Computer Science Study

Learn Everything

Comprehensive learning materials covering all computer science topics from A-Z

Platform Overview

Welcome to the CS Study platform, a comprehensive resource for mastering computer science concepts.

From hardware fundamentals to advanced algorithms, this platform provides interactive learning materials to help you succeed.

Key Features

  • Interactive Topics & Quizzes
  • CompTIA A+ Preparation
  • Code Examples & Resources
Scroll Down

Computer Science Topics

Comprehensive coverage of all computer science concepts from CompTIA A+ certification.

Safety & Professionalism

Proper procedures, communication, and safety measures in IT environments.

Learn More

Visible Computer

Understanding the visible components of a computer system.

Learn More

CPU

Central Processing Unit architecture, features, and performance.

Learn More

RAM

Random Access Memory types, technologies, and configurations.

Learn More

Firmware

BIOS, UEFI, and firmware configuration settings.

Learn More

Motherboards

Form factors, components, and features of modern motherboards.

Learn More

Power Supplies

Power supply specifications, connectors, and troubleshooting.

Learn More

Mass Storage Technologies

HDDs, SSDs, NVMe, and other storage technologies.

Learn More

Implementing Mass Storage

RAID, partitioning, formatting, and storage implementation.

Learn More

Essential Peripherals

Keyboards, mice, monitors, and other essential peripherals.

Learn More

Installing & Upgrading OS

OS installation methods, requirements, and upgrade paths.

Learn More

Working with OS

Navigating and configuring operating system settings.

Learn More

Users, Groups & Permissions

User account management and permission systems.

Learn More

Maintaining & Optimizing OS

Performance tuning, maintenance tasks, and optimization.

Learn More

Command-Line Interface

Essential command-line tools and scripting.

Learn More

Troubleshooting OS

Diagnosing and resolving operating system issues.

Learn More

Display Technologies

Monitor types, resolutions, and display technologies.

Learn More

Essentials of Networking

Networking fundamentals, protocols, and models.

Learn More

Local Area Networking

LAN technologies, cabling, and network devices.

Learn More

Wireless Networking

Wi-Fi standards, security, and configuration.

Learn More

The Internet

Internet technologies, services, and protocols.

Learn More

Virtualization

Virtual machines, hypervisors, and cloud concepts.

Learn More

Portable Computing

Laptops, tablets, and mobile computing devices.

Learn More

Mobile Devices

Smartphones, tablets, and mobile operating systems.

Learn More

Securing Mobile Devices

Mobile device management and security practices.

Learn More

Printers & MFPs

Printer technologies, maintenance, and troubleshooting.

Learn More

Securing Computers

Security threats, malware protection, and best practices.

Learn More

Operating Procedures

IT documentation, change management, and best practices.

Learn More

Safety & Professionalism

Master the essential skills for maintaining safety, professionalism, and excellence in IT environments.

Core Professional Skills

Professional Appearance

  • Dress appropriately for the work environment
  • Maintain personal hygiene
  • Project confidence through body language

Professional Conduct

  • Effective communication with all stakeholders
  • Active listening and empathy
  • Timeliness and reliability

Technical Methodology

  • Structured troubleshooting approaches
  • Documentation and knowledge sharing
  • Continuous learning mindset

IT Professionalism Essentials

Communication Excellence

Verbal Communication

Master the art of technical translation by adapting your language to different audiences. For non-technical users, use simple analogies ("Think of RAM like a desk workspace - the bigger it is, the more projects you can have open at once"). For technical peers, be precise but concise. Always confirm understanding by asking follow-up questions like, "Does this make sense so far?" or "Would you like me to clarify any part of this?"

Written Communication

Professional writing follows the ABC principle: A ccurate, B rief, C lear. Structure technical documentation with:

  • Problem statement (what's occurring)
  • Diagnosis (root cause analysis)
  • Solution steps (numbered instructions)
  • Prevention (how to avoid recurrence)

Status Reporting

Effective updates follow the 4P framework:

Progress

What's been accomplished since last update

Problems

Current blockers or unexpected issues

Plan

Next steps and timeline

Participation

What do you need to do now

Active Listening

Practice the LARA method for effective dialogue:

Listen without interrupting Acknowledge by paraphrasing Respond to emotional cues Ask clarifying questions

Safety & Environmental Protocols

ESD (Electrostatic Discharge)

Static electricity can damage components with as little as 30 volts, while humans can't feel it until 3,000 volts.

  • Prevention: Use Antistatic Wrist Straps (connect to chassis ground) and Antistatic Mats.
  • Storage: Store components in Antistatic Bags (Shielding vs Dissipative).
  • Self-Grounding: Touch unpainted metal chassis before handling components if no strap is available.
  • Environment: Keep humidity around 50% to reduce static buildup.
Fire Safety

Electrical fires require Class C fire extinguishers (Non-conductive chemicals like CO2 or Halon).

PASS Method: | Pull the pin | Aim at base | Squeeze lever | Sweep side to side
Power Protection
  • Surge/Spike: Sudden rise in voltage. Use Surge Protectors.
  • Sag/Brownout: Drop in voltage. Use UPS (Uninterruptible Power Supply).
  • Blackout: Complete power loss. Use UPS + Generator.
Environmental & Disposal

Follow MSDS / SDS (Safety Data Sheets) for chemical handling and disposal.

  • Batteries: Recycle (Li-ion risk of fire). Do not trash.
  • Toner Cartridges: Recycle or return to manufacturer.
  • CRTs: Hazardous (Lead/Phosphorus). specialized recycling.
Physical Safety

Lifting: Lift with legs, keep back straight. Weight limit awareness.
Cable Management: Prevent trip hazards using velcro/ties and floor covers.
Jewelry: Remove dangling jewelry/badges when working near moving parts (fans/printers).

IT Ethical Framework

Confidentiality

Protect: Customer data, passwords, and proprietary information. GDPR/HIPAA compliance ? Secure file disposal ? Need-to-know access

Integrity

Maintain: Truthful time reporting, accurate documentation, and transparent limitations. Disclose conflicts ? Reject bribes ? Credit others' work

Accountability

Own: Mistakes, system changes, and security incidents. Change logs ? Incident reports ? RCA documentation

Social Responsibility

Consider: Environmental impact, accessibility, and digital divide. E-waste recycling ? WCAG compliance ? Tech literacy programs

Legal Compliance

Adhere to: Licensing, copyright, and regulatory requirements. Software licenses ? Patent laws ? Export controls

AI Ethics

Ensure: Algorithmic fairness, transparency, and human oversight. Bias testing ? Explainable AI ? Human-in-the-loop

Responsibility

Uphold: System reliability, data backups, and disaster recovery. 99.9% uptime ? Backup verification ? Disaster recovery drills

Continuous Improvement

Pursue: Threat modeling, ethical hacking, and secure coding. CVE monitoring ? OWASP training ? Red team exercises

Professional Knowledge Check

What is the primary purpose of an ESD wrist strap?

When explaining technical issues to non-technical users, you should:

Professional Tip

Always carry a professional toolkit including:

  • ESD wrist strap
  • Multi-bit screwdriver
  • Flashlight
  • Network cable tester
  • Notepad and pen
  • USB diagnostic tools
  • Cable ties
  • Spare parts organizer

The Visible Computer

Understanding computer components, their connections, and how hardware and software work together.

How Computers Work

Input

Process

Storage

Output

Processing Components

  • CPU: Central Processing Unit (brain of the computer)
  • GPU: Graphics Processing Unit (handles visual data)
  • RAM: Temporary working memory
  • Motherboard: Central communication hub

Data Flow

Data moves through the system via buses and interfaces, with the CPU coordinating operations between components using electrical signals and binary code.

Power Conversion

The power supply converts AC to DC power at various voltages needed by different components.

Cables & Connectors

USB Standards & Speeds

Version Marketing Name Speed Connector
USB 2.0 High Speed 480 Mbps Type-A, Type-B, Mini, Micro
USB 3.0 (3.1 Gen 1) SuperSpeed 5 Gbps Type-A (Blue), Type-B, Micro-B
USB 3.1 (Gen 2) SuperSpeed+ 10 Gbps Type-A (Teal), Type-C
USB 3.2 (Gen 2x2) SuperSpeed++ 20 Gbps Type-C Only
USB 4.0 USB4 40 Gbps Type-C Only

Video Interfaces

VGA (DE-15) Analog, Blue, 15-pin. Legacy.
DVI DVI-A (Analog), DVI-D (Digital), DVI-I (Integrated). Single/Dual Link.
HDMI Digital Audio/Video. Type A (Std), C (Mini), D (Micro).
DisplayPort Packet-based, Daisy-chaining support. MiniDP.

