Computer Science Study

Learn Everything

Comprehensive learning materials covering all computer science topics from A-Z

Platform Overview

Welcome to the CS Study platform, a comprehensive resource for mastering computer science concepts.

From hardware fundamentals to advanced algorithms, this platform provides interactive learning materials to help you succeed.

Key Features

  • Interactive Topics & Quizzes
  • CompTIA A+ Preparation
  • Code Examples & Resources
Scroll Down

Computer Science Topics

Broad coverage of IT and computing fundamentals aligned with CompTIA A+ objectives.

Safety & Professionalism

Proper procedures, communication, and safety measures in IT environments.

Learn More

Visible Computer

Understanding the visible components of a computer system.

Learn More

CPU

Central Processing Unit architecture, features, and performance.

Learn More

RAM

Random Access Memory types, technologies, and configurations.

Learn More

Firmware

BIOS, UEFI, and firmware configuration settings.

Learn More

Motherboards

Form factors, components, and features of modern motherboards.

Learn More

Power Supplies

Power supply specifications, connectors, and troubleshooting.

Learn More

Mass Storage Technologies

HDDs, SSDs, NVMe, and other storage technologies.

Learn More

Implementing Mass Storage

RAID, partitioning, formatting, and storage implementation.

Learn More

Essential Peripherals

Keyboards, mice, monitors, and other essential peripherals.

Learn More

Installing & Upgrading OS

OS installation methods, requirements, and upgrade paths.

Learn More

Working with OS

Navigating and configuring operating system settings.

Learn More

Users, Groups & Permissions

User account management and permission systems.

Learn More

Maintaining & Optimizing OS

Performance tuning, maintenance tasks, and optimization.

Learn More

Command-Line Interface

Essential command-line tools and scripting.

Learn More

Troubleshooting OS

Diagnosing and resolving operating system issues.

Learn More

Display Technologies

Monitor types, resolutions, and display technologies.

Learn More

Essentials of Networking

Networking fundamentals, protocols, and models.

Learn More

Local Area Networking

LAN technologies, cabling, and network devices.

Learn More

Wireless Networking

Wi-Fi standards, security, and configuration.

Learn More

The Internet

Internet technologies, services, and protocols.

Learn More

Virtualization

Virtual machines, hypervisors, and cloud concepts.

Learn More

Portable Computing

Laptops, tablets, and mobile computing devices.

Learn More

Mobile Devices

Smartphones, tablets, and mobile operating systems.

Learn More

Securing Mobile Devices

Mobile device management and security practices.

Learn More

Printers & MFPs

Printer technologies, maintenance, and troubleshooting.

Learn More

Securing Computers

Security threats, malware protection, and best practices.

Learn More

Operating Procedures

IT documentation, change management, and best practices.

Learn More

Safety & Professionalism

Master the essential skills for maintaining safety, professionalism, and excellence in IT environments.

Study Outcomes

  • Apply correct ESD controls (strap/mat/bag handling) and explain why straps protect components (not people) from static.
  • Choose safe responses for electrical/fire hazards (CO2/dry powder for energized equipment; never water).
  • Document work professionally by separating symptoms, evidence, root cause, and verified resolution.
  • Explain confidentiality and ethics using least privilege, need-to-know, and chain of custody concepts.

Core Professional Skills

Professional Appearance

  • Dress appropriately for the environment
  • Maintain hygiene and a tidy presentation
  • Use calm, confident body language

Professional Conduct

  • Communicate clearly with users and stakeholders
  • Practice active listening and empathy
  • Be reliable: punctual, honest, and consistent

Technical Methodology

  • Use a structured troubleshooting process
  • Document changes and share knowledge
  • Keep skills current (tools, threats, platforms)

IT Professionalism Essentials

Communication Excellence

Verbal Communication

Master the art of technical translation by adapting your language to different audiences. For non-technical users, use simple analogies ("Think of RAM like a desk workspace - the bigger it is, the more projects you can have open at once"). For technical peers, be precise but concise. Always confirm understanding by asking follow-up questions like, "Does this make sense so far?" or "Would you like me to clarify any part of this?"

Written Communication
Professional writing follows the ABC principle: Accurate, Brief, Clear.
A strong ticket / runbook note includes:
  • Problem statement (symptoms, scope, impact)
  • Diagnosis (evidence and root cause)
  • Resolution (numbered steps + verification)
  • Prevention (follow-up actions and monitoring)
Status Reporting

Effective updates follow the 4P framework:

Progress

What changed since the last update (completed work and verified outcomes).

Problems

Current blockers, incidents, or risks (include impact and who is engaged).

Plan

Next steps with ETA and validation criteria (how you will confirm success).

Participation

What you need from others (approvals, access, user actions, or decisions).

Active Listening
Practice the LARA method for effective dialogue:
Listen without interrupting Acknowledge by paraphrasing Respond to emotional cues Ask clarifying questions

Safety & Environmental Protocols

ESD (Electrostatic Discharge)

Static electricity can damage components at as little as 10-30 volts, while humans often can't feel a discharge until around 3,000 volts.

  • Prevention: Use Antistatic Wrist Straps (connect to chassis ground) and Antistatic Mats.
  • Storage: Store components in Antistatic Bags (Shielding vs Dissipative).
  • Self-Grounding: Touch unpainted metal chassis before handling components if no strap is available.
  • Environment: Keep humidity around 50% to reduce static buildup.
Fire Safety

For energized electrical equipment, use a non-conductive extinguisher (typically CO2 or dry powder). In many US/Canada materials this is referred to as Class C; in the UK/EU “electrical” is usually treated as a risk category rather than a separate class—use an extinguisher rated/suitable for electrical equipment.

PASS Method: | Pull the pin | Aim at base | Squeeze lever | Sweep side to side
Power Protection
  • Surge/Spike: Sudden rise in voltage. Use Surge Protectors.
  • Sag/Brownout: Drop in voltage. Use UPS (Uninterruptible Power Supply).
  • Blackout: Complete power loss. Use UPS + Generator.
Common Hardware Hazards (Quick Reference)
Hazard Risk Best Practice
PSU capacitors Stored charge even when unplugged Do not open PSUs; unplug and wait before servicing a system
Laser printer fuser High heat; burn risk Allow cooldown; follow service manual handling steps
Lithium batteries Puncture/thermal runaway Replace swollen packs safely; recycle per local guidance
Trip/cable hazards Injury and equipment damage Route/secure cables; use covers and label runs
Environmental & Disposal

Follow MSDS / SDS (Safety Data Sheets) for chemical handling and disposal.

  • Batteries: Recycle (Li-ion risk of fire). Do not trash.
  • Toner Cartridges: Recycle or return to manufacturer.
  • CRTs: Hazardous (leaded glass/phosphor). Use specialized recycling.
Physical Safety

Lifting: Lift with legs, keep back straight. Weight limit awareness.
Cable Management: Prevent trip hazards using velcro/ties and floor covers.
Jewelry: Remove dangling jewelry/badges when working near moving parts (fans/printers).

IT Ethical Framework

Confidentiality

Protect: Customer data, passwords, and proprietary information. Privacy regulations (e.g., GDPR/UK GDPR, HIPAA) • Secure disposal • Need-to-know access

Integrity

Maintain: Truthful time reporting, accurate documentation, and transparent limitations. Disclose conflicts • Reject bribes • Credit others' work

Accountability

Own: Mistakes, system changes, and security incidents. Change logs • Incident reports • RCA documentation

Social Responsibility

Consider: Environmental impact, accessibility, and digital divide. E-waste recycling • Accessibility (WCAG) • Digital skills programs

Legal Compliance

Adhere to: Licensing, copyright, and regulatory requirements. Software licenses • Copyright/patents • Export controls

AI Ethics

Ensure: Algorithmic fairness, transparency, and human oversight. Bias testing • Transparency/explainability • Human-in-the-loop

Responsibility

Uphold: System reliability, data backups, and disaster recovery. Reliability targets • Backup verification • DR drills

Continuous Improvement

Pursue: Threat modeling, ethical hacking, and secure coding. CVE monitoring • OWASP training • Red team exercises

Professional Knowledge Check

What is the primary purpose of an ESD wrist strap?

When explaining technical issues to non-technical users, you should:

Professional Tip

Always carry a professional toolkit including:

  • ESD wrist strap
  • Multi-bit screwdriver
  • Flashlight
  • Network cable tester
  • Notepad and pen
  • USB diagnostic tools
  • Cable ties
  • Spare parts organizer

The Visible Computer

Understanding computer components, their connections, and how hardware and software work together.

Study Outcomes

  • Trace the basic flow: input → processing → memory/storage → output, and name the components involved.
  • Identify common connectors and what they carry (data/video/power), including the difference between a connector (USB‑C) and a protocol/speed (USB4/Thunderbolt).
  • Explain how apps reach hardware: APIs/system callskerneldrivers/firmware → devices.
  • Recognize filesystem/path differences across Windows/macOS/Linux (separators, case-sensitivity, permissions).

How Computers Work

Input

Process

Storage

Output

Processing Components

  • CPU: Central Processing Unit (general-purpose compute)
  • GPU: Graphics Processing Unit (parallel compute; graphics/compute workloads)
  • RAM: Volatile working memory (active programs/data)
  • Motherboard: Interconnect, chipset/I/O, and power distribution

Data Flow

Data moves through the system via buses and interfaces, with the CPU coordinating operations between components using electrical signals and binary code.

Power Conversion

The power supply converts AC to DC power at various voltages needed by different components.

Cables & Connectors

USB Standards & Speeds

Version Marketing Name Speed Connector
USB 2.0 High Speed 480 Mbps Type-A, Type-B, Mini, Micro
USB 3.2 Gen 1 SuperSpeed 5 Gbps Type-A, Type-B, Micro-B, Type-C
USB 3.2 Gen 2 SuperSpeed 10 Gbps Type-A, Type-C
USB 3.2 Gen 2x2 SuperSpeed 20 Gbps Type-C Only
USB4 USB4 20/40 Gbps Type-C Only
USB4 v2 USB4 Up to 80 Gbps Type-C Only
USB-C is a connector (not a speed). Check the negotiated features: data rate, USB PD power, and DisplayPort Alt Mode.

Video Interfaces

VGA (DE-15) Analog, Blue, 15-pin. Legacy.
DVI DVI-A (Analog), DVI-D (Digital), DVI-I (Integrated). Single/Dual Link.
HDMI Digital Audio/Video. Type A (Std), C (Mini), D (Micro).
DisplayPort Packet-based, Daisy-chaining support. MiniDP.

Network & Phone

  • RJ-45: Ethernet (8P8C modular connector).
  • RJ-11: Telephone/Modem (4-6 pins).

Storage & Data

  • SATA: Internal drive data (L-shape).
  • eSATA: External SATA (Shielded).
  • Thunderbolt: 1/2 (MiniDP), 3/4 (USB-C) up to 40 Gbps; Thunderbolt 5 up to 80/120 Gbps.
  • Lightning: Apple proprietary (Mobile).

Operating Systems

Core Functions

Process management and multitasking
Memory allocation and virtual memory
File system management
Security and access control
Device drivers and hardware abstraction

Common Features

Graphical Interface

Windows, icons, menus, and pointer (WIMP) with desktop metaphor

File Management

Hierarchical directory structure with file explorer

Networking

Built-in TCP/IP stack and network configuration tools

System Utilities

Disk management, task manager, and control panel

Major Operating Systems

Windows
macOS
Linux
Android
iOS
Server OS

Hardware Deep Dive

Motherboard
CPU
RAM
Storage
GPU
Cooling
PSU

Processor

  • Cores/threads: parallel execution units
  • Clock speed: GHz range (performance also depends on IPC)
  • Cache: L1/L2/L3 (low-latency memory)
  • ISA/architecture: x86-64, ARM64, and (in some ecosystems) RISC-V

Memory

  • Types: DDR4, DDR5, LPDDR
  • Capacity: GB to TB range (platform-dependent)
  • Speed: MT/s (effective) and latency
  • Volatile vs non-volatile: RAM vs storage

Storage

  • HDD: magnetic platters (high capacity, slower random I/O)
  • SSD: flash memory (fast random I/O)
  • NVMe: SSD protocol over PCIe (M.2/U.2/PCIe add-in)
  • Cloud: remote/object storage (latency/network dependent)

Graphics

  • Integrated: GPU on CPU/SoC (shared memory)
  • Discrete: dedicated GPU card (own VRAM)
  • VRAM: GPU memory (GDDR/HBM)
  • APU/SoC: CPU+GPU integrated package

Software Deep Dive

Applications
Utilities
Drivers
Middleware
Operating System

System Software

  • Operating system (kernel + user space)
  • Device drivers
  • Firmware (UEFI/BIOS, device firmware)
  • Utilities (backup, disk tools, monitoring)

Application Software

  • Productivity suites
  • Creative tools
  • Web browsers
  • Games

Cloud Services

  • SaaS: software delivered over the internet
  • PaaS: managed platform/runtime for apps
  • IaaS: virtual machines, networks, storage
  • Web apps: browser-based applications (often SaaS)

Development

  • Programming languages
  • IDEs/editors
  • Compilers/interpreters
  • Debuggers/profilers

How Software Interacts

  • Applications request resources via system calls and APIs
  • The OS manages hardware through drivers and firmware interfaces
  • Middleware provides shared services (runtimes, libraries, queues)
  • Virtual machines and containers abstract hardware and isolate workloads

File Systems & Paths

Windows

  • NTFS (permissions, journaling, large files)
  • FAT32 (legacy/compatibility; 4 GB file limit)
  • exFAT (flash/external drives; large files; cross-platform)
  • Paths: C:\Users\Name\File (typically case-insensitive)

macOS

  • APFS (default; snapshots/encryption support)
  • HFS+ (legacy)
  • Case-insensitive by default (case-sensitive volumes exist)
  • Paths: /Users/name/file

Linux

  • ext4 (common), XFS, Btrfs
  • Case-sensitive by default
  • Paths: /home/name/file

Mobile

  • Android: ext4/F2FS (flash-optimized)
  • iOS/iPadOS: APFS
  • Sandboxed apps with restricted file access
  • Cloud sync/integration (vendor and policy dependent)

Path Navigation

Absolute:
/home/user/docs/report.txt

Full path from root

Relative:
../images/photo.jpg

From current directory

Special paths: ~ (home), . (current), .. (parent)

User Interfaces

CLI
(1970s)
GUI
(1984)
Web
(1990s)
Touch
(2007)
Voice
(2010s)

CLI

Command Line Interface - text-based commands and parameters
Powerful for automation and repeatability

GUI

Graphical User Interface - visual controls (windows/icons/menus)
Fast discovery and accessibility for many tasks

Touch

Direct manipulation via gestures (tap, swipe, pinch)
Great for mobile and kiosks

Voice/NUI

Natural user interfaces using speech recognition
Hands-free operation and accessibility
Modern UI Example:

Windows 11 combines GUI (windows/menus) with touch (gestures), voice access/dictation, and CLI (PowerShell/WSL) for versatile interaction.

