Computer Science Study

Learn Everything

Comprehensive learning materials covering all computer science topics from A-Z

terminal
$ cs-mastery topics
Computer Science from A-Z
Interactive learning platform
$ cat topics.txt
- Hardware Fundamentals
- Operating Systems
- Networking & Security
$ ls # topics/ resources/ comptia/
$ ./start.sh
> |
Scroll Down

Computer Science Topics

Comprehensive coverage of all computer science concepts from CompTIA A+ certification.

Safety & Professionalism

Proper procedures, communication, and safety measures in IT environments.

Learn More

Visible Computer

Understanding the visible components of a computer system.

Learn More

CPU

Central Processing Unit architecture, features, and performance.

Learn More

RAM

Random Access Memory types, technologies, and configurations.

Learn More

Firmware

BIOS, UEFI, and firmware configuration settings.

Learn More

Motherboards

Form factors, components, and features of modern motherboards.

Learn More

Power Supplies

Power supply specifications, connectors, and troubleshooting.

Learn More

Mass Storage Technologies

HDDs, SSDs, NVMe, and other storage technologies.

Learn More

Implementing Mass Storage

RAID, partitioning, formatting, and storage implementation.

Learn More

Essential Peripherals

Keyboards, mice, monitors, and other essential peripherals.

Learn More

Installing & Upgrading OS

OS installation methods, requirements, and upgrade paths.

Learn More

Working with OS

Navigating and configuring operating system settings.

Learn More

Users, Groups & Permissions

User account management and permission systems.

Learn More

Maintaining & Optimizing OS

Performance tuning, maintenance tasks, and optimization.

Learn More

Command-Line Interface

Essential command-line tools and scripting.

Learn More

Troubleshooting OS

Diagnosing and resolving operating system issues.

Learn More

Display Technologies

Monitor types, resolutions, and display technologies.

Learn More

Essentials of Networking

Networking fundamentals, protocols, and models.

Learn More

Local Area Networking

LAN technologies, cabling, and network devices.

Learn More

Wireless Networking

Wi-Fi standards, security, and configuration.

Learn More

The Internet

Internet technologies, services, and protocols.

Learn More

Virtualization

Virtual machines, hypervisors, and cloud concepts.

Learn More

Portable Computing

Laptops, tablets, and mobile computing devices.

Learn More

Mobile Devices

Smartphones, tablets, and mobile operating systems.

Learn More

Securing Mobile Devices

Mobile device management and security practices.

Learn More

Printers & MFPs

Printer technologies, maintenance, and troubleshooting.

Learn More

Securing Computers

Security threats, malware protection, and best practices.

Learn More

Operating Procedures

IT documentation, change management, and best practices.

Learn More

Safety & Professionalism

Master the essential skills for maintaining safety, professionalism, and excellence in IT environments.

Core Professional Skills

Professional Appearance

  • Dress appropriately for the work environment
  • Maintain personal hygiene
  • Project confidence through body language

Professional Conduct

  • Effective communication with all stakeholders
  • Active listening and empathy
  • Timeliness and reliability

Technical Methodology

  • Structured troubleshooting approaches
  • Documentation and knowledge sharing
  • Continuous learning mindset

IT Professionalism Essentials

Communication Excellence

Verbal Communication

Master the art of technical translation by adapting your language to different audiences. For non-technical users, use simple analogies ("Think of RAM like a desk workspace - the bigger it is, the more projects you can have open at once"). For technical peers, be precise but concise. Always confirm understanding by asking follow-up questions like, "Does this make sense so far?" or "Would you like me to clarify any part of this?"

Written Communication

Professional writing follows the ABC principle: Accurate, Brief, Clear. Structure technical documentation with:

  • Problem statement (what's occurring)
  • Diagnosis (root cause analysis)
  • Solution steps (numbered instructions)
  • Prevention (how to avoid recurrence)
Status Reporting

Effective updates follow the 4P framework:

Progress

What's been accomplished since last update

Problems

Current blockers or unexpected issues

Plan

Next steps and timeline

Participation

What do you need to do now

Active Listening

Practice the LARA method for effective dialogue:

Listen without interrupting Acknowledge by paraphrasing Respond to emotional cues Ask clarifying questions

Safety Protocols

ESD Protection

Proper use of Anti-static mats, Wrist straps, and Anti-static bags when Handling / Storing or Shipping out sensitive components.


This is Greatly exaggerated in the IT / Tech world, Tho it is still a great risk that can occur

Emergency Preparedness

Acknowledgement of the nearest Fire exits, First Aid kits, and Emergency shutdown procedures.

Ergonomics

Proper workstation setup to prevent, Disorganization and Misstakes from Misplaced Screws or Small Components to Incorrect Wiring or Memory Alignment .


Maintaining a good and consistant stance / back position to reduces and prevents straining injuries. This is common during Warehouse Tasks or Actively doing Heavy Manual labour .

Equipment Handling

Make sure to use Safe lifting techniques and to know your limit. (Most of us are not Superman).


This is to ensure proper safe storage of hardware and to prevent injuries and Breaking Components.

IT Ethical Framework

Confidentiality

Protect: Customer data, passwords, and proprietary information. GDPR/HIPAA compliance ? Secure file disposal ? Need-to-know access

Integrity

Maintain: Truthful time reporting, accurate documentation, and transparent limitations. Disclose conflicts ? Reject bribes ? Credit others' work

Accountability

Own: Mistakes, system changes, and security incidents. Change logs ? Incident reports ? RCA documentation

Social Responsibility

Consider: Environmental impact, accessibility, and digital divide. E-waste recycling ? WCAG compliance ? Tech literacy programs

Legal Compliance

Adhere to: Licensing, copyright, and regulatory requirements. Software licenses ? Patent laws ? Export controls

AI Ethics

Ensure: Algorithmic fairness, transparency, and human oversight. Bias testing ? Explainable AI ? Human-in-the-loop

Responsibility

Uphold: System reliability, data backups, and disaster recovery. 99.9% uptime ? Backup verification ? Disaster recovery drills

Continuous Improvement

Pursue: Threat modeling, ethical hacking, and secure coding. CVE monitoring ? OWASP training ? Red team exercises

Professional Knowledge Check

What is the primary purpose of an ESD wrist strap?