Network & Phone

  • RJ-45: Ethernet (8 pins).
  • RJ-11: Telephone/Modem (4-6 pins).

Storage & Data

  • SATA: Internal drive data (L-shape).
  • eSATA: External SATA (Shielded).
  • Thunderbolt: v1/2 (MDP), v3/4 (USB-C). Up to 40Gbps.
  • Lightning: Apple proprietary (Mobile).

Operating Systems

Core Functions

Process management and multitasking
Memory allocation and virtual memory
File system management
Security and access control
Device drivers and hardware abstraction

Common Features

Graphical Interface

Windows, icons, menus, and pointer (WIMP) with desktop metaphor

File Management

Hierarchical directory structure with file explorer

Networking

Built-in TCP/IP stack and network configuration tools

System Utilities

Disk management, task manager, and control panel

Major Operating Systems

Windows
macOS
Linux
Android
iOS
Server OS

Hardware Deep Dive

Motherboard
CPU
RAM
Storage
GPU
Cooling
PSU

Processor

  • Cores: 2-64+ processing units
  • Clock speed: GHz range
  • Cache: L1/L2/L3 memory
  • Architecture: x86, ARM, etc.

Memory

  • Types: DDR4, DDR5, LPDDR
  • Capacity: 4GB-2TB+
  • Speed: MHz-GHz range
  • Volatile vs non-volatile

Storage

  • HDD: Magnetic platters
  • SSD: Flash memory
  • NVMe: PCIe interface
  • Cloud: Remote storage

Graphics

  • Integrated: CPU-based
  • Discrete: Dedicated GPU
  • VRAM: Dedicated memory
  • APUs: Hybrid solutions

Software Deep Dive

Applications
Utilities
Drivers
Middleware
Operating System

System Software

  • Operating systems
  • Device drivers
  • Firmware
  • Utilities

Application Software

  • Productivity suites
  • Creative tools
  • Web browsers
  • Games

Cloud Services

  • SaaS: Software as a Service
  • PaaS: Platform as a Service
  • IaaS: Infrastructure as a Service
  • Web applications

Development

  • Programming languages
  • IDEs
  • Compilers
  • Debuggers

How Software Interacts

Applications make system calls to the OS for resources

OS manages hardware through drivers and firmware

Middleware provides services between applications

Virtual machines and containers abstract the hardware

File Systems & Paths

Windows

  • NTFS (New Technology FS)
  • FAT32 (legacy)
  • exFAT (external drives)
  • Paths: C:\Users\Name\File

macOS

  • APFS (Apple File System)
  • HFS+ (legacy)
  • Case-insensitive
  • Paths: /Users/Name/File

Linux

  • ext4 (common)
  • XFS, Btrfs
  • Case-sensitive
  • Paths: /home/name/file

Mobile

  • F2FS (Flash storage)
  • Sandboxed apps
  • Limited access
  • Cloud integration

Path Navigation

Absolute:
/home/user/docs/report.txt

Full path from root

Relative:
../images/photo.jpg

From current directory

Special paths: ~ (home), . (current), .. (parent)

User Interfaces

CLI
(1970s)
GUI
(1984)
Web
(1990s)
Touch
(2007)
Voice
(2010s)

CLI

Command Line Interface - text-based input with commands and parameters

Powerful for automation

GUI

Graphical User Interface - visual elements like windows and icons

Intuitive for beginners

Touch

Direct manipulation with gestures like tap, swipe, pinch

Mobile-friendly

Voice/NUI

Natural User Interfaces using speech recognition

Hands-free operation

Modern UI Example:

Windows 11 combines GUI (Start menu, windows) with touch (gestures), voice (Cortana), and CLI (PowerShell/WSL) for versatile interaction.

CPU (Central Processing Unit)

The brain of the computer that performs calculations and executes instructions.

Conceptual Overview & History

Evolution of CPUs

From vacuum tubes in the 1940s to today's nanometer-scale transistors, CPUs have evolved dramatically.

1947: First transistor invented at Bell Labs
1971: Intel 4004 - First commercial microprocessor (4-bit, 740kHz)
1985: 32-bit processors emerge (Intel 80386)
2005: Multi-core processors become standard
2020s: 3-5nm process nodes with hybrid architectures

CPU Architectures

x86 : Intel/AMD desktop CPUs
ARM : Mobile/Apple M-series
MIPS : Embedded systems
RISC-V : Open-source architecture
Key Differences
  • CISC (x86): Complex instructions, variable length
  • RISC (ARM/MIPS): Simplified instructions, fixed length
  • Endianness : Byte ordering (Big-Endian vs Little-Endian)

CPU Core Components

ALU (Arithmetic Logic Unit)

Performs all arithmetic and logical operations including:

  • Integer arithmetic (add, subtract, multiply)
  • Bitwise operations (AND, OR, NOT, XOR)
  • Comparisons (greater than, equal to)
  • Shift/rotate operations
Modern ALUs often include FPUs (Floating Point Units)

Control Unit

The conductor of the CPU orchestra:

  • Manages fetch-decode-execute cycle
  • Generates control signals for all components
  • Handles interrupts and exceptions
  • Coordinates pipeline stages
Uses microcode for complex instruction handling

Registers & Cache

PC (Program Counter) Next instruction address
IR (Instruction Register) Current instruction
MAR (Memory Address) Address for memory access
MDR (Memory Data) Data being read/written
General Purpose Temporary data storage
Register access: 0.5-1ns vs RAM: 80-100ns

The Full Cycle: From Boot to Browser

1. Power On & Reset Vector

CPU begins execution at a fixed memory address (0xFFFFFFF0 in x86) in ROM. The Power Good signal from PSU triggers this.

PC set to reset vector
ROM mapped to address space

2. POST (Power-On Self-Test)

CPU executes BIOS/UEFI firmware to:

  • Test RAM (write/read patterns)
  • Initialize hardware (PCIe enumeration)
  • Set up interrupt vectors
  • Build ACPI tables
Control Unit manages tests
Buses verified

3. Bootloader Execution

CPU loads bootloader via these steps:

  1. Reads boot device (MBR/GPT)
  2. Loads first sector to 0x7C00
  3. Transitions to protected/long mode
  4. Loads kernel to memory
MAR/MDR used for transfers
DMA may assist

4. OS Initialization

CPU executes kernel startup:

  • Initializes memory management (paging)
  • Sets up IDT/GDT (interrupt descriptors)
  • Starts scheduler and processes
  • Loads drivers via ACPI
MMU activated
Timers configured

5. Browser Launch (Simplified)

When you click a browser icon:

  1. Shell makes exec() system call
  2. CPU switches to kernel mode
  3. MMU maps executable into memory
  4. Dynamic linker loads libraries
  5. CPU begins executing browser code
  6. Multiple threads created for UI/network
Branch Prediction
Cache Hierarchy
Pipelining

Memory Context & Buses

Buses & Interconnects

Address Bus

Carries memory addresses from CPU to RAM. Width determines maximum addressable memory:

32-bit : 4GB limit
64-bit : 16 exabytes

Data Bus

Transfers actual data between CPU and memory. Modern systems use 64-bit wide buses.

