • XFS, Btrfs
  • Case-sensitive
  • Paths: /home/name/file

Mobile

  • F2FS (Flash storage)
  • Sandboxed apps
  • Limited access
  • Cloud integration

Path Navigation

Absolute:
/home/user/docs/report.txt

Full path from root

Relative:
../images/photo.jpg

From current directory

Special paths: ~ (home), . (current), .. (parent)

User Interfaces

CLI
(1970s)
GUI
(1984)
Web
(1990s)
Touch
(2007)
Voice
(2010s)

CLI

Command Line Interface - text-based input with commands and parameters

Powerful for automation

GUI

Graphical User Interface - visual elements like windows and icons

Intuitive for beginners

Touch

Direct manipulation with gestures like tap, swipe, pinch

Mobile-friendly

Voice/NUI

Natural User Interfaces using speech recognition

Hands-free operation
Modern UI Example:

Windows 11 combines GUI (Start menu, windows) with touch (gestures), voice (Cortana), and CLI (PowerShell/WSL) for versatile interaction.

CPU (Central Processing Unit)

The brain of the computer that performs calculations and executes instructions.

Conceptual Overview & History

Evolution of CPUs

From vacuum tubes in the 1940s to today's nanometer-scale transistors, CPUs have evolved dramatically.

1947: First transistor invented at Bell Labs
1971: Intel 4004 - First commercial microprocessor (4-bit, 740kHz)
1985: 32-bit processors emerge (Intel 80386)
2005: Multi-core processors become standard
2020s: 3-5nm process nodes with hybrid architectures

CPU Architectures

x86: Intel/AMD desktop CPUs
ARM: Mobile/Apple M-series
MIPS: Embedded systems
RISC-V: Open-source architecture
Key Differences
  • CISC (x86): Complex instructions, variable length
  • RISC (ARM/MIPS): Simplified instructions, fixed length
  • Endianness: Byte ordering (Big-Endian vs Little-Endian)

CPU Core Components

ALU (Arithmetic Logic Unit)

Performs all arithmetic and logical operations including:

  • Integer arithmetic (add, subtract, multiply)
  • Bitwise operations (AND, OR, NOT, XOR)
  • Comparisons (greater than, equal to)
  • Shift/rotate operations
Modern ALUs often include FPUs (Floating Point Units)

Control Unit

The conductor of the CPU orchestra:

  • Manages fetch-decode-execute cycle
  • Generates control signals for all components
  • Handles interrupts and exceptions
  • Coordinates pipeline stages
Uses microcode for complex instruction handling

Registers & Cache

PC (Program Counter) Next instruction address
IR (Instruction Register) Current instruction
MAR (Memory Address) Address for memory access
MDR (Memory Data) Data being read/written
General Purpose Temporary data storage
Register access: 0.5-1ns vs RAM: 80-100ns

The Full Cycle: From Boot to Browser

1. Power On & Reset Vector

CPU begins execution at a fixed memory address (0xFFFFFFF0 in x86) in ROM. The Power Good signal from PSU triggers this.

PC set to reset vector
ROM mapped to address space

2. POST (Power-On Self-Test)

CPU executes BIOS/UEFI firmware to:

  • Test RAM (write/read patterns)
  • Initialize hardware (PCIe enumeration)
  • Set up interrupt vectors
  • Build ACPI tables
Control Unit manages tests
Buses verified

3. Bootloader Execution

CPU loads bootloader via these steps:

  1. Reads boot device (MBR/GPT)
  2. Loads first sector to 0x7C00
  3. Transitions to protected/long mode
  4. Loads kernel to memory
MAR/MDR used for transfers
DMA may assist

4. OS Initialization

CPU executes kernel startup:

  • Initializes memory management (paging)
  • Sets up IDT/GDT (interrupt descriptors)
  • Starts scheduler and processes
  • Loads drivers via ACPI
MMU activated
Timers configured

5. Browser Launch (Simplified)

When you click a browser icon:

  1. Shell makes exec() system call
  2. CPU switches to kernel mode
  3. MMU maps executable into memory
  4. Dynamic linker loads libraries
  5. CPU begins executing browser code
  6. Multiple threads created for UI/network
Branch Prediction
Cache Hierarchy
Pipelining

Memory Context & Buses

Buses & Interconnects

Address Bus

Carries memory addresses from CPU to RAM. Width determines maximum addressable memory:

32-bit: 4GB limit
64-bit: 16 exabytes
Data Bus

Transfers actual data between CPU and memory. Modern systems use 64-bit wide buses.