When explaining technical issues to non-technical users, you should:

Professional Tip

Always carry a professional toolkit including:

  • ESD wrist strap
  • Multi-bit screwdriver
  • Flashlight
  • Network cable tester
  • Notepad and pen
  • USB diagnostic tools
  • Cable ties
  • Spare parts organizer

The Visible Computer

Understanding computer components, their connections, and how hardware and software work together.

How Computers Work

Input

Process

Storage

Output

Processing Components

  • CPU: Central Processing Unit (brain of the computer)
  • GPU: Graphics Processing Unit (handles visual data)
  • RAM: Temporary working memory
  • Motherboard: Central communication hub

Data Flow

Data moves through the system via buses and interfaces, with the CPU coordinating operations between components using electrical signals and binary code.

Power Conversion

The power supply converts AC to DC power at various voltages needed by different components.

Connectors & Ports

USB

Universal Serial Bus (A, C, etc.)

HDMI

Video/audio interface

Ethernet

RJ45 network connection

Audio Jack

3.5mm audio connection

Power

AC/DC power inputs

Thunderbolt

High-speed data/display

Connection Types

External:
  • USB
  • HDMI
  • Audio
Internal:
  • SATA
  • PCIe
  • M.2

Port Identification

Look for distinctive shapes, colors, and symbols near ports. Modern motherboards often color-code ports.

Note: USB-C is reversible but not all USB-C ports support the same features (Thunderbolt, power delivery, etc.)

Operating Systems

Core Functions

Process management and multitasking
Memory allocation and virtual memory
File system management
Security and access control
Device drivers and hardware abstraction

Common Features

Graphical Interface

Windows, icons, menus, and pointer (WIMP) with desktop metaphor

File Management

Hierarchical directory structure with file explorer

Networking

Built-in TCP/IP stack and network configuration tools

System Utilities

Disk management, task manager, and control panel

Major Operating Systems

Windows
macOS
Linux
Android
iOS
Server OS

Hardware Deep Dive

Motherboard
CPU
RAM
Storage
GPU
Cooling
PSU

Processor

  • Cores: 2-64+ processing units
  • Clock speed: GHz range
  • Cache: L1/L2/L3 memory
  • Architecture: x86, ARM, etc.

Memory

  • Types: DDR4, DDR5, LPDDR
  • Capacity: 4GB-2TB+
  • Speed: MHz-GHz range
  • Volatile vs non-volatile

Storage

  • HDD: Magnetic platters
  • SSD: Flash memory
  • NVMe: PCIe interface
  • Cloud: Remote storage

Graphics

  • Integrated: CPU-based
  • Discrete: Dedicated GPU
  • VRAM: Dedicated memory
  • APUs: Hybrid solutions

Software Deep Dive

Applications
Utilities
Drivers
Middleware
Operating System

System Software

  • Operating systems
  • Device drivers
  • Firmware
  • Utilities

Application Software

  • Productivity suites
  • Creative tools
  • Web browsers
  • Games

Cloud Services

  • SaaS: Software as a Service
  • PaaS: Platform as a Service
  • IaaS: Infrastructure as a Service
  • Web applications

Development

  • Programming languages
  • IDEs
  • Compilers
  • Debuggers

How Software Interacts

Applications make system calls to the OS for resources

OS manages hardware through drivers and firmware

Middleware provides services between applications

Virtual machines and containers abstract the hardware

File Systems & Paths

Windows

  • NTFS (New Technology FS)
  • FAT32 (legacy)
  • exFAT (external drives)
  • Paths: C:\Users\Name\File

macOS

  • APFS (Apple File System)
  • HFS+ (legacy)
  • Case-insensitive
  • Paths: /Users/Name/File

Linux

  • ext4 (common)
  • XFS, Btrfs
  • Case-sensitive
  • Paths: /home/name/file

Mobile

  • F2FS (Flash storage)
  • Sandboxed apps
  • Limited access
  • Cloud integration

Path Navigation

Absolute:
/home/user/docs/report.txt

Full path from root

Relative:
../images/photo.jpg

From current directory

Special paths: ~ (home), . (current), .. (parent)

User Interfaces

CLI
(1970s)
GUI
(1984)
Web
(1990s)
Touch
(2007)
Voice
(2010s)

CLI

Command Line Interface - text-based input with commands and parameters

Powerful for automation

GUI

Graphical User Interface - visual elements like windows and icons

Intuitive for beginners

Touch

Direct manipulation with gestures like tap, swipe, pinch

Mobile-friendly

Voice/NUI

Natural User Interfaces using speech recognition

Hands-free operation
Modern UI Example:

Windows 11 combines GUI (Start menu, windows) with touch (gestures), voice (Cortana), and CLI (PowerShell/WSL) for versatile interaction.

CPU (Central Processing Unit)

The brain of the computer that performs calculations and executes instructions.

Conceptual Overview & History

Evolution of CPUs

From vacuum tubes in the 1940s to today's nanometer-scale transistors, CPUs have evolved dramatically.

1947: First transistor invented at Bell Labs
1971: Intel 4004 - First commercial microprocessor (4-bit, 740kHz)
1985: 32-bit processors emerge (Intel 80386)
2005: Multi-core processors become standard
2020s: 3-5nm process nodes with hybrid architectures

CPU Architectures

x86: Intel/AMD desktop CPUs
ARM: Mobile/Apple M-series
MIPS: Embedded systems
RISC-V: Open-source architecture
Key Differences
  • CISC (x86): Complex instructions, variable length
  • RISC (ARM/MIPS): Simplified instructions, fixed length
  • Endianness: Byte ordering (Big-Endian vs Little-Endian)

CPU Core Components

ALU (Arithmetic Logic Unit)

Performs all arithmetic and logical operations including:

  • Integer arithmetic (add, subtract, multiply)
  • Bitwise operations (AND, OR, NOT, XOR)
  • Comparisons (greater than, equal to)
  • Shift/rotate operations
Modern ALUs often include FPUs (Floating Point Units)

Control Unit

The conductor of the CPU orchestra:

  • Manages fetch-decode-execute cycle
  • Generates control signals for all components
  • Handles interrupts and exceptions
  • Coordinates pipeline stages
Uses microcode for complex instruction handling

Registers & Cache

PC (Program Counter) Next instruction address
IR (Instruction Register) Current instruction
MAR (Memory Address) Address for memory access
MDR (Memory Data) Data being read/written
General Purpose Temporary data storage
Register access: 0.5-1ns vs RAM: 80-100ns

The Full Cycle: From Boot to Browser

1. Power On & Reset Vector

CPU begins execution at a fixed memory address (0xFFFFFFF0 in x86) in ROM. The Power Good signal from PSU triggers this.