Control Bus

Carries signals like:

READ
WRITE
IRQ
RESET
CLK
WAIT

Memory Hierarchy

Registers
1 cycle PC, IR, MAR, MDR
L1 Cache
~4 cycles 64KB/core
L2 Cache
~12 cycles 256KB-1MB
L3 Cache
~30 cycles 8-32MB shared
RAM
~100 cycles DDR4/DDR5

Clock Cycles & Pipelining

Clock Cycle Breakdown

Clock Speed 2.5GHz - 5.8GHz
CPI (Cycles/Instruction) 0.25-10 (varies by arch)
IPC (Instructions/Cycle) Up to 4-6 (modern CPUs)
Superscalar Execution

Modern CPUs can execute multiple instructions per cycle through:

  • Multiple ALUs
  • Out-of-order execution
  • Speculative execution

Instruction Pipeline

Modern CPUs use deep pipelines (15-20 stages) to overlap execution:

Fetch
Decode
Rename
Schedule
Execute
Memory
Bypass
Writeback
Retire
Hazards & Solutions
Structural : More units
Data : Forwarding
Control : Prediction

Modern CPU Technologies

Multi-Core & Hybrid

Modern approaches to parallelism:

  • P-cores : High performance (Intel Golden Cove)
  • E-cores : Power efficiency (Intel Gracemont)
  • SMT : Hyper-Threading (2 threads/core)
  • ccNUMA : Non-uniform memory access
Apple M1: 4P + 4E cores, Intel Alder Lake: 8P + 8E

Process Nodes

1971: 10?m Intel 4004
2000: 180nm Pentium 4
2020: 7nm AMD Zen 3
2023: 3nm Apple A17 Pro
Node names now marketing (Intel 7 ? TSMC 4nm)

Advanced Features

SIMD : AVX-512, Neon
Virtualization : VT-x, AMD-V
AI : AMX, NPUs
Security : SGX, TPM
Power : DVFS, C-states
Memory : ECC, TRR
SIMD : Single Instruction Multiple Data

Selecting a CPU

Socket Compatibility

Intel : LGA1700, LGA1851
AMD : AM5, sTRX4

Check chipset support (Z790 vs B650) and BIOS requirements.

Performance Needs

Gaming : Clock speed
Editing : Cores
Servers : ECC

Thermal Considerations

TDP : 65W-350W Cooling : Air/Liquid

High-end CPUs may require 240mm+ AIO liquid coolers.

Installation & Troubleshooting

Installation Issues

Bent pins (LGA)
Paste application
Pressure uneven
Power connectors

Overheating Symptoms

Throttling
Shutdowns
BSODs
Instability

Catastrophic Failures

No POST
Burning
Damage

May require motherboard replacement if socket damaged.

Developer Perspective

Optimization Techniques

Cache Optimization
  • Structure of Arrays vs Array of Structures
  • Prefetching patterns
  • Alignment to cache lines (64B)
Parallelism
  • Thread affinity/pinning
  • False sharing avoidance
  • Vectorization (SIMD)

Benchmarking & Analysis

Performance Counters
L1/L2/L3 cache misses
Branch mispredictions
IPC (Instructions/Cycle)
CPI (Cycles/Instruction)
Tools
perf (Linux)
VTune (Intel)
AMD uProf
LLVM-MCA

Acronym Key

ALU : Arithmetic Logic Unit
PC : Program Counter
IR : Instruction Register
MAR : Memory Address Register
MDR : Memory Data Register
SIMD : Single Instruction Multiple Data
IPC : Instructions Per Cycle
CPI : Cycles Per Instruction
MMU : Memory Management Unit
TDP : Thermal Design Power
SMT : Simultaneous Multithreading
ccNUMA : Cache-Coherent Non-Uniform Memory Access

Knowledge Check

What is the purpose of the CPU's MAR register?

RAM (Random Access Memory)

Temporary storage that the CPU uses to store data that is actively being worked on.

Conceptual Understanding

How RAM Works

RAM is volatile memory that provides fast temporary storage for data being actively used by the CPU.

DRAM (Dynamic RAM)

Needs constant refreshing, used for main system memory.

SRAM (Static RAM)

Faster but more expensive, used for CPU cache.

Memory Hierarchy
CPU Registers (Fastest)
CPU Cache (SRAM)
Main Memory (DRAM)
Storage (SSD/HDD)

RAM Evolution

RAM Generations Timeline

SDRAM (1993)

Synchronous DRAM, first to sync with system bus

DDR (2000)

Double Data Rate, 2x transfer rate

DDR2 (2003)

Higher speeds, lower power

DDR3 (2007)

Higher bandwidth, 1.5V standard

DDR4 (2014)

Higher density, 1.2V standard

DDR5 (2020)

Doubled bandwidth, on-die ECC

Visual Comparison

DDR3 240-pin
DDR4 288-pin
DDR5 288-pin (different notch)
DDR3
DDR4
DDR5
Future

RAM Modules & Form Factors

DIMM (Desktop RAM)

Dual In-line Memory Modules used in desktop computers and servers.

Length

133.35mm

Pins

288 (DDR4/DDR5)

SO-DIMM (Laptop RAM)

Small Outline DIMMs used in laptops and compact systems.

Length

67.6mm

Pins

260 (DDR4)

Performance Metrics

Capacity

Minimum 4GB
Standard 16GB
High-End 128GB+

Speed

DDR4 1600-3200MHz
DDR5 4800-6400MHz

Latency

CAS Latency CL16-CL40
Impact Lower = Better

Installation & Troubleshooting

Installation Best Practices

Dual-Channel Architecture

Install pairs in matching colored slots (usually 2 & 4) to double bandwidth (128-bit path).

Compatibility

Do not mix speeds (system slows to lowest). Do not mix ECC and Non-ECC.

Physical Install
  • Align notch (keying prevents backward install).
  • Apply firm pressure until side clips snap.
  • Laptop (SO-DIMM): Insert at 45? angle, then push down.

Troubleshooting RAM

Beep Codes

Continuous beeps or specific patterns (check motherboard manual) indicate RAM failure or missing RAM.

Reseating

Remove and reinstall modules. Oxidation or loose connection is a common cause of failure.

Diagnostics

Use Windows Memory Diagnostic or MemTest86 to check for address errors.

System Behavior

Random BSODs, freezing, or "Page Fault" errors often point to bad RAM.

Do You Need More RAM?

Signs You Need More

Frequent slowdowns with multiple apps
Excessive disk activity (thrashing)
Applications crashing unexpectedly
Task manager shows high RAM usage

Recommended Amounts

Basic Use

8GB

Office Work

16GB

Gaming

16-32GB

Content Creation

32GB+

RAM Configurations

Single Channel

Basic configuration with one RAM stick

64-bit bus

Dual Channel

Two identical sticks for 128-bit bus

64-bit
64-bit

Quad Channel

High-end systems with four sticks

64-bit
64-bit
64-bit
64-bit

Troubleshooting RAM Issues

Common Problems

No Boot/Beep Codes

Check seating, try one stick at a time

BSOD/Crashes

Run memory diagnostics (Windows: mdsched.exe)

Underperforming

Verify running at correct speed in BIOS

Compatibility Checks

Motherboard supports RAM type (DDR4/DDR5)
Speed supported by CPU/motherboard
Maximum capacity per slot/channel
For dual/quad channel: use identical sticks

RAM Knowledge

ECC vs Non-ECC

ECC (Error Correcting Code) memory detects and fixes bit errors, used in servers and workstations.

Registered (Buffered) RAM

Contains a register between RAM and memory controller for stability with large amounts of RAM.

XMP Profiles

Intel's Extreme Memory Profile for easy overclocking of supported RAM kits.

Knowledge Check

What type of memory is volatile and loses data when power is removed?

Firmware Ecosystem

The foundational layer controlling hardware initialization, system configuration, and secure boot processes across all computing platforms.

Windows Linux macOS Enterprise

Core Firmware Components

BIOS/UEFI

System firmware that initializes hardware and boots the OS.

Manages hardware abstraction
Secure Boot implementation
Power management

CMOS/RTC

Battery-backed memory storing system settings and clock.

Typically CR2032 battery
64-256 bytes of storage
Maintains date/time

POST Process

Power-On Self-Test verifies hardware before boot.