CPU (Central Processing Unit)

The brain of the computer that performs calculations and executes instructions.

Study Outcomes

  • Distinguish ISA (x86‑64/ARM64/RISC‑V) from microarchitecture (pipelines, caches, branch prediction) and why both affect compatibility and performance.
  • Describe the boot path from reset → firmware → bootloader → kernel and where POST/boot errors show up.
  • Explain real-world performance drivers: single vs multi-thread, cache/memory latency, sustained power/thermals, and I/O limits.

Conceptual Overview & History

Evolution of CPUs

From vacuum tubes in the 1940s to today's nanometer-scale transistors, CPUs have evolved dramatically.

1947: First transistor invented at Bell Labs
1971: Intel 4004 - First commercial microprocessor (4-bit, 740kHz)
1985: 32-bit processors emerge (Intel 80386)
2005: Multi-core processors become standard
2020s: 3-5nm process nodes with hybrid architectures

CPU Architectures

x86 : Intel/AMD desktop CPUs
ARM : Mobile/Apple M-series
MIPS : Embedded systems
RISC-V : Open-source architecture
Key Differences
  • CISC (x86): Complex instructions, variable length
  • RISC (ARM/MIPS): Simplified instructions, fixed length
  • Endianness : Byte ordering (Big-Endian vs Little-Endian)

CPU Core Components

ALU (Arithmetic Logic Unit)

Performs all arithmetic and logical operations including:

  • Integer arithmetic (add, subtract, multiply)
  • Bitwise operations (AND, OR, NOT, XOR)
  • Comparisons (greater than, equal to)
  • Shift/rotate operations
Modern ALUs often include FPUs (Floating Point Units)

Control Unit

The conductor of the CPU orchestra:

  • Manages fetch-decode-execute cycle
  • Generates control signals for all components
  • Handles interrupts and exceptions
  • Coordinates pipeline stages
Uses microcode for complex instruction handling

Registers & Cache

PC (Program Counter) Next instruction address
IR (Instruction Register) Current instruction
MAR (Memory Address) Address for memory access
MDR (Memory Data) Data being read/written
General Purpose Temporary data storage
Register access: 0.5-1ns vs RAM: 80-100ns

The Full Cycle: From Boot to Browser

1. Power On & Reset Vector

On x86, the CPU starts at the reset vector mapped to firmware (commonly physical 0xFFFFFFF0). In legacy real-mode terms this corresponds to CS:IP = F000:FFF0 (linear 0xFFFF0). The PSU Power Good signal releases reset so this first fetch can occur.

PC set to reset vector
ROM mapped to address space

2. POST (Power-On Self-Test)

CPU executes BIOS/UEFI firmware to:

  • Test RAM (write/read patterns)
  • Initialize hardware (PCIe enumeration)
  • Set up interrupt vectors
  • Build ACPI tables
Control Unit manages tests
Buses verified

3. Bootloader Execution

CPU loads bootloader via these steps:

  1. Firmware selects a boot target (boot order / UEFI Boot Manager)
  2. Legacy BIOS: loads MBR to 0x7C00; UEFI: loads an EFI bootloader from the ESP
  3. Bootloader initializes CPU/memory state (e.g., protected/long mode)
  4. Loads kernel (and initramfs if used) and hands off control
MAR/MDR used for transfers
DMA may assist

4. OS Initialization

CPU executes kernel startup:

  • Initializes memory management (paging)
  • Sets up IDT/GDT (interrupt descriptors)
  • Starts scheduler and processes
  • Loads drivers via ACPI
MMU activated
Timers configured

5. Browser Launch (Simplified)

When you click a browser icon:

  1. Shell makes exec() system call
  2. CPU switches to kernel mode
  3. MMU maps executable into memory
  4. Dynamic linker loads libraries
  5. CPU begins executing browser code
  6. Multiple threads created for UI/network
Branch Prediction
Cache Hierarchy
Pipelining

Memory Context & Buses

Buses & Interconnects

Address Bus

Carries memory addresses from CPU to memory devices. Width sets a theoretical address space; real limits also depend on the memory controller, chipset/firmware mapping, and OS.

32-bit : 4 GiB address space (often less usable due to device mapping; PAE can extend physical addressing on some systems)
64-bit : theoretical 16 EiB (practical limits are much lower and platform-specific)
Data Bus

Transfers actual data between CPU and memory. Modern systems use 64-bit wide buses.

Control Bus

Carries signals like:

READ
WRITE
IRQ
RESET
CLK
WAIT

Memory Hierarchy

Registers
1 cycle PC, IR, MAR, MDR
L1 Cache
~4 cycles 64KB/core
L2 Cache
~12 cycles 256KB-1MB
L3 Cache
~30 cycles 8-32MB shared
RAM
~100 cycles DDR4/DDR5

Clock Cycles & Pipelining

Clock Cycle Breakdown

Clock Speed 2.5GHz - 5.8GHz
CPI (Cycles/Instruction) 0.25-10 (depends on workload and microarchitecture)
IPC (Instructions/Cycle) Up to 4-6 (modern CPUs)
Superscalar Execution

Modern CPUs can execute multiple instructions per cycle through:

  • Multiple ALUs
  • Out-of-order execution
  • Speculative execution

Instruction Pipeline

Modern CPUs use deep pipelines (15-20 stages) to overlap execution:

Fetch
Decode
Rename
Schedule
Execute
Memory
Bypass
Writeback
Retire
Hazards & Solutions
Structural : More units
Data : Forwarding
Control : Prediction

Modern CPU Technologies

Multi-Core & Hybrid

Modern approaches to parallelism:

  • P-cores : High performance (Intel Golden Cove)
  • E-cores : Power efficiency (Intel Gracemont)
  • SMT : Hyper-Threading (2 threads/core)
  • ccNUMA : Non-uniform memory access
Apple M1: 4P + 4E cores, Intel Alder Lake: 8P + 8E

Process Nodes

1971: 10 µm Intel 4004
2000: 180nm Pentium 4
2020: 7nm AMD Zen 3
2023: 3nm Apple A17 Pro
Node names are now marketing (e.g., Intel 7 isn't the same as TSMC 7nm)

Advanced Features

SIMD : AVX2/AVX-512, NEON
Virtualization : VT-x/VT-d, AMD-V/IOMMU
AI : AMX (where present), on-chip NPUs (some SoCs)
Security : memory encryption/TEEs (e.g., SEV), control-flow protections
Power : DVFS, C-states
Memory : ECC, TRR
SIMD : Single Instruction Multiple Data

Selecting a CPU

Socket Compatibility

Intel : LGA1700, LGA1851
AMD : AM5, sTRX4

Check chipset support (Z790 vs B650) and BIOS requirements.

Performance Needs

Gaming : Clock speed
Editing : Cores
Servers : ECC
What Actually Determines CPU Speed
  • Single-thread: boost clocks + IPC + cache + memory latency (common for games/UI).
  • Multi-thread: real core count + sustained power/thermals (builds, rendering, encoding).
  • Platform: PCIe lanes/gen, iGPU needs, and memory support (DDR4/DDR5, channels).
  • Stability: aggressive boosts and memory OC can trade performance for crashes.

Thermal Considerations

TDP : 65W-350W Cooling : Air/Liquid

Match cooling to sustained power limits: many high-end CPUs benefit from large tower air coolers or 240mm+ AIOs for consistent boost clocks.

Installation & Troubleshooting

Installation Issues

Bent pins (LGA)
Paste application
Pressure uneven
Power connectors

Overheating Symptoms

Throttling
Shutdowns
BSODs
Instability

Catastrophic Failures

No POST
Burning
Damage

May require motherboard replacement if socket damaged.

Developer Perspective

Optimization Techniques

Cache Optimization
  • Structure of Arrays vs Array of Structures
  • Prefetching patterns
  • Alignment to cache lines (64B)
Parallelism
  • Thread affinity/pinning
  • False sharing avoidance
  • Vectorization (SIMD)

Benchmarking & Analysis

Performance Counters
L1/L2/L3 cache misses
Branch mispredictions
IPC (Instructions/Cycle)
CPI (Cycles/Instruction)
Tools
perf (Linux)
VTune (Intel)
AMD uProf
LLVM-MCA

Acronym Key

ALU : Arithmetic Logic Unit
PC : Program Counter
IR : Instruction Register
MAR : Memory Address Register
MDR : Memory Data Register
SIMD : Single Instruction Multiple Data
IPC : Instructions Per Cycle
CPI : Cycles Per Instruction
MMU : Memory Management Unit
TDP : Thermal Design Power
SMT : Simultaneous Multithreading
ccNUMA : Cache-Coherent Non-Uniform Memory Access

Knowledge Check

What is the purpose of the CPU's MAR register?

RAM (Random Access Memory)

Temporary storage that the CPU uses to store data that is actively being worked on.

Study Outcomes

  • Explain why RAM is volatile, and distinguish DRAM (system memory) from SRAM (CPU caches).
  • Choose compatible modules (DDR generation, form factor, capacity) and describe how channels, MT/s, and timings affect performance.
  • Troubleshoot instability with a repeatable flow: reseat → single-stick tests → diagnostics → configuration (XMP/EXPO) → replace.

Conceptual Understanding

How RAM Works

RAM is volatile memory that provides fast temporary storage for data being actively used by the CPU.

DRAM (Dynamic RAM)

Needs constant refreshing, used for main system memory.

SRAM (Static RAM)

Faster but more expensive, used for CPU cache.

Memory Hierarchy
CPU Registers (Fastest)
CPU Cache (SRAM)
Main Memory (DRAM)
Storage (SSD/HDD)

RAM Evolution

RAM Generations Timeline

SDRAM (1993)

Synchronous DRAM, first to sync with system bus

DDR (2000)

Double Data Rate, 2x transfer rate

DDR2 (2003)

Higher speeds, lower power

DDR3 (2007)

Higher bandwidth, 1.5V standard

DDR4 (2014)

Higher density, 1.2V standard

DDR5 (2020)

Higher bandwidth and density; on-die ECC (internal reliability, not the same as system ECC)

Visual Comparison

DDR3 240-pin
DDR4 288-pin
DDR5 288-pin (different notch)
DDR3
DDR4
DDR5
Future

RAM Modules & Form Factors

DIMM (Desktop RAM)

Dual In-line Memory Modules used in desktop computers and servers.

Length

133.35mm

Pins

288 (DDR4/DDR5)

SO-DIMM (Laptop RAM)

Small Outline DIMMs used in laptops and compact systems.

Length

67.6mm

Pins

260 (DDR4), 262 (DDR5)

Performance Metrics

Capacity

Minimum 4GB
Standard 16GB
High-End 128GB+

Speed

DDR4 2133-3200 MT/s
DDR5 4800-6400+ MT/s

Latency

CAS Latency CL16-CL40
Impact Lower = Better

Speed vs Latency (MT/s, MHz, and CAS)

DDR memory is usually advertised in MT/s (mega transfers per second). The underlying clock is about half of that (MHz). A practical quick-estimate for first-word CAS latency is:

tCL (ns) ~ (CL * 2000) / MT/s
Example Approx. CAS latency Takeaway
DDR4-3200 CL16 ~10 ns Balanced for many desktops
DDR5-6000 CL30 ~10 ns Higher bandwidth at similar first-word latency

Installation & Troubleshooting

Installation Best Practices

Dual-Channel Architecture

Install pairs in matching colored slots (usually 2 & 4) to double bandwidth (128-bit path).

Compatibility

Do not mix speeds (system slows to lowest). Do not mix ECC and Non-ECC.

Physical Install
  • Align notch (keying prevents backward install).
  • Apply firm pressure until side clips snap.
  • Laptop (SO-DIMM): Insert at roughly 302 456, then push down until the side clips engage.

Troubleshooting RAM

Beep Codes

Continuous beeps or specific patterns (check motherboard manual) indicate RAM failure or missing RAM.

Reseating

Remove and reinstall modules. Oxidation or loose connection is a common cause of failure.

Diagnostics

Use Windows Memory Diagnostic or MemTest86 to check for address errors.

System Behavior

Random BSODs, freezing, or "Page Fault" errors often point to bad RAM.

Do You Need More RAM?

Signs You Need More

Frequent slowdowns with multiple apps
Excessive disk activity (thrashing)
Applications crashing unexpectedly
Task manager shows high RAM usage

Recommended Amounts

Basic Use

8GB

Office Work

16GB

Gaming

16-32GB

Content Creation

32GB+

RAM Configurations

Single Channel

Basic configuration with one RAM stick

64-bit bus

Dual Channel

Two identical sticks for 128-bit bus

64-bit
64-bit

Quad Channel

High-end systems with four sticks

64-bit
64-bit
64-bit
64-bit

Troubleshooting RAM Issues

Common Problems

No Boot/Beep Codes

Check seating, try one stick at a time

BSOD/Crashes

Run memory diagnostics (Windows: mdsched.exe)

Underperforming

Verify running at correct speed in BIOS

Compatibility Checks

Motherboard supports RAM type (DDR4/DDR5)
Speed supported by CPU/motherboard
Maximum capacity per slot/channel
For dual/quad channel: use identical sticks

RAM Knowledge

ECC vs Non-ECC

ECC (Error Correcting Code) RAM uses extra bits to detect and correct memory errors (typically single-bit correction). It requires support from the CPU + motherboard. Note: DDR5 “on-die ECC” improves chip reliability but is not the same as full system ECC.

Registered (Buffered) RAM

Contains a register between RAM and memory controller for stability with large amounts of RAM.