PC set to reset vector
ROM mapped to address space

2. POST (Power-On Self-Test)

CPU executes BIOS/UEFI firmware to:

  • Test RAM (write/read patterns)
  • Initialize hardware (PCIe enumeration)
  • Set up interrupt vectors
  • Build ACPI tables
Control Unit manages tests
Buses verified

3. Bootloader Execution

CPU loads bootloader via these steps:

  1. Reads boot device (MBR/GPT)
  2. Loads first sector to 0x7C00
  3. Transitions to protected/long mode
  4. Loads kernel to memory
MAR/MDR used for transfers
DMA may assist

4. OS Initialization

CPU executes kernel startup:

  • Initializes memory management (paging)
  • Sets up IDT/GDT (interrupt descriptors)
  • Starts scheduler and processes
  • Loads drivers via ACPI
MMU activated
Timers configured

5. Browser Launch (Simplified)

When you click a browser icon:

  1. Shell makes exec() system call
  2. CPU switches to kernel mode
  3. MMU maps executable into memory
  4. Dynamic linker loads libraries
  5. CPU begins executing browser code
  6. Multiple threads created for UI/network
Branch Prediction
Cache Hierarchy
Pipelining

Memory Context & Buses

Buses & Interconnects

Address Bus

Carries memory addresses from CPU to RAM. Width determines maximum addressable memory:

32-bit: 4GB limit
64-bit: 16 exabytes
Data Bus

Transfers actual data between CPU and memory. Modern systems use 64-bit wide buses.

Control Bus

Carries signals like:

READ
WRITE
IRQ
RESET
CLK
WAIT

Memory Hierarchy

Registers
1 cycle PC, IR, MAR, MDR
L1 Cache
~4 cycles 64KB/core
L2 Cache
~12 cycles 256KB-1MB
L3 Cache
~30 cycles 8-32MB shared
RAM
~100 cycles DDR4/DDR5

Clock Cycles & Pipelining

Clock Cycle Breakdown

Clock Speed 2.5GHz - 5.8GHz
CPI (Cycles/Instruction) 0.25-10 (varies by arch)
IPC (Instructions/Cycle) Up to 4-6 (modern CPUs)
Superscalar Execution

Modern CPUs can execute multiple instructions per cycle through:

  • Multiple ALUs
  • Out-of-order execution
  • Speculative execution

Instruction Pipeline

Modern CPUs use deep pipelines (15-20 stages) to overlap execution:

Fetch
Decode
Rename
Schedule
Execute
Memory
Bypass
Writeback
Retire
Hazards & Solutions
Structural: More units
Data: Forwarding
Control: Prediction

Modern CPU Technologies

Multi-Core & Hybrid

Modern approaches to parallelism:

  • P-cores: High performance (Intel Golden Cove)
  • E-cores: Power efficiency (Intel Gracemont)
  • SMT: Hyper-Threading (2 threads/core)
  • ccNUMA: Non-uniform memory access
Apple M1: 4P + 4E cores, Intel Alder Lake: 8P + 8E

Process Nodes

1971: 10?m Intel 4004
2000: 180nm Pentium 4
2020: 7nm AMD Zen 3
2023: 3nm Apple A17 Pro
Node names now marketing (Intel 7 ? TSMC 4nm)

Advanced Features

SIMD: AVX-512, Neon
Virtualization: VT-x, AMD-V
AI: AMX, NPUs
Security: SGX, TPM
Power: DVFS, C-states
Memory: ECC, TRR
SIMD: Single Instruction Multiple Data

Selecting a CPU

Socket Compatibility

Intel: LGA1700, LGA1851
AMD: AM5, sTRX4

Check chipset support (Z790 vs B650) and BIOS requirements.

Performance Needs

Gaming: Clock speed
Editing: Cores
Servers: ECC

Thermal Considerations

TDP: 65W-350W Cooling: Air/Liquid

High-end CPUs may require 240mm+ AIO liquid coolers.

Installation & Troubleshooting

Installation Issues

Bent pins (LGA)
Paste application
Pressure uneven
Power connectors

Overheating Symptoms

Throttling
Shutdowns
BSODs
Instability

Catastrophic Failures

No POST
Burning
Damage

May require motherboard replacement if socket damaged.

Developer Perspective

Optimization Techniques

Cache Optimization
  • Structure of Arrays vs Array of Structures
  • Prefetching patterns
  • Alignment to cache lines (64B)
Parallelism
  • Thread affinity/pinning
  • False sharing avoidance
  • Vectorization (SIMD)

Benchmarking & Analysis

Performance Counters
L1/L2/L3 cache misses
Branch mispredictions
IPC (Instructions/Cycle)
CPI (Cycles/Instruction)
Tools
perf (Linux)
VTune (Intel)
AMD uProf
LLVM-MCA

Acronym Key

ALU: Arithmetic Logic Unit
PC: Program Counter
IR: Instruction Register
MAR: Memory Address Register
MDR: Memory Data Register
SIMD: Single Instruction Multiple Data
IPC: Instructions Per Cycle
CPI: Cycles Per Instruction
MMU: Memory Management Unit
TDP: Thermal Design Power
SMT: Simultaneous Multithreading
ccNUMA: Cache-Coherent Non-Uniform Memory Access

Knowledge Check

What is the purpose of the CPU's MAR register?

RAM (Random Access Memory)

Temporary storage that the CPU uses to store data that is actively being worked on.

Conceptual Understanding

How RAM Works

RAM is volatile memory that provides fast temporary storage for data being actively used by the CPU.

DRAM (Dynamic RAM)

Needs constant refreshing, used for main system memory.

SRAM (Static RAM)

Faster but more expensive, used for CPU cache.