Beep codes for errors
Video test sequence
Hardware verification

Boot Process Flow

Power On

CPU Init

RAM Test

Device Enum

Bootloader

Consumer Boot

UEFI ? Boot Manager ? Windows Boot Manager (bootmgfw.efi) or GRUB2 (Linux)

Enterprise PXE Boot

UEFI ? iPXE ? DHCP ? TFTP ? WDS/SCCM (Windows) or Cobbler (Linux)

BIOS/UEFI Configuration

Keyboard Communication

PS/2 vs USB initialization, legacy support, NKRO (N-Key Rollover) settings

CMOS & Setup Utility

Access methods (DEL, F2, F12), navigation, hierarchy structure

Security Settings

  • Secure Boot (Microsoft, Custom, Other OS)
  • TPM 2.0/1.2 configuration
  • Boot password protection
  • Intel TXT/AMD PSP features

Save & Exit Options

Save profiles, discard changes, boot override, secure flash validation

POST & Boot Process

Beep/Error Codes

AMI, Award, Phoenix, IBM, Dell proprietary codes

1-3-1 : RAM error
2-2-3 : ROM error
1 long : POST passed
Continuous : Power issue

POST Cards & Debug

PCIe/ISA debug cards, port 80h readouts, OEM-specific LEDs

SuperMicro: BMC debug headers, ASUS: Q-Code displays

PXE Boot Process

  1. DHCP discovery
  2. TFTP download of NBP (Network Bootstrap Program)
  3. UNDI network stack initialization
  4. OS image download

Firmware Maintenance

CMOS Management

  • Clearing CMOS via jumper/battery removal
  • RTC (Real-Time Clock) drift compensation
  • NVRAM corruption recovery
  • Battery voltage thresholds (typically 2.7-3.3V)

Flashing Procedures

  • In-system programming (ISP) methods
  • Recovery modes (ASUS CrashFree, Gigabyte DualBIOS)
  • Dell/HPE/Lenovo vendor-specific tools
  • Supermicro IPMI flash updates

Security Best Practices

  • Regular firmware updates (quarterly review)
  • Secure flash validation (checksums, signatures)
  • Disabling unused features (Legacy ROM, CSM)
  • Physical write-protection when appropriate
Platform Windows Tools Linux Tools macOS Tools Enterprise Methods
ASUS AI Suite, EZ Flash fwupd, afudos Boot Camp (Intel) ASUS Control Center
Supermicro SUM (SuperMicro Update Manager) ipmitool, sfcbd N/A IPMI/BMC web interface
Dell Dell Command Update fwupd, dsu Boot Camp (Intel) iDRAC, OpenManage
Apple Boot Camp (Intel) apple-bce (limited) System Firmware Updates MDM profiles (macOS Server)

Enterprise Firmware Management

Server Platform Firmware

IPMI/BMC Features
  • KVM over IP (Keyboard-Video-Mouse)
  • Serial over LAN (SOL)
  • SEL (System Event Log) monitoring
  • FRU (Field Replaceable Unit) inventory
Blade Server Considerations

Chassis-level firmware vs blade-level firmware, interposer modules, management module updates

Network Deployment

PXE Infrastructure
  • DHCP options (66/67 for boot server)
  • TFTP vs HTTP boot
  • UEFI HTTP Boot (RFC 7230)
  • iSCSI SAN booting
Centralized Management

Dell OpenManage, HPE OneView, Lenovo XClarity, Cisco UCS Manager

Most solutions support firmware baselines and staged rollouts

Vendor Comparison

Vendor Management Interface Firmware Update Method Unique Features
Supermicro IPMI 2.0, Redfish SUM, SMCIPMITool SMBios DMI editing
ASUS Server ASMB (ASUS Server Management Board) ASUS Control Center TPM auto-provisioning
Dell PowerEdge iDRAC (Dell Remote Access Controller) Dell Repository Manager Rollback protection
HPE ProLiant iLO (Integrated Lights-Out) Service Pack for ProLiant Silicon Root of Trust

Motherboard Guide

The foundation of every computing system - from desktops to enterprise servers

Motherboard Architecture

PCB Layers

2-Layer Basic Systems
4-Layer Standard Desktops
6+ Layer Servers/High-End

Form Factors

ATX (Standard Desktop)
Micro-ATX (Compact)
E-ATX (Server)
Blade (Modular Server)
CPU RAM PCIe Slots Chipset I/O

Key Specifications

Socket Type LGA1700/AM5
RAM Support DDR4/DDR5
PCIe Version 4.0/5.0
Storage Options M.2/SATA

Desktop Components

CPU Socket

LGA, AM4/5, PGA

RAM Slots

2-4 DIMMs

PCIe Slots

x16, x8, x4, x1

Storage

M.2, SATA

Power

24-pin + 8-pin

Networking

1G/2.5G Ethernet

Server Components

CPU Sockets

Dual/Quad Socket

RAM Capacity

8-16 DIMMs, ECC

Remote Mgmt

IPMI, iDRAC

Hot-Swap

Drives, PSUs

Power

Dual PSUs

Networking

10G/25G/40G

Expansion Bus Architecture

PCI (Legacy)

133 MB/s max
Shared bandwidth
32-bit parallel

PCI Express

Up to 128 GB/s
Dedicated lanes
Serial point-to-point
PCI PCIe 3.0 PCIe 5.0 133 MB/s 1 GB/s 4 GB/s

Headers & Connectors

Front Panel (JFP1)

Connects case buttons and LEDs. Polarity matters for LEDs (+/-).

Power SW Reset SW HDD LED Power LED

Internal USB

  • USB 2.0: 9-pin header (Double row, one missing pin).
  • USB 3.0: 19-pin header (Blue, larger).
  • USB-C: Key-A header (Metal shield).

Fan Headers

  • 3-Pin: DC Control (Voltage regulation).
  • 4-Pin: PWM (Pulse Width Modulation) - Constant 12V, speed signal.
  • CPU_FAN: Critical header (System may not boot if empty).

Installation & Troubleshooting

Standoffs

CRITICAL: Ensure standoffs match mounting holes. Extra standoffs cause short circuits.

I/O Shield

Install before the motherboard. Watch for metal tabs grounding into ports.

Common Issues

  • No Power: Check Front Panel "Power SW" connection.
  • Boot Loop: Check RAM seating.
  • Short Circuit: Check for loose screws/standoffs.

Knowledge Check

Which motherboard component handles CPU to RAM communication?

What's the main advantage of PCIe over PCI?

Which is NOT a server motherboard feature?

What should you check first if a new motherboard won't POST?

Power Supply Unit (PSU) Complete Coverage

Comprehensive guide to AC/DC power conversion, distribution, and management for all computing environments

Power Supply Fundamentals

Basic Function

  • Converting AC (Alternating Current) to DC (Direct Current)
  • Voltage regulation and filtering
  • Power distribution to components
  • Electrical safety and protection

Power Sources

  • Wall outlet AC power (110V/220V)
  • UPS (Uninterruptible Power Supply)
  • Battery backup systems
  • Solar/alternative power integration

Quick Reference

80 PLUS Ratings Efficiency
White 80%
Bronze 82-85%
Silver 85-88%
Gold 87-90%
Platinum 90-92%
Titanium 90-94%
Form Factors Size
ATX Standard
SFX Small
TFX Thin
FlexATX Compact

Desktop Form Factors

  • ATX (Advanced Technology eXtended) - Standard
  • SFX (Small Form Factor) - Compact
  • TFX (Thin Form Factor) - Low-profile
  • Flex ATX - Mini-ITX builds

Server/Enterprise

  • Redundant power supplies (N+1, 2N)
  • Hot-swap capabilities
  • 1U/2U rack-mount formats
  • Blade server power modules
  • High-efficiency standards (80+ Titanium)

Power Requirements

Component Power Draw

  • CPU (TDP - Thermal Design Power)
  • GPU (Peak vs sustained)
  • Storage devices
  • RAM and motherboard

Calculation Methods

  • Online PSU calculators
  • Manual wattage estimation
  • 20-30% overhead for upgrades

PSU Specifications & Technologies

Wattage & Rails

Continuous vs peak 80-100%
Single vs multi-rail 12V primary
  • +12V (CPU/GPU)
  • +5V (storage)
  • +3.3V (motherboard)
  • -12V (legacy)

Protection Features

OVP
Over-Voltage
UVP
Under-Voltage
OCP
Over-Current
OTP
Over-Temp
OPP
Over-Power
SCP
Short Circuit

Cooling & PFC

Active vs passive Fan curves
PFC (Power Factor Correction) Active > Passive
Fan bearing types: Fluid Dynamic, Rifle, Ball
Harmonic distortion reduction

Connectors & Cables

24-pin ATX

Main motherboard power

4+4-pin EPS

CPU power

6+2-pin PCIe

GPU power

SATA

Storage devices

Molex

Legacy peripherals

Berg

Floppy drives

Modular vs non-modular designs
Cable length considerations (450mm-700mm)

Installation & Troubleshooting

Installation

  • Fan Orientation: Fan should face intake vent (usually bottom).
  • Modular Cables: Only use cables provided with the PSU (Pinouts vary!).

Troubleshooting

  • Paperclip Test: Jump Green (PS_ON) to Black (COM) to test if PSU turns on.
  • Multimeter: Check voltages (Yellow=12V, Red=5V, Orange=3.3V). Tolerance ±5%.
  • Symptoms: Random reboots (Power Good signal drop), Burning smell, No fan spin.