XMP Profiles

XMP (Intel) and EXPO (AMD) are one-click memory profiles. They can improve performance, but they are still overclocks relative to JEDEC defaults—if unstable, drop speed, relax timings, or use a validated kit from the motherboard QVL.

Knowledge Check

What type of memory is volatile and loses data when power is removed?

Firmware Ecosystem

The foundational layer controlling hardware initialization, system configuration, and secure boot processes across all computing platforms.

Study Outcomes

  • Compare BIOS vs UEFI (boot methods, ESP, Secure Boot/CSM) and explain the firmware → OS handoff.
  • Configure core settings safely: boot order, virtualization extensions, TPM/Secure Boot, and recovery options.
  • Perform firmware updates with risk controls: correct image, stable power, recovery path, and post-update validation.
Windows Linux macOS Enterprise

Core Firmware Components

BIOS/UEFI

System firmware that initializes hardware and boots the OS.

Manages hardware abstraction
Secure Boot implementation
Power management

CMOS/RTC

Real-time clock (RTC) plus battery-backed state. Modern systems typically store most firmware settings in UEFI NVRAM within flash; the battery mainly preserves time when power is removed.

Typically CR2032 battery
Clearing CMOS resets configuration to defaults (jumper/button or battery removal)
Maintains date/time

POST Process

Power-On Self-Test verifies hardware before boot.

Beep codes for errors
Video test sequence
Hardware verification

Boot Process Flow

Power On

CPU Init

RAM Test

Device Enum

Bootloader

Consumer Boot

UEFI -> Boot Manager -> Windows Boot Manager (bootmgfw.efi) or GRUB2 (Linux)

Enterprise PXE Boot

UEFI -> iPXE -> DHCP -> TFTP -> WDS/SCCM (Windows) or Cobbler (Linux)

BIOS/UEFI Configuration

Keyboard Communication

PS/2 vs USB initialization, legacy support, NKRO (N-Key Rollover) settings

CMOS & Setup Utility

Access methods (DEL, F2, F12), navigation, hierarchy structure

Security Settings

  • Secure Boot (Microsoft, Custom, Other OS)
  • TPM 2.0/1.2 configuration
  • Boot password protection
  • Intel TXT/AMD PSP features

Save & Exit Options

Save profiles, discard changes, boot override, secure flash validation

POST & Boot Process

Beep/Error Codes

AMI, Award, Phoenix, IBM, Dell proprietary codes

1-3-1 : RAM error
2-2-3 : ROM error
1 long : POST passed
Continuous : Power issue

POST Cards & Debug

PCIe/ISA debug cards, port 80h readouts, OEM-specific LEDs

SuperMicro: BMC debug headers, ASUS: Q-Code displays

PXE Boot Process

  1. DHCP discovery
  2. TFTP download of NBP (Network Bootstrap Program)
  3. UNDI network stack initialization
  4. OS loader/image download (often HTTP, SMB, NFS, or iSCSI after initial TFTP)

Firmware Maintenance

CMOS Management

  • Clearing CMOS via jumper/battery removal
  • RTC (Real-Time Clock) drift compensation
  • NVRAM corruption recovery
  • Battery voltage thresholds (typically 2.7-3.3V)

Flashing Procedures

  • In-system programming (ISP) methods
  • Recovery modes (ASUS CrashFree, Gigabyte DualBIOS)
  • Dell/HPE/Lenovo vendor-specific tools
  • Supermicro IPMI flash updates

Security Best Practices

  • Regular firmware updates (quarterly review)
  • Secure flash validation (checksums, signatures)
  • Disabling unused features (Legacy ROM, CSM)
  • Physical write-protection when appropriate
Platform Windows Tools Linux Tools macOS Tools Enterprise Methods
ASUS AI Suite, EZ Flash fwupd (where supported), vendor utilities N/A ASUS Control Center
Supermicro SUM (Supermicro Update Manager) ipmitool, vendor bundles N/A IPMI/BMC web interface
Dell Dell Command Update fwupd, dsu N/A iDRAC, OpenManage
Apple N/A N/A Software Update (firmware bundled with OS updates) MDM-managed updates

Enterprise Firmware Management

Server Platform Firmware

IPMI/BMC Features
  • KVM over IP (Keyboard-Video-Mouse)
  • Serial over LAN (SOL)
  • SEL (System Event Log) monitoring
  • FRU (Field Replaceable Unit) inventory
Blade Server Considerations

Chassis-level firmware vs blade-level firmware, interposer modules, management module updates

Network Deployment

PXE Infrastructure
  • DHCP options (66/67 for boot server)
  • TFTP vs HTTP boot
  • UEFI HTTP Boot (RFC 7230)
  • iSCSI SAN booting
Centralized Management

Dell OpenManage, HPE OneView, Lenovo XClarity, Cisco UCS Manager

Most solutions support firmware baselines and staged rollouts

Vendor Comparison

Vendor Management Interface Firmware Update Method Unique Features
Supermicro IPMI 2.0, Redfish SUM, SMCIPMITool SMBIOS/DMI customization options
ASUS Server ASMB (ASUS Server Management Board) ASUS Control Center TPM provisioning support (platform-dependent)
Dell PowerEdge iDRAC (Dell Remote Access Controller) Dell Repository Manager Rollback protection
HPE ProLiant iLO (Integrated Lights-Out) Service Pack for ProLiant Silicon Root of Trust

Motherboard Guide

The foundation of every computing system - from desktops to enterprise servers

Study Outcomes

  • Identify major motherboard parts (socket, chipset, VRM, slots/headers) and what each controls.
  • Match compatibility requirements (case form factor, CPU socket, RAM type, PCIe lanes, storage options).
  • Use POST/LED/Q-code and minimal boot testing to isolate board vs PSU vs RAM vs CPU problems.

Motherboard Architecture

PCB Layers

2-Layer Basic Systems
4-Layer Standard Desktops
6+ Layer Servers/High-End

Form Factors

ATX (Standard Desktop)
Micro-ATX (Compact)
E-ATX (Server)
Blade (Modular Server)
CPU RAM PCIe Slots Chipset I/O

Key Specifications

Socket Type Platform-dependent (e.g., AM5, LGA)
RAM Support DDR4 or DDR5 (board/platform)
PCIe Version 4.0/5.0 (depends on CPU/chipset and slot wiring)
Storage Options M.2 (NVMe/SATA), SATA

Desktop Components

CPU Socket

LGA, AM4/5, PGA

RAM Slots

2-4 DIMMs

PCIe Slots

x16, x8, x4, x1

Storage

M.2, SATA

Power

24-pin + 8-pin

Networking

1G/2.5G Ethernet

Server Components

CPU Sockets

Dual/Quad Socket

RAM Capacity

8-16 DIMMs, ECC

Remote Mgmt

IPMI, iDRAC

Hot-Swap

Drives, PSUs

Power

Dual PSUs

Networking

10G/25G/40G

Expansion Bus Architecture

PCI (Legacy)

133 MB/s max
Shared bandwidth
32-bit parallel

PCI Express

Bandwidth scales with lanes: x1 is ~1 GB/s (PCIe 3.0) or ~4 GB/s (PCIe 5.0) each direction; x16 multiplies by 16.
Dedicated lanes
Serial point-to-point
PCI PCIe 3.0 PCIe 5.0 133 MB/s 1 GB/s 4 GB/s

Headers & Connectors

Front Panel (JFP1)

Connects case buttons and LEDs. Polarity matters for LEDs (+/-).

Power SW Reset SW HDD LED Power LED

Internal USB

  • USB 2.0: 9-pin header (Double row, one missing pin).
  • USB 3.x: 19-pin (20-1) header (often blue, larger).
  • USB-C: USB Type-E front-panel header.

Fan Headers

  • 3-Pin: DC Control (Voltage regulation).
  • 4-Pin: PWM (Pulse Width Modulation) - Constant 12V, speed signal.
  • CPU_FAN: Critical header (System may not boot if empty).

M.2 Slots (NVMe/SATA)

  • Keys: Most SSDs use M-key (NVMe). Some boards support B/B+M SATA M.2 in specific slots.
  • Sizes: 2230/2242/2260/2280/22110 (width/length in mm).
  • Lane sharing: Installing an M.2 drive may disable certain SATA ports or reduce PCIe slot lanes (check manual).

Audio, RGB, TPM & Misc.

  • HD_AUDIO: Front-panel headphone/mic header (not the same as USB).
  • RGB/ARGB: 12V 4-pin (RGB) vs 5V 3-pin (ARGB) — never mix them.
  • TPM: Many systems use firmware TPM (fTPM/PTT); some boards also provide a TPM header/module support.

Installation & Troubleshooting

Standoffs

CRITICAL: Ensure standoffs match mounting holes. Extra standoffs cause short circuits.

I/O Shield

Install before the motherboard. Watch for metal tabs grounding into ports.

Common Issues

  • No Power: Verify PSU switch, 24-pin ATX + CPU EPS (4+4/8-pin), and Front Panel "Power SW".
  • No POST/Boot Loop: Reseat RAM (try one stick in the recommended slot), GPU, and CPU power; clear CMOS if needed.
  • Short Circuit: Check standoffs/loose screws, and that the board isn’t contacting the case.
  • Debug LEDs/Codes: Use Q-LED/POST code display/speaker beeps to identify CPU/RAM/VGA/BOOT failures.

Minimal POST (“Breadboard”)

If troubleshooting, test outside the case with CPU + cooler, 1 RAM stick, PSU, and (if required) GPU—then add parts back one at a time.

Knowledge Check

Which motherboard component handles CPU to RAM communication?

What's the main advantage of PCIe over PCI?

Which is NOT a server motherboard feature?

What should you check first if a new motherboard won't POST?

Power Supply Unit (PSU) Complete Coverage

Comprehensive guide to AC/DC power conversion, distribution, and management for all computing environments

Study Outcomes

  • Size a PSU with realistic load + headroom and interpret efficiency ratings (80 PLUS) correctly (efficiency 3 power quality).
  • Identify connectors (24‑pin ATX, EPS CPU, PCIe, SATA) and explain why mixing modular cables across PSU brands is unsafe.
  • Troubleshoot power symptoms (no POST, random resets, overheating) and choose surge protection vs UPS.

Power Supply Fundamentals

Basic Function

  • Converting AC (Alternating Current) to DC (Direct Current)
  • Voltage regulation and filtering
  • Power distribution to components
  • Electrical safety and protection

Power Sources

  • Wall outlet AC power (commonly 100-120V or 200-240V depending on region)
  • UPS (Uninterruptible Power Supply)
  • Battery backup systems
  • Solar/alternative power integration

Quick Reference

80 PLUS (Efficiency) Efficiency
White Entry-level
Bronze Better
Silver Better
Gold Common sweet spot
Platinum High efficiency
Titanium Highest (includes 10% load)
Ratings vary by test standard and input voltage; check the PSU's certification report and efficiency curve.
Form Factors Size
ATX Standard
SFX Small
TFX Thin
FlexATX Compact

Desktop Form Factors

  • ATX (Advanced Technology eXtended) - Standard
  • SFX (Small Form Factor) - Compact
  • TFX (Thin Form Factor) - Low-profile
  • FlexATX - very compact/low-profile cases

Server/Enterprise

  • Redundant power supplies (N+1, 2N)
  • Hot-swap capabilities
  • 1U/2U rack-mount formats
  • Blade server power modules
  • High-efficiency standards (80+ Titanium)

Power Requirements

Component Power Draw

  • CPU (TDP - Thermal Design Power)
  • GPU (Peak vs sustained)
  • Storage devices
  • RAM and motherboard

Calculation Methods

  • Online PSU calculators
  • Manual wattage estimation
  • 20-30% headroom for boosts/transients and upgrades

PSU Specifications & Technologies

Wattage & Rails

Continuous rating Prefer continuous
12V distribution Single vs multi-rail
  • +12V (CPU/GPU)
  • +5V (storage)
  • +3.3V (motherboard)
  • -12V (legacy)
  • Modern GPUs can draw short transients; ATX 3.x PSUs are designed to handle higher spikes without shutdown.

Protection Features

OVP
Over-Voltage
UVP
Under-Voltage
OCP
Over-Current
OTP
Over-Temp
OPP
Over-Power
SCP
Short Circuit

Cooling & PFC

Active vs passive Fan curves
PFC (Power Factor Correction) Active > Passive
Fan bearing types: Fluid Dynamic, Rifle, Ball
Active PFC improves power factor and reduces input current for a given load

Connectors & Cables

24-pin ATX

Main motherboard power

4+4-pin EPS

CPU power

6+2-pin PCIe

GPU power

12VHPWR / 12V-2x6

Newer high-power GPUs (use proper seating; avoid sharp cable bends)

SATA

Storage devices

Molex

Legacy peripherals

Berg

Rare legacy (floppy)

Modular vs non-modular designs
Cable length considerations (case-dependent)

Installation & Troubleshooting

Installation

  • Fan Orientation: Fan should face intake vent (usually bottom).
  • Modular Cables: Only use cables provided with the PSU (Pinouts vary!).

Troubleshooting

  • Paperclip Test: Jump Green (PS_ON) to Black (COM) to test if PSU turns on.
  • Multimeter: Check rails under load when possible (Yellow=+12V, Red=+5V, Orange=+3.3V, Purple=+5VSB). Typical tolerances: +12/+5/+3.3/5VSB +/- 5%; -12V +/- 10%.
  • Symptoms: Random reboots/shutdowns (PWR_OK/Power Good drop), coil whine, burning smell, fan not spinning, or GPU power connector overheating.
  • Note: A paperclip test only proves the PSU can start; it does not prove voltage regulation is stable under real load.

Safety

NEVER open a PSU. Capacitors hold lethal charge even when unplugged.

