CompTia IT Fundamentals Exam Guide (New 2023/ 2024 Update) Questions and Verified Answers| 100 % Correct
CompTia IT Fundamentals Exam Guide
(New 2023/ 2024 Update) Questions and
Verified Answers| 100 % Correct
QUESTION
Liquid cooling system
Answer:
inside the case. These use tubes filled with a coolant, connected to a radiator, and a pump to
circulate the liquid coolant through the inside of your computer case
QUESTION
Heat Sinks
Answer:
metal, usually formed into ridges, and installed on components. Transfers the heated air from the
component to the fan (or liquid cooling system), which then moves the heated air out of the
computer case, keeping the inside of the case and the components cooler.
QUESTION
Port
Answer:
hardware interface that you can use to connect devices to a computer
QUESTION
Serial Connection
Answer:
is a personal computer connection that transfers data one bit at a time over a single wire. Support
two-way communications and were typically used for devices such as fax cards or external
modems
QUESTION
Parallel connection
Answer:
is a computer connection that transfers data eight or more bits at a time over eight or more wires.
Any components connected by multiple data pathways
QUESTION
USB
Answer:
connection is a computer connection that enables you to connect multiple peripherals to a single
port with high performance and minimal device configuration.
QUESTION
FireWire
Answer:
connection is a computer connection that provides a high-speed interface for peripheral devices
that are designed to use the Institute of Electrical and Electronic Engineers (IEEE) 1394 standard
FireWire 400 transmits at 400 Mbps
QUESTION
USB 3.0
Answer:
also called SuperSpeed USB. It features a maximum transfer rate of 5.0 Gbps.
QUESTION
USB 2.0
Answer:
It can communicate at up to 480 Mbps.
QUESTION
Firewall vs USB
Answer:
USB 2.0 is faster by the numbers than FireWire, FireWire is actually faster on throughput,
making it ideal for video/audio file transfers and external storage devices.
QUESTION
External SATA (eSATA)
Answer:
it provides a connection for external storage devices. connections provide fast data transfers
without having to translate data between the device and the host computer. interfaces do require
an additional power connector to function.
QUESTION
RJ-45 (registered jack 45)
Answer:
An 8-pin/8-position plug or jack is commonly used to connect computers onto Ethernet-based
local area networks (LAN).
QUESTION
RJ-11
Powered by https://learnexams.com/search/study?query=

Computing Device
is an electronic machine that uses binary data to automatically perform calculations.
PC
is a computing device designed to be used by one person at a time. These computing devices are found in offices, schools, and homes; are used to run commercial software applications
desktop computer
is a computing device designed to be placed on or near a user’s desk. Its size and its need to be plugged in to a power source mean it typically needs to be placed where it will be used and not be moved.
All-in-One Desktop Computers
Some computers have the monitor and the computing components all in one physical device
Laptop
is a complete computer system that is small, compact, lightweight, and portable. have specialized hardware designed especially for use in a smaller portable system, use standard operating systems, can run on battery or alternating current (AC) power
Servers
network computer that shares resources with and responds to requests from computers, devices, and other servers on the network. provide centralized access and storage for resources that can include applications, files, printers, and other hardware as well as services, such as email.
Supercomputer
fastest and the most expensive computer among all types of computers
Mainframe
large computer that might serve a large organization. It is used to process and store information for many users at once.
Motherboard
is the personal computer component that acts as the backbone for the entire computer system.
CPU
computer chip where most of the computing calculations take place
Power supply
internal computer component that converts line voltage AC power from an electrical outlet to the low-voltage direct current (DC) power needed by system components
RAM
type of computer memory that can be accessed randomly; that is, any byte of memory can be accessed without touching the preceding bytes. volatile memory.
Byte
One character (a letter, number, space, or punctuation mark). consists of 8 bits.
Kilobyte (KB)
1,024 bytes or 8,192 bits is one
Megabyte (MB, Meg, or M)
1,048,576 bytes or 1,024 KB is one
Gigabyte (GB)
1,073,741,824 bytes or 1,024 MB is one
Terabyte (TB)
1,099,511,627,776 bytes or 1,024 GB is one
Dual in-line memory modules (DIMMs)
found in many systems, and they have a 64-bit data path. Generally have 16 or 32 chips per module.
Small outline dual in-line memory modules
are most often seen in laptops, small networking devices (such as routers), and PCs with smaller system boards. They have either 32- or 64-bit data paths. Half the size of DIMM
hard drive
generally non-removable disks. Almost all computers use these to store data. Store data digitally on circular platters.
Storage capacity of hard disk drives is expressed in gigabytes (GBs) and terabytes (TBs)
Solid State Drive
uses non-volatile memory to emulate mechanical storage devices.
USB devices that are commonly known as jump drives or thumb drives; flash memory cards; and secure digital
Optical drive
personal computer storage devices, such as CDs, DVDs, or Blu-ray™ discs, that store data optically rather than magnetically.
