Professional Documents
Culture Documents
Comptia It Fundamentals Course Notes PDF
Comptia It Fundamentals Course Notes PDF
FC0-‐U51
IT Fundamentals
• The
CompTIA
IT
Fundamentals
Cer9fica9on
exam
is
designed
to
show
that
the
successful
candidate
has
the
knowledge
to:
• Iden9fy
and
explain
basic
computer
components
• Set
up
a
basic
worksta9on
• Conduct
basic
soFware
installa9on
• Establish
basic
network
connec9vity
• Iden9fy
compa9bility
issues
• Iden9fy/prevent
basic
security
risks
IT Fundamentals
So1ware
1. Compare
and
contrast
common
Opera9ng
Systems
and
their
func9ons
and
features
2. Iden9fy
common
programs,
applica9ons
and
their
purpose
3. SoFware
management
best
prac9ces
4. Iden9fy
some
alterna9ve
technologies
and
their
purpose
5. Explain
the
basic
soFware
features
and
func9ons
of
wireless
devices
Hardware
1. Iden9fy
basic
wired
and
wireless
peripherals
and
their
purpose
2. Compare
and
contrast
common
computer
connector
types
3. Iden9fy
the
purpose
of
internal
computer
components
Security
1. Define
basic
security
threats
2. Security
best
prac9ces
3. Web-‐browsing
best
prac9ces
Networking
1. Set
up
and
configure
a
basic
SOHO
router
(wired
/
wireless)
2. Compare
and
contrast
cellular,
wireless
and
wired
data
connec9ons
3. Compare
and
contrast
different
methods
of
sharing
and
storage
Basic IT literacy
1. Perform
appropriate
steps
to
set
up
a
basic
worksta9on
2. Explain
the
basic
methods
of
naviga9ng
an
opera9ng
system
3. Given
a
scenario,
implement
basic
support
concepts
4. Explain
basic
backup
concepts
5. Describe
the
importance
and
impact
of
various
environmental
and
safety
concepts
What can you expect?
• This
course
will
consist
of
my
lecture
/
discussions
on
the
various
topics
• Corresponding
PowerPoints
/
Screen
Shots
• Demos
for
some
of
the
topics
Ready?
• So
if
you’re
ready
lets
get
started
on
our
first
Objec9ve
Topic,
SoFware
*
IT Fundamentals
FC0-‐U51
So1ware
1. Compare
and
contrast
common
Opera9ng
Systems
and
their
func9ons
and
features
2. Iden9fy
common
programs,
applica9ons
and
their
purpose
3. SoFware
management
best
prac9ces
4. Iden9fy
some
alterna9ve
technologies
and
their
purpose
5. Explain
the
basic
soFware
features
and
func9ons
of
wireless
devices
1. Compare and contrast common OperaFng
Systems and their funcFons and features
• Types
• SoFware
compa9bility
for
different
OS
types
and
versions
• Awareness
of
hardware
compa9bility
for
OS
support
• Basic
func9ons
of
an
opera9ng
system
Types
• Mobile
• Apple
iOS
• Apple
Corp,
Clean
&
Simple
Design,
Most
Popular,
Proprietary
• Android
• Google
Corp,
More
flexible
than
Apple
iOS
• Windows
Phone
• MicrosoF
Corp,
Just
like
Windows
8
for
a
PC,
Tiles
to
touch,
Simple
Design,
Proprietary
• Blackberry
• Blackberry
Corp,
Originally
for
enterprises,
Email,
Web
Browsing,
Instant
Messaging
Mobile Types
• Let’s
take
a
look
at
some
emulators
to
see
the
differences
of
the
Mobile
Types
we
just
men9oned
• Just
an
emulator
so
we
don’t
get
full
func9onality
–
just
a
way
for
us
to
be
familiar
with
what
they
look
like
and
may
behave
Types
• Worksta9on
• Windows
• Most
Popular,