Memory Hierarchy
CPU Registers (Fastest)
CPU Cache (SRAM)
Main Memory (DRAM)
Storage (SSD/HDD)

RAM Evolution

RAM Generations Timeline

SDRAM (1993)

Synchronous DRAM, first to sync with system bus

DDR (2000)

Double Data Rate, 2x transfer rate

DDR2 (2003)

Higher speeds, lower power

DDR3 (2007)

Higher bandwidth, 1.5V standard

DDR4 (2014)

Higher density, 1.2V standard

DDR5 (2020)

Doubled bandwidth, on-die ECC

Visual Comparison

DDR3 240-pin
DDR4 288-pin
DDR5 288-pin (different notch)
DDR3
DDR4
DDR5
Future

RAM Modules & Form Factors

DIMM (Desktop RAM)

Dual In-line Memory Modules used in desktop computers and servers.

Length

133.35mm

Pins

288 (DDR4/DDR5)

SO-DIMM (Laptop RAM)

Small Outline DIMMs used in laptops and compact systems.

Length

67.6mm

Pins

260 (DDR4)

Performance Metrics

Capacity

Minimum 4GB
Standard 16GB
High-End 128GB+

Speed

DDR4 1600-3200MHz
DDR5 4800-6400MHz

Latency

CAS Latency CL16-CL40
Impact Lower = Better

Installation & Troubleshooting

Desktop DIMM Installation

1

Power off and unplug the computer

2

Open the case and locate RAM slots

3

Push down the retention clips at each end

4

Align notch and firmly press until clips snap

Laptop SO-DIMM Installation

1

Power off and remove battery if possible

2

Remove access panel or keyboard

3

Insert at 45? angle then press down

4

Reassemble and power on to verify

Do You Need More RAM?

Signs You Need More

Frequent slowdowns with multiple apps
Excessive disk activity (thrashing)
Applications crashing unexpectedly
Task manager shows high RAM usage

Recommended Amounts

Basic Use

8GB

Office Work

16GB

Gaming

16-32GB

Content Creation

32GB+

RAM Configurations

Single Channel

Basic configuration with one RAM stick

64-bit bus

Dual Channel

Two identical sticks for 128-bit bus

64-bit
64-bit

Quad Channel

High-end systems with four sticks

64-bit
64-bit
64-bit
64-bit

Troubleshooting RAM Issues

Common Problems

No Boot/Beep Codes

Check seating, try one stick at a time

BSOD/Crashes

Run memory diagnostics (Windows: mdsched.exe)

Underperforming

Verify running at correct speed in BIOS

Compatibility Checks

Motherboard supports RAM type (DDR4/DDR5)
Speed supported by CPU/motherboard
Maximum capacity per slot/channel
For dual/quad channel: use identical sticks

RAM Knowledge

ECC vs Non-ECC

ECC (Error Correcting Code) memory detects and fixes bit errors, used in servers and workstations.

Registered (Buffered) RAM

Contains a register between RAM and memory controller for stability with large amounts of RAM.

XMP Profiles

Intel's Extreme Memory Profile for easy overclocking of supported RAM kits.

Knowledge Check

What type of memory is volatile and loses data when power is removed?

Firmware Ecosystem

The foundational layer controlling hardware initialization, system configuration, and secure boot processes across all computing platforms.

Windows Linux macOS Enterprise

Core Firmware Components

BIOS/UEFI

System firmware that initializes hardware and boots the OS.

Manages hardware abstraction
Secure Boot implementation
Power management

CMOS/RTC

Battery-backed memory storing system settings and clock.

Typically CR2032 battery
64-256 bytes of storage
Maintains date/time

POST Process

Power-On Self-Test verifies hardware before boot.

Beep codes for errors
Video test sequence
Hardware verification

Boot Process Flow

Power On

CPU Init

RAM Test

Device Enum

Bootloader

Consumer Boot

UEFI ? Boot Manager ? Windows Boot Manager (bootmgfw.efi) or GRUB2 (Linux)

Enterprise PXE Boot

UEFI ? iPXE ? DHCP ? TFTP ? WDS/SCCM (Windows) or Cobbler (Linux)

BIOS/UEFI Configuration

Keyboard Communication

PS/2 vs USB initialization, legacy support, NKRO (N-Key Rollover) settings

CMOS & Setup Utility

Access methods (DEL, F2, F12), navigation, hierarchy structure

Security Settings

  • Secure Boot (Microsoft, Custom, Other OS)
  • TPM 2.0/1.2 configuration
  • Boot password protection
  • Intel TXT/AMD PSP features

Save & Exit Options

Save profiles, discard changes, boot override, secure flash validation

POST & Boot Process

Beep/Error Codes

AMI, Award, Phoenix, IBM, Dell proprietary codes

1-3-1: RAM error
2-2-3: ROM error
1 long: POST passed
Continuous: Power issue

POST Cards & Debug

PCIe/ISA debug cards, port 80h readouts, OEM-specific LEDs

SuperMicro: BMC debug headers, ASUS: Q-Code displays

PXE Boot Process

  1. DHCP discovery
  2. TFTP download of NBP (Network Bootstrap Program)
  3. UNDI network stack initialization
  4. OS image download

Firmware Maintenance

CMOS Management

  • Clearing CMOS via jumper/battery removal
  • RTC (Real-Time Clock) drift compensation
  • NVRAM corruption recovery
  • Battery voltage thresholds (typically 2.7-3.3V)

Flashing Procedures

  • In-system programming (ISP) methods
  • Recovery modes (ASUS CrashFree, Gigabyte DualBIOS)
  • Dell/HPE/Lenovo vendor-specific tools
  • Supermicro IPMI flash updates

Security Best Practices

  • Regular firmware updates (quarterly review)
  • Secure flash validation (checksums, signatures)
  • Disabling unused features (Legacy ROM, CSM)
  • Physical write-protection when appropriate
PlatformWindows ToolsLinux ToolsmacOS ToolsEnterprise Methods
ASUSAI Suite, EZ Flashfwupd, afudosBoot Camp (Intel)ASUS Control Center
SupermicroSUM (SuperMicro Update Manager)ipmitool, sfcbdN/AIPMI/BMC web interface
DellDell Command Updatefwupd, dsuBoot Camp (Intel)iDRAC, OpenManage
AppleBoot Camp (Intel)apple-bce (limited)System Firmware UpdatesMDM profiles (macOS Server)

Enterprise Firmware Management

Server Platform Firmware

IPMI/BMC Features
  • KVM over IP (Keyboard-Video-Mouse)
  • Serial over LAN (SOL)
  • SEL (System Event Log) monitoring
  • FRU (Field Replaceable Unit) inventory
Blade Server Considerations

Chassis-level firmware vs blade-level firmware, interposer modules, management module updates