Enterprise & Server Power Systems

Redundancy

  • N+1 configuration
  • 2N full redundancy
  • Hot-swap capabilities
  • Failover testing

PDU (Power Distribution Unit)

  • Basic vs metered
  • Switched PDUs
  • 208V vs 240V
  • Remote management

UPS (Uninterruptible Power Supply)

  • Online vs line-interactive
  • Runtime calculations
  • SNMP monitoring
  • Generator integration

Remote Power Management

  • IPMI/iLO/iDRAC power control
  • Safe shutdown via UPS/agents
  • Wake-on-LAN (WoL)
  • PXE can be paired with remote power for hands-off provisioning

Testing & Diagnostics

Basic Methods

  • Paper clip test (PSU standalone)
  • Multimeter voltage testing
  • Boot/stability checks under load

Advanced Diagnostics

  • PSU load testers
  • Oscilloscope ripple testing
  • Thermal imaging

Troubleshooting

No Power

  • Verify PSU switch position
  • Test wall outlet
  • Check cable connections

Intermittent Issues

  • Temperature-related
  • Load-dependent failures
  • Capacitor aging

Mass Storage Technologies

Devices and technologies for long-term data storage

Study Outcomes

  • Compare HDD vs SSD vs NVMe using latency, IOPS, sequential throughput, and endurance (TBW/DWPD).
  • Explain SATA vs PCIe/NVMe and how form factors (2.5, M.2) relate to protocols.
  • Use drive health signals (SMART, wear indicators) to decide when to back up, clone, or replace.

History & Evolution

Mass storage began with magnetic tape in the 1950s, evolving through hard disk drives (HDDs) in 1956, optical storage (CDs/DVDs) in the 1980s, and solid-state drives (SSDs) in the 2000s.

1950s: Magnetic Tape
1956: First HDD (IBM 350)
1982: CD-ROM
2007: First Consumer SSDs
Tape HDD Optical SSD

How Hard Drives Work

HDDs store data on spinning magnetic platters with read/write heads that move across the surface.

Platters

Stacked magnetic disks that spin at 5400-15000 RPM

Actuator Arm

Moves read/write heads across platter surfaces

Sectors

512-byte or 4K segments where data is stored (Advanced Format: 512e/4Kn)

Tracks & Cylinders

Data is arranged in concentric tracks; a cylinder is the set of tracks at the same radius across platters.

Latency Sources

Seek time + rotational latency dominate random I/O; sequential reads/writes are much faster.

Hard Disk Drive (HDD) Diagram

How SSDs Work (NAND + Controller)

SSDs store data in NAND flash cells. A controller translates logical blocks into physical pages/blocks using a Flash Translation Layer (FTL), spreading writes to reduce wear.

Controller + FTL

Maps LBAs to flash pages, manages wear leveling, bad blocks, and error correction.

TRIM + Garbage Collection

TRIM tells the SSD which blocks are no longer in use so it can clean them in the background and keep write performance steady.

Endurance

Measured as TBW (total bytes written) or DWPD (drive writes per day). More writes and higher temps reduce lifespan.

NAND Types (Typical Tradeoffs)

Type Bits/cell Common Use Tradeoff
SLC 1 Enterprise/cache Fastest/most durable, expensive
TLC 3 Mainstream SSDs Good balance of cost, speed, endurance
QLC 4 Budget/high capacity Lower endurance; slow sustained writes when cache fills
Many consumer drives use an SLC write-cache (pseudo-SLC). Benchmarks can drop sharply on long writes once that cache is full.

Storage Comparison

Hard Disk Drives (HDD)

Technology: Magnetic
Speed: 120-250 MB/s
Capacity: 500GB-20TB
Durability: Mechanical wear; sensitive to shock/heat (life depends on workload, vibration, and temperature)
Cost: Lowest cost per TB

Solid State Drives (SSD)

Technology: Flash Memory
Speed: 500-14000+ MB/s
Capacity: 120GB-8TB
Durability: 5-10+ years (endurance-dependent)
Cost: Higher cost per TB

Connection Interfaces

SATA III

Standard for 2.5" SSDs and HDDs.

Speed: 6 Gbps (~600 MB/s raw)

NVMe (M.2)

Uses PCIe lanes. Direct CPU connection.

Speed: 3500-14000+ MB/s

M.2 Keys

Notch positions prevent wrong install.

Types: B-Key (SATA/PCIe x2), M-Key (PCIe x4)

Legacy

Older standards found in retro systems.

Types: PATA (IDE), SCSI

RAID Levels

RAID 0 (Striping)

High Speed

Splits data evenly across two or more disks.

  • Performance: High (Read/Write)
  • Fault Tolerance: None (0)
  • Min Drives: 2

RAID 1 (Mirroring)

High Safety

Exact copy of data on two or more disks.

  • Performance: Good Read, Slow Write
  • Fault Tolerance: High (1 drive failure)
  • Min Drives: 2

RAID 5 (Striping + Parity)

Balanced

Stripes data and parity across all drives.

  • Performance: Good Read, Slow Write (Parity calc)
  • Fault Tolerance: Yes (1 drive failure)
  • Min Drives: 3

RAID 6 (Striping + Dual Parity)

Safer Parity

Like RAID 5, but stores two parity blocks so two drives can fail.

  • Performance: Good Read, Slower Write (more parity)
  • Fault Tolerance: Yes (2 drive failures)
  • Min Drives: 4

RAID 10 (1+0)

Best of Both

Stripe of Mirrors. Combines speed and redundancy.

  • Performance: High
  • Fault Tolerance: High (1 drive per mirror)
  • Min Drives: 4
RAID improves availability, not data safety. It does not protect against accidental deletion, ransomware, corruption, or fire - you still need backups.

RAID Implementation Types

Hardware RAID

Dedicated controller with processor and cache

Software RAID

OS-managed with CPU overhead

Dedicated RAID Boxes

External enclosures with RAID support

RAID Disk 1 Disk 2 Disk 3

Drive Installation & Troubleshooting

Installation Checklist

Power & Data: Ensure both cables are seated (SATA).
M.2 Standoff: Use correct height to avoid bending.
BIOS Mode: Set SATA to AHCI (not IDE/RAID) for SSDs.
Boot Order: Set new OS drive as primary boot device.

Common Issues

Boot Device Not Found: Check cables, boot order, or MBR/GPT mismatch.
Slow Performance: Check for full drive (keep 10-20% free) or enable TRIM.
Clicking Noise: Mechanical failure imminent (HDD). Backup immediately!
S.M.A.R.T. Errors: Self-Monitoring Analysis and Reporting Technology warning. Replace drive.

Implementing Mass Storage

Techniques for configuring and managing storage devices

Study Outcomes

  • Choose MBR vs GPT based on boot mode (BIOS/UEFI), disk size limits, and partitioning needs.
  • Explain how partitioning differs from formatting, and pick file systems (NTFS/exFAT/ext4/APFS) based on features and compatibility.
  • Apply reliability fundamentals: backups/restore testing, monitoring (SMART), and SSD care (TRIM and free-space headroom).

Partitioning Systems

MBR (Master Boot Record)

  • Legacy system (since 1983)
  • Max 4 primary partitions (or 3 + extended)
  • ~2 TiB disk limit (with 512-byte sectors)
  • Stores boot code in first sector

GPT (GUID Partition Table)

  • Modern standard (UEFI for booting on most PCs)
  • 128 partitions by default (Windows)
  • ~9.4 ZB max size (with 512-byte sectors)
  • CRC32 checksums for integrity

File Systems

Windows File Systems

FAT32

Compatible but limited (4GB file size)

Max Volume: 2TB (Win format tool ~32GB)
NTFS

Windows standard with security features

Max File: Very large (practically multi-TB+; depends on cluster size and implementation)
exFAT

Optimized for flash storage

Max File: 16EB
ReFS (Resilient File System)

Used mainly on Windows Server and some Storage Spaces scenarios. Designed for resilience against corruption and large volumes; not typically used as a boot file system on consumer Windows installs.

Other OS File Systems

HFS+ / APFS macOS (Legacy / Current)
ext3 / ext4 Linux Standard
XFS Linux (common for large filesystems)
Btrfs Linux (snapshots, checksums)
ZFS Advanced storage (checksums, snapshots)

Network & Optical

SMB / CIFS Windows file sharing (cross-platform)
NFS Network File System (Linux)
iSCSI Block storage over IP (SAN)
CDFS / UDF Optical Media (CD/DVD/Blu-ray)

Partitioning Tools

Windows Tools

Disk Management

Built-in tool for basic partitioning

DiskPart

Command-line utility

Third-party Tools

EaseUS, MiniTool, AOMEI

Linux Tools

fdisk/gdisk

Command-line partitioning

GParted

Graphical partition editor

LVM

Logical Volume Management

Storage Spaces (Windows)

Storage Spaces lets you pool multiple drives together with resiliency options similar to RAID.

Simple

No redundancy (like RAID 0)

Mirror

Data duplication (like RAID 1)

Parity

Efficiency with redundancy (like RAID 5)

Storage Pool Drive 1 Drive 2 Drive 3

Maintenance & Troubleshooting

Maintenance

Disk Cleanup

Remove temporary files and system clutter

Defragmentation

HDDs only (not needed for SSDs)

SSD Optimize (TRIM)

Keep TRIM enabled so the SSD can maintain performance; avoid manual defrag on SSDs.

Backups + Restore Testing

RAID and redundancy are not backups. Verify you can restore files/systems before you need to.

SMART Monitoring

Check drive health indicators

Troubleshooting

Drive Not Detected

Check connections, BIOS settings, Bad Partition or Volume

Corrupt Data

Run CHKDSK (Windows) or fsck (Linux)

Slow Performance

Check for failing sectors or SSD wear

Essential Peripherals

Input and output devices that extend computer functionality with connection interfaces

Study Outcomes

  • Match peripherals to interfaces (USB/Bluetooth/Wi‑Fi) and separate hardware faults from driver/config faults.
  • Troubleshoot disconnect/not detected issues using isolation: known-good cable/port, remove hubs, different user/profile, different machine.
  • Explain common gotchas: USB power draw limits, 2.4 GHz dongle placement/interference, and TRRS headsets vs separate jacks.

Connectivity & Ports

Bluetooth Standards

Short-range wireless communication for peripherals and low-power devices (range depends heavily on obstacles and RF noise).

Practical notes: modern devices often use BLE (Bluetooth Low Energy) for better battery life; pairing creates trusted keys, so remove and re-pair if authentication gets stuck.

Class 1: 100 mW, up to ~100 m
Class 2: 2.5 mW, ~10 m (most common)
Class 3: 1 mW, ~1 m

USB Standards

Universal Serial Bus (USB) versions and nominal link speeds. Names are confusing: USB-C is a connector shape, not a speed.

Real-world performance depends on the device, cable, and host controller; hubs and long/low-quality cables can cause disconnects or fall back to lower speeds.

USB 2.0 (Black): 480 Mbps
USB 3.2 Gen 1 (was USB 3.0): 5 Gbps
USB 3.2 Gen 2 (was USB 3.1 Gen 2): 10 Gbps
USB 3.2 Gen 2x2: 20 Gbps
USB4: 20-40 Gbps (USB-C)

USB-C, USB PD & Thunderbolt

USB-C ports may support charging (USB Power Delivery), data, and sometimes video (DisplayPort Alt Mode) or Thunderbolt.

  • Not every USB-C supports video: look for DP/Thunderbolt logos or check specs.
  • PD negotiation: both the charger and device must agree on voltage/current.
  • Cables matter: high-speed and high-wattage charging require the right cable.

NFC & RFID

Contactless communication technologies.

NFC Range: ~4 cm (payments, pairing)
RFID: Passive HF is short-range; passive UHF can reach meters; active tags can reach farther (tracking/access control)

Video Interfaces

Display connection standards.

VGA (DE-15): Analog, Blue, 15-pin
DVI-D/I: Digital/Integrated, typically white
HDMI: Audio+Video, Digital
DisplayPort: Packet-based, Daisy-chaining
USB-C (Alt Mode): Can carry DisplayPort/HDMI on some ports

Common Peripherals

Keyboards

Mechanical
Membrane
Wireless
Ergonomic

Pointing Devices

Optical
Laser
Trackball
Touchpad

Biometric Devices

Biometric authentication using unique physical characteristics (e.g., fingerprint, face, iris).

QR & Barcode Scanners

Devices that read optical machine-readable representations of data.

Touch Screens

Resistive
Capacitive
Infrared
SAW

KVM Switches

Hardware devices that allow control of multiple computers from a single keyboard, video monitor, and mouse.

Other Input Devices

Game Controllers

Gamepads
Joysticks
Racing Wheels
Flight Sticks

Digitizers

Graphics tablets for digital art and signatures.

Storage Media

Flash Memory

USB Drives
SD Cards
microSD
CFexpress
Speed depends on the card/device and reader. Look for performance markings such as UHS-I/UHS-II, V30/V60/V90 (video class), and A1/A2 (app class).
SD (Secure Digital) - removable flash memory card format

Optical Media

CD
DVD
Blu-ray
HD DVD
Optical is mostly legacy for installs/archival. Typical capacities: CD ~700MB, DVD 4.7GB (single-layer), Blu-ray 25GB (single-layer). HD DVD is obsolete.
CD (Compact Disc), DVD (Digital Versatile Disc), BD (Blu-ray Disc)

Troubleshooting Peripherals (Fast Checks)

Common Symptoms

Not detected / disconnecting

Try a different port (rear I/O vs front hub), swap cable, remove hubs, and test on another system to isolate device vs host.

Wireless lag / pairing issues

Replace/charge batteries, move the dongle closer (USB extension helps), reduce 2.4 GHz interference, and remove/re-pair the device.

No audio / wrong mic

Check default input/output device, mute/levels, app permissions, and whether it's TRRS vs separate mic/headphone jacks.

High-Value Tools

  • Windows: Device Manager, Bluetooth settings, and Event Viewer for USB/Bluetooth driver events.
  • Drivers/Firmware: update via vendor when devices misbehave; roll back if a new driver introduces issues.
  • Power: check USB power limits; disable problematic USB power-saving only when needed.
  • Sanity checks: verify the peripheral works on another machine and another OS/user profile.

Knowledge Check

Which connection type is most common for modern peripherals?

Installing & Upgrading OS

Methods and considerations for installing and upgrading operating systems.

Study Outcomes

  • Choose clean install vs in-place upgrade based on risk, rollback, and data preservation requirements.
  • Explain modern boot requirements (UEFI, Secure Boot, TPM) and how they influence partitioning and install media choices.
  • Run a pre-flight checklist: backups + BitLocker/recovery keys, driver/network access, target disk plan, and post-install verification.

Installation Methods

Media Types

Common ways to deliver an OS installer or image to a target machine.