PCs,
(XP,
Vista,
Win7,
Win8,
Server
03,
Server
08,
Server
2012)
• Mac
• A
lot
like
Apple’s
iOS,
Simple
but
affec9ve
design
• Linux
• Open
source
OS,
Most
distros
are
free,
gaining
ground
(Fedora,
Red
Hat,
Mint,
Kali,
Ubuntu)
• Chrome
OS
• Simple,
Web
Based,
Light
Weight
as
far
as
resources,
Need
to
have
Internet/Network
connec9on
WorkstaFon Types
• Let’s
take
a
look
at
these
Worksta9on
types
and
the
Opera9ng
Systems
they
use
• If
you
have
a
64
bit
program/applica9on
you
have
to
install
it
on
a
64
bit
computer
• If
you
have
a
32
bit
program/applica9on
you
can
install
it
on
a
32
bit
OR
64
bit
computer
• 64
-‐>
64
• 32
-‐>
32
or
64
Basic funcFons of an operaFng system
• Interface
between
user
and
machine
• So
you
can
“see”
what
you
are
doing,
not
just
command
line
• Coordina9on
of
hardware
components
• Drivers
play
an
important
role
here
too
• Provides
environment
for
soFware
to
func9on
• Apps
can’t
func9on
alone,
need
a
“mom”
• Monitors
system
health
and
func9onality
• Usage,
RAM,
CPU,
Drivers,
Heat,
etc…
• Displays
structure
/
directories
for
data
management
• File
managers
Coming up
• That
was
a
good
talk
on
Opera9ng
Systems
–
important
because
everything
we
do
will
stem
from
our
OS
• Next
we
are
going
to
talk
about
some
Common
programs,
applica9ons
and
their
purposes
*
2. IdenFfy common programs, applicaFons
and their purpose
• Types
• Plaoorms
• Common
file
types
Types
• Produc9vity
SoFware
• Collabora9on
SoFware
• U9lity
SoFware
• Specialized
SoFware
ProducFvity So1ware
• Word
processing
• MS
Word,
OpenOffice
and
LibreOffice
Writer,
MS
WordPad,
notepad++
• Spreadsheet
soFware
• MS
Excel,
OpenOffice
and
LibreOffice
Calc
• Email
soFware
• Outlook,
Outlook
express,
Thunderbird,
Apple
Mail
• Basic
database
soFware
• MS
Access,
SQL
Express,
OpenOffice
and
LibreOffice
Base
ProducFvity So1ware
• PDF
viewers/creators
• Portable
Document
File,
Adobe
Professional,
Nitro
PDF
• Presenta9on
soFware
• MS
PowerPoint,
Open
Office
and
LibreOffice
Impress
• Desktop
publishing
soFware
• Adobe
InDesign,
Corel
Draw,
MS
Publisher
• Personal
Informa9on
Manager
• Address
books,
Calendars,
Evernote
• Remote
desktop
soFware
• Team
Viewer,
VNC
(virtual
network
compu9ng),
Windows
Remote
Desktop
CollaboraFon So1ware
• Online
workspace
• MS
SharePoint,
Google
Groups
• Document
storage/sharing
• MS
SharePoint,
Drop
Box,
MS
OneDrive,
Google
Drive
• Screen
sharing
soFware
• Team
Viewer,
VNC,
Lync
Mee9ng,
AnyMee9ng,
Join.me,
Skype
CollaboraFon So1ware
• Video
conferencing
soFware
• Cisco
WebEx,
Adobe
Connect,
Any
Mee9ng,
MS
Lync,
NetMee9ng
• Instant
messaging
soFware
• MS
Lync,
Skype,
Trillian,
Pidgin,
Steam,
Xfire
• Email
soFware
• Outlook,
Thunderbird
UFlity So1ware
• An9-‐malware
•
Malwarebytes,
EmsisoF
An9-‐Malware,
MS
Malicious
SoFware
Removal
Tool
• SoFware
firewalls
• ZoneAlarm,
Comodo,
OS
Firewall
(Windows,
Linux)
• Diagnos9c/maintenance
soFware
• Task
Manager,
Windows
Ac9on
Center,
CCleaner,
AppCleaner
• Compression
soFware
• Winzip,
Winrar,
7zip,
gzip,
Specialized So1ware
• POS
(Point
of
Sale)
• CAD
• AutoCad
• Graphic
design
• Adobe