Control Bus

Carries signals like:

READ
WRITE
IRQ
RESET
CLK
WAIT

Memory Hierarchy

Registers
1 cycle PC, IR, MAR, MDR
L1 Cache
~4 cycles 64KB/core
L2 Cache
~12 cycles 256KB-1MB
L3 Cache
~30 cycles 8-32MB shared
RAM
~100 cycles DDR4/DDR5

Clock Cycles & Pipelining

Clock Cycle Breakdown

Clock Speed 2.5GHz - 5.8GHz
CPI (Cycles/Instruction) 0.25-10 (varies by arch)
IPC (Instructions/Cycle) Up to 4-6 (modern CPUs)
Superscalar Execution

Modern CPUs can execute multiple instructions per cycle through:

  • Multiple ALUs
  • Out-of-order execution
  • Speculative execution

Instruction Pipeline

Modern CPUs use deep pipelines (15-20 stages) to overlap execution:

Fetch
Decode
Rename
Schedule
Execute
Memory
Bypass
Writeback
Retire
Hazards & Solutions
Structural: More units
Data: Forwarding
Control: Prediction

Modern CPU Technologies

Multi-Core & Hybrid

Modern approaches to parallelism:

  • P-cores: High performance (Intel Golden Cove)
  • E-cores: Power efficiency (Intel Gracemont)
  • SMT: Hyper-Threading (2 threads/core)
  • ccNUMA: Non-uniform memory access
Apple M1: 4P + 4E cores, Intel Alder Lake: 8P + 8E

Process Nodes

1971: 10?m Intel 4004
2000: 180nm Pentium 4
2020: 7nm AMD Zen 3
2023: 3nm Apple A17 Pro
Node names now marketing (Intel 7 ? TSMC 4nm)

Advanced Features

SIMD: AVX-512, Neon
Virtualization: VT-x, AMD-V
AI: AMX, NPUs
Security: SGX, TPM
Power: DVFS, C-states
Memory: ECC, TRR
SIMD: Single Instruction Multiple Data

Selecting a CPU

Socket Compatibility

Intel: LGA1700, LGA1851
AMD: AM5, sTRX4

Check chipset support (Z790 vs B650) and BIOS requirements.

Performance Needs

Gaming: Clock speed
Editing: Cores
Servers: ECC

Thermal Considerations

TDP: 65W-350W Cooling: Air/Liquid

High-end CPUs may require 240mm+ AIO liquid coolers.

Installation & Troubleshooting

Installation Issues

Bent pins (LGA)
Paste application
Pressure uneven
Power connectors

Overheating Symptoms

Throttling
Shutdowns
BSODs
Instability

Catastrophic Failures

No POST
Burning
Damage

May require motherboard replacement if socket damaged.

Developer Perspective

Optimization Techniques

Cache Optimization
  • Structure of Arrays vs Array of Structures
  • Prefetching patterns
  • Alignment to cache lines (64B)
Parallelism
  • Thread affinity/pinning
  • False sharing avoidance
  • Vectorization (SIMD)

Benchmarking & Analysis

Performance Counters
L1/L2/L3 cache misses
Branch mispredictions
IPC (Instructions/Cycle)
CPI (Cycles/Instruction)
Tools
perf (Linux)
VTune (Intel)
AMD uProf
LLVM-MCA

Acronym Key

ALU: Arithmetic Logic Unit
PC: Program Counter
IR: Instruction Register
MAR: Memory Address Register
MDR: Memory Data Register
SIMD: Single Instruction Multiple Data
IPC: Instructions Per Cycle
CPI: Cycles Per Instruction
MMU: Memory Management Unit
TDP: Thermal Design Power
SMT: Simultaneous Multithreading
ccNUMA: Cache-Coherent Non-Uniform Memory Access

Knowledge Check

What is the purpose of the CPU's MAR register?

RAM (Random Access Memory)

Temporary storage that the CPU uses to store data that is actively being worked on.

Conceptual Understanding

How RAM Works

RAM is volatile memory that provides fast temporary storage for data being actively used by the CPU.

DRAM (Dynamic RAM)

Needs constant refreshing, used for main system memory.

SRAM (Static RAM)

Faster but more expensive, used for CPU cache.