Network Deployment

PXE Infrastructure
  • DHCP options (66/67 for boot server)
  • TFTP vs HTTP boot
  • UEFI HTTP Boot (RFC 7230)
  • iSCSI SAN booting
Centralized Management

Dell OpenManage, HPE OneView, Lenovo XClarity, Cisco UCS Manager

Most solutions support firmware baselines and staged rollouts

Vendor Comparison

VendorManagement InterfaceFirmware Update MethodUnique Features
SupermicroIPMI 2.0, RedfishSUM, SMCIPMIToolSMBios DMI editing
ASUS ServerASMB (ASUS Server Management Board)ASUS Control CenterTPM auto-provisioning
Dell PowerEdgeiDRAC (Dell Remote Access Controller)Dell Repository ManagerRollback protection
HPE ProLiantiLO (Integrated Lights-Out)Service Pack for ProLiantSilicon Root of Trust

Motherboard Guide

The foundation of every computing system - from desktops to enterprise servers

Motherboard Architecture

PCB Layers

2-Layer Basic Systems
4-Layer Standard Desktops
6+ Layer Servers/High-End

Form Factors

ATX (Standard Desktop)
Micro-ATX (Compact)
E-ATX (Server)
Blade (Modular Server)
CPURAMPCIe SlotsChipsetI/O

Key Specifications

Socket Type LGA1700/AM5
RAM Support DDR4/DDR5
PCIe Version 4.0/5.0
Storage Options M.2/SATA

Desktop Components

CPU Socket

LGA, AM4/5, PGA

RAM Slots

2-4 DIMMs

PCIe Slots

x16, x8, x4, x1

Storage

M.2, SATA

Power

24-pin + 8-pin

Networking

1G/2.5G Ethernet

Server Components

CPU Sockets

Dual/Quad Socket

RAM Capacity

8-16 DIMMs, ECC

Remote Mgmt

IPMI, iDRAC

Hot-Swap

Drives, PSUs

Power

Dual PSUs

Networking

10G/25G/40G

Expansion Bus Architecture

PCI (Legacy)

133 MB/s max
Shared bandwidth
32-bit parallel

PCI Express

Up to 128 GB/s
Dedicated lanes
Serial point-to-point
PCIPCIe 3.0PCIe 5.0133 MB/s1 GB/s4 GB/s

Installation Guide

Choosing Components

Match socket type, RAM compatibility, and form factor

Pre-Installation

Update BIOS, backup data, prepare workspace

Mounting

Install standoffs, align I/O shield, secure motherboard

Connections

Attach power, front panel, storage, and expansion cards

Troubleshooting

No POST

Check power, RAM seating, CPU installation

Overheating

Verify fan connections, thermal paste application

Random Crashes

Test RAM, check temperatures, update drivers

No Display

Verify graphics card connection, try different slot

Knowledge Check

Which motherboard component handles CPU to RAM communication?

What's the main advantage of PCIe over PCI?

Which is NOT a server motherboard feature?

What should you check first if a new motherboard won't POST?

Power Supply Unit (PSU) Complete Coverage

Comprehensive guide to AC/DC power conversion, distribution, and management for all computing environments

Power Supply Fundamentals

Basic Function

  • Converting AC (Alternating Current) to DC (Direct Current)
  • Voltage regulation and filtering
  • Power distribution to components
  • Electrical safety and protection

Power Sources

  • Wall outlet AC power (110V/220V)
  • UPS (Uninterruptible Power Supply)
  • Battery backup systems
  • Solar/alternative power integration

Quick Reference

80 PLUS Ratings Efficiency
White80%
Bronze82-85%
Silver85-88%
Gold87-90%
Platinum90-92%
Titanium90-94%
Form Factors Size
ATXStandard
SFXSmall
TFXThin
FlexATXCompact

Desktop Form Factors

  • ATX (Advanced Technology eXtended) - Standard
  • SFX (Small Form Factor) - Compact
  • TFX (Thin Form Factor) - Low-profile
  • Flex ATX - Mini-ITX builds

Server/Enterprise

  • Redundant power supplies (N+1, 2N)
  • Hot-swap capabilities
  • 1U/2U rack-mount formats
  • Blade server power modules
  • High-efficiency standards (80+ Titanium)

Power Requirements

Component Power Draw

  • CPU (TDP - Thermal Design Power)
  • GPU (Peak vs sustained)
  • Storage devices
  • RAM and motherboard

Calculation Methods

  • Online PSU calculators
  • Manual wattage estimation
  • 20-30% overhead for upgrades

PSU Specifications & Technologies

Wattage & Rails

Continuous vs peak 80-100%
Single vs multi-rail 12V primary
  • +12V (CPU/GPU)
  • +5V (storage)
  • +3.3V (motherboard)
  • -12V (legacy)

Protection Features

OVP
Over-Voltage
UVP
Under-Voltage
OCP
Over-Current
OTP
Over-Temp
OPP
Over-Power
SCP
Short Circuit

Cooling & PFC

Active vs passive Fan curves
PFC (Power Factor Correction) Active > Passive
Fan bearing types: Fluid Dynamic, Rifle, Ball
Harmonic distortion reduction

Connectors & Cables

24-pin ATX

Main motherboard power

4+4-pin EPS

CPU power

6+2-pin PCIe

GPU power

SATA

Storage devices

Molex

Legacy peripherals

Berg

Floppy drives

Modular vs non-modular designs
Cable length considerations (450mm-700mm)

Installation & Maintenance

Pre-Installation

  • Verify case compatibility
  • Check cable lengths
  • Plan cable routing

Safety Procedures

  • Never open PSU case
  • Proper grounding techniques
  • Disconnect power completely

Maintenance

  • Dust cleaning every 6-12 months
  • Monitor fan operation
  • Replace after 5-10 years

Enterprise & Server Power Systems

Redundancy

  • N+1 configuration
  • 2N full redundancy
  • Hot-swap capabilities
  • Failover testing

PDU (Power Distribution Unit)

  • Basic vs metered
  • Switched PDUs
  • 208V vs 240V
  • Remote management

UPS (Uninterruptible Power Supply)

  • Online vs line-interactive
  • Runtime calculations
  • SNMP monitoring
  • Generator integration

PXE (Preboot Execution Environment)

  • Network boot requirements
  • Power sequencing
  • Wake-on-LAN (WoL)
  • IPMI (Intelligent Platform Management Interface)

Testing & Diagnostics

Basic Methods

  • Paper clip test (PSU standalone)
  • Multimeter voltage testing
  • Power-on self-test (POST)

Advanced Diagnostics

  • PSU load testers
  • Oscilloscope ripple testing
  • Thermal imaging

Troubleshooting

No Power

  • Verify PSU switch position
  • Test wall outlet
  • Check cable connections

Intermittent Issues

  • Temperature-related
  • Load-dependent failures
  • Capacitor aging

Mass Storage Technologies

Devices and technologies for long-term data storage

History & Evolution

Mass storage began with magnetic tape in the 1950s, evolving through hard disk drives (HDDs) in 1956, optical storage (CDs/DVDs) in the 1980s, and solid-state drives (SSDs) in the 2000s.