Illustrator
• Medical
• Scien9fic
• Financial
• Gaming
• Entertainment
PlaSorms
• Mobile
• Runs
on
our
tablets
or
phones
• Interface
is
different
usually
• Desktop
• Full
version
of
an
applica9on
• Most
powerful
• Web-‐Based
• Chrome
OS
• Runs
from
the
Web
Common File Types
• Documents
• Audio
• Images
• Video
• Executables
• Compression
Formats
Documents
• Txt
• Text
file,
vanilla/plain
• Ro
• Rich
Text
file,
some
formatng
but
nothing
super
fancy
• doc/docx
• Document,
heavy
formatng,
(***x
-‐>
2010
versions
higher
in
Office)
• xls/xlsx
• Spreadsheet
• ppt/pptx
• PowerPoint
• PDF
• Portable
Document
Format
Audio
• Mp3
• MPEG
Audio
Layer
III,
Smaller
file
size,
some
lossless,
compressed
• Wav
• WAVeform
audio
format,
Larger
file
size,
no
lossless,
not
compressed
• Flac
•
Free
Lossless
Audio
Codec,
no
lossless,
compressed
• AAC
• Advanced
Audio
Coding,
Successor
to
the
MP3,
• M4A
• The
file
extension
for
ACC
files
Images
• JPG/JPEG
•
Joint
Photographic
Experts
Group,
compressed,
16.7
million
colors
• gif
• Graphics
Interchange
Format,
not
compressed,
portable,
larger
file
size
usually,
supports
anima9on,
256
colors
• 9ff
• Tagged
Image
File
Format,
good
for
raster
images,
Adobe
product
now,
1992
last
update
Images
• PNG
• Portable
Network
Graphics,
successor
of
the
GIF,
Lossless
and
compressed
for
web
traffic
• BMP
• bitmap
image
file,
Windows
usually
for
raster
images
• Let’s
jump
over
to
MSPaint
and
look
at
these
raster
images
real
quick
Video
• MPG
•
Standard
for
lossy
compression
of
video
and
audio,
where
MP3
derived
from
• MP4
• MPEG-‐4
Part
14,
stores
audio
and
video,
very
popular
• FLV
• Flash
Video,
Video
over
the
Internet
using
Adobe
Flash
Player,
Hulu,
Youtube
Video
• WMV
• Windows
Media
Video,
MS
product,
used
now
in
Blue
Ray
and
HD
DVD
• AVI
• Audio
Video
Interleaved,
MS
Product,
usually
larger
file
sizes,
not
always
compa9ble
with
video
players
Executables
• Exe
• Default/de
facto
executable
file
exens9on
• Msi
• MicrosoF
Installer,
Windows
Installer
now
• App
• Applica9on
program
for
Mac
OS
X,
runs
when
double-‐clicked,
similar
to
a
.EXE
file
in
Windows
Executables
• Bat
• Batch
File,
can
write
simple
programs
to
execute,
write
scripts,
can
run
them
by
double
clicking
• scexe
• HP
Releases
self-‐extrac9ng
firmware
update
files
for
Linux
as
.scexe
files
Compression Formats
• RAR
• Na9ve
format
of
WinRAR
archiver
• TAR
• UNIX
file
type,
derived
from
tape
backups
• ZIP
• Archive
file
format
that
supports
lossless
data
compression
• DMG
• Apple
Disk
Images,
mount
to
use
them
in
Finder
Compression Formats
• ISO
(might
see
.img)
• Sector-‐by-‐sector
copy
of
the
data
on
an
op9cal
disc,
stored
inside
a
binary
file
• 7zip
/
7z
• An
open
source
file
archiver,
Used
to
compress/decompress
files
• gzip
/
gz
• Now
part
of
the
GNU
program,
usually
see
in
Linux
though
can
work
cross
plaoorm
• jar
• Package
file
format
typically
used
to
aggregate
many
Java
class
files
and
associated
metadata
and
resources
(text,
images,
etc.)
into
one
file
to
distribute
applica9on
soFware
or
libraries
on
the
Java
plaoorm
Coming up
• Shew!!