Memory Hierarchy
CPU Registers (Fastest)
CPU Cache (SRAM)
Main Memory (DRAM)
Storage (SSD/HDD)

RAM Evolution

RAM Generations Timeline

SDRAM (1993)

Synchronous DRAM, first to sync with system bus

DDR (2000)

Double Data Rate, 2x transfer rate

DDR2 (2003)

Higher speeds, lower power

DDR3 (2007)

Higher bandwidth, 1.5V standard

DDR4 (2014)

Higher density, 1.2V standard

DDR5 (2020)

Doubled bandwidth, on-die ECC

Visual Comparison

DDR3 240-pin
DDR4 288-pin
DDR5 288-pin (different notch)
DDR3
DDR4
DDR5
Future

RAM Modules & Form Factors

DIMM (Desktop RAM)

Dual In-line Memory Modules used in desktop computers and servers.

Length

133.35mm

Pins

288 (DDR4/DDR5)

SO-DIMM (Laptop RAM)

Small Outline DIMMs used in laptops and compact systems.

Length

67.6mm

Pins

260 (DDR4)

Performance Metrics

Capacity

Minimum 4GB
Standard 16GB
High-End 128GB+

Speed

DDR4 1600-3200MHz
DDR5 4800-6400MHz

Latency

CAS Latency CL16-CL40
Impact Lower = Better

Installation & Troubleshooting

Desktop DIMM Installation

1

Power off and unplug the computer

2

Open the case and locate RAM slots

3

Push down the retention clips at each end

4

Align notch and firmly press until clips snap

Laptop SO-DIMM Installation

1

Power off and remove battery if possible

2

Remove access panel or keyboard

3

Insert at 45? angle then press down

4

Reassemble and power on to verify

Do You Need More RAM?

Signs You Need More

Frequent slowdowns with multiple apps
Excessive disk activity (thrashing)
Applications crashing unexpectedly
Task manager shows high RAM usage

Recommended Amounts

Basic Use

8GB

Office Work

16GB

Gaming

16-32GB

Content Creation

32GB+

RAM Configurations

Single Channel

Basic configuration with one RAM stick

64-bit bus

Dual Channel

Two identical sticks for 128-bit bus

64-bit
64-bit

Quad Channel

High-end systems with four sticks

64-bit
64-bit
64-bit
64-bit

Troubleshooting RAM Issues

Common Problems

No Boot/Beep Codes

Check seating, try one stick at a time

BSOD/Crashes

Run memory diagnostics (Windows: mdsched.exe)

Underperforming

Verify running at correct speed in BIOS

Compatibility Checks

Motherboard supports RAM type (DDR4/DDR5)
Speed supported by CPU/motherboard
Maximum capacity per slot/channel
For dual/quad channel: use identical sticks

RAM Knowledge

ECC vs Non-ECC

ECC (Error Correcting Code) memory detects and fixes bit errors, used in servers and workstations.

Registered (Buffered) RAM

Contains a register between RAM and memory controller for stability with large amounts of RAM.

XMP Profiles

Intel's Extreme Memory Profile for easy overclocking of supported RAM kits.

Knowledge Check

What type of memory is volatile and loses data when power is removed?

Firmware

The bridge between hardware and operating systems across all platforms.

Windows Linux macOS Enterprise

BIOS vs UEFI

Legacy BIOS

The traditional firmware interface found on older systems.

  • 16-bit Real Mode (1MB address space)
  • MBR Partitioning (2TB limit)
  • Slower boot process
  • Limited security features
// Typical BIOS Setup Access
DEL, F2, F10 during POST

UEFI

Modern firmware standard with enhanced capabilities.

  • 32/64-bit Protected Mode
  • GPT Partitioning (>2TB support)
  • Faster boot with parallel initialization
  • Secure Boot, TPM 2.0 support
// UEFI Shell Commands
map - List devices
bcfg - Manage boot options
dmpstore - View variables

Keyboard Communication

Firmware handles low-level keyboard input during pre-boot environment.

// Common BIOS/UEFI Keys:

DEL/F2 - Setup

F8/F12 - Boot Menu

ESC - Exit

PS/2 keyboards initialize before USB in most BIOS

CMOS & Setup Utility

Non-volatile RAM stores system configuration.

Powered by CMOS battery when system is off

Common Settings:

  • Date/Time (RTC)
  • Boot Order
  • Hardware Configuration
  • Security Settings

POST & Error Codes

Power-On Self-Test verifies hardware before boot.