Safety

NEVER open a PSU. Capacitors hold lethal charge even when unplugged.

Enterprise & Server Power Systems

Redundancy

  • N+1 configuration
  • 2N full redundancy
  • Hot-swap capabilities
  • Failover testing

PDU (Power Distribution Unit)

  • Basic vs metered
  • Switched PDUs
  • 208V vs 240V
  • Remote management

UPS (Uninterruptible Power Supply)

  • Online vs line-interactive
  • Runtime calculations
  • SNMP monitoring
  • Generator integration

PXE (Preboot Execution Environment)

  • Network boot requirements
  • Power sequencing
  • Wake-on-LAN (WoL)
  • IPMI (Intelligent Platform Management Interface)

Testing & Diagnostics

Basic Methods

  • Paper clip test (PSU standalone)
  • Multimeter voltage testing
  • Power-on self-test (POST)

Advanced Diagnostics

  • PSU load testers
  • Oscilloscope ripple testing
  • Thermal imaging

Troubleshooting

No Power

  • Verify PSU switch position
  • Test wall outlet
  • Check cable connections

Intermittent Issues

  • Temperature-related
  • Load-dependent failures
  • Capacitor aging

Mass Storage Technologies

Devices and technologies for long-term data storage

History & Evolution

Mass storage began with magnetic tape in the 1950s, evolving through hard disk drives (HDDs) in 1956, optical storage (CDs/DVDs) in the 1980s, and solid-state drives (SSDs) in the 2000s.

1950s: Magnetic Tape
1956: First HDD (IBM 350)
1982: CD-ROM
2007: First Consumer SSDs

Tape HDD Optical SSD

How Hard Drives Work

HDDs store data on spinning magnetic platters with read/write heads that move across the surface.

Platters

Stacked magnetic disks that spin at 5400-15000 RPM

Actuator Arm

Moves read/write heads across platter surfaces

Sectors

512-byte or 4K segments where data is stored

Hard Disk Drive (HDD) Diagram

Storage Comparison

Hard Disk Drives (HDD)

Technology: Magnetic
Speed: 120-250 MB/s
Capacity: 500GB-20TB
Durability: ~5 years
Cost: $0.02-$0.05/GB

Solid State Drives (SSD)

Technology: Flash Memory
Speed: 500-7000 MB/s
Capacity: 120GB-8TB
Durability: ~10 years
Cost: $0.08-$0.20/GB

Connection Interfaces

SATA III

Standard for 2.5" SSDs and HDDs.

Speed: 6 Gbps (600 MB/s)

NVMe (M.2)

Uses PCIe lanes. Direct CPU connection.

Speed: 3500-7000+ MB/s

M.2 Keys

Notch positions prevent wrong install.

Types: B-Key (SATA), M-Key (NVMe)

Legacy

Older standards found in retro systems.

Types: PATA (IDE), SCSI

RAID Levels

RAID 0 (Striping)

High Speed

Splits data evenly across two or more disks.

  • Performance: High (Read/Write)
  • Fault Tolerance: None (0)
  • Min Drives: 2

RAID 1 (Mirroring)

High Safety

Exact copy of data on two or more disks.

  • Performance: Good Read, Slow Write
  • Fault Tolerance: High (1 drive failure)
  • Min Drives: 2

RAID 5 (Striping + Parity)

Balanced

Stripes data and parity across all drives.

  • Performance: Good Read, Slow Write (Parity calc)
  • Fault Tolerance: Yes (1 drive failure)
  • Min Drives: 3

RAID 10 (1+0)

Best of Both

Stripe of Mirrors. Combines speed and redundancy.

  • Performance: High
  • Fault Tolerance: High (1 drive per mirror)
  • Min Drives: 4

RAID Implementation Types

Hardware RAID

Dedicated controller with processor and cache

Software RAID

OS-managed with CPU overhead

Dedicated RAID Boxes

External enclosures with RAID support

RAID Disk 1 Disk 2 Disk 3

Drive Installation & Troubleshooting

Installation Checklist

Power & Data: Ensure both cables are seated (SATA).
M.2 Standoff: Use correct height to avoid bending.
BIOS Mode: Set SATA to AHCI (not IDE/RAID) for SSDs.
Boot Order: Set new OS drive as primary boot device.

Common Issues

Boot Device Not Found: Check cables, boot order, or MBR/GPT mismatch.
Slow Performance: Check for full drive (keep 10-20% free) or enable TRIM.
Clicking Noise: Mechanical failure imminent (HDD). Backup immediately!
S.M.A.R.T. Errors: Self-Monitoring Analysis and Reporting Technology warning. Replace drive.

Implementing Mass Storage

Techniques for configuring and managing storage devices

Partitioning Systems

MBR (Master Boot Record)

  • Legacy system (since 1983)
  • Max 4 primary partitions
  • 2TB partition size limit
  • Stores boot code in first sector

GPT (GUID Partition Table)

  • Modern standard (UEFI required)
  • 128 partitions by default
  • 9.4ZB (zettabyte) max size
  • CRC32 checksums for integrity

File Systems

Windows File Systems

FAT32

Compatible but limited (4GB file size)

Max Volume: 32GB (Win)

NTFS

Windows standard with security features

Max File: 16TB

exFAT

Optimized for flash storage

Max File: 16EB

Other OS File Systems

HFS+ / APFS macOS (Legacy / Current)
ext3 / ext4 Linux Standard

Network & Optical

NFS Network File System (Linux)
CDFS / UDF Optical Media (CD/DVD/Blu-ray)

Partitioning Tools

Windows Tools

Disk Management

Built-in tool for basic partitioning

DiskPart

Command-line utility

Third-party Tools

EaseUS, MiniTool, AOMEI

Linux Tools

fdisk/gdisk

Command-line partitioning

GParted

Graphical partition editor

LVM

Logical Volume Management

Storage Spaces (Windows)

Storage Spaces lets you pool multiple drives together with resiliency options similar to RAID.

Simple

No redundancy (like RAID 0)

Mirror

Data duplication (like RAID 1)

Parity

Efficiency with redundancy (like RAID 5)

Storage Pool Drive 1 Drive 2 Drive 3

Maintenance & Troubleshooting

Maintenance

Disk Cleanup

Remove temporary files and system clutter

Defragmentation

HDDs only (not needed for SSDs)

SMART Monitoring

Check drive health indicators

Troubleshooting

Drive Not Detected

Check connections, BIOS settings, Bad Partition or Volume

Corrupt Data

Run CHKDSK (Windows) or fsck (Linux)

Slow Performance

Check for failing sectors or SSD wear

Essential Peripherals

Input and output devices that extend computer functionality with connection interfaces

Connectivity & Ports

Bluetooth Standards

Short-range wireless communication.

Class 1: 100mW, ~100m
Class 2: 2.5mW, ~10m (Most Common)
Class 3: 1mW, ~1m

USB Standards

Universal Serial Bus speeds and colors.

USB 2.0 (Black): 480 Mbps
USB 3.0 (Blue): 5 Gbps
USB 3.1 Gen 2 (Red/Teal): 10 Gbps
USB 3.2 Gen 2x2: 20 Gbps

NFC & RFID

Contactless communication technologies.

NFC Range: ~4cm (Payment, Pairing)
RFID: Tags, Tracking, Access Cards

Video Interfaces

Display connection standards.

VGA (DE-15): Analog, Blue, 15-pin
DVI-D/I: Digital/Integrated, White
HDMI: Audio+Video, Digital
DisplayPort: Packet-based, Daisy-chaining

Common Peripherals

Keyboards

Mechanical
Membrane
Wireless
Ergonomic

Pointing Devices

Optical
Laser
Trackball
Touchpad

Biometric Devices

Biometric authentication using unique physical characteristics.

QR & Barcode Scanners

Devices that read optical machine-readable representations of data.

Touch Screens

Resistive
Capacitive
Infrared
SAW

KVM Switches

Hardware devices that allow control of multiple computers from a single keyboard, video monitor, and mouse.

Other Input Devices

Game Controllers

Gamepads
Joysticks
Racing Wheels
Flight Sticks

Digitizers

Graphics tablets for digital art and signatures.