Lots
of
file
types
to
remember,
but
they
are
important.
You
will
see
them
everyday
in
your
IT
career.
• Next
we
are
going
to
discuss
SoFware
Management
Best
Prac9ces
3. Given a scenario, use so1ware
management best pracFces
• Install
/
uninstall
• Patching
/
updates
for
OS,
drivers,
applica9ons
and
security
soFware
• SoFware
version
iden9fica9on
and
compa9bility
• Licensing
Install / Uninstall
• OS
features
• Can
add/remove
features
“bells
and
whistles”
of
the
opera9ng
system
• Applica9ons
• Download
or
get
from
the
store,
but
we
always
install
applica9ons
to
“do”
stuff
on
our
computers,
phones
or
tablets
• Drivers
• Need
these
guys
so
the
hardware
they
support
talk
to
the
opera9ng
system
correctly.
This
way
we
get
the
most
out
of
our
hardware
• Always
get
from
original
vendor,
get
signed
drivers
if
possible
Install / Uninstall
• Let’s
jump
over
to
another
machine
and
take
a
look
at
some
of
these
things
we
just
covered.
• Do
you
have
32bit
or
64bit?
Windows?
Mac?
Linux?
Does
the
soFware
work
cross
plaoorm?
XP?
Vista?
Win7?
Older
Linux
version?
Etc…
Licensing
• Very
important
for
you
to
make
sure
you
are
following
licensing
agreements
and
you
are
staying
lega
• Product
keys
• Will
be
provided
to
purchasers
to
verify
the
soFware
is
legit
to
the
vendor.
Usually
on
the
packaging
somewhere
or
emailed
to
the
registra9on
email
if
web
based
purchase
• Single
/
mul9-‐license
• How
many
computers
are
you
installing
this
on?
Do
you
need
more
than
one?
4. IdenFfy the following alternaFve
technologies and their purpose
• Virtualiza9on
• Cloud
Compu9ng
• Web
applica9ons
• VoIP
• Telepresence
• Gesture-‐based
interac9on
VirtualizaFon
• Physical
machine
vs.
virtual
machine
• Physical
machine
• Right
in
front
of
me,
I
can
touch
it
• Virtual
Machine
• SoFware
on
my
“physical
machine”
called
a
Host
• 2
types
of
VMs
• Type
1
• Doesn’t
need
opera9ng
system
to
run
–
directly
on
the
hardware
• Popular
on
server
systems
like
esxi
Server
and
Hyper-‐V
server
• Type
2
• Needs
an
opera9ng
system
to
talk
to
the
hardware
• Very
popular
for
desktops/laptops
(what
I
am
using
for
our
demos)
Cloud CompuFng
• Everything
is
hosted
in
the
“cloud”
(on
the
internet,
somewhere)
• A
cloud
service
model
is
a
set
of
IT-‐related
services
offered
by
a
cloud
provider
• Provider
is
responsible
for
supplying
cloud-‐based
IT
resources
to
a
cloud
consumer
under
a
service
agreement
(SLA)
• Think
of
it
like,
the
cloud
consumer
is
buying
or
leasing
their
IT
infrastructure
from
the
cloud
provider
• Office
365
is
a
popular
cloud
compu9ng
plaoorm
Web ApplicaFons
• Web
based
programs
• Web 2.0
• CD
–
700
Mb
• DVD
–
4.7
to
9.4
Gb
• Blueray
–
25
to
128
Gb
depending
on
technology
Network Aaached
Storage
• A
dedicated
system
just
for
storage
on
a
network
• Popular
in
homes
with
enthusiast
and
SOHO
setngs
• Can
be
used
in
enterprise
setngs
as
