CompTIA ITF+ CertMike: Prepare. Practice. Pass the Test! Get Certified!: Exam FC0-U61

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

The leading, no-nonsense guide to get you up to speed on the fundamentals of IT In CompTIA ITF+ CertMike: Prepare. Practice. Pass the Exam! Get Certified! Exam FC0-U61, experienced tech education guru Mike Chapple delivers an essential and efficient guide to acing the ITF+ (IT Fundamentals+) exam administered by CompTIA. In the book, you'll get access to every objective tested by the foundational exam, including IT concepts and terminology, infrastructure, applications and software, software development, database fundamentals, and security. Ace the test using the proven CertMike approach • Prepare — CertMike is your personal study coach, guiding you through all the exam objectives and helping you gain an understanding of how they apply to on-the-job tasks! • Practice — Each chapter includes two multiple choice practice questions. Work through the detailed explanations to evaluate each answer option and understand the reason for the best answer! • Pass — On exam day, use the critical knowledge you've learned when you're ready to take the test. You'll feel ready and confident to pass the exam and earn your certification! With a laser-focus on getting you job- and exam-ready, the book skips the fluff and gets right to the point of getting you familiar with IT basics and on the road to an in-demand IT certification and a new career in tech. You'll also get complimentary access to additional online study tools, complete with a bonus practice exam and audio recordings of the CertMike Exam Essentials. Banish test anxiety and feel ready to pass the test—the first time around! A must-read guide for anyone considering a career in IT and looking for a resource that assumes no background knowledge or experience, CompTIA ITF+ CertMike: Prepare. Practice. Pass the Test! Get Certified! Exam FC0-U61 is your ticket to basic IT competency and confidence.

Author(s): Mike Chapple
Series: Prepare.Practice. Pass the test
Year: 2023

Language: English
Pages: 368