Optical Media (DVD) (legacy)
Bootable USB (often created from an ISO)
External drive / installer volume (useful for large images)
Network install (PXE / iPXE) + image server
Vendor recovery (local recovery partition or cloud recovery)
Remote “virtual media” (iLO/iDRAC/IMM) for servers

Installation Types

Clean Install Fresh OS on empty drive
Upgrade In-place upgrade (when supported)
Repair Install Fix OS files, keep data
Dual Boot Multiple OS on same machine
Image Deployment Apply a prepared image (MDT/SCCM/Intune/Clonezilla)
Unattended Install Automated setup via answer file / scripts

Pre-install Checklist (Don’t Skip)

  • Back up user data and verify restore (spot-check files or run a test restore).
  • Confirm firmware mode: UEFI recommended; Legacy BIOS only when required.
  • Plan partitioning: GPT for UEFI systems; MBR for legacy BIOS-only scenarios.
  • Have drivers ready (especially storage/NVMe, Wi‑Fi, GPU) if the installer lacks them.
  • Record licensing/keys and note encryption status (BitLocker/FileVault) before wiping.
  • Disconnect non-essential drives to avoid installing the bootloader to the wrong disk.

Boot & File-System Fundamentals

  • UEFI + GPT: modern standard (uses an EFI System Partition for boot).
  • BIOS + MBR: legacy boot method (limited partitioning features compared to GPT).
  • Common file systems: NTFS (Windows), APFS (macOS), ext4 (Linux), exFAT (cross-platform removable media).
  • Secure Boot: validates boot components; may require signed drivers/bootloaders.

Requirements

Windows 11

Supported 64-bit CPU (1GHz+, 2+ cores), UEFI with Secure Boot support, TPM 2.0, 4GB RAM minimum (8GB+ recommended), and 64GB storage minimum (more needed for updates and feature installs).

macOS

Apple-supported Mac model; requirements vary by version (8GB+ RAM and ~20-35GB free storage is common).

Linux

Depends on distro and workload. Headless/server installs can run with less, but a modern desktop experience is typically smoother with 4GB+ RAM and ~25GB+ storage.

Knowledge Check

Which installation method completely erases the existing OS?

Operating Systems

Managing hardware resources, file systems, and user interfaces.

Study Outcomes

  • Explain what the OS provides (scheduling, memory, drivers, filesystem, networking) and why the kernel boundary matters.
  • Compare major OS families by security/update model and common management tooling (Windows, macOS, Linux, mobile).
  • Recognize when you need a special OS class (real-time, embedded, kiosk/hardened) and the trade-offs involved.

What an OS Actually Does

Core Responsibilities

  • Process & thread scheduling: decides what runs, when, and on which CPU core.
  • Memory management: virtual memory, paging, isolation, and address space layout.
  • Storage & file systems: files, permissions, journaling, and caching/buffering.
  • Device I/O: drivers, interrupts, DMA, and plug-and-play enumeration.
  • Security: authentication, authorization, auditing, sandboxing, and encryption hooks.
  • Networking: TCP/IP stack, firewalling, DNS resolution, and routing.

Kernel vs User Space (Mental Model)

User space apps, shells, services/daemons
System calls safe API boundary into the kernel
Kernel space scheduler, memory, drivers, filesystem, network stack
Most crashes/security bugs matter more in kernel space because they can affect the whole system.

Windows Editions

Windows Home
Consumer use. No Domain Join; BitLocker full-drive requires Pro/Enterprise (Device Encryption on supported hardware); up to 128GB RAM.
Windows Pro
Business use. Domain Join, BitLocker, RDP Host, Hyper-V.
Windows Enterprise
Large orgs. Advanced security and management (e.g., AppLocker/WDAC, Credential Guard/VBS), enterprise deployment and policy controls.

macOS Features

  • Spotlight

    System-wide search (Cmd + Space).

  • Mission Control

    View all open windows and desktops.

  • Terminal

    Unix-based command line interface (zsh).

File Systems & Boot Process

File Systems

System OS Features
NTFS Windows Permissions, journaling, compression, large files.
FAT32 All Max 4GB file size. High compatibility.
exFAT All No 4GB limit. Optimized for flash drives.
ext4 Linux Journaling, high performance.
APFS macOS Optimized for SSDs, encryption.

Boot Process

  1. 1. BIOS / UEFI

    Firmware initializes hardware.

  2. 2. POST

    Power-On Self-Test checks RAM, CPU, Video.

  3. 3. Bootloader

    Locates OS kernel (Windows Boot Manager / GRUB).

  4. 4. Kernel Load

    OS core loads into memory and starts services.

Working with OS

Navigating and configuring operating system settings and features.

Study Outcomes

  • Use core tools to inspect system state: processes/services, device manager, disk management, logs, and network settings.
  • Explain the difference between configuration (settings/policies) and state (running processes, connections, cache).
  • Apply safe admin habits: staged changes, backups/restore points where available, and verification steps.

Command Line Interfaces & Tools

Windows (CMD/PowerShell)
  • ipconfig - View network config
  • ping - Test connectivity
  • tracert - Trace route to host
  • netstat - Network statistics
  • nslookup - DNS query
  • chkdsk - Check disk errors
  • sfc /scannow - System file checker
  • gpupdate - Update group policy
Linux (Bash)
  • ip a - View network config (ifconfig is legacy)
  • ping - Test connectivity
  • traceroute - Trace route to host
  • ss - Socket statistics (netstat is legacy)
  • dig - DNS query
  • fsck - Check file system
  • ls -l - List files with permissions
  • sudo - Execute as superuser

System Configuration Tools

Windows Tools

Control Panel Legacy settings & applets
Settings App Modern configuration hub
MMC (Snap-ins) Advanced management (compmgmt.msc)

macOS & Linux

System Settings macOS main settings (System Preferences on older versions)
Terminal CLI for administration and automation

Task Management

Task Manager

Monitor and manage running processes (Windows).

Activity Monitor

Monitor system resources (macOS).

System Monitor

Linux equivalent for process management.

Knowledge Check

Which tool would you use to end a frozen application in Windows?

Users, Groups & Permissions

Managing user accounts, groups, and access control in operating systems.

Study Outcomes

  • Separate authentication (who you are) from authorization (what you can do) and relate both to MFA/SSO.
  • Explain groups/roles and permission inheritance (Windows NTFS vs Linux permissions/ACLs) and why least privilege matters.
  • Use elevation safely (UAC/sudo) and avoid mistakes like running as admin by default or sharing credentials.

Account Types

Windows

Common account types in Windows. In practice you’ll also see local accounts, Microsoft accounts, and domain identities (Active Directory / Entra ID joined).

Key idea: use least privilege—work as a standard user and elevate only when needed (UAC prompt).

Administrator
Standard User
Guest (disabled by default)
Groups/roles (e.g., Local Administrators) grant permissions without sharing passwords

Linux/macOS

Unix-like systems separate identity (users/groups) from capability (permissions). Root is powerful; prefer sudo with logging.

Root (Superuser)
Standard User
System Accounts
Service accounts: non-interactive identities used by daemons/services

Permission Systems

NTFS Permissions

Windows uses ACLs (Access Control Lists) with Allow/Deny entries that can be inherited. Effective access is the combination of: NTFS permissions (on the file/folder) and, if accessed over the network, share permissions (the most restrictive wins).

Quick mapping
Read: view contents • Write: create/modify • Modify: read/write/delete • Full control: modify + change permissions/ownership
Windows example (check/set ACLs)
icacls C:\Data
icacls C:\Data /grant "Alice:(OI)(CI)M"

POSIX Permissions

Classic Unix permissions are rwx for owner / group / others. Extras you must know: setuid, setgid, and the sticky bit (common on shared temp dirs).

Bits
r=4 (read) • w=2 (write) • x=1 (execute)
755 = rwx r-x r-x • 644 = rw- r-- r--
Linux example
ls -l /var/www
chmod 640 secrets.txt
chown root:www-data app.conf

Group Policy

Centralized configuration and security enforcement for Windows in AD domains. Useful for password/lockout policy, software deployment, firewall rules, drive mappings, and hardening. Remember LSDOU: Local → Site → Domain → OU (later policies can override earlier ones).

Golden Rules

  • Don’t share accounts; assign access via groups/roles.
  • Audit and review permissions periodically (especially shared folders and admin groups).
  • Prefer MFA for privileged access and remote logins.

Knowledge Check

What does the permission "rwxr-xr--" mean in Linux?

Maintaining & Optimizing OS

Techniques for keeping operating systems running smoothly and efficiently.

Study Outcomes

  • Measure before you change: CPU, RAM, disk, and network bottlenecks using built-in monitoring tools.
  • Explain safe maintenance: patch cadence, driver updates, startup management, and storage health (TRIM vs defrag).
  • Recognize when performance problems are really security problems (malware, unwanted persistence, risky configs).

Maintenance Tasks

Routine Maintenance

Regular tasks to keep the OS stable, secure, and performant.

Storage Sense / Disk Cleanup
Defragmentation (HDDs)
Optimize Drives (TRIM for SSDs)
Software Updates
Patch/AV hygiene (OS updates, browser updates, malware scans)
Backups + restore testing (verify that recovery actually works)
Disk health checks (SMART/NVMe health) and filesystem checks

Performance Monitoring

Task Manager Windows process monitoring
Activity Monitor macOS resource monitoring
Performance Monitor Advanced Windows metrics
Resource Monitor Per-process disk/network insight (Windows)
top / htop Live CPU/RAM/process view (Linux)

Optimization Techniques

Startup Management

Control what launches at boot/login to reduce boot time and background CPU/RAM usage.

Service Optimization

Disable or reconfigure services only when you understand dependencies. Prefer changing startup apps first; record changes so you can revert.

Virtual Memory

Swap/pagefile is a stability feature. If RAM is tight, the system will page—watch for high disk activity and sustained hard faults.

Common Symptoms → First Checks

Symptom Likely Causes First Checks
Slow boot Startup apps, updates, disk issues Startup list, update status, disk health
High CPU Runaway process, malware, updates Per-process CPU, AV scan, update activity
High disk usage Paging, indexing, failing drive RAM pressure, disk queue, SMART/NVMe health

Knowledge Check

Which maintenance task is NOT recommended for SSDs?

Scripting & Remote Access

Automating tasks and managing systems remotely.

Study Outcomes

  • Use the shell safely: quoting/escaping, pipes/redirection, and exit codes for automation.
  • Write small scripts that are idempotent (safe to re-run) and log what they changed.
  • Explain common remote access methods (RDP/SSH/VPN) and baseline hardening (MFA, strong keys, least privilege).

Scripting Basics

Batch (.bat)

Windows command scripting for simple automation.

@echo off
echo Hello World
pause

PowerShell (.ps1)

Object-based automation (Windows and cross-platform).

Write-Host "Hello"
Get-Service | Where-Object Status -eq 'Running'

Bash (.sh)

Linux/macOS shell scripting (common on servers).

#!/bin/bash
echo "Hello World"
ls -la

Common Types

  • String: Text ("Hello")
  • Integer: Whole numbers (42)
  • Floating Point: Decimals (3.14)
  • Boolean: True/False (language-dependent)

Constructs

  • Loops: Repeat actions (For, While)
  • Variables: Store data (PowerShell/Bash: $name; cmd.exe: %name%)
  • Comments: Notes (# or REM)
  • Conditionals: Branch logic (if/else, case/switch)

Shell Fundamentals (High-Value)

  • Exit codes: 0 = success; non‑zero = failure (useful for automation/CI).
  • Pipes & redirection: connect commands and capture output (|, >, 2>).
  • Quoting: handle spaces/special characters correctly (especially paths and user input).
  • Idempotence: scripts should be safe to run twice (avoid “half-configured” systems).
  • Secrets: never hard-code passwords/API keys; use vaults/env vars/secure prompts.

Remote Access Protocols

RDP (Remote Desktop Protocol)

Remote GUI access (commonly secured with NLA/TLS).

Port: TCP/UDP 3389

SSH (Secure Shell)

Encrypted command-line access (Linux/macOS/Windows).

Port: TCP 22

SFTP / SCP

Secure file transfer over SSH (preferred over FTP).

Port: TCP 22

Telnet

Unencrypted command-line access (Insecure!).

Port: TCP 23

VNC (Virtual Network Computing)

Platform-independent graphical desktop sharing.

Port: TCP 5900+ (display-dependent)

WinRM / PowerShell Remoting

Remote management for Windows (use HTTPS where possible; commonly used in enterprise automation).

Ports: TCP 5985 (HTTP), 5986 (HTTPS)

Remote Access Security (Non‑Optional)

  • Prefer VPN + MFA for administrative access; avoid exposing RDP/SSH directly to the internet.
  • Use SSH keys (and disable password login where appropriate); protect private keys with passphrases.
  • Apply least privilege and audit logins; separate admin accounts from daily-use accounts.
  • Keep services patched and restrict by firewall/IP allow-lists.

Troubleshooting OS

Diagnosing and resolving common operating system issues.

Study Outcomes

  • Triaging issues quickly: identify symptom, scope (one app/user vs system-wide), and recent changes (updates, drivers, hardware).
  • Use core tools to isolate causes: Safe Mode, Event Viewer, Task Manager, and system logs.
  • Resolve boot/startup failures using recovery options (Startup Repair, restore points, and tools like bootrec when appropriate).
  • Distinguish likely hardware faults vs software/driver faults based on repeatability, error codes, and diagnostics.

Critical Errors

BSOD (Blue Screen of Death)

MEMORY_MANAGEMENT
Faulty RAM or driver issue. Run Windows Memory Diagnostic.
NTFS_FILE_SYSTEM
Hard drive corruption. Run chkdsk.
INACCESSIBLE_BOOT_DEVICE
Driver issue or changed SATA mode (AHCI/RAID).

Boot Issues

  • No Boot Device Found

    Check BIOS boot order. Ensure drive is detected.

  • Missing NTLDR / BOOTMGR

    Bootloader/BCD corruption. Use Startup Repair, or WinRE tools like `bootrec /fixmbr`, `bootrec /rebuildbcd`, or `bcdboot` (common on UEFI systems).

  • Services Fail to Start

    Check Event Viewer (System Log). Boot into Safe Mode.