part
of
a
SAN,
Storage
Area
Network
Memory card
• Typically
used
in
devices
that
require
storage
like
a
digital
camera,
camcorder,
drones,
cell
phones
and
tablets
• Used
to
expand
the
memory
is
some
cases
• Many
different
types
and
flavors
of
the
cards
• SD
cards
are
probably
the
favorite
today
• Need
a
special
hardware
device
to
read
the
contents
of
the
card
outside
of
the
device
that
originally
used
the
card
Mobile media players
• Allow
you
to
take
the
media
with
you
and
listen
and/or
watch
on
the
go
Smart phone
• They
are
star9ng
to
do
it
all
• Can
be
your
“calling
device”
but
much,
much
more
• Can
act
as
a
mobile
media
player
• Can
save
informa9on
to
your
device
• Can
pull
informa9on
from
your
device
Touchscreen display
• True
interac9on
with
the
computer
or
system
• See
these
all
over
• Can
be
a
stand
alone
device
like
a
PC
• Can
be
a
television
device
• Kiosks
are
popular
with
this
technology
Coming Up
• Next
we
are
going
to
switch
gears
a
li|le
and
move
towards
talking
about
connector
types
you
need
to
be
familiar
with
for
the
exam
*
2. Compare and contrast common computer
connector types
• Video
• Parallel
• FireWire
• Serial
• eSATA
• RJ-‐45
• Thunderbolt
• RJ-‐11
• USB
• Audio
• PS/2
• Power
Video connector types
VGA
• Video
Graphics
Array
• Refers
to
only
640x480
pixels
officially
• 16
or
256
colors
• Extremely
common
s9ll
DVI
Digital
Visual
Interface
Compa9ble
with
older
VGA
HDMI
• High
Defini9on
Mul9media
Interface
• Can
carry
video
and
audio
• De
facto
for
Digital
entertainment
Display Port
• The
interface
is
primarily
used
to
connect
a
video
source
to
a
display
device
such
as
a
computer
monitor
• Can
also
be
used
to
carry
audio
and
other
forms
of
data
Mini Display Port
• Delivers
a
pure
digital
connec9on
to
external
displays
• It
gives
you
plug-‐and-‐play
performance
with
the
Apple
LED
Cinema
Display
• Works
with
single-‐link
DVI,
dual-‐link
DVI,
and
VGA
displays
with
the
appropriate
adapters
USB
• Universal
Serial
Bus
• Amazing
li|le
connector
• Can
care
audio,
video,
power,
data
S-‐Video
• Separate
video
• Be|er
than
composite
video
• Not
as
good
as
component
video
• On
video
Component -‐ RGB
• Component
–
Red
Green
Blue
• split
into
two
or
more
component
channels
• Be|er
quality
• Only
video
FireWire
• Popular
by
Apple
• IEEE
1394
• Standard
for
a
serial
bus
for
high-‐speed
communica9ons
and
isochronous
real-‐
9me
data
transfer
eSATA
• External
SATA
• External
Serial
Advanced
Technology
A|achment
• Standard
technology
for
connec9ng
a
hard
drive
or
SSD
to
the
rest
of
the
computer.
• IDE:
Integrated
Drive
Electronics
is
the
older
standard
that
SATA
replaced
• Needs
it’s
own
power
connector
to
work
properly
Thunderbolt
• Extremely
fast
connec9ons
• Thunderbolt
2
gives
you
two
channels
on
the
same
connector
with
10Gb/s
of
throughput
in
both
direc9ons
• 20Gb
of
throughput!!