Video Cards
typically have their own bank of memory to improve the rate at which the images on screen can be updated. Can have a variety of connectors on them for connecting video display devices. Some of the video adapters include VGA, DVI, and HDMI.
Audio card
typically includes ports to connect speakers, a microphone, and headphones.
Network Card
A network adapter allows your computer to connect to other computers over a wired or wireless connection.
Expansion Card
is a printed circuit board that you install into a slot on the computer’s system board to expand the functionality of the computer
Modem
allows your computer to connect to other computers and the Internet by using an analog phone line.
Liquid cooling system
inside the case. These use tubes filled with a coolant, connected to a radiator, and a pump to circulate the liquid coolant through the inside of your computer case
Heat Sinks
metal, usually formed into ridges, and installed on components. Transfers the heated air from the component to the fan (or liquid cooling system), which then moves the heated air out of the computer case, keeping the inside of the case and the components cooler.
Port
hardware interface that you can use to connect devices to a computer
Serial Connection
is a personal computer connection that transfers data one bit at a time over a single wire. Support two-way communications and were typically used for devices such as fax cards or external modems
Parallel connection
is a computer connection that transfers data eight or more bits at a time over eight or more wires. Any components connected by multiple data pathways
USB
connection is a computer connection that enables you to connect multiple peripherals to a single port with high performance and minimal device configuration.
FireWire
connection is a computer connection that provides a high-speed interface for peripheral devices that are designed to use the Institute of Electrical and Electronic Engineers (IEEE) 1394 standard
FireWire 400 transmits at 400 Mbps
USB 3.0
also called SuperSpeed USB. It features a maximum transfer rate of 5.0 Gbps.
USB 2.0
It can communicate at up to 480 Mbps.
Firewall vs USB
USB 2.0 is faster by the numbers than FireWire, FireWire is actually faster on throughput, making it ideal for video/audio file transfers and external storage devices.
External SATA (eSATA)
it provides a connection for external storage devices. connections provide fast data transfers without having to translate data between the device and the host computer. interfaces do require an additional power connector to function.
RJ-45 (registered jack 45)
An 8-pin/8-position plug or jack is commonly used to connect computers onto Ethernet-based local area networks (LAN).
RJ-11
connector is used with Category 1 cables in telephone system connections and is not suitable for network connectivity
Peripheral Devices
device that connects to a computer to expand the computer’s functionality. This includes devices that enable the user to input, output, store, and share data.
Input devices
keyboards, pointing devices, game controllers, scanners, microphones, webcams, graphics tablet
Output devices
monitors, printers, speakers
Types of printers
Laser, Inkjet, and thermal.
Devices that do Input and Output functions
Fax, Flashdrive, External hard drive, Optical discs, Network attached storage, Memory card, Mobile media, Smartphone, touch screen monitors
Output. Types of display devices
CRT, LCD, LED,OLED, Plasma, Projector
Operating Systems
software package that enables a computer to function. It performs basic tasks, such as recognizing the input from a keyboard, sending the output to a display screen or monitor, and controlling peripheral devices such as disk drives and printers
Types of software licensing
Open source, Freeware, Commercial, Copyleft, Shareware
Type of Operating Systems
Windows, Mac OS X, Linux, Chrome OS
Types of Mobile Operating Systems
Android OS, BlackBerry OS, Firefox OS, Windows Phone OS
Drivers
is specialized software that controls a device attached to a computer
Application Software
is a program that provides specific functionality such as word processing, graphics creation, or database management. It is generally written to run on a specific operating system
File Types and Extensions
Documents= .txt .rtf .doc .xls. ppt .pdf
Audio= .aac .flac .m4a .mP3 .wav
Images= .bmp . .gif .jpg .png .tif/.tiff
Video= .avi .flv .mp4 (MP4).wmv
Excutables = .app .bat .com A command file or compiled application file. .exe
Compression formats= .iso .dng. gzip .jar . rar .7zip .tar .zip
Workstation Setup Process
Gather hardware
power on computer
*run OS
*config peripherals
Install security software
Identify which apps should be on workstation
Update OS
Config user accounts
Reduce clutter
Patch (OS updates)
are small units of supplemental code meant to address either a security problem or a functionality flaw in a software package or operating system.
Service Pack (OS updates)
is a larger compilation of system updates that can include functionality enhancements, new features, and typically all patches, updates,
Hotfix (OS updates)
is a patch that is often issued on an emergency basis to address a specific security flaw.
Rollup (OS updates)
is a collection of previously issued patches and hotfixes, usually meant to be applied to one component of a system,
Local Area Network (LAN)
is a group of computers and associated devices that share the resources of a single processor or server within a small geographic area. may serve as few as two or three users or as many as thousands of users.
Wide Area Network (WAN)
is a network of computers that are spread across a large geographic area. An example would be a company that has offices in several different cities or nations
Network Connection Methods
Wireless, Wired, Cellular
SOHO
is a network that provides connectivity and resource sharing for a small office or home office.