Beep Codes

1 long, 2 short: Video error

POST Cards

Hex codes for diagnostics

Server boards often have IPMI for remote POST monitoring

Security Settings

Secure Boot

Ensures only signed OS loaders execute

TPM 2.0

Hardware-based encryption (Windows 11+ requirement)

Supervisor Password

Prevents unauthorized BIOS changes

Boot Process

  1. Power On ? POST
  2. Firmware Initialization
  3. Boot Device Selection
  4. Bootloader Execution
  5. OS Loading

PXE Boot (Enterprise):

Network boot using DHCP/TFTP

Common in data centers

Maintenance

Flashing BIOS

Update via USB or vendor tools (SUPERMICRO, ASUS)

Clearing CMOS

Jumper or battery removal resets settings

RTC Reset

Dead CMOS battery causes time reset

Firmware Visual Guide

AMI BIOS Setup Utility

Main

Advanced

Boot

Security

Exit

System Time: [14:30:22]

System Date: [08/19/2025]

SATA Configuration

USB Configuration

Fan Speed Control

?? Select Item Enter Select +/- Change Values F1 Help ESC Exit

POST Code Examples

00/FF

Successful POST

C1

Memory error

D0

CPU failure

A2

IDE detect

Server POST Cards:

Supermicro boards display IPMI codes

ASUS servers use Q-Code displays

Knowledge Check

What is the primary purpose of Secure Boot?

Which method is safest for flashing BIOS?

Practical Exercise

Try these in your BIOS/UEFI setup:

1. Document Settings

Note your current boot order and security settings

2. Change Boot Mode

Switch between Legacy and UEFI (if available)

3. Reset to Defaults

Load optimized defaults and observe changes

Caution: Don't save changes if unsure about settings

Motherboards

The main circuit board that connects all components of a computer system.

Motherboard Components

Key Features

Essential components that make up a modern motherboard.

CPU Socket
RAM Slots
Expansion Slots (PCIe)

Form Factors

ATX Standard desktop size
Micro-ATX Smaller, fewer slots
Mini-ITX Compact, single expansion slot

Chipsets

Northbridge

Historically handled high-speed CPU connections.

Southbridge

Handled slower I/O operations.

Modern Integration

Most functions now integrated into CPU.

Knowledge Check

Which motherboard form factor is the smallest?

Power Supplies

Components that convert AC power to DC and distribute it to computer components.

Power Supply Specifications

Key Metrics

Important specifications when selecting a power supply.

Wattage (300W - 1600W)
Efficiency Rating (80 Plus)
Modular vs Non-modular

Voltage Rails

+3.3V Older components
+5V Drives, USB
+12V CPU, GPU, main power

Connectors

24-pin ATX

Main motherboard power connector.

4/8-pin EPS

CPU power connector.

6/8-pin PCIe

Graphics card power connector.

Knowledge Check

Which power supply rating indicates higher efficiency?

Mass Storage Technologies

Devices and technologies for long-term data storage.

Storage Types

Hard Disk Drives (HDD)

Magnetic storage with spinning platters for high-capacity storage.

Capacity: 500GB - 20TB
Speed: 5400 - 15000 RPM
Cost: $0.02 - $0.05 per GB

Solid State Drives (SSD)

Flash memory with no moving parts for faster performance.

Capacity: 120GB - 8TB
Speed: 500 - 7000 MB/s
Cost: $0.08 - $0.20 per GB

Interfaces

SATA

Serial ATA for HDDs and SATA SSDs (6Gbps).

NVMe

PCIe-based interface for high-speed SSDs (up to 32Gbps).

M.2

Form factor supporting both SATA and NVMe SSDs.

Knowledge Check

Which storage technology has no moving parts?

Implementing Mass Storage

Techniques for configuring and managing storage devices.

RAID Levels

Common RAID Configurations

Different RAID levels offer various balances of performance, capacity, and redundancy.

RAID 0: Striping (Performance)
RAID 1: Mirroring (Redundancy)
RAID 5: Striping with Parity

RAID Implementation

Hardware RAID Dedicated controller
Software RAID OS-based solution
Hybrid RAID Combination of both

Partitioning

MBR

Master Boot Record (legacy, max 2TB).

GPT

GUID Partition Table (modern, >2TB).

File Systems

NTFS, FAT32, exFAT, ext4, APFS.