Repair Tools

sfc /scannow
System File Checker. Scans and repairs corrupted Windows system files.
dism
Repairs the Windows component store that SFC relies on (e.g., `DISM /Online /Cleanup-Image /RestoreHealth`). Run in an elevated prompt.
chkdsk /f /r
Checks disk + filesystem. `/f` fixes logical errors; `/r` scans for bad sectors (mainly HDD-focused) and can take a long time.
gpupdate /force
For domain-managed PCs: refreshes Group Policy immediately (useful after policy changes).
Event Viewer
Central log for System, Application, and Security events.
Safe Mode
Boots with minimal drivers. Useful for removing malware or bad drivers.

Core Principles & Defense-in-Depth

CIA Triad

  • Confidentiality: only authorized access (MFA, least privilege, encryption).
  • Integrity: data is accurate and unmodified (hashing, code signing, change control).
  • Availability: systems stay usable (redundancy, backups, DDoS protection).
Control Types

Preventive (stop), Detective (identify), and Corrective (recover) controls work together.

Practical Checklist

  • Patch: OS, browsers, firmware, and apps (reduce known-vulnerability exposure).
  • MFA: especially for admin and email accounts.
  • Encrypt: full-disk encryption (BitLocker/FileVault/LUKS) + secure key recovery.
  • Endpoint protection: AV/EDR + application control where possible.
  • Backups: 3-2-1 mindset; test restores; isolate/offline copies to resist ransomware.
  • Logging: centralize important logs; alert on suspicious events.

Knowledge Check

Which command would you run to repair corrupted Windows system files?

Display Technologies

Understanding monitor types, connectors, and troubleshooting.

Study Outcomes

  • Choose the right connector/adapter for a scenario and know common limits (audio support, analog vs digital, version-dependent features).
  • Explain key specs that affect experience: resolution, refresh rate, VRR, color depth/gamut, and practical HDR.
  • Troubleshoot common faults: no signal, wrong input, overscan/scaling, flicker/tearing, dead pixels, and artifacts.
  • Set up multi-monitor layouts (extended vs mirrored) and apply sensible calibration basics (brightness/contrast, color profile).

Video Connectors

HDMI
Audio+Video. Capability depends on HDMI version, cable, and devices (e.g., 4K/8K, HDR, VRR).
DisplayPort
VESA standard. Often supports MST daisy-chaining on capable gear. Some DP→HDMI adapters require DP++ or an active converter.
DVI
DVI-D (Digital only), DVI-I (Digital+Analog). No audio.
VGA (DE-15)
Analog only. Blue 15-pin connector. Legacy support.
USB-C / Thunderbolt
May carry data, charging, and video, but only if the port supports DisplayPort Alt Mode or Thunderbolt. Check logos/specs.

Key Display Specs (What Matters)

Core Specs

  • Resolution & scaling: higher resolution increases clarity but may require UI scaling.
  • Refresh rate (Hz): 60Hz is standard; higher refresh improves motion clarity if the GPU can keep up.
  • Adaptive sync: VRR (e.g., FreeSync/G-SYNC Compatible) reduces tearing/stutter.
  • Color depth & gamut: 8-bit vs 10-bit and sRGB vs wide-gamut affects color accuracy.
  • HDR: meaningful HDR needs sufficient brightness and local dimming; marketing labels vary widely.

Common Resolutions

Name Resolution Notes
1080p 1920x1080 Common baseline
1440p 2560x1440 Sharper, more GPU load
4K 3840x2160 Great for text; scaling often used
Tip: if a monitor won't do the refresh rate you expect, check the port version, cable type, and chroma/color depth settings.

Panel Technologies

LCD Panels

  • TN (Twisted Nematic)

    Fast response times (often 1-5ms). Weaker viewing angles and color accuracy.

  • IPS (In-Plane Switching)

    Strong color accuracy and viewing angles. Response times range widely; check reviews for motion handling (GtG, overshoot) if gaming matters.

  • VA (Vertical Alignment)

    Best contrast (deep blacks). Compromise between TN and IPS.

OLED

Organic Light Emitting Diode: No backlight. Each pixel emits its own light.

  • True Black (Infinite contrast)
  • Thinner and lighter
  • Risk of burn-in with long static content (mitigated by pixel shifting and screen savers)

Troubleshooting Displays

Artifacts
Distorted geometry or strange colors. Usually overheating GPU or bad driver.
Dead Pixels
Dead pixels stay dark; stuck pixels stay on a color. Usually a panel defect.
Dim Screen
Brightness setting, power-saving mode, or backlight failure (LED driver/CCFL inverter).
No Signal
Correct input selected? Reseat cable, try another port/cable, test with another device, and confirm the GPU output is enabled.
Flicker / Blackouts
Often cable/adapter or refresh-rate mismatch. Try a known-good cable, lower refresh rate, disable VRR temporarily, and update GPU drivers.
Wrong Resolution
EDID not read correctly. Replug, avoid cheap adapters, update drivers, and reset the monitor OSD to defaults.

Knowledge Check

Which display connector is analog-only?

Essentials of Networking

The fundamental backbone of modern communication: Models, Protocols, and Addressing.

Study Outcomes

  • Map real technologies to OSI and TCP/IP layers (where switches, routers, DNS, and TLS fit).
  • Explain IP addressing (IPv4 vs IPv6), subnets, and the roles of default gateway, DHCP, and DNS.
  • Differentiate TCP vs UDP, and know why ports and protocols matter for troubleshooting and firewall rules.
  • Use first-line tools effectively: ping, tracert, ipconfig/ifconfig, and nslookup.

Network Models

OSI Model (Open Systems Interconnection)

7
Application
App services and protocols (HTTP, DNS, SMTP, SSH)
6
Presentation
Encoding, compression, encryption (TLS)
5
Session
Session setup/teardown, state, dialog control
4
Transport
End-to-end connection (TCP, UDP)
3
Network
Routing, IP addressing (Packets)
2
Data Link
MAC addressing, switching (Frames)
1
Physical
Cables, signals, binary (Bits)

TCP/IP Model

Application
Combines OSI Layers 5, 6, 7
Transport
Matches OSI Layer 4
Internet
Matches OSI Layer 3
Network Access
Combines OSI Layers 1, 2

IP Addressing

IPv4 vs IPv6

IPv4 32-bit

Format: Dotted Decimal

192.168.1.1

~4.3 billion addresses (limited; public allocation largely exhausted)

IPv6 128-bit

Format: Hexadecimal

2001:0db8:85a3:0000:0000:8a2e:0370:7334

~3.4e38 addresses (vast address space)

Special Addresses

  • Loopback (Localhost):
    IPv4: 127.0.0.1 | IPv6: ::1
  • Private Ranges (RFC 1918):
    • Class A: 10.0.0.0 - 10.255.255.255
    • Class B: 172.16.0.0 - 172.31.255.255
    • Class C: 192.168.0.0 - 192.168.255.255
  • APIPA (Auto-Config):
    169.254.x.x (Used when DHCP fails)

Subnetting & Routing Basics

CIDR in One Minute

CIDR notation (/24, /16, and similar prefixes) tells you how many bits are the network prefix. The rest are host bits.

CIDR Mask Hosts (IPv4) Typical Use
/24 255.255.255.0 254 Small LAN / VLAN
/16 255.255.0.0 65,534 Large site (often split into smaller VLANs)
/30 255.255.255.252 2 Point-to-point links

IPv4 host count is typically 2^(32 - prefix) - 2 (network + broadcast reserved) in traditional subnets.

Default Gateway, NAT, and “Why Can’t I Reach It?”

  • Default gateway: the router your device uses to reach other networks.
  • NAT: translates private RFC1918 addresses to a public address for internet access (common on home/SMB routers).
  • DNS vs IP: if IP works but names don’t, suspect DNS.
Fast Troubleshooting Flow
  1. Link up? (Wi‑Fi connected / Ethernet link light)
  2. IP config ok? (IP, mask/prefix, gateway, DNS; DHCP lease)
  3. Ping gateway → ping local host → ping public IP → test DNS
  4. Trace route to locate where it stops (routing/firewall)

Common Ports & Protocols

Port Protocol Use Case Transport
20/21 FTP File Transfer Protocol (Unsecured) TCP
22 SSH Secure Shell (Remote Login) TCP
23 Telnet Remote Terminal (Unsecured) TCP
25 SMTP Simple Mail Transfer (Sending) TCP
53 DNS Domain Name System UDP/TCP
67/68 DHCP Dynamic Host Config UDP
80 HTTP Web Traffic (Unsecured) TCP
110 POP3 Post Office Protocol (Receiving) TCP
143 IMAP Internet Message Access (Receiving) TCP
443 HTTPS Secure Web Traffic (TLS) TCP
3389 RDP Remote Desktop Protocol TCP/UDP

Knowledge Check

Which protocol is used to automatically assign IP addresses to devices on a network?

Local Area Networking

Technologies and devices for connecting computers in a limited area.

Study Outcomes

  • Explain what each device does on a LAN: switch, router, firewall, AP—and where they sit in a typical home/office topology.
  • Describe broadcast domains vs collision domains, and why VLANs create segmentation (and need routing between VLANs).
  • Understand structured cabling basics (patch panels, patch leads) and when PoE is useful (APs, phones, cameras).
  • Identify symptoms of switching/cabling issues (duplex mismatch, bad termination, loops) and choose a sensible first check.

Typical Home / Small Office Topology

A quick mental model for where each box sits:
Internet
    │
  Modem / ONT
    │
  Router (NAT + DHCP + Firewall)
    │
  Switch ────────────────┐
    │                    │
  Access Point        Wired Clients
  (Wi‑Fi)             (PCs/Printers/NAS)
What usually lives where
  • DHCP is usually on the router (or a server); switches don’t hand out IPs.
  • VLANs live on managed switches/APs; routing between VLANs is done by a router/L3 switch.
  • Two switch ports cabled together can create a loop; managed networks rely on STP/RSTP to prevent broadcast storms.
Fast symptom mapping
No link light → cable/port; link but no IP → DHCP/VLAN; IP works but names fail → DNS.

Network Hardware

Switch
Typically Layer 2. Connects devices on a LAN using MAC addresses.
Managed Switch
Adds VLANs, trunking, QoS, port mirroring, STP/RSTP, and security features (802.1X, port security).
Router
Layer 3. Connects networks (LAN/WAN) using IP routing.
Firewall
Security. Filters traffic based on rules (ACLs).
Access Point
Bridges wireless clients to a wired network.
VLAN
Logical segmentation on a switch (separate broadcast domains). Inter‑VLAN routing requires a router/L3 switch.
PoE
Power over Ethernet powers APs/phones/cameras over the cable (802.3af/at/bt).
Patch Panel
Terminates building cabling; patch leads connect ports to the switch for clean, maintainable wiring.

Cabling Standards

Twisted Pair Categories

Cat Speed Max Dist
Cat 5e 1 Gbps 100m
Cat 6 Up to 10 Gbps Up to ~55m (10GBASE-T)
Cat 6a 10 Gbps 100m
Cat 8 Up to 40 Gbps Up to ~30m
Plenum vs PVC: Use Plenum-rated cables in drop ceilings (HVAC spaces) to prevent toxic fumes during a fire.

T568B Wiring Standard

Most common wiring standard (RJ45).

Both ends wired the same (T568A‑A or T568B‑B) gives a straight‑through cable; A‑B makes a crossover (rare today due to Auto‑MDI/MDIX).
1
W/O
2
Or
3
W/G
4
Bl
5
W/B
6
Gr
7
W/Br
8
Br
Fiber Connectors
ST (Stick/Twist) SC (Square) LC (Little)

Network Tools

Crimper
Attaches RJ45 connectors to cables.
Punchdown Tool
Connects wires to patch panels (110 block).
Cable Tester
Verifies continuity and correct wiring map.
Toner Probe
Locates specific cables in a bundle (Fox and Hound).

Knowledge Check

Which device operates at Layer 2 of the OSI model?

Wireless Networking

Wi-Fi standards, security, and configuration for wireless networks.

Study Outcomes

  • Identify Wi‑Fi generations/standards and what changes (bands, channel width, MIMO/OFDMA, throughput vs real-world performance).
  • Choose secure configurations: prefer WPA3 (or WPA2‑AES), avoid legacy options, and understand guest networks and isolation.
  • Troubleshoot wireless issues: interference/congestion, channel overlap, roaming, signal attenuation, and mismatched security settings.
  • Explain common deployment choices: single AP vs mesh, SSIDs, band steering, and when to use wired backhaul.

802.11 Standards

Standard Freq (GHz) Max Speed Notes
802.11a 5 54 Mbps Legacy. Short range.
802.11b 2.4 11 Mbps Legacy. Long range.
802.11g 2.4 54 Mbps Backwards compatible with 'b'.
802.11n (Wi-Fi 4) 2.4 / 5 600 Mbps Introduced MIMO (Multiple Antennas).
802.11ac (Wi-Fi 5) 5 ~7 Gbps MU-MIMO (Multi-User). Beamforming.
802.11ax (Wi-Fi 6) 2.4 / 5 (6 for Wi-Fi 6E) ~9.6 Gbps OFDMA (Efficiency). High density.
802.11be (Wi-Fi 7) 2.4 / 5 / 6 ~46 Gbps Multi-Link Operation (MLO). Very high throughput/low latency.

Note: “Max Speed” values are theoretical PHY rates. Real throughput depends on channel width, client capability, distance/interference, AP load, and encryption overhead.

Frequencies & Channels

2.4 GHz Band

Longer range, better wall penetration, but crowded.

Non-Overlapping Channels:
1 6 11

5 GHz Band

Faster speeds, more channels (availability depends on regulatory domain and DFS rules), less interference than 2.4 GHz, shorter range.

Channel Width, DFS, and 6 GHz

  • Channel width: 20 MHz is most reliable in crowded areas; 40/80/160 MHz can increase throughput but also increases interference and reduces usable channel choices.
  • DFS channels (5 GHz): may be required to vacate if radar is detected; can cause brief drops during channel changes.
  • 6 GHz (Wi-Fi 6E/7): cleaner spectrum and wider channels; shorter range and availability depends on country rules plus client/AP support.

Wireless Security

WEP
DO NOT USE. Easily cracked (IV attack).
WPA
Uses TKIP. Temporary fix for WEP. Deprecated.
WPA2
Uses AES-CCMP. Still common; prefer WPA3 where available.
WPA3
Latest standard. Uses SAE (Simultaneous Authentication of Equals).