1950s: Magnetic Tape
1956: First HDD (IBM 350)
1982: CD-ROM
2007: First Consumer SSDs
TapeHDDOpticalSSD

How Hard Drives Work

HDDs store data on spinning magnetic platters with read/write heads that move across the surface.

Platters

Stacked magnetic disks that spin at 5400-15000 RPM

Actuator Arm

Moves read/write heads across platter surfaces

Sectors

512-byte or 4K segments where data is stored

Hard Disk Drive (HDD) Diagram

Storage Comparison

Hard Disk Drives (HDD)

Technology: Magnetic
Speed: 120-250 MB/s
Capacity: 500GB-20TB
Durability: ~5 years
Cost: $0.02-$0.05/GB

Solid State Drives (SSD)

Technology: Flash Memory
Speed: 500-7000 MB/s
Capacity: 120GB-8TB
Durability: ~10 years
Cost: $0.08-$0.20/GB

Connection Interfaces

PATA (Parallel ATA)

Legacy 40/80-wire ribbon cables (133MB/s max)

Also known as: IDE

SATA (Serial ATA)

Current standard (600MB/s for SATA III)

Versions: 1.5Gbps, 3Gbps, 6Gbps

eSATA (External SATA)

External version of SATA (6Gbps)

Max Cable Length: 2 meters

RAID (Redundant Array of Independent Disks)

Common RAID Levels

RAID 0

Striping (Performance)

Min Disks: 2
RAID 1

Mirroring (Redundancy)

Min Disks: 2
RAID 5

Striping + Parity

Min Disks: 3
RAID 10

Mirroring + Striping

Min Disks: 4

RAID Implementation Types

Hardware RAID

Dedicated controller with processor and cache

Software RAID

OS-managed with CPU overhead

Dedicated RAID Boxes

External enclosures with RAID support

RAIDDisk 1Disk 2Disk 3

Drive Installation

Choosing Your Drive

Capacity needs
Performance requirements
Form factor (2.5", 3.5", M.2)
Interface (SATA, NVMe)

BIOS Configuration

SATA Mode (AHCI/IDE/RAID)
Boot order
Secure Boot settings
CSM/Legacy support

Implementing Mass Storage

Techniques for configuring and managing storage devices

Partitioning Systems

MBR (Master Boot Record)

  • Legacy system (since 1983)
  • Max 4 primary partitions
  • 2TB partition size limit
  • Stores boot code in first sector

GPT (GUID Partition Table)

  • Modern standard (UEFI required)
  • 128 partitions by default
  • 9.4ZB (zettabyte) max size
  • CRC32 checksums for integrity

File Systems

Windows File Systems

FAT32

Compatible but limited (4GB file size)

Max Volume: 32GB (Win)
NTFS

Windows standard with security features

Max File: 16TB
exFAT

Optimized for flash storage

Max File: 16EB

macOS File Systems

HFS+ Legacy (pre-2017)
APFS Current standard

Linux File Systems

ext4 Most common
Btrfs Advanced features

Partitioning Tools

Windows Tools

Disk Management

Built-in tool for basic partitioning

DiskPart

Command-line utility

Third-party Tools

EaseUS, MiniTool, AOMEI

Linux Tools

fdisk/gdisk

Command-line partitioning

GParted

Graphical partition editor

LVM

Logical Volume Management

Storage Spaces (Windows)

Storage Spaces lets you pool multiple drives together with resiliency options similar to RAID.

Simple

No redundancy (like RAID 0)

Mirror

Data duplication (like RAID 1)

Parity

Efficiency with redundancy (like RAID 5)

Storage PoolDrive 1Drive 2Drive 3

Maintenance & Troubleshooting

Maintenance

Disk Cleanup

Remove temporary files and system clutter

Defragmentation

HDDs only (not needed for SSDs)

SMART Monitoring

Check drive health indicators

Troubleshooting

Drive Not Detected

Check connections, BIOS settings, Bad Partition or Volume

Corrupt Data

Run CHKDSK (Windows) or fsck (Linux)

Slow Performance

Check for failing sectors or SSD wear

Essential Peripherals

Input and output devices that extend computer functionality with connection interfaces

Common Connection Ports

Serial Ports (COM)

RS-232 (Recommended Standard 232) serial communication ports for transmitting data one bit at a time.

Legacy ports for modems, mice, and industrial equipment

USB Ports

USB (Universal Serial Bus) standard for connection, communication, and power supply.

USB-A
USB-C
USB 2.0
USB 3.0+

Thunderbolt Ports

Thunderbolt hardware interface developed by Intel that combines PCI Express and DisplayPort.

Up to 40 Gbps transfer speeds

General Port Issues

Driver conflicts and compatibility issues
Physical damage to ports or connectors
Insufficient power for bus-powered devices
Bandwidth sharing limitations

Common Peripherals

Keyboards

Mechanical
Membrane
Wireless
Ergonomic

Pointing Devices

Optical
Laser
Trackball
Touchpad

Biometric Devices

Biometric authentication using unique physical characteristics.

QR & Barcode Scanners

Devices that read optical machine-readable representations of data.

Touch Screens

Resistive
Capacitive
Infrared
SAW

KVM Switches

Hardware devices that allow control of multiple computers from a single keyboard, video monitor, and mouse.

Additional Peripherals

Game Controllers & Joysticks

Gamepads
Joysticks
Racing Wheels
Flight Sticks

Digitizers

Devices that convert analog information into digital data, such as graphics tablets.