Knowledge Check

Which RAID level provides both performance and redundancy?

Essential Peripherals

Input and output devices that extend computer functionality.

Common Peripherals

Input Devices

Devices used to input data and commands into the computer.

Keyboards (Mechanical, Membrane)
Mice (Optical, Laser, Trackball)
Game Controllers

Output Devices

Devices that display or output information from the computer.

Monitors (LCD, LED, OLED)
Printers (Inkjet, Laser, Dot Matrix)
Speakers and Headsets

Connection Types

USB

Universal Serial Bus (USB-A, USB-C, USB 2.0/3.0/4).

Bluetooth

Wireless standard for short-range communication.

PS/2

Legacy port for keyboards and mice.

Knowledge Check

Which connection type is most common for modern peripherals?

Installing & Upgrading OS

Methods and considerations for installing and upgrading operating systems.

Installation Methods

Media Types

Different ways to install an operating system.

Optical Media (DVD)
USB Flash Drive
Network Installation

Installation Types

Clean Install Fresh OS on empty drive
Upgrade Preserve files and settings
Dual Boot Multiple OS on same machine

Requirements

Windows 11

TPM 2.0, Secure Boot, 4GB RAM, 64GB storage.

macOS

Apple hardware, 4GB RAM, 35GB storage.

Linux

Varies by distro, typically 2GB RAM, 25GB storage.

Knowledge Check

Which installation method completely erases the existing OS?

Working with OS

Navigating and configuring operating system settings and features.

OS Features

File Management

Tools and techniques for managing files and folders.

File Explorer/Finder
Search Functionality
Copy/Move Operations

System Configuration

Control Panel Windows system settings
System Preferences macOS settings
Settings App Modern Windows settings

Task Management

Task Manager

Monitor and manage running processes (Windows).

Activity Monitor

Monitor system resources (macOS).

System Monitor

Linux equivalent for process management.

Knowledge Check

Which tool would you use to end a frozen application in Windows?

Users, Groups & Permissions

Managing user accounts, groups, and access control in operating systems.

Account Types

Windows

User account types in Windows operating systems.

Administrator
Standard User
Guest

Linux/macOS

User account types in Unix-based systems.

Root (Superuser)
Standard User
System Accounts

Permission Systems

NTFS Permissions

Windows file system permissions (Full Control, Modify, etc.).

POSIX Permissions

Unix/Linux permission system (rwx for user/group/others).

Group Policy

Windows domain-level permission management.

Knowledge Check

What does the permission "rwxr-xr--" mean in Linux?

Maintaining & Optimizing OS

Techniques for keeping operating systems running smoothly and efficiently.

Maintenance Tasks

Routine Maintenance

Regular tasks to keep the OS performing well.

Disk Cleanup
Defragmentation (HDDs)
Software Updates

Performance Monitoring

Task Manager Windows process monitoring
Activity Monitor macOS resource monitoring
Performance Monitor Advanced Windows metrics

Optimization Techniques

Startup Management

Controlling which applications launch at startup.

Service Optimization

Disabling unnecessary background services.

Virtual Memory

Adjusting page file settings for optimal performance.

Knowledge Check

Which maintenance task is NOT recommended for SSDs?

Command-Line Interface

Powerful text-based interface for interacting with operating systems.

CLI Environments

Windows

Command-line tools available in Windows.

Command Prompt (cmd.exe)
PowerShell
Windows Terminal

Linux/macOS

Terminal environments in Unix-based systems.

Bash (Bourne-Again Shell)
Zsh (Z Shell)
Fish (Friendly Interactive Shell)

Essential Commands

File Operations

ls/dir, cd, cp/copy, mv/move, rm/del

System Info

top/tasklist, df, free, systeminfo

Networking

ping, ipconfig/ifconfig, netstat, traceroute

Knowledge Check

Which command would you use to list files in a Linux directory?

Troubleshooting OS

Diagnosing and resolving common operating system issues.

Troubleshooting Methodology

Steps

Systematic approach to identifying and resolving issues.

1. Identify the Problem
2. Establish a Theory
3. Test the Theory
4. Implement the Solution

Common Tools

Event Viewer Windows system logs
Safe Mode Minimal OS environment
System Restore Revert to previous state

Common Issues

Boot Failures

Missing OS, corrupt bootloader, hardware issues.

Performance Problems

High CPU/memory usage, disk bottlenecks.