Enterprise & Best Practices

  • WPA2/WPA3‑Enterprise: uses 802.1X with EAP (e.g., PEAP/EAP‑TLS) and a RADIUS server—better than shared passwords.
  • Disable WPS: it weakens security and is a common attack target.
  • Use guest networks (separate VLAN/SSID) for untrusted devices; isolate clients if needed.
  • Update firmware and use strong admin credentials on APs/routers.

Knowledge Check

Which 2.4 GHz channels are non-overlapping?

The Internet

Connection types, Cloud Computing, and DNS.

Study Outcomes

  • Compare common access types (fiber/cable/DSL/satellite/cellular) by latency, throughput, and shared vs dedicated characteristics.
  • Explain what DNS does (names → IPs), how caching works, and why DNS issues can look like “the internet is down”.
  • Describe NAT and default gateway behavior in typical home networks, and why it impacts inbound connectivity.
  • Differentiate cloud service models: IaaS, PaaS, SaaS (and what you manage vs what the provider manages).

Internet Connection Types

Type Medium Characteristics Speed
Fiber Light (Glass) Fastest, Low latency, Immune to EMI. 1 Gbps+ (often multi-gig)
Cable Coaxial (Copper) Shared bandwidth with neighbors. TV lines. ~100 Mbps-1+ Gbps
DSL Telephone (Copper) Dedicated line. Speed drops with distance. Up to ~100 Mbps
Satellite Radio Waves Latency depends on orbit: GEO is high; modern LEO constellations can be much lower. Line of sight and weather effects still apply. Varies (often tens to hundreds of Mbps)
Cellular 4G / 5G Mobile. Tethering/Hotspot capabilities. Varies (signal, congestion, plan, device)

Cloud Computing

SaaS (Software as a Service)
End-user applications. Provider manages the platform.
Ex: Gmail, Microsoft 365, Dropbox.
PaaS (Platform as a Service)
Managed runtime/services for building and deploying apps.
Ex: Azure App Service, Google App Engine, Heroku.
IaaS (Infrastructure as a Service)
Virtualized compute, storage, and networking.
Ex: AWS EC2, Azure Virtual Machines.

DNS Records

Domain Name System translates names to IP addresses.

Records have a TTL (cache time). “DNS propagation” is usually just caches expiring + replicas updating.

A Record Maps hostname to IPv4 Address
AAAA Record Maps hostname to IPv6 Address
CNAME Canonical Name (Alias for another name)
MX Record Mail Exchange (Email servers)
TXT Record Text values (SPF, DKIM, DMARC)
NS Record Authoritative name servers for a zone
PTR Record Reverse lookup (IP → name)
SRV Record Service discovery (host + port)
CAA Record Which CAs may issue TLS certs for the domain

Knowledge Check

Which cloud model gives you the most control over the operating system?

Virtualization & Cloud

The technology that abstracts hardware to run multiple operating systems and services.

Study Outcomes

  • Distinguish Type 1 vs Type 2 hypervisors and identify common examples and use cases.
  • Explain core VM resources and tradeoffs: vCPU scheduling, RAM overcommit, storage provisioning, and virtual networking basics (NAT/bridged).
  • Understand snapshots vs backups and when each is appropriate (short-term rollback vs durable recovery).
  • Describe how cloud builds on virtualization (elasticity, multi-tenancy) and relate common service models (IaaS/PaaS/SaaS).

Hypervisor Types

Type 1 (Bare Metal)

Installs directly on the server hardware without a host OS. Used in enterprise data centers for maximum performance.

  • High Performance
  • Direct Hardware Access
  • Enterprise Scalability
Examples:
VMware ESXi Microsoft Hyper-V KVM Xen

Type 2 (Hosted)

Runs as an application on top of an existing operating system. Ideal for testing, development, and end-user sandboxing.

  • Easy Setup
  • Runs on Windows/Mac/Linux
  • Good for Labs
Examples:
VirtualBox VMware Workstation Parallels

Cloud Service Models

SaaS

Software as a Service

End-user applications delivered over the web. No maintenance required by the user.

Ex: Gmail, Microsoft 365, Salesforce

PaaS

Platform as a Service

Tools and environment for developers to build and deploy apps without managing infrastructure.

Ex: Heroku, Google App Engine, Azure App Service

IaaS

Infrastructure as a Service

Virtual hardware (servers, storage, networks) that you manage and configure yourself.

Ex: AWS EC2, Azure Virtual Machines, Google Compute Engine

VMs vs Containers (and What You’re Responsible For)

Virtual Machines

  • Virtualize hardware; each VM runs a full guest OS.
  • Stronger isolation boundary; heavier resource overhead than containers.
  • Common features: snapshots, clones, virtual switches, and resource limits/reservations.

Containers

  • Share the host kernel; package an app + dependencies.
  • Fast startup, high density; isolation relies on namespaces/cgroups and kernel security features.
  • Often orchestrated with platforms like Kubernetes (scheduling, scaling, service discovery).
Snapshots are NOT Backups

Snapshots save the state of a VM at a point in time (useful for testing updates). They depend on the base disk. If the base disk fails, the snapshot is lost.

Backups

Backups are independent copies of the data stored separately. They are required for disaster recovery.

Shared Responsibility Model (Cloud)

In cloud services, the provider secures the underlying infrastructure (datacenters, physical hosts). You are typically responsible for identity/access, data, configuration, and patching what you control (especially in IaaS).

VM Networking Modes

Bridged

VM connects directly to the physical network. It gets its own IP address from the physical router/DHCP server.

Best for: Servers that need to be accessible from the LAN.
NAT

VM shares the host's IP address. The host acts as a router for the VM. VM can access the internet, but outside devices can't see the VM easily.

Best for: Client VMs, browsing, testing.
Host-Only

VM connects only to the host and other VMs on the same private network. No internet access.

Best for: Isolated testing, malware analysis.

Client-Side Requirements

  • CPU Support

    Must support virtualization extensions (Intel VT-x or AMD-V) and be enabled in BIOS/UEFI.

  • RAM

    Sufficient memory for the host OS plus all running VMs. (e.g., 16GB+ recommended).

  • Storage

    Fast storage (NVMe SSD) is critical for VM performance. Large capacity for virtual disk files.

  • Network

    Virtual switches plus NAT/bridged/host-only networking for VM connectivity and isolation.

Knowledge Check

Which cloud model gives you the most control over the operating system and installed software?

Portable Computing

Hardware, displays, and power management for laptops and mobile workstations.

Study Outcomes

  • Identify common laptop components and form factors (SoC vs discrete parts, SODIMM vs soldered LPDDR, M.2 storage vs 2.5" SATA).
  • Explain portable power concepts: battery health, charge cycles, AC adapters (wattage), USB‑C PD, and why performance changes with power profiles.
  • Troubleshoot laptop-specific issues (thermal throttling, docking/port replication problems, keyboard/trackpad faults, and display/backlight symptoms).
  • Choose the right expansion/IO solution (dock, hub, Thunderbolt/USB4) based on required bandwidth, video outputs, and charging support.

Laptop Hardware

Internal Components

Mobile CPU / SoC

Often a power-tuned CPU (sometimes a full SoC) designed around heat and battery limits. Performance can vary with power profiles and sustained load.

SODIMM RAM

Small Outline Dual In-line Memory Module. Roughly half the size of desktop DIMMs.

Soldered RAM (LPDDR)

Many thin laptops use soldered low-power RAM (LPDDR). Faster and efficient, but typically not upgradeable.

Storage (M.2 / 2.5")

Modern laptops commonly use M.2 NVMe SSDs. Older models may use 2.5" SATA SSDs/HDDs.

Wireless Cards

Mini-PCIe or M.2 Key E cards for Wi-Fi and Bluetooth connectivity.

Cooling System

Heat pipes/vapor chamber, fans, and thermal paste/pads. Dust buildup and dried paste can cause throttling and unexpected shutdowns.

Battery & Charging

Typically Li-ion/LiPo packs with a battery management controller. Charging may be vendor-specific or USB-C Power Delivery depending on the model.

Display Components

LCD / LED Screen

TN/IPS/VA or OLED. Most modern laptops use eDP; older models may use LVDS. Backlight issues often appear as a very dim image under a flashlight.

Digitizer

The glass overlay that converts touch inputs into digital signals (for touchscreens).

Hinges & Cable Routing

Display cables flex through the hinge area. Intermittent flicker or backlight loss can be caused by a damaged eDP/LVDS cable.

Webcam & Mic

Integrated into the top bezel. Privacy shutters are becoming common.

Expansion Options

Docking Station

Proprietary or USB-C/Thunderbolt. Provides power, display outputs, and extra ports. Capability depends on the laptop port (USB-C with DP Alt Mode vs Thunderbolt/USB4) and the dock.

Port Replicator

Adds extra ports (often via USB). May not supply charging power or support multiple high-resolution displays like a full dock.

Adapters & Alt Modes

USB-C to HDMI/DP adapters rely on DisplayPort Alt Mode support. If video does not work, confirm the port supports video, try a different cable, and avoid low-quality adapters.

External GPU (eGPU)

Some laptops support external GPUs over Thunderbolt/USB4. Useful for graphics workloads; performance depends on the link and GPU enclosure.

Physical Locks

Kensington Lock slots for physical security in public spaces.

Power Management

ACPI S0 Working (On)
ACPI S3 Sleep (Legacy Standby)
ACPI S4 Hibernate (Disk)
ACPI S5 Soft Off
Note: many modern laptops use Modern Standby (S0 low power idle / S0ix) instead of S3.

Tip: Swollen batteries are a fire hazard. Dispose of them properly immediately.

Knowledge Check

Which type of RAM is specifically designed for laptops?

Mobile Devices

Smartphones, tablets, and the ecosystems that power them.

Study Outcomes

  • Compare Android vs iOS/iPadOS in terms of app distribution, update model, customization, and enterprise management constraints.
  • Explain how mobile devices sync data (accounts, cloud services) and choose the right email approach (e.g., IMAP for multi-device sync).
  • Troubleshoot common connectivity issues across Wi‑Fi, Bluetooth, NFC, and cellular (airplane mode, APN, pairing, captive portals).
  • Identify typical mobile hardware/service topics: SIM vs eSIM, screen types, charging standards, and safe accessory selection.

Mobile Operating Systems

Android

  • Source: Open-source core (AOSP) with OEM layers; Google Mobile Services on many devices
  • Apps: APK files via Google Play and other sources (including sideloading)
  • Security model: App sandboxing, permissions, and app signing; timely OS/security updates vary by OEM/carrier
  • Customization: High (Launchers, Widgets)
  • Hardware: Many manufacturers (e.g., Samsung, Google Pixel, Motorola, OnePlus, Xiaomi)

iOS / iPadOS

  • Source: Closed Source (Proprietary)
  • Apps: App Store (plus limited enterprise/test distribution)
  • Security model: Strong app signing/review, sandboxing, and secure hardware-backed key storage
  • Customization: Limited (Uniform experience)
  • Hardware: Apple only

Connectivity & Synchronization

Wireless Connections

  • Cellular (LTE / 5G)
    Mobile data and voice services. Features like VoLTE/VoWiFi, roaming, and APN settings can affect connectivity.
  • NFC
    Near Field Communication. Tap-to-pay (Apple Pay/Google Pay), access cards, and quick pairing. Range: ~4cm.
  • Bluetooth
    Short-range wireless for peripherals and sharing. Pairing typically follows discovery -> authenticate -> connect.
  • Hotspot / Tethering
    Sharing cellular data via Wi-Fi, Bluetooth, or USB.

Email Configuration

  • POP3 vs IMAP
    POP3 typically downloads mail to one device (can leave copies on the server). IMAP syncs mailboxes across devices (server-based).
  • Exchange / S/MIME
    Exchange supports corporate mail plus contacts/calendar sync. S/MIME provides email signing and encryption.
  • Port Numbers
    SMTP submission: 587 (STARTTLS) / 465 (implicit TLS). IMAPS: 993. POP3S: 995.

Data Synchronization

  • Cloud Sync
    iCloud, Google Drive, OneDrive. Automatic backup of photos, contacts, app data.
  • Backup & Restore
    Backups protect against loss/theft. Verify what is included (photos, messages, app data) and test restores when possible.
  • Local Sync
    Finder/iTunes (iOS) or USB file transfer/MTP (Android). Requires a USB connection.
  • SSO
    Single Sign-On. Use one account to access multiple apps/services.

Mobile Hardware & Troubleshooting

Key Hardware Concepts

  • SIM / eSIM
    Subscriber identity. eSIM is embedded and activated digitally; SIM PIN adds protection if a phone is stolen.
  • Storage & Performance
    Mobile storage is typically flash (e.g., UFS). Keeping some free space helps performance and updates.
  • Charging
    USB-C and sometimes wireless (Qi). Fast charging depends on supported standards and the charger/cable.

Common Issues (Quick Fix Flow)

  • No service: toggle airplane mode, check SIM/eSIM status, carrier outage, APN settings, and roaming.
  • Won't charge: inspect/clean port, try known-good cable/charger, and verify PD/fast-charge compatibility.
  • Overheating / slow: close heavy apps, remove case, check storage space, and install OS/app updates.
  • Boot loop: force restart; if needed, use recovery mode and back up before a factory reset (data loss).
  • Bluetooth problems: forget device and re-pair; keep firmware/drivers current (car/earbuds often need updates too).

Knowledge Check

Which email protocol should you use if you want to access your email from multiple devices and keep them in sync?

Mobile Security

Protecting mobile devices, data, and users from modern threats.

Study Outcomes

  • Recognize high-risk behaviors (rooting/jailbreaking, unsafe sideloading) and explain how they weaken platform security controls.
  • Apply core protections: strong unlock + biometrics, device encryption, secure backups, and remote locate/lock/wipe.
  • Identify common mobile attack paths: smishing/QR phishing, permission abuse, malicious profiles/configs, and SIM-swap–enabled account takeover.
  • Explain enterprise controls at a high level: MDM, compliance policies, app allowlists, containerization, and VPN profiles.

Mobile Threats

OS Tampering

Rooting (Android)

Gaining elevated/admin access. Weakens platform protections and increases malware risk. May break warranty/support and security updates.

Jailbreaking (iOS)

Removing Apple's restrictions. Allows unauthorized apps but exposes system to malware.