COVER
2 TITLE PAGE
3 COPYRIGHT
4 DEDICATION
5 ACKNOWLEDGMENTS
6 ABOUT THE AUTHORS
7 ABOUT THE TECHNICAL EDITOR
8 INTRODUCTION
1 THE ITF+ EXAM
2 WHAT DOES THIS BOOK COVER?
3 EXAM FC0-U61 EXAM OBJECTIVES
4 FC0-U61 CERTIFICATION EXAM OBJECTIVE MAP
5 HOW TO CONTACT THE PUBLISHER
6 PART I: Domain 1.0: IT Concepts and Terminology
1 CHAPTER 1: Notational Systems
1 STORING DATA
2 CHARACTER ENCODING
3 CHAPTER 2: Data Types
1 DATA TYPES
2 CHAPTER 3: Computing Basics
1 COMPUTER ACTIONS
2 CHAPTER 4: Value of Data
1 DATA AND INFORMATION
2 INTELLECTUAL PROPERTY
3 SECURING DATA
4 CHAPTER 5: Units of Measure
1 MEASURING DATA STORAGE
2 MEASURING DATA THROUGHPUT
3 MEASURING PROCESSOR SPEED
4 CHAPTER 6: Troubleshooting Methodology
1 TROUBLESHOOTING METHODOLOGY
2 PART II: Domain 2.0: Infrastructure
1 CHAPTER 7: Input/Output Device Interfaces
1 NETWORK INTERFACES
2 PERIPHERAL INTERFACES
3 GRAPHIC INTERFACES
4 CHAPTER 8: Installing Peripherals
1 PERIPHERAL TYPES
2 INSTALLING AND CONFIGURING PERIPHERALS
3 CHAPTER 9: Internal Computing Components
1 CPU
2 MOTHERBOARD
3 FIRMWARE
4 MEMORY
5 DISK DRIVES
6 NETWORK INTERFACE CARDS
7 GPU
8 POWER AND COOLING
9 CHAPTER 10: Internet Service Types
1 SERVICE TYPES
2 CHAPTER 11: Storage
1 VOLATILE STORAGE
2 NONVOLATILE STORAGE
3 CHAPTER 12: Computing Devices
1 COMPUTING DEVICE TYPES
2 INTERNET OF THINGS
CHAPTER 13: TCP/IP Networking
1 NETWORK TYPES
2 TCP/IP NETWORKING
3 NETWORK ADDRESSING
4 CHAPTER 14: Application Protocols
1 APPLICATION PROTOCOLS
2 CHAPTER 15: Network Devices
1 MODEMS
2 SWITCHES
3 ROUTERS
4 FIREWALLS
5 ACCESS POINTS
6 CHAPTER 16: Wireless Networks
1 WIRELESS NETWORKING
2 WIRELESS SIGNAL PROPAGATION
3 WIRELESS SECURITY
4 WIRELESS ENCRYPTION
5 PART III: Domain 3.0: Applications and Software
1 CHAPTER 17: Operating Systems
1 OPERATING SYSTEM ROLES
2 OPERATING SYSTEM TYPES
3 CHAPTER 18: Virtualization
1 VIRTUALIZATION
2 CHAPTER 19: Filesystems
1 FILES AND FILESYSTEMS
2 FILESYSTEM FEATURES
3 FILESYSTEM TYPES
4 CHAPTER 20: Services and Processes
1 APPLICATIONS
2 PROCESSES
3 SERVICES
4 CHAPTER 21: Drivers, Utilities, and Interfaces
1 DRIVERS
2 INTERFACES
3 UTILITIES
4 CHAPTER 22: Software Types
1 SOFTWARE
2 CHAPTER 23: Application Architecture and Delivery
1 APPLICATION DELIVERY
2 APPLICATION ARCHITECTURE
3 CHAPTER 24: Web Browsers
1 HOW THE WEB WORKS
2 CONFIGURING WEB BROWSERS
3 PROXY SERVERS
4 DIGITAL CERTIFICATES
5 CHAPTER 25: Application Concepts and Uses
1 SOFTWARE COMPATIBILITY
2 SOFTWARE INSTALLATION BEST PRACTICES
3 SOFTWARE LICENSING
4 PART IV: Domain 4.0: Software Development Concepts
1 CHAPTER 26: Programming Languages
1 PROGRAMMING LANGUAGE CATEGORIES
2 SPECIALIZED LANGUAGES
3 IDENTIFYING LANGUAGES
4 CHAPTER 27: Programming Organizational Techniques
1 PSEUDOCODE
2 FLOWCHARTS
3 CHAPTER 28: Logic Components
1 BRANCHING
2 LOOPING
CHAPTER 29: Programming Concepts
1 VARIABLES AND ARRAYS
2 DATA TYPES
3 FUNCTIONS
4 OBJECTS
5 PART V: Domain 5.0: Database Fundamentals
1 CHAPTER 30: Database Concepts
1 DATABASES
2 USING A DATABASE
3 CHAPTER 31: Database Structures
1 STRUCTURING DATA
2 RELATIONAL DATABASES
3 NONRELATIONAL DATABASES
4 CHAPTER 32: Database Interfaces
1 STRUCTURED QUERY LANGUAGE (SQL)
2 DATABASE ACCESS METHODS
3 PART VI: Domain 6.0: Security
1 CHAPTER 33: Confidentiality, Integrity, and Availability
1 THE CIA TRIAD
2 CONFIDENTIALITY
3 INTEGRITY
4 AVAILABILITY