Multimedia Devices & Formats

Webcams
Microphones
Speakers
Headsets

Removable Storage Devices

External HDD
External SSD
Flash Drives
Memory Cards

Storage Media

Flash Memory

USB Drives
SD Cards
microSD
CFexpress
SD (Secure Digital) - removable flash memory card format

Optical Media

CD
DVD
Blu-ray
HD DVD
CD (Compact Disc), DVD (Digital Versatile Disc)

Knowledge Check

Which connection type is most common for modern peripherals?

Installing & Upgrading OS

Methods and considerations for installing and upgrading operating systems.

Installation Methods

Media Types

Different ways to install an operating system.

Optical Media (DVD)
USB Flash Drive
Network Installation

Installation Types

Clean Install Fresh OS on empty drive
Upgrade Preserve files and settings
Dual Boot Multiple OS on same machine

Requirements

Windows 11

TPM 2.0, Secure Boot, 4GB RAM, 64GB storage.

macOS

Apple hardware, 4GB RAM, 35GB storage.

Linux

Varies by distro, typically 2GB RAM, 25GB storage.

Knowledge Check

Which installation method completely erases the existing OS?

Working with OS

Navigating and configuring operating system settings and features.

OS Features

File Management

Tools and techniques for managing files and folders.

File Explorer/Finder
Search Functionality
Copy/Move Operations

System Configuration

Control Panel Windows system settings
System Preferences macOS settings
Settings App Modern Windows settings

Task Management

Task Manager

Monitor and manage running processes (Windows).

Activity Monitor

Monitor system resources (macOS).

System Monitor

Linux equivalent for process management.

Knowledge Check

Which tool would you use to end a frozen application in Windows?

Users, Groups & Permissions

Managing user accounts, groups, and access control in operating systems.

Account Types

Windows

User account types in Windows operating systems.

Administrator
Standard User
Guest

Linux/macOS

User account types in Unix-based systems.

Root (Superuser)
Standard User
System Accounts

Permission Systems

NTFS Permissions

Windows file system permissions (Full Control, Modify, etc.).

POSIX Permissions

Unix/Linux permission system (rwx for user/group/others).

Group Policy

Windows domain-level permission management.

Knowledge Check

What does the permission "rwxr-xr--" mean in Linux?

Maintaining & Optimizing OS

Techniques for keeping operating systems running smoothly and efficiently.

Maintenance Tasks

Routine Maintenance

Regular tasks to keep the OS performing well.

Disk Cleanup
Defragmentation (HDDs)
Software Updates

Performance Monitoring

Task Manager Windows process monitoring
Activity Monitor macOS resource monitoring
Performance Monitor Advanced Windows metrics

Optimization Techniques

Startup Management

Controlling which applications launch at startup.

Service Optimization

Disabling unnecessary background services.

Virtual Memory

Adjusting page file settings for optimal performance.

Knowledge Check

Which maintenance task is NOT recommended for SSDs?

Command-Line Interface

Powerful text-based interface for interacting with operating systems.

CLI Environments

Windows

Command-line tools available in Windows.

Command Prompt (cmd.exe)
PowerShell
Windows Terminal

Linux/macOS

Terminal environments in Unix-based systems.

Bash (Bourne-Again Shell)
Zsh (Z Shell)
Fish (Friendly Interactive Shell)

Essential Commands

File Operations

ls/dir, cd, cp/copy, mv/move, rm/del

System Info

top/tasklist, df, free, systeminfo

Networking

ping, ipconfig/ifconfig, netstat, traceroute

Knowledge Check

Which command would you use to list files in a Linux directory?

Troubleshooting OS

Diagnosing and resolving common operating system issues.

Troubleshooting Methodology

Steps

Systematic approach to identifying and resolving issues.

1. Identify the Problem
2. Establish a Theory
3. Test the Theory
4. Implement the Solution

Common Tools

Event Viewer Windows system logs
Safe Mode Minimal OS environment
System Restore Revert to previous state

Common Issues

Boot Failures

Missing OS, corrupt bootloader, hardware issues.

Performance Problems

High CPU/memory usage, disk bottlenecks.

Application Crashes

Compatibility issues, missing dependencies.

Knowledge Check

Which tool would you use to view detailed system logs in Windows?

Display Technologies

Understanding monitor types, resolutions, and display technologies.

Display Types

LCD Technologies

Liquid Crystal Display variants and their characteristics.

TN (Twisted Nematic) - Fast response
IPS (In-Plane Switching) - Better colors
VA (Vertical Alignment) - Good contrast

Other Technologies

OLED Organic LEDs, perfect blacks
QLED Quantum dot enhanced LCD
MicroLED Emerging high-end technology

Display Specifications

Resolution

HD (720p), FHD (1080p), QHD (1440p), UHD (4K), 8K

Refresh Rate

60Hz, 120Hz, 144Hz, 240Hz, 360Hz

Response Time

1ms, 4ms, etc. (lower is better)

Knowledge Check

Which display technology offers the best contrast ratio?

Essentials of Networking

Fundamental concepts of computer networking and communication.

Networking Models

OSI Model

7-layer conceptual model for network communications.

7. Application
6. Presentation
5. Session
4. Transport

TCP/IP Model

4-layer practical implementation model.

4. Application
3. Transport
2. Internet
1. Network Access

Protocols

TCP vs UDP

Connection-oriented vs connectionless.

IP Addressing

IPv4 (32-bit) vs IPv6 (128-bit).

Common Protocols

HTTP, HTTPS, FTP, SSH, DNS, DHCP.

Knowledge Check

Which protocol is used for secure web browsing?

Local Area Networking

Technologies and devices for connecting computers in a limited area.

Network Devices

Basic Devices

Core components of a local area network.

Hub (Obsolete)
Switch
Router

Advanced Devices

Wireless Access Point Wi-Fi connectivity
Firewall Network security
PoE Switch Power over Ethernet

Cabling

Ethernet Categories

Cat5e (1Gbps), Cat6 (10Gbps), Cat6a (10Gbps), Cat7 (10Gbps+).

Fiber Optic

Single-mode vs multi-mode, long-distance.

Connectors

RJ45, LC, SC, ST.

Knowledge Check

Which device operates at Layer 2 of the OSI model?

Wireless Networking

Wi-Fi standards, security, and configuration for wireless networks.

Wi-Fi Standards

IEEE Standards

Evolution of Wi-Fi technologies over time.