• USB
2.0
gives
about
500
Mb
• USB
3.0
gives
about
5
Gb
• Firewire
gives
800
Mb
PS/2
• A
6-‐pin
mini-‐DIN
connector
used
for
connec9ng
some
keyboards
and
mice
to
a
PC
compa9ble
computer
system
• Being
replaced
(if
not
already)
by
USB
connec9ons
Parallel
May
be
referred
to
as
the
printer
cable
or
printer
port
Was
the
de
facto
for
many
years
for
printer
connec9ons
Two
way
street
for
data
Being
(has
been)
replaced
by
the
USB
connec9ons
Serial
• A
serial
communica9on
physical
interface
through
which
informa9on
transfers
in
or
out
one
bit
at
a
9me
• Replaced
by
the
USB
Connec9ons
RJ-‐45
• Standard
connector
for
Cat3
through
Cat
6
networking
cable
• RJ-‐45
is
NOT
the
descriptor
for
the
cable,
it
is
for
the
connec9on
type
• 8
connectors
for
the
wires
internally
to
pass
data
and/or
voice
traffic
RJ-‐11
• Standard
for
the
POTS,
Plain
old
telephone
systems
• Not
the
descriptor
for
the
cable,
but
for
the
connec9on
type
• 4
wires
connectors
for
the
wires
internally
• Can
pass
data
and
voice
traffic
Audio
• Carries
the
audio
signals
for
the
video
being
shown
• Can
carry
just
audio
from
a
mobile
media
device
to
your
vehicle
• Can
carry
audio
from
a
mobile
media
device
to
an
external
speaker
or
amplifier
• Carries
signal
from
a
device,
CD/DVD
player
to
an
amplifier
or
television
set
Power
• Quite
simply
it
carries
the
power
to
your
computer,
monitor
or
peripheral
device
like
a
printer
or
fax
• Carries
AC
current
to
power
the
device
• US
is
120V
• EU
is
usually
220V
–
Be
careful!
• Could
carry
power
to
the
internal
components
of
your
system
–
the
hard
drives
or
CD/DVD
drives
Coming Up
• Next
we
are
going
to
take
a
look
at
some
of
the
internal
hardware
components
of
a
system
like
the
CPU
and
Hard
drives
3. IdenFfy the purpose of internal computer
components
• CPU
• Power
Supply
• RAM
• Storage
• Expansion
cards
• Motherboard/mainboard
• System
cooling
CPU
• Central
Processing
Unit
• Some9mes
called
the
brains
of
the
computer
• Nothing
more
than
a
very
powerful
switching
mechanism
• Capable
of
doing
millions
of
things
at
once
• Works
on
binary,
1
and
0,
on
and
off,
highs
and
lows
• Intel
or
AMD
these
days
• Many
different
types
and
designs
Power Supply
• Simply
supplies
power
to
you
computer
and
the
devices
within
• US
–
120V
• EU
–
220V
–
Be
Careful!!
RAM
• Random
Access
Memory
• Lots
of
op9ons
here
but
some
more
common
ones
are
DIMMs
and
SODIMMs
• Dual
inline
memory
modules
(DIMMs),
used
in
desktop
PCs
• Small-‐outline
dual
inline
memory
modules
(SODIMMs),
used
in
portable
PCs
Storage
OpFcal drive
• Read/Writes
to
CD/DVD
and/or
BlueRay
discs
• CD
–
700
Mb
• DVD
–
4.7
to
9.4
Gb
• Blueray
–
25
to
128
Gb
depending
on
technology
Hard drive
• Internal
to
the
computer
• Where
all
the
data
is
stored
for
later
use
• Where
the
opera9ng
system
is
stored
• Where
the
computer
looks
for
instruc9ons
upon
boo9ng
• Sealed
stack
of
metal
pla|ers
• Each
with
a
read-‐write
head
on
a
retractable
arm
that
reads
data
from
and
writes
data
to
the
pla|ers
by
magne9zing
bits
of
iron
oxide
par9cles
on
the
pla|ers
in
pa|erns
of
posi9ve
and
nega9ve
polarity
Solid state drive
• Sta9c
RAM
• Nonvola9le
Flash
RAM
• No
moving
parts
• Extremely
fast
and
efficient
Expansion Cards
Video Card
• Allows
the
graphics
to
be
displayed
on
a
monitor
• Can
increase
overall
performance
and
resolu9on
depending
on
the
card
you
get