Application Crashes

Compatibility issues, missing dependencies.

Knowledge Check

Which tool would you use to view detailed system logs in Windows?

Display Technologies

Understanding monitor types, resolutions, and display technologies.

Display Types

LCD Technologies

Liquid Crystal Display variants and their characteristics.

TN (Twisted Nematic) - Fast response
IPS (In-Plane Switching) - Better colors
VA (Vertical Alignment) - Good contrast

Other Technologies

OLED Organic LEDs, perfect blacks
QLED Quantum dot enhanced LCD
MicroLED Emerging high-end technology

Display Specifications

Resolution

HD (720p), FHD (1080p), QHD (1440p), UHD (4K), 8K

Refresh Rate

60Hz, 120Hz, 144Hz, 240Hz, 360Hz

Response Time

1ms, 4ms, etc. (lower is better)

Knowledge Check

Which display technology offers the best contrast ratio?

Essentials of Networking

Fundamental concepts of computer networking and communication.

Networking Models

OSI Model

7-layer conceptual model for network communications.

7. Application
6. Presentation
5. Session
4. Transport

TCP/IP Model

4-layer practical implementation model.

4. Application
3. Transport
2. Internet
1. Network Access

Protocols

TCP vs UDP

Connection-oriented vs connectionless.

IP Addressing

IPv4 (32-bit) vs IPv6 (128-bit).

Common Protocols

HTTP, HTTPS, FTP, SSH, DNS, DHCP.

Knowledge Check

Which protocol is used for secure web browsing?

Local Area Networking

Technologies and devices for connecting computers in a limited area.

Network Devices

Basic Devices

Core components of a local area network.

Hub (Obsolete)
Switch
Router

Advanced Devices

Wireless Access Point Wi-Fi connectivity
Firewall Network security
PoE Switch Power over Ethernet

Cabling

Ethernet Categories

Cat5e (1Gbps), Cat6 (10Gbps), Cat6a (10Gbps), Cat7 (10Gbps+).

Fiber Optic

Single-mode vs multi-mode, long-distance.

Connectors

RJ45, LC, SC, ST.

Knowledge Check

Which device operates at Layer 2 of the OSI model?

Wireless Networking

Wi-Fi standards, security, and configuration for wireless networks.

Wi-Fi Standards

IEEE Standards

Evolution of Wi-Fi technologies over time.

802.11a/b/g (Legacy)
802.11n (Wi-Fi 4)
802.11ac (Wi-Fi 5)
802.11ax (Wi-Fi 6)

Frequency Bands

2.4GHz Longer range, more interference
5GHz Faster speeds, less interference
6GHz Wi-Fi 6E, newest band

Security

Encryption

WEP (insecure), WPA, WPA2, WPA3.

Authentication

PSK, 802.1X, Enterprise.

Best Practices

Strong passwords, disable WPS, hide SSID.

Knowledge Check

Which Wi-Fi security protocol is considered insecure and should be avoided?

The Internet

Global network of networks and the technologies that power it.

Internet Infrastructure

Service Providers

Entities that provide internet connectivity.

ISPs (Internet Service Providers)
IXPs (Internet Exchange Points)
Backbone Providers

Connection Types

DSL Phone line, asymmetric
Cable Coaxial, shared bandwidth
Fiber Optical, fastest speeds

Internet Services

DNS

Domain Name System (name resolution).

Cloud Services

IaaS, PaaS, SaaS deployment models.

Content Delivery

CDNs for faster content distribution.

Knowledge Check

Which internet connection type typically offers the fastest speeds?

Virtualization

Creating virtual versions of hardware, operating systems, and other resources.

Virtualization Types

System Virtualization

Running multiple operating systems on a single physical machine.

Type 1 Hypervisor (Bare Metal)
Type 2 Hypervisor (Hosted)
Cloud Virtualization

Other Virtualization

Network Virtualization Virtual networks, VLANs
Storage Virtualization Abstracted storage resources
Application Virtualization Sandboxed applications

Virtualization Benefits

Resource Efficiency

Better hardware utilization.

Isolation

Separate environments for security/testing.

Scalability

Easy to deploy new instances.

Knowledge Check

Which type of hypervisor runs directly on the hardware?

Portable Computing

Laptops, tablets, and other mobile computing devices.

Laptop Components

Specialized Parts

Components unique to or different in laptops.