Storage Media

Flash Memory

USB Drives
SD Cards
microSD
CFexpress
SD (Secure Digital) - removable flash memory card format

Optical Media

CD
DVD
Blu-ray
HD DVD
CD (Compact Disc), DVD (Digital Versatile Disc)

Knowledge Check

Which connection type is most common for modern peripherals?

Installing & Upgrading OS

Methods and considerations for installing and upgrading operating systems.

Installation Methods

Media Types

Different ways to install an operating system.

Optical Media (DVD)
USB Flash Drive
Network Installation

Installation Types

Clean Install Fresh OS on empty drive
Upgrade Preserve files and settings
Dual Boot Multiple OS on same machine

Requirements

Windows 11

TPM 2.0, Secure Boot, 4GB RAM, 64GB storage.

macOS

Apple hardware, 4GB RAM, 35GB storage.

Linux

Varies by distro, typically 2GB RAM, 25GB storage.

Knowledge Check

Which installation method completely erases the existing OS?

Operating Systems

Managing hardware resources, file systems, and user interfaces.

Windows Editions

Windows Home
Consumer use. No Domain Join, no BitLocker (full), max 128GB RAM.
Windows Pro
Business use. Domain Join, BitLocker, RDP Host, Hyper-V.
Windows Enterprise
Large orgs. AppLocker, BranchCache, DirectAccess.

macOS Features

  • Spotlight

    System-wide search (Cmd + Space).

  • Mission Control

    View all open windows and desktops.

  • Terminal

    Unix-based command line interface (zsh).

File Systems & Boot Process

File Systems

System OS Features
NTFS Windows Security, Compression, 4GB+ files.
FAT32 All Max 4GB file size. High compatibility.
exFAT All No 4GB limit. Optimized for flash drives.
ext4 Linux Journaling, high performance.
APFS macOS Optimized for SSDs, encryption.

Boot Process

  1. 1. BIOS / UEFI

    Firmware initializes hardware.

  2. 2. POST

    Power-On Self-Test checks RAM, CPU, Video.

  3. 3. Bootloader

    Locates OS kernel (Windows Boot Manager / GRUB).

  4. 4. Kernel Load

    OS core loads into memory and starts services.

Working with OS

Navigating and configuring operating system settings and features.

Command Line Interfaces & Tools

Windows (CMD/PowerShell)
  • ipconfig - View network config
  • ping - Test connectivity
  • tracert - Trace route to host
  • netstat - Network statistics
  • nslookup - DNS query
  • chkdsk - Check disk errors
  • sfc /scannow - System file checker
  • gpupdate - Update group policy
Linux (Bash)
  • ifconfig / ip a - View network config
  • ping - Test connectivity
  • traceroute - Trace route to host
  • netstat / ss - Network statistics
  • dig - DNS query
  • fsck - Check file system
  • ls -l - List files with permissions
  • sudo - Execute as superuser

System Configuration Tools

Windows Tools

Control Panel Legacy settings & applets
Settings App Modern configuration hub
MMC (Snap-ins) Advanced management (compmgmt.msc)

macOS & Linux

System Preferences macOS main config
Terminal Primary config tool for Linux

Task Management

Task Manager

Monitor and manage running processes (Windows).

Activity Monitor

Monitor system resources (macOS).

System Monitor

Linux equivalent for process management.

Knowledge Check

Which tool would you use to end a frozen application in Windows?

Users, Groups & Permissions

Managing user accounts, groups, and access control in operating systems.

Account Types

Windows

User account types in Windows operating systems.

Administrator
Standard User
Guest

Linux/macOS

User account types in Unix-based systems.

Root (Superuser)
Standard User
System Accounts

Permission Systems

NTFS Permissions

Windows file system permissions (Full Control, Modify, etc.).

POSIX Permissions

Unix/Linux permission system (rwx for user/group/others).

Group Policy

Windows domain-level permission management.

Knowledge Check

What does the permission "rwxr-xr--" mean in Linux?

Maintaining & Optimizing OS

Techniques for keeping operating systems running smoothly and efficiently.

Maintenance Tasks

Routine Maintenance

Regular tasks to keep the OS performing well.

Disk Cleanup
Defragmentation (HDDs)
Software Updates

Performance Monitoring

Task Manager Windows process monitoring
Activity Monitor macOS resource monitoring
Performance Monitor Advanced Windows metrics

Optimization Techniques

Startup Management

Controlling which applications launch at startup.

Service Optimization

Disabling unnecessary background services.

Virtual Memory

Adjusting page file settings for optimal performance.

Knowledge Check

Which maintenance task is NOT recommended for SSDs?

Scripting & Remote Access

Automating tasks and managing systems remotely.

Scripting Basics

Batch (.bat)

Legacy Windows scripting.

@echo off
echo Hello World
pause

PowerShell (.ps1)

Modern Windows automation.

Write-Host "Hello"
Get-Service | Where-Object Status -eq 'Running'

Bash (.sh)

Linux/macOS scripting.

#!/bin/bash
echo "Hello World"
ls -la

Data Types

  • String: Text characters ("Hello")
  • Integer: Whole numbers (42)
  • Floating Point: Decimals (3.14)
  • Boolean: True/False

Constructs

  • Loops: Repeat actions (For, While)
  • Variables: Store data ($name)
  • Comments: Notes (# or REM)

Remote Access Protocols

RDP (Remote Desktop Protocol)

Microsoft proprietary protocol for GUI access.

Port: TCP/UDP 3389

SSH (Secure Shell)

Encrypted command-line access (Linux/macOS).

Port: TCP 22

Telnet

Unencrypted command-line access (Insecure!).

Port: TCP 23

VNC (Virtual Network Computing)

Platform-independent graphical desktop sharing.

Port: TCP 5900

Troubleshooting OS

Diagnosing and resolving common operating system issues.

Critical Errors

BSOD (Blue Screen of Death)

MEMORY_MANAGEMENT
Faulty RAM or driver issue. Run Windows Memory Diagnostic.
NTFS_FILE_SYSTEM
Hard drive corruption. Run chkdsk.
INACCESSIBLE_BOOT_DEVICE
Driver issue or changed SATA mode (AHCI/RAID).

Boot Issues

  • No Boot Device Found

    Check BIOS boot order. Ensure drive is detected.

  • Missing NTLDR / BOOTMGR

    Boot sector corruption. Use Startup Repair or `bootrec /fixboot`.

  • Services Fail to Start

    Check Event Viewer (System Log). Boot into Safe Mode.

Repair Tools

sfc /scannow
System File Checker. Scans and repairs corrupted Windows system files.
dism
Deployment Image Servicing. Fixes component store corruption if SFC fails.
chkdsk /f /r
Check Disk. Fixes file system errors (/f) and bad sectors (/r).
gpupdate /force
Updates Group Policy settings immediately.
Event Viewer
Central log for System, Application, and Security events.
Safe Mode
Boots with minimal drivers. Useful for removing malware or bad drivers.

Knowledge Check

Which command would you run to repair corrupted Windows system files?

Display Technologies

Understanding monitor types, connectors, and troubleshooting.

Video Connectors

HDMI
Audio+Video. Versions 1.4, 2.0, 2.1 (4K/8K support).
DisplayPort
Royalty-free. Daisy-chaining support. High refresh rates.
DVI
DVI-D (Digital only), DVI-I (Digital+Analog). No audio.
VGA (DE-15)
Analog only. Blue 15-pin connector. Legacy support.
USB-C / Thunderbolt
Data, Power, and Video in one cable.

Panel Technologies

LCD Panels

  • TN (Twisted Nematic)

    Fastest response time (1ms). Poor viewing angles/colors.

  • IPS (In-Plane Switching)

    Best color accuracy and viewing angles. Slower response.

  • VA (Vertical Alignment)

    Best contrast (deep blacks). Compromise between TN and IPS.

OLED

Organic Light Emitting Diode: No backlight. Each pixel emits its own light.

  • True Black (Infinite contrast)
  • Thinner and lighter
  • Risk of "Burn-in" (static image retention)

Troubleshooting Displays

Artifacts
Distorted geometry or strange colors. Usually overheating GPU or bad driver.
Dead Pixels
Pixels that don't light up. Stuck pixels are always on. (Hardware defect).
Dim Screen
Backlight failure (inverter) or brightness setting.

Knowledge Check

Which display connector is analog-only?

Essentials of Networking

The fundamental backbone of modern communication: Models, Protocols, and Addressing.