• More
expensive
cards
have
more
bells
and
whistles
and
more
on
board
RAM
Audio Card
If
you
require
higher
end
audio
you
can
invest
in
an
Audio
expansion
card
Can
support
other
peripherals
like
sound
boards,
music
instruments,
etc…
If
not
required,
you
can
use
the
on
board
audio
most
mother
boards
come
with
Network Card
• If
your
system
requires
mul9ple
network
cards
for
network
communica9ons
• Most
mother
boards
have
on
board
network
cards
that
are
good
enough
for
everyday
use
• Network
cards
allow
the
communica9on
to
the
network
and
possibly
out
to
the
Internet
Modem
• Modulator
–
Demodulator
• Takes
the
signals
and
converts
them
for
use
by
a
computer
• Used
over
the
telephone
lines
• You
might
hear
one
screech
when
using
a
fax
machine
• Not
regularly
used
in
todays
systems
because
it
is
an
“older”
technology
compared
to
network
cards;
it
is
slower
than
network
cards
as
well
• Measured
by
BAUD
Rate
compared
to
the
MB/GB
on
network
cards
Motherboard or
Mainboard
Where
it
all
comes
together
All
internal
components
pass
through
or
are
connected
to
the
mother
board
Holds
it
all
together
–
the
traffic
cop
of
the
system
(Hardware
wise
anyway)
Depending
on
the
mother
board
will
depend
on
what
type
of
CPU
(processor)
you
can
have
–
choose
wisely
I
want
to
take
a
closer
look
at
a
mother
board
on
the
next
slide
–
important
for
you
to
understand
and
know
what’s
going
on
System Cooling
Case Fans
• Fans
that
are
a|ached
to
the
case
• Keep
a
good
flow
of
fresh,
cooler,
air
flowing
throughout
the
case
internally
• Heat
is
BAD
for
computer
components
so
a
good
air
flow
is
essen9al
CPU Fans
• These
are
fans
directly
on
top
of
or
beside
the
CPU
• ESSENTIAL!
• Do
not
run
a
desktop
computer
without
a
CPU
fan
and
heat
fins
• This
is
designed
to
pull
heat
off
of
the
CPU
so
it
doesn’t
damage
the
processor
• If
the
CPU
Fan
goes
out
–
the
computer
has
built
in
safety
that
will
(or
should)
shut
off
the
computer
before
any
real
damage
is
done
Liquid Cooling
• Next
genera9on
of
cooling
for
our
systems
• Very
efficient
and
does
a
great
job
in
keeping
a
system
cooler
• Liquid
is
actually
moving
through
the
system
in
9ny
tubes
that
draw
the
heat
away
from
the
cri9cal
components
• Hope
you
don’t
ever
have
a
leak
though
–
liquid
and
computer
components
don’t
mixed
well.
J
Wrap it Up
• That
does
it
for
Domain
2,
Hardware
• We
looked
at
a
ton
of
topics
that
will
be
necessary
for
us
to
know
come
test
9me.
• Sec9ons
we
covered
were:
• Iden9fy
basic
wired
and
wireless
peripherals
and
their
purpose
• Compare
and
contrast
common
computer
connector
types
• Iden9fy
the
purpose
of
internal
computer
components
• Now
that
we
have
hardware
under
our
belts
we
can
move
forward
with
the
next
Domain
IT Fundamentals
FC0-‐U51
3. Security
1. Define
basic
security
threats
2. Use
security
best
prac9ces
3. Use
web-‐browsing
best
prac9ces
Security Terminology
• Vulnerability
• A
weakness
in
your
system
or
infrastructure
• Exploit
• Item
that
will
take
advantage
of
your
weakness;
what
is
used
in
the
a|ack
• Threat
• Person
or
thing
that
is
doing
the
a|acking;
User
of
the
exploit
Define basic security threats
• Malware
• Phishing
• Social
engineering
• Spam
• Password
cracking
• Physical
security
Malware
Viruses
• A
virus
is
a
self
replica9ng
program
that
produces
its
own
code
by
a|aching
copies
of
it
into
other
executable
codes.