802.11a/b/g (Legacy)
802.11n (Wi-Fi 4)
802.11ac (Wi-Fi 5)
802.11ax (Wi-Fi 6)

Frequency Bands

2.4GHz Longer range, more interference
5GHz Faster speeds, less interference
6GHz Wi-Fi 6E, newest band

Security

Encryption

WEP (insecure), WPA, WPA2, WPA3.

Authentication

PSK, 802.1X, Enterprise.

Best Practices

Strong passwords, disable WPS, hide SSID.

Knowledge Check

Which Wi-Fi security protocol is considered insecure and should be avoided?

The Internet

Global network of networks and the technologies that power it.

Internet Infrastructure

Service Providers

Entities that provide internet connectivity.

ISPs (Internet Service Providers)
IXPs (Internet Exchange Points)
Backbone Providers

Connection Types

DSL Phone line, asymmetric
Cable Coaxial, shared bandwidth
Fiber Optical, fastest speeds

Internet Services

DNS

Domain Name System (name resolution).

Cloud Services

IaaS, PaaS, SaaS deployment models.

Content Delivery

CDNs for faster content distribution.

Knowledge Check

Which internet connection type typically offers the fastest speeds?

Virtualization

Creating virtual versions of hardware, operating systems, and other resources.

Virtualization Types

System Virtualization

Running multiple operating systems on a single physical machine.

Type 1 Hypervisor (Bare Metal)
Type 2 Hypervisor (Hosted)
Cloud Virtualization

Other Virtualization

Network Virtualization Virtual networks, VLANs
Storage Virtualization Abstracted storage resources
Application Virtualization Sandboxed applications

Virtualization Benefits

Resource Efficiency

Better hardware utilization.

Isolation

Separate environments for security/testing.

Scalability

Easy to deploy new instances.

Knowledge Check

Which type of hypervisor runs directly on the hardware?

Portable Computing

Laptops, tablets, and other mobile computing devices.

Laptop Components

Specialized Parts

Components unique to or different in laptops.

Battery
Keyboard/Touchpad
DC Power Jack

Form Factors

Ultrabook Thin and light
Convertible 2-in-1 laptop/tablet
Gaming Laptop High-performance

Mobile Features

Input Methods

Touchscreen, stylus, voice input.

Connectivity

Wi-Fi, Bluetooth, cellular options.

Docking Stations

Expand functionality when stationary.

Knowledge Check

Which laptop component is most likely to fail due to physical stress?

Mobile Devices

Smartphones, tablets, and other portable computing devices.

Mobile Platforms

Operating Systems

Dominant mobile operating systems and their characteristics.

Android (Open-source, Google)
iOS (Closed, Apple)
Other (KaiOS, HarmonyOS)

Hardware Features

Sensors Accelerometer, Gyroscope, etc.
Biometrics Fingerprint, Face ID
Connectivity 5G, NFC, Bluetooth

App Ecosystems

App Stores

Google Play Store, Apple App Store

Development

Android Studio, Xcode, Flutter

Distribution

Enterprise deployment, sideloading

Knowledge Check

Which mobile OS uses APK files for app installation?

Securing Mobile Devices

Best practices for protecting mobile devices and their data.

Security Measures

Authentication

Methods to verify user identity on mobile devices.

Biometrics (Fingerprint, Face ID)
Strong Passcodes
Two-Factor Authentication

Protection

Encryption Device and storage encryption
Remote Wipe Erase data if lost/stolen
VPN Secure network connections

MDM Solutions

Mobile Device Management

Centralized control of corporate devices.

MAM

Mobile Application Management.

BYOD Policies

Bring Your Own Device guidelines.

Knowledge Check

Which security feature allows a company to erase data from a lost device?

Printers & MFPs

Printing technologies and multifunction device management.

Printer Types

Impact Printers

Printers that use physical impact to create images.

Dot Matrix
Line Printers

Non-Impact Printers

Inkjet Liquid ink, versatile
Laser Toner, fast, high-quality
Thermal Receipts, labels

MFP Features

Functions

Print, Scan, Copy, Fax

Connectivity

USB, Ethernet, Wi-Fi, Cloud

Management

Print servers, quotas, auditing

Knowledge Check

Which printer type uses toner cartridges?

Securing Computers

Protecting systems from threats and vulnerabilities.

Security Threats

Malware Types

Various forms of malicious software.

Viruses
Worms
Ransomware

Attack Vectors

Phishing Deceptive emails/messages
Social Engineering Human manipulation
Zero-Day Exploits Unknown vulnerabilities

Protection Methods

Software

Antivirus, Firewalls, Anti-malware

Policies

Password policies, access controls

Physical Security

Locks, biometrics, surveillance

Knowledge Check

Which security threat encrypts files and demands payment?

Operating Procedures

IT documentation, change management, and best practices.

Documentation

Essential Documents

Critical documentation for IT operations.

Network Diagrams
Asset Inventory
Incident Reports

Change Management

Request Document change needs
Approval Review and authorize
Implementation Deploy with rollback plan

Best Practices

Ticketing Systems

Track issues and resolutions

Standard Operating Procedures

Documented processes

Knowledge Bases

Shared troubleshooting info

Knowledge Check

What is the purpose of a rollback plan in change management?

Operating Systems

Explore how operating systems manage hardware resources and provide services to applications.

Windows

Microsoft's flagship OS with GUI focus and broad software compatibility.

Latest Version: Windows 11

Linux

Open-source kernel powering many distributions (Ubuntu, Fedora, etc.).

Kernel Version: 6.x

macOS

Apple's Unix-based OS with tight hardware-software integration.

Latest Version: macOS Sonoma

Process Management

Process States

New, Ready, Running, Waiting, Terminated

Scheduling

Round Robin, Priority, Shortest Job First, Multilevel Queue

Threads

Lightweight processes sharing the same memory space

Memory Management

Paging

Divides memory into fixed-size blocks called pages

Segmentation

Divides memory into variable-sized logical segments

Virtual Memory

Uses disk space to extend available RAM

Learning Resources

Curated collection of resources to enhance your computer science journey.

Books

Essential reading materials for computer science fundamentals.

Explore Books

Videos

Video tutorials and lectures from industry experts.

Watch Videos

Interactive Labs

Hands-on coding exercises and virtual labs.

Start Practicing

CompTia A+ Certification Prep

Resources for professional certification exams.

Prepare Now