Network Models

OSI Model (Open Systems Interconnection)

7
Application
User interface, APIs (HTTP, FTP)
6
Presentation
Formatting, encryption (SSL/TLS)
5
Session
Sync, session control
4
Transport
End-to-end connection (TCP, UDP)
3
Network
Routing, IP addressing (Packets)
2
Data Link
MAC addressing, switching (Frames)
1
Physical
Cables, signals, binary (Bits)

TCP/IP Model

Application
Combines OSI Layers 5, 6, 7
Transport
Matches OSI Layer 4
Internet
Matches OSI Layer 3
Network Access
Combines OSI Layers 1, 2

IP Addressing

IPv4 vs IPv6

IPv4 32-bit

Format: Dotted Decimal

192.168.1.1

~4.3 Billion addresses (Exhausted)

IPv6 128-bit

Format: Hexadecimal

2001:0db8:85a3:0000:0000:8a2e:0370:7334

340 Undecillion addresses (Infinite)

Special Addresses

  • Loopback (Localhost):
    IPv4: 127.0.0.1 | IPv6: ::1
  • Private Ranges (RFC 1918):
    • Class A: 10.0.0.0 - 10.255.255.255
    • Class B: 172.16.0.0 - 172.31.255.255
    • Class C: 192.168.0.0 - 192.168.255.255
  • APIPA (Auto-Config):
    169.254.x.x (Used when DHCP fails)

Common Ports & Protocols

Port Protocol Use Case Transport
20/21 FTP File Transfer Protocol (Unsecured) TCP
22 SSH Secure Shell (Remote Login) TCP
23 Telnet Remote Terminal (Unsecured) TCP
25 SMTP Simple Mail Transfer (Sending) TCP
53 DNS Domain Name System UDP/TCP
67/68 DHCP Dynamic Host Config UDP
80 HTTP Web Traffic (Unsecured) TCP
110 POP3 Post Office Protocol (Receiving) TCP
143 IMAP Internet Message Access (Receiving) TCP
443 HTTPS Secure Web Traffic (SSL/TLS) TCP
3389 RDP Remote Desktop Protocol TCP

Knowledge Check

Which protocol is used to automatically assign IP addresses to devices on a network?

Local Area Networking

Technologies and devices for connecting computers in a limited area.

Network Hardware

Switch
Layer 2. Connects devices on LAN. Uses MAC addresses.
Router
Layer 3. Connects networks (WAN/LAN). Uses IP addresses.
Firewall
Security. Filters traffic based on rules (ACLs).
Access Point
Extends wired network to wireless clients.

Cabling Standards

Twisted Pair Categories

Cat Speed Max Dist
Cat 5e 1 Gbps 100m
Cat 6 10 Gbps 55m
Cat 6a 10 Gbps 100m
Cat 8 40 Gbps 30m
Plenum vs PVC: Use Plenum-rated cables in drop ceilings (HVAC spaces) to prevent toxic fumes during a fire.

T568B Wiring Standard

Most common wiring standard (RJ45).

1
W/O
2
Or
3
W/G
4
Bl
5
W/B
6
Gr
7
W/Br
8
Br
Fiber Connectors
ST (Stick/Twist) SC (Square) LC (Little)

Network Tools

Crimper
Attaches RJ45 connectors to cables.
Punchdown Tool
Connects wires to patch panels (110 block).
Cable Tester
Verifies continuity and correct wiring map.
Toner Probe
Locates specific cables in a bundle (Fox and Hound).

Knowledge Check

Which device operates at Layer 2 of the OSI model?

Wireless Networking

Wi-Fi standards, security, and configuration for wireless networks.

802.11 Standards

Standard Freq (GHz) Max Speed Notes
802.11a 5 54 Mbps Legacy. Short range.
802.11b 2.4 11 Mbps Legacy. Long range.
802.11g 2.4 54 Mbps Backwards compatible with 'b'.
802.11n (Wi-Fi 4) 2.4 / 5 600 Mbps Introduced MIMO (Multiple Antennas).
802.11ac (Wi-Fi 5) 5 ~7 Gbps MU-MIMO (Multi-User). Beamforming.
802.11ax (Wi-Fi 6) 2.4 / 5 / 6 ~9.6 Gbps OFDMA (Efficiency). High density.

Frequencies & Channels

2.4 GHz Band

Longer range, better wall penetration, but crowded.

Non-Overlapping Channels:
1 6 11

5 GHz Band

Faster speeds, more channels (23+), less interference, shorter range.

Wireless Security

WEP
DO NOT USE. Easily cracked (IV attack).
WPA
Uses TKIP. Temporary fix for WEP. Deprecated.
WPA2
Uses AES (Advanced Encryption Standard). Current standard.
WPA3
Latest standard. Uses SAE (Simultaneous Authentication of Equals).

Knowledge Check

Which 2.4 GHz channels are non-overlapping?

The Internet

Connection types, Cloud Computing, and DNS.

Internet Connection Types

Type Medium Characteristics Speed
Fiber Light (Glass) Fastest, Low latency, Immune to EMI. 1 Gbps+
Cable Coaxial (Copper) Shared bandwidth with neighbors. TV lines. ~1 Gbps
DSL Telephone (Copper) Dedicated line. Speed drops with distance. ~100 Mbps
Satellite Radio Waves High latency (Geo). Line of sight required. ~100 Mbps
Cellular 4G / 5G Mobile. Tethering/Hotspot capabilities. Varies

Cloud Computing

SaaS (Software as a Service)
End-user applications. No management required.
Ex: Gmail, Office 365, Dropbox.
PaaS (Platform as a Service)
Tools for developers to build apps.
Ex: Google App Engine, Heroku.
IaaS (Infrastructure as a Service)
Raw hardware (Servers, Storage, Networking).
Ex: AWS EC2, Azure VM.

DNS Records

Domain Name System translates names to IP addresses.

A Record Maps hostname to IPv4 Address
AAAA Record Maps hostname to IPv6 Address
CNAME Canonical Name (Alias for another name)
MX Record Mail Exchange (Email servers)
TXT Record Text notes (SPF, DKIM for email security)

Knowledge Check

Which cloud model gives you the most control over the operating system?

Virtualization & Cloud

The technology that abstracts hardware to run multiple operating systems and services.

Hypervisor Types

Type 1 (Bare Metal)

Installs directly on the server hardware without a host OS. Used in enterprise data centers for maximum performance.

  • High Performance
  • Direct Hardware Access
  • Enterprise Scalability
Examples:
VMware ESXi Microsoft Hyper-V Xen

Type 2 (Hosted)

Runs as an application on top of an existing operating system. Ideal for testing, development, and end-user sandboxing.

  • Easy Setup
  • Runs on Windows/Mac/Linux
  • Good for Labs
Examples:
VirtualBox VMware Workstation Parallels

Cloud Service Models

SaaS

Software as a Service

End-user applications delivered over the web. No maintenance required by the user.

Ex: Gmail, Office 365, Dropbox

PaaS

Platform as a Service

Tools and environment for developers to build and deploy apps without managing infrastructure.

Ex: Heroku, Google App Engine

IaaS

Infrastructure as a Service

Virtual hardware (servers, storage, networks) that you manage and configure yourself.

Ex: AWS EC2, Azure VMs

Client-Side Requirements

  • CPU Support

    Must support virtualization extensions (Intel VT-x or AMD-V) and be enabled in BIOS/UEFI.

  • RAM

    Sufficient memory for the host OS plus all running VMs. (e.g., 16GB+ recommended).

  • Storage

    Fast storage (NVMe SSD) is critical for VM performance. Large capacity for virtual disk files.

  • Network

    Virtual switches and bridged adapters for VM connectivity.

Knowledge Check

Which cloud model gives you the most control over the operating system and installed software?

Portable Computing

Hardware, displays, and power management for laptops and mobile workstations.

Laptop Hardware

Internal Components

SODIMM RAM

Small Outline Dual In-line Memory Module. Roughly half the size of desktop DIMMs.

Storage (M.2 / 2.5")

Modern laptops use M.2 NVMe SSDs directly on the motherboard. Older ones use 2.5" SATA SSDs/HDDs.

Wireless Cards

Mini-PCIe or M.2 Key E cards for Wi-Fi and Bluetooth connectivity.

Display Components

LCD / LED Screen

TN (Fast), IPS (Color Accurate), or OLED (High Contrast). Connected via LVDS or eDP cable.