5 CHAPTER 34: Securing Devices
1 DEVICE SECURITY
2 SOFTWARE SECURITY
3 CHAPTER 35: Behavioral Security
1 PRIVACY
2 SECURITY POLICIES AND PROCEDURES
3 CHAPTER 36: Authentication, Authorization, Accounting, and Nonrepudiation
1 ACCESS CONTROL
2 AUTHENTICATION FACTORS
3 AUTHORIZATION
4 ACCOUNT TYPES
5 NONREPUDIATION
6 CHAPTER 37: Password Best Practices
1 PASSWORD POLICIES
2 CHAPTER 38: Encryption
1 CRYPTOGRAPHY
2 USES OF ENCRYPTION
3 CHAPTER 39: Business Continuity and Disaster Recovery
1 BUSINESS CONTINUITY
2 DISASTER RECOVERY
3 INDEX
4 END USER LICENSE AGREEMENT
List of Tables
1 Chapter 1
1 TABLE 1.1 Decimal conversion of 2-bit values
2 TABLE 1.2 Decimal conversion of 3-bit values
3 TABLE 1.3 Binary, decimal, and hexadecimal equivalent values
4 Chapter 2
1 TABLE 2.1 Product information
2 Chapter 5
1 TABLE 5.1 Possible combinations of 2 bits
2 TABLE 5.2 Possible combinations of 3 bits
3 TABLE 5.3 Data storage units
4 TABLE 5.4 Data throughput units
5 Chapter 11
1 TABLE 11.1 Common disc types
Chapter 16
1 TABLE 16.1 Wireless standard frequencies and speed
2 TABLE 16.2 Wireless encryption options
3 Chapter 19
1 TABLE 19.1 Summary of filesystem characteristics
2 Chapter 30
1 TABLE 30.1
2 TABLE 30.2 Customer contact information stored in a database table
3 TABLE 30.3 Restaurant location information stored in a database table
4 TABLE 30.4 Product inventory information stored in a database table
List of Illustrations
1 Chapter 1
1 FIGURE 1.1 A single bit can only hold two values: 0 and 1.
2 FIGURE 1.2 Two bits can hold four possible values.
3 FIGURE 1.3 One decimal digit can hold 10 possible values.
4 FIGURE 1.4 A single hexadecimal digit can hold 16 possible values.
5 Chapter 2
1 FIGURE 2.1 Data type flowchart
2 Chapter 4
1 FIGURE 4.1 A spreadsheet of temperature readings is only data.
2 FIGURE 4.2 Plotting data over time is one way we can transform it into infor...
3 FIGURE 4.3 Information can drive action.
4 FIGURE 4.4 Copyright symbol
5 FIGURE 4.5 Symbols used to denote (a) trademarks and (b) registered trademar...
6 Chapter 6
1 FIGURE 6.1 CompTIA's eight-step troubleshooting methodology
2 Chapter 7
1 FIGURE 7.1 Wall plate containing four network jacks
2 FIGURE 7.2 RJ-45 network connector
3 FIGURE 7.3 RJ-11 telephone connector
4 FIGURE 7.4 USB connectors
5 FIGURE 7.5 FireWire connectors
6 FIGURE 7.6 SATA and eSATA connectors
7 FIGURE 7.7 VGA connector
8 FIGURE 7.8 DVI connectors
9 FIGURE 7.9 HDMI connector
10 FIGURE 7.10 DisplayPort and Mini DisplayPort connectors
11 Chapter 8
1 FIGURE 8.1 Keyboard and mouse
2 FIGURE 8.2 Typical computer display
3 FIGURE 8.3 Computer speakers
4 FIGURE 8.4 Typical desktop printer
5 FIGURE 8.5 Typical desktop scanner
6 FIGURE 8.6 Camera used to capture still images and video
7 Chapter 9
1 FIGURE 9.1 Central processing unit (CPU)
2 FIGURE 9.2 Motherboard
3 FIGURE 9.3 Dual in-line memory module (DIMM)
4 FIGURE 9.4 Hard disk drive (HDD)
5 FIGURE 9.5 Solid-state drive (SSD)
6 FIGURE 9.6 Network interface card (NIC)
7 FIGURE 9.7 Graphics processing unit (GPU)
8 FIGURE 9.8 Computer power supply unit (PSU)
9 Chapter 11
FIGURE 11.1 Magnetic hard disk drive (HDD)
2 FIGURE 11.2 Solid-state drive (SDD)
3 FIGURE 11.3 USB flash drive
4 FIGURE 11.4 SD card
5 FIGURE 11.5 Optical disc
6 FIGURE 11.6 Network attached storage (NAS) array
7 Chapter 12
1 FIGURE 12.1 Desktop computer system