Battery
Keyboard/Touchpad
DC Power Jack

Form Factors

Ultrabook Thin and light
Convertible 2-in-1 laptop/tablet
Gaming Laptop High-performance

Mobile Features

Input Methods

Touchscreen, stylus, voice input.

Connectivity

Wi-Fi, Bluetooth, cellular options.

Docking Stations

Expand functionality when stationary.

Knowledge Check

Which laptop component is most likely to fail due to physical stress?

Mobile Devices

Smartphones, tablets, and other portable computing devices.

Mobile Platforms

Operating Systems

Dominant mobile operating systems and their characteristics.

Android (Open-source, Google)
iOS (Closed, Apple)
Other (KaiOS, HarmonyOS)

Hardware Features

Sensors Accelerometer, Gyroscope, etc.
Biometrics Fingerprint, Face ID
Connectivity 5G, NFC, Bluetooth

App Ecosystems

App Stores

Google Play Store, Apple App Store

Development

Android Studio, Xcode, Flutter

Distribution

Enterprise deployment, sideloading

Knowledge Check

Which mobile OS uses APK files for app installation?

Securing Mobile Devices

Best practices for protecting mobile devices and their data.

Security Measures

Authentication

Methods to verify user identity on mobile devices.

Biometrics (Fingerprint, Face ID)
Strong Passcodes
Two-Factor Authentication

Protection

Encryption Device and storage encryption
Remote Wipe Erase data if lost/stolen
VPN Secure network connections

MDM Solutions

Mobile Device Management

Centralized control of corporate devices.

MAM

Mobile Application Management.

BYOD Policies

Bring Your Own Device guidelines.

Knowledge Check

Which security feature allows a company to erase data from a lost device?

Printers & MFPs

Printing technologies and multifunction device management.

Printer Types

Impact Printers

Printers that use physical impact to create images.

Dot Matrix
Line Printers

Non-Impact Printers

Inkjet Liquid ink, versatile
Laser Toner, fast, high-quality
Thermal Receipts, labels

MFP Features

Functions

Print, Scan, Copy, Fax

Connectivity

USB, Ethernet, Wi-Fi, Cloud

Management

Print servers, quotas, auditing

Knowledge Check

Which printer type uses toner cartridges?

Securing Computers

Protecting systems from threats and vulnerabilities.

Security Threats

Malware Types

Various forms of malicious software.

Viruses
Worms
Ransomware

Attack Vectors

Phishing Deceptive emails/messages
Social Engineering Human manipulation
Zero-Day Exploits Unknown vulnerabilities

Protection Methods

Software

Antivirus, Firewalls, Anti-malware

Policies

Password policies, access controls

Physical Security

Locks, biometrics, surveillance

Knowledge Check

Which security threat encrypts files and demands payment?

Operating Procedures

IT documentation, change management, and best practices.

Documentation

Essential Documents

Critical documentation for IT operations.

Network Diagrams
Asset Inventory
Incident Reports

Change Management

Request Document change needs
Approval Review and authorize
Implementation Deploy with rollback plan

Best Practices

Ticketing Systems

Track issues and resolutions

Standard Operating Procedures

Documented processes

Knowledge Bases

Shared troubleshooting info

Knowledge Check

What is the purpose of a rollback plan in change management?

Operating Systems

Explore how operating systems manage hardware resources and provide services to applications.

Windows

Microsoft's flagship OS with GUI focus and broad software compatibility.

Latest Version: Windows 11

Linux

Open-source kernel powering many distributions (Ubuntu, Fedora, etc.).

Kernel Version: 6.x

macOS

Apple's Unix-based OS with tight hardware-software integration.

Latest Version: macOS Sonoma

Process Management

Process States

New, Ready, Running, Waiting, Terminated

Scheduling

Round Robin, Priority, Shortest Job First, Multilevel Queue

Threads

Lightweight processes sharing the same memory space

Memory Management

Paging

Divides memory into fixed-size blocks called pages

Segmentation

Divides memory into variable-sized logical segments

Virtual Memory

Uses disk space to extend available RAM

Learning Resources

Curated collection of resources to enhance your computer science journey.

Books

Essential reading materials for computer science fundamentals.

Explore Books

Videos

Video tutorials and lectures from industry experts.

Watch Videos

Interactive Labs

Hands-on coding exercises and virtual labs.

Start Practicing

CompTia A+ Certification Prep

Resources for professional certification exams.

Prepare Now