Digitizer

The glass overlay that converts touch inputs into digital signals (for touchscreens).

Webcam & Mic

Integrated into the top bezel. Privacy shutters are becoming common.

Expansion Options

Docking Station

Proprietary or USB-C/Thunderbolt. Provides power, display outputs, and extra ports. Turns a laptop into a desktop replacement.

Port Replicator

Similar to a dock but usually lacks proprietary power charging or advanced video capabilities. Often just a USB hub.

Physical Locks

Kensington Lock slots for physical security in public spaces.

Power Management

ACPI S0 Working (On)
ACPI S3 Sleep (Standby)
ACPI S4 Hibernate (Disk)
ACPI S5 Soft Off

Tip: Swollen batteries are a fire hazard. Dispose of them properly immediately.

Knowledge Check

Which type of RAM is specifically designed for laptops?

Mobile Devices

Smartphones, tablets, and the ecosystems that power them.

Mobile Operating Systems

Android

  • Source: Open Source (AOSP) + Google Services
  • Apps: APK files, Google Play Store
  • Customization: High (Launchers, Widgets)
  • Hardware: Many manufacturers (Samsung, Pixel, etc.)

iOS / iPadOS

  • Source: Closed Source (Proprietary)
  • Apps: IPA files, Apple App Store only
  • Customization: Limited (Uniform experience)
  • Hardware: Apple only

Connectivity & Synchronization

Wireless Connections

  • NFC
    Near Field Communication. Payment (Apple Pay/Google Pay) & pairing. Range: ~4cm.
  • Bluetooth
    PAN (Personal Area Network). Pairing process: Discovery -> PIN -> Connect.
  • Hotspot / Tethering
    Sharing cellular data via Wi-Fi, Bluetooth, or USB.

Email Configuration

  • POP3 vs IMAP
    POP3 downloads (local only). IMAP syncs across devices (server-based).
  • Exchange / S/MIME
    Corporate email. Supports Contacts/Calendar sync and encryption.
  • Port Numbers
    Secure SMTP: 587/465. Secure IMAP: 993. Secure POP3: 995.

Data Synchronization

  • Cloud Sync
    iCloud, Google Drive, OneDrive. Automatic backup of photos, contacts, app data.
  • Local Sync
    iTunes/Finder (iOS) or File Explorer (Android). Requires USB cable.
  • SSO
    Single Sign-On. Use one account to access multiple apps/services.

Knowledge Check

Which email protocol should you use if you want to access your email from multiple devices and keep them in sync?

Mobile Security

Protecting mobile devices, data, and users from modern threats.

Mobile Threats

OS Tampering

Rooting (Android)

Gaining admin access. Bypasses security sandboxes. Voids warranty.

Jailbreaking (iOS)

Removing Apple's restrictions. Allows unauthorized apps but exposes system to malware.

App Risks

  • Sideloading

    Installing apps from outside official stores. High risk of malware.

  • Unofficial Stores

    Third-party markets often lack rigorous security checks.

  • Public Wi-Fi

    Man-in-the-Middle (MitM) attacks on unsecured networks.

Defense Mechanisms

Authentication

  • Biometrics
    Face ID, Touch ID (Convenient & Secure)
  • MFA / 2FA
    Authenticator Apps > SMS (SIM Swap risk)
  • Failed Attempts
    Lockout or wipe after X wrong guesses

Enterprise Tools

  • MDM
    Mobile Device Management. Full device control.
  • MAM
    Mobile Application Management. Controls specific corporate apps only.
  • Remote Wipe
    Erase data if device is lost/stolen.

Deployment Models

  • BYOD
    Bring Your Own Device. High privacy, lower security.
  • COPE
    Corporate Owned, Personally Enabled. Balanced.
  • CYOD
    Choose Your Own Device. Employee picks from approved list.

Knowledge Check

What is the primary security risk associated with "Jailbreaking" an iOS device?

Printers & Imaging

Technologies, maintenance, and troubleshooting for modern printing devices.

Printing Technologies

Laser Printing Process

1
Processing (Rasterizing the image)
2
Charging (Applying negative charge to drum)
3
Exposing (Laser writes image to drum)
4
Developing (Toner sticks to exposed areas)
5
Transferring (Toner moves to paper)
6
Fusing (Heat/Pressure melts toner)
7
Cleaning (Removing excess toner)

Other Types

Inkjet

Uses liquid ink. Thermal (bubble) or Piezoelectric (vibration) nozzles. High quality photos, slower speed.

Thermal

Heat-sensitive paper (Direct Thermal) or ribbon (Thermal Transfer). Used for receipts and labels.

Impact (Dot Matrix)

Pins strike a ribbon. Noisy but useful for multi-part carbon forms.

Maintenance Tasks

  • Calibration

    Aligning colors/heads to prevent blurry prints.

  • Cleaning

    Running cleaning cycles for inkjet heads. Vacuuming toner dust (with specialized vacuum).

  • Replacement

    Toner cartridges, Fuser assembly, Transfer belt, Pickup rollers.

Printer Sharing

Network Sharing
Ethernet/Wi-Fi. Requires IP address configuration.
Print Server
Dedicated hardware or software service to manage queues and drivers.
Cloud / AirPrint
Driverless printing from mobile devices (Bonjour protocol).

Knowledge Check

Which step of the laser printing process involves melting the toner onto the paper?

Computer Security

Identifying threats and implementing physical and logical security controls.

Common Threats

Social Engineering

Phishing / Spear Phishing
Deceptive emails to steal credentials. "Spear" targets specific individuals.
Tailgating / Piggybacking
Following an authorized person into a secure area without credentials.
Dumpster Diving
Searching trash for sensitive documents (mitigated by shredding).

Malware Types

Ransomware

Encrypts data and demands payment for the key.

Trojan

Malware disguised as legitimate software.

Spyware / Keylogger

Records keystrokes and user activity silently.

Rootkit

Embeds deep in OS to hide itself and other malware.

Security Controls

Physical Security

  • Mantrap
    Double-door system to prevent tailgating.
  • Biometric Locks
    Fingerprint/Retina scanners for entry.
  • Privacy Filter
    Screen film to prevent "Shoulder Surfing".

Logical Security

  • Firewall
    Filters network traffic (Host-based or Network-based).
  • Least Privilege
    Users have only necessary permissions.
  • Active Directory
    Centralized user management (Group Policy).

Data Destruction

  • Degaussing
    Using magnets to wipe magnetic drives (HDDs/Tapes).
  • Shredding/Drilling
    Physical destruction of the drive platters/chips.
  • Overwriting
    Writing 0s and 1s over data (Standard wipe).

Knowledge Check

Which physical security measure is designed specifically to prevent tailgating?

Operational Procedures

Best practices for safety, documentation, and professional conduct.

Change Management Process

1. Request Change
Submit a formal request (RFC) detailing the purpose and scope.
2. Impact Analysis
Determine risks, downtime, and affected systems.
3. Approval
Get sign-off from the Change Advisory Board (CAB).
4. Implementation
Execute the change during a scheduled maintenance window.
5. Backout Plan
Procedure to revert changes if implementation fails.
6. Documentation
Update network diagrams and close the ticket.

Safety & Environment

Physical Safety

  • ESD Protection

    Use antistatic wrist straps and mats. Self-ground on chassis.

  • Fire Safety

    Use Class C extinguishers for electrical fires (CO2 or Dry Chemical).

  • MSDS / SDS

    Safety Data Sheets for handling chemicals (toner, cleaners).

Environmental Controls

  • Temperature/Humidity

    Keep cool (68-71°F) and moderate humidity (50%) to prevent ESD/Corrosion.

  • UPS / Surge

    Uninterruptible Power Supply for outages; Surge protector for spikes.

Incident Response

First Response

Identify the issue, report to proper channels, and protect evidence (do not turn off if volatile data is needed).

Chain of Custody

Document exactly who handled evidence, when, and where to maintain legal integrity.

Knowledge Check

What is the first step in the Change Management process?

Learning Resources

Curated collection of resources to enhance your computer science journey.

Books

Essential reading materials for computer science fundamentals.

Explore Books

Videos

Video tutorials and lectures from industry experts.

Watch Videos

Interactive Labs

Hands-on coding exercises and virtual labs.

Start Practicing

CompTia A+ Certification Prep

Resources for professional certification exams.

Prepare Now