2 FIGURE 12.2 Server racks in a data center
3 FIGURE 12.3 Laptop computer
4 FIGURE 12.4 Smartphone
5 FIGURE 12.5 Tablet computer
6 FIGURE 12.6 Convertible laptop being used as a tablet
7 FIGURE 12.7 Gaming console
8 Chapter 13
1 FIGURE 13.1 Communication from a user to a web server
2 FIGURE 13.2 Communication from a web server to a user
3 Chapter 15
1 FIGURE 15.1 Cable modem
2 FIGURE 15.2 Network switches
3 FIGURE 15.3 Network firewall deployment
4 FIGURE 15.4 Wireless access point
5 Chapter 16
1 FIGURE 16.1 SOHO wireless access point
2 Chapter 19
1 FIGURE 19.1 Directory structure
2 FIGURE 19.2 File permission settings
3 FIGURE 19.3 Uncompressed Macbeth script
4 FIGURE 19.4 Compressed Macbeth script
5 Chapter 20
1 FIGURE 20.1 Activity Monitor on a Mac
2 FIGURE 20.2 Windows Task Manager
3 Chapter 21
1 FIGURE 21.1 GUI on a Mac
2 FIGURE 21.2 GUI on a Windows system
3 FIGURE 21.3 Terminal on a Mac
4 FIGURE 21.4 Command shell on a Windows system
5 Chapter 22
1 FIGURE 22.1 Editing a chapter in Microsoft Word
2 FIGURE 22.2 Creating a pie chart in Google Sheets
3 FIGURE 22.3 Editing a slide deck in Apple Keynote
4 FIGURE 22.4 Accessing comptia.org using Google Chrome
5 FIGURE 22.5 Creating a network diagram in Lucidchart
6 FIGURE 22.6 Conferencing software hosting a video meeting
7 FIGURE 22.7 Collaborating with Microsoft Teams
8 Chapter 23
1 FIGURE 23.1 Two-tier applications involve the client and one server.
2 FIGURE 23.2 Three-tier applications involve the client and two tiers of serv...
3 Chapter 24
1 FIGURE 24.1 Retrieving a web page
2 FIGURE 24.2 Clearing browsing data in Chrome
3 FIGURE 24.3 Activating incognito mode in Chrome
4 FIGURE 24.4 Deactivating client-side scripting in Chrome
5 FIGURE 24.5 Managing browser extensions in Chrome
6 FIGURE 24.6 Disabling pop-ups and redirects in Chrome
7 FIGURE 24.7 Configuring a proxy server on a Mac
FIGURE 24.8 Valid certificate for CertMike.com 9 FIGURE 24.9 Invalid certificate warning for wrong.host.badssl.com 10 Chapter 26
1 FIGURE 26.1 Code written in the R programming language
2 FIGURE 26.2 Web page written in HTML
3 FIGURE 26.3 Document written in XML
4 FIGURE 26.4 Language summary chart
5 Chapter 27
1 FIGURE 27.1 Temperature adjustment flowchart
2 FIGURE 27.2 Common flowchart shapes
3 Chapter 29
1 FIGURE 29.1 The Product object
2 FIGURE 29.2 Instances of the Product object for a bicycle and a TV
3 FIGURE 29.3 Updated instances of the Product object for a bicycle and a TV
4 Chapter 30
1 FIGURE 30.1 Recipe example
2 Chapter 31
1 FIGURE 31.1 Microsoft Excel spreadsheet
2 FIGURE 31.2 AdventureWorks database schema
3 FIGURE 31.3 Customers database table
4 FIGURE 31.4 Orders database table
5 FIGURE 31.5 CustomerID is a foreign key from the Orders table to the Custome...
6 FIGURE 31.6 Table from a key-value store
7 Chapter 32
1 FIGURE 32.1 SQL command summary
2 FIGURE 32.2 Executing a SQL command in Azure Data Studio
3 Chapter 33
1 FIGURE 33.1 The CIA triad summarizes the three main concerns of cybersecurit...
2 Chapter 36
1 FIGURE 36.1 Fingerprint authentication on a smartphone
2 FIGURE 36.2 Eye scan authentication entering a facility
3 FIGURE 36.3 Microsoft Windows access control list
4 Chapter 37
1 FIGURE 37.1 Creating a password in LastPass
2 Chapter 38
1 FIGURE 38.1 Plain text message
2 FIGURE 38.2 Ciphertext message obtained by encrypting the plain text in Figu...