Hub
is a networking device that connects multiple computers to form a LAN.
Switch
is a small network hardware device that joins multiple computers together within the same LAN. Like hubs, these also have multiple ports and are responsible for forwarding data from a source to a destination
Router
is a networking device used to send data among multiple networks that use the same protocol.
Wireless Encryption Standards
WEP, WPA, WPA2
WEP
security protocol for wireless local area networks (WLANs). Does not use strong encryption and is therefore considered obsolete.
WPA (Wi-Fi Protected Access)
provides a significantly stronger encryption scheme than WEP, and can use a shared private key
WPA2
improved encryption for wireless networking. The 802.11i standard requires strong encryption key protocols, known as Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES). WPA2/802.11i encryption is considered to be the strongest available method of wireless security
Service Set Identifiers (SSIDs)
32-bit alphanumeric string that identifies a WAP and all the devices attached to it. A WAP typically broadcasts this in plaintext. It is more appropriate to think of this as a network name that is applied to the grouping of the WAP
Firmware
is specialized software that is stored on a hardware device’s read-only memory (ROM) whether or not the device is powered.
Virtualization
allows for one physical device, such as a server operating system, to host multiple logical operating systems
VoIP (Voice over Internet Protocol)
transmission of voice communications over IP networks, such as the Internet. The emergence of virtual meetings, which participants can attend remotely, is fueled by this and screen-sharing technologies
CD-ROM
Disk that can store up to 680 MB of data; data can only be read from it.
HDD (Hard Disk Drive)
A disk drive that has one or more platters and a spindle. In contrast, USB flash drives use flash memory.
VGA (Video Graphics Array)
translates binary-coded information (0s and 1s) into the color combinations required to make up an image on your computer screen.
memory card
removable storage device used in digital cameras (such as SD cards, compact flash cards)
SSL (Secure Sockets Layer)
A security protocol that uses certificates for authentication and encryption to protect web communication.
64-bit CPU
Type of CPU architecture that incorporates registers that are 64 bits wide. These registers, or temporary storage areas, allow the CPU to work with and process 64-bit data types and provide support for address space in the terabytes
Hypervisor
Software that enables a single computer to run multiple operating systems simultaneously.
productivity software
Applications designed to help individual computer users complete tasks more efficiently. Examples are word processors, spreadsheet programs, and database applications.
n-tier
type of network architecture in which several servers, specialized for particular tasks, may be accessed by a client computer to perform some activity, such as retrieving a bank balance
three tier
The user interface runs on the client and the data is stored on the server contains a middle layer between the client and server that processes the client requests and translates them into data access commands.
binary
A way of representing information using only two options, 1s and 0s
boolean
A single value of either TRUE or FALSE
char
single character
optical disk
store data but are not designed to replace hard drives
BD-ROMs> DVD-ROMs> CD-ROMs
NTFS (New Technology File System)
A file system used on Windows-based systems. It is more efficient and provides much more security than do FAT-based file systems.
FAT32 (File Allocation Table)
A file system that was popular in earlier versions of Windows (such as Windows 95, Windows 98, Windows Millennium Edition, Windows NT, and Windows 2000). The limitations make it less desirable than NTFS.
HFS (Hierarchical File System)
A file system developed by Apple. Windows can read it, but needs additional software to write it.
ext4
A Linux file system which support up to 1 Exbibyte (EiB) of data. supports an unlimited number of subdirectories.
file system
manage compression, encryption, permissions, journaling, and naming rules. Some have limitations, such as the maximum length of a filename
folders
hold and organize files and other folders in your computer which is stored on the hard drive
collaboration software
includes email clients, conferencing software, instant messaging, online workspace, and document storage
utility software
includes anti-malware, software firewalls, compression utilities, and PDF readers
locally installed
Software installed on your own computer
local network hosted
a computer or other device connected to a computer network; offers installed applications to all computers on the network
two tier
do not have a separate logic layer, but just a database and front-end application
one tier
are built with all functionality in one
databases
Computer programs that contain large volumes of information, such as encyclopedias and atlases.
structured databases
use rows (records) and columns (fields) to store data
non-structured data
can be data from several different types, such as pictures, emails, documents, presentations, and text and numbers
semi-structured data
is non-structured data that has been tagged with metadata to help define some characteristics of the data, such as when the picture was taken, by whom, and a brief description of what’s in the picture
metadata
data that describes other data
relational database
use shame, tables, rows (records), and columns (fields), and may have constraints on the types of data included
primary key
A field (or group of fields) that uniquely identifies a given entity in a table
foreign key
is one or more columns in a table that refers to the primary key in another table. Cannot contain null or blank values
internet access
options include dial-up, DSL, cable modems, fiber-optic Internet, satellite, cellular, and radio frequency
wired internet
more secure and faster type of internet
wireless internet
more popular because of its vastly superior mobility for internet
DHCP
automatically assigns TCP/IP configuration information to clients.
DNS
resolves user-friendly hostnames such as www.google.com to an IP address