App Risks

  • Smishing / QR Phishing

    Malicious SMS/IM messages and QR codes that trick users into installing apps, handing over credentials, or approving MFA prompts.

  • Sideloading

    Installing apps outside official stores. Increases the risk of malware and unsafe permissions.

  • Permission Abuse

    Overly broad access (SMS, Accessibility, device admin, contacts) can enable data theft, overlays, or persistent control.

  • SIM Swap / Account Takeover

    Attackers transfer your number to a new SIM to intercept calls/SMS. Use authenticator apps, SIM PIN, and carrier port-out protections.

  • Unofficial Stores

    Third-party markets often lack rigorous security checks.

  • Public Wi-Fi

    Greater risk of Man-in-the-Middle (MitM) attacks on untrusted networks; prefer VPN and HTTPS/TLS.

  • Untrusted USB Charging

    Avoid unknown USB ports/cables. Use your own charger or a charge-only adapter; keep USB data access locked when possible.

Defense Mechanisms

Authentication

  • Biometrics
    Face ID, Touch ID (Convenient & Secure)
  • MFA / 2FA
    Authenticator Apps > SMS (SIM Swap risk)
  • Failed Attempts
    Lockout or wipe after a configured number of failed attempts
  • Encryption
    Device encryption protects data at rest; strong passcodes improve the strength of hardware-backed keys.

Enterprise Tools

  • MDM
    Mobile Device Management. Full device control.
  • MAM
    Mobile Application Management. Controls specific corporate apps only.
  • Remote Wipe
    Erase data if device is lost/stolen.
  • Work Profile / Container
    Separates corporate apps/data from personal data (common for BYOD) and enables selective wipe.

Deployment Models

  • BYOD
    Bring Your Own Device. Higher user control/privacy, harder for IT to enforce policies.
  • COPE
    Corporate Owned, Personally Enabled. Balanced.
  • CYOD
    Choose Your Own Device. Employee picks from approved list.
  • COBO
    Corporate Owned, Business Only. Strictest controls; minimal personal use.

Knowledge Check

What is the primary security risk associated with "Jailbreaking" an iOS device?

Printers & Imaging

Technologies, maintenance, and troubleshooting for modern printing devices.

Study Outcomes

  • Differentiate printer types (laser/inkjet/thermal/impact) and match them to use cases (speed, cost per page, photo quality, durability).
  • Explain the laser printing workflow at a high level and connect it to common symptoms (fuser issues, toner distribution, drum wear).
  • Troubleshoot typical failures: jams, streaks/ghosting, faded prints, duplex problems, connectivity/driver issues, and spooler errors.
  • Choose appropriate connection methods and protocols (USB/Ethernet/Wi‑Fi; shared printing) and handle maintenance safely (consumables, calibration).

Printing Technologies

Laser Printing Process

1
Processing (Rasterizing the image)
2
Charging (Applying negative charge to drum)
3
Exposing (Laser writes image to drum)
4
Developing (Toner sticks to exposed areas)
5
Transferring (Toner moves to paper)
6
Fusing (Heat/Pressure melts toner)
7
Cleaning (Removing excess toner)

Other Types

Inkjet

Uses liquid ink. Thermal (bubble) or Piezoelectric (vibration) nozzles. High quality photos, slower speed.

Dye-Sublimation

Heat transfers dye to photo paper in layers (typically CMY + overcoat). Common for photo kiosks; great gradients and photo consistency.

Thermal

Heat-sensitive paper (Direct Thermal) or ribbon (Thermal Transfer). Used for receipts and labels.

Impact (Dot Matrix)

Pins strike a ribbon. Noisy but useful for multi-part carbon forms.

Maintenance Tasks

  • Calibration

    Inkjet head alignment and color calibration; for lasers, configuration pages and color registration help maintain consistent output.

  • Cleaning

    Run cleaning cycles for inkjet heads; clean rollers and remove dust. Use a toner-safe vacuum only (household vacuums can spread fine toner).

  • Replacement

    Toner/ink, imaging drum (sometimes separate), fuser (laser), transfer belt/roller, pickup rollers and separation pads, and periodic maintenance kits.

Printer Sharing

Network Sharing
Ethernet/Wi-Fi. Prefer DHCP reservations or static IPs for stable connections; verify subnet, gateway, and DNS if using hostnames.
Print Server
Dedicated hardware or software service to manage queues, drivers, and permissions (and features like hold/release or department codes).
Cloud / AirPrint
Driverless printing (AirPrint/Mopria) often discovered via mDNS/Bonjour on the local network; some enterprise setups use secure/pull printing for sensitive documents.

Printer Components & Consumables

Laser Printer Parts

  • Toner + Developer
    Powdered toner is attracted to the charged image on the drum; low toner often causes faded prints.
  • Imaging Drum (Photoconductor)
    Holds the electrostatic image. Worn drums can cause repeating defects at regular intervals.
  • Transfer Roller/Belt
    Moves toner from the drum to paper. Issues can cause missing color or uneven transfer (especially on color lasers).
  • Fuser Assembly
    Heat + pressure bond toner to paper. Fuser problems can cause smearing, wrinkling, or toner rubbing off.
  • Pickup Roller + Separation Pad
    Feeds a single sheet from the tray. Worn rollers commonly cause misfeeds and multi-feeds.

Common Features

  • ADF vs Flatbed
    Automatic Document Feeder scans stacks; flatbed handles books and fragile originals. Duplex ADF supports double-sided scans.
  • Duplexing
    Automatic duplex prints both sides. Some devices support duplex printing but simplex scanning (or vice versa).
  • Paper Handling
    Correct tray selection, paper type, and humidity matter. Use the right media (labels/photo) to avoid jams and fuser damage.
  • Consumable Yield
    Page yield is usually rated at a standardized coverage (often ~5%). Real usage varies with graphics and photos.

Connectivity, Protocols & Drivers

Connections

USB
Simple and reliable for a single PC. Watch for driver selection and correct port/cable.
Ethernet
Best for stable shared printers. Confirm IP address and that the device responds to ping/web admin.
Wi-Fi / Wi-Fi Direct
Wi-Fi joins the LAN; Wi‑Fi Direct is peer-to-peer. Band steering and guest isolation can break discovery/printing.

Printing Protocols (Common)

  • IPP / IPPS: modern standard (IPPS = encrypted), common for driverless printing.
  • RAW 9100 (JetDirect): widely used for network printers.
  • LPD/LPR: legacy but still seen in some environments.
  • SMB sharing: printing through a Windows/macOS print server share.
  • mDNS/Bonjour: discovery used by AirPrint/Mopria on local networks.
Protocol Typical Port(s) Notes
IPP 631 Modern printing; common for “driverless” setups.
IPPS 443 / 631 IPP over TLS (encrypted). Port depends on implementation.
RAW (JetDirect) 9100 Simple TCP stream; very common on network printers.
LPD/LPR 515 Legacy line printer protocol.
SMB 445 Printing via a print server share; permissions matter.
mDNS / Bonjour 5353 (UDP) Local discovery; often blocked across VLANs or guest isolation.

Print Languages

Common page description languages include PCL, PostScript, and PDF direct. A wrong driver can cause gibberish prints or missing features.

Troubleshooting (Print Quality & Feeding)

Paper Jams / Misfeeds
Check tray settings (size/type), remove torn paper, and inspect pickup rollers and separation pads. Fan paper and avoid overfilling trays.
Faded Prints
Low toner/ink, clogged inkjet nozzles, economy mode, or incorrect paper type. Run a test page and cleaning/alignment.
Streaks / Lines
Dirty rollers, damaged drum, or clogged ink jets. For lasers, inspect drum/toner; for inkjets, run nozzle check.
Smudging / Toner Rubs Off
Fuser not bonding correctly or wrong media type. Let the printer warm up; verify fuser condition and paper rating.
Gibberish / Random Characters
Driver or print language mismatch. Reinstall the correct driver, try PCL vs PostScript, and clear/recreate the print queue.
Offline / Queue Stuck
Verify connectivity and IP, restart the printer, and clear stuck jobs. Confirm correct port (TCP/IP) and disable "Use Printer Offline" if set.
Tip: print a configuration/test page from the printer itself to separate device problems from PC/driver problems.

Knowledge Check

Which step of the laser printing process involves melting the toner onto the paper?

Computer Security

Identifying threats and implementing physical and logical security controls.

Study Outcomes

  • Identify common threat categories (social engineering, malware, unpatched systems) and describe realistic indicators and impacts.
  • Apply layered controls: least privilege, MFA, patching, endpoint protection, backups, and basic hardening.
  • Differentiate key security technologies (encryption, firewalls, secure authentication, physical controls) and when to use each.
  • Explain safe response basics: isolate affected systems, preserve evidence when needed, and follow escalation/incident procedures.

Common Threats

Social Engineering

Phishing / Spear Phishing
Deceptive emails to steal credentials. "Spear" targets specific individuals.
Tailgating / Piggybacking
Following an authorized person into a secure area without credentials.
Dumpster Diving
Searching trash for sensitive documents (mitigated by shredding).
Vishing / Smishing
Voice calls (vishing) or SMS/texts (smishing) designed to trick users into revealing information or installing malware.
Pretexting / Impersonation
A fabricated scenario to build trust (e.g., pretending to be IT, a vendor, or a manager) to obtain access or data.

Malware Types

Ransomware

Encrypts data and demands payment for the key.

Trojan

Malware disguised as legitimate software.

Spyware / Keylogger

Records keystrokes and user activity silently.

Rootkit

Embeds deep in OS to hide itself and other malware.

Virus / Worm

A virus typically attaches to files and needs user action; a worm self-propagates over networks without user interaction.

Botnet

A group of compromised devices controlled remotely, often used for DDoS attacks and spam.

Security Controls

Controls are often categorized by Type (how they are implemented) and Function (what they do).

Type Examples Primary Function
Technical (Logical) Firewalls, Antivirus, Encryption, ACLs, MFA Prevent/Detect via software/hardware
Administrative (Management) Policies, Training, Background Checks, Risk Assessments Govern behavior and processes
Physical Locks, Fences, Guards, Lighting, Mantraps Restrict physical access

Physical Security

  • Mantrap
    Double-door system to prevent tailgating.
  • Biometric Locks
    Fingerprint or iris scanners for access control.
  • Privacy Filter
    Screen film to prevent "Shoulder Surfing".

Logical Security

  • Firewall
    Filters network traffic (Host-based or Network-based).
  • Least Privilege
    Users have only necessary permissions.
  • Active Directory
    Centralized user management (Group Policy).

Data Destruction

  • Degaussing
    Using a degausser to erase magnetic media (HDDs/tapes). Not effective for SSDs.
  • Shredding/Drilling
    Physical destruction of the drive platters/chips.
  • Overwriting
    Writing patterns over data (effective for HDDs). For SSDs, prefer secure erase/crypto erase per vendor guidance.

Knowledge Check

Which physical security measure is designed specifically to prevent tailgating?

Operational Procedures

Best practices for safety, documentation, and professional conduct.

Study Outcomes

  • Follow a basic change management flow (request → assess → approve → implement → backout → document) and know what “good” change documentation includes.
  • Use repeatable troubleshooting methodology and keep clear notes: symptoms, attempted steps, results, and next actions/escalation.
  • Describe baseline operational hygiene: backups and restore testing, patch windows, asset tracking, and secure disposal procedures.
  • Practice professional conduct: privacy and confidentiality, communication, and safety awareness in the workspace.

Change Management Process

1. Request Change
Submit a formal request (RFC) detailing the purpose and scope.
2. Impact Analysis
Determine risks, downtime, and affected systems.
3. Approval
Get sign-off from the Change Advisory Board (CAB).
4. Implementation
Execute the change during a scheduled maintenance window.
5. Backout Plan
Procedure to revert changes if implementation fails.
6. Documentation
Update network diagrams and close the ticket.

Change Types (Common in ITIL-style orgs)

  • Standard: pre-approved, low-risk, repeatable (e.g., routine patching) — often no CAB meeting required.
  • Normal: requires assessment + approval (most planned changes).
  • Emergency: urgent fix to restore service or stop active risk — document after the fact and review outcomes.

Strong RFCs include: scope, risk, test plan, rollback/backout, comms plan, maintenance window, and a clear success/verification step.

Safety & Environment

Physical Safety

  • ESD Protection

    Use antistatic wrist straps and mats, and connect them to a proper ground to prevent static discharge.

  • Fire Safety

    Use an electrical-rated extinguisher (commonly CO2 or dry powder). Never use water on energized equipment.

  • MSDS / SDS

    Safety Data Sheets for handling chemicals (toner, cleaners).

Environmental Controls

  • Temperature/Humidity

    Maintain manufacturer-recommended temperature and moderate humidity (often ~40-60%) to reduce ESD and corrosion risk.

  • UPS / Surge

    Uninterruptible Power Supply for outages; Surge protector for spikes.

Incident Response

First Response

Identify the issue, report to proper channels, and protect evidence (do not turn off if volatile data is needed).

First Responder Checklist

  • Identify: Confirm an incident is happening (e.g., ransomware screen, unusual traffic).
  • Report: Notify the security team/management immediately.
  • Isolate: Disconnect from the network (unplug cable/disable Wi-Fi) to stop spread.
  • Preserve: Do NOT reboot or power off unless instructed (preserves RAM evidence).
  • Document: Take photos of errors, note time/date, and record actions taken.

Chain of Custody

Document exactly who handled evidence, when, and where to maintain legal integrity.

Standard IR Flow

  1. Preparation (tools, access, runbooks, contacts)
  2. Identification (triage alerts/symptoms; confirm incident)
  3. Containment (limit spread; isolate systems/accounts)
  4. Eradication (remove malware/backdoors; patch root cause)
  5. Recovery (restore service; monitor for recurrence)
  6. Lessons learned (RCA + long-term fixes)
Order of volatility (when capturing evidence): CPU/registers → RAM → network connections → disk.

Knowledge Check

What is the first step in the Change Management process?

Learning Resources

Curated collection of resources to enhance your computer science journey.

Books

Essential reading materials for computer science fundamentals.

Explore Books

Videos

Video tutorials and lectures from industry experts.

Watch Videos

Interactive Labs

Hands-on coding exercises and virtual labs.

Start Practicing

CompTIA A+ Certification Prep

Resources for professional certification exams.

Prepare Now