• This
virus
operates
without
the
knowledge
or
desire
of
the
user.
• Like
a
real
virus,
a
computer
virus
is
contagious
and
can
contaminate
other
files.
• Viruses
can
infect
outside
machines
only
with
the
assistance
of
computer
users.
Why are Viruses created?
• Inflict
damage
to
compe9tors
• Research
projects
• Pranks
• Vandalism
• A|ack
the
products
o
f
specific
companies
• Distribute
poli9cal
messages
• Financial
gain
• Iden9ty
theF
• Spyware
How do you know if you have Virus?
• Programs
take
longer
to
load
• The
hard
drive
is
always
full,
even
without
installing
any
programs
• The
floppy
disk
drive
or
hard
drive
runs
when
it
is
not
being
used
• Unknown
files
keep
appearing
on
the
system
• The
keyboard
or
the
computer
emits
strange
or
beeping
sounds
• The
computer
monitor
displays
strange
graphics
• Filenames
turn
strange,
oFen
beyond
recogni9on
• The
hard
drive
becomes
inaccessible
when
trying
to
boot
from
the
floppy
drive
• A
program's
size
keeps
changing
• The
memory
on
the
system
seems
to
be
in
use
and
the
system
slows
d
own
How do you get one?
• When
a
user
accepts
files
and
downloads
without
checking
properly
for
the
source.
• A|ackers
usually
send
virus
-‐
infected
files
as
email
a|achments
to
spread
the
virus
on
The
vic9m
's
system.
If
the
vic9m
opens
the
mail,
the
virus
automa9cally
infects
the
system.
• A|ackers
incorporate
viruses
in
popular
soFware
programs
and
upload
the
infected
soFware
on
websites
intended
to
download
soFware.
When
the
vic9m
downloads
infected
soFware
and
installs
it,
the
system
gets
infected.
• Failing
to
install
new
versions
or
update
with
latest
patches
intended
to
fix
the
known
bugs
may
expose
your
system
to
viruses.
• With
the
increasing
technology
,
a|ackers
also
are
designing
new
viruses.
Failing
to
use
latest
an9virus
applica9ons
may
expose
you
to
virus
a|acks
Trojans
• Trojan
is
defined
as
a
"malicious,
security
breaking
program
that
is
disguised
as
something
benign."
• A
computer
Trojan
horse
is
used
to
enter
a
vic9m's
computer
undetected,
gran9ng
the
a|acker
unrestricted
access
to
the
data
stored
on
that
computer
and
causing
immense
damage
to
the
vic9m.
Trojans
• Trojan
horses
work
on
the
same
level
of
privileges
that
the
vic9m
user
has.
• If
the
vic9m
had
the
privileges,
Trojan
can
delete
files,
transmit
informa9on,
modify
exis9ng
files,
and
install
other
programs.
• The
Trojan
horse
can
a|empt
to
exploit
a
vulnerability
to
increase
the
level
of
access
beyond
that
of
the
user
running
the
Trojan
horse.
• If
successful,
the
Trojan
horse
can
operate
with
increased
privileges
and
may
install
other
malicious
codes
on
the
vic9m's
machine.
Trojans Purpose
• Delete
or
replace
the
opera9ng
system's
cri9cal
files
• Generate
fake
traffic
to
create
DOS
a|acks
• Download
spyware,
adware,
and
malicious
files
• Record
screenshots,
and
audio
and
video
of
the
vic9m's
PC
• Steal
informa9on
such
as
passwords,
security
codes,
and
credit
card
informa9on
using
keyloggers
• Disable
firewalls
and
an9virus
soFware
• Create
backdoors
to
gain
remote
access
• Infect
a
vic9m's
PC
as
a
proxy
server
for
relaying
a|acks
• Use
a
vic9m's
PC
as
a
botnet
to
perform
DDoS
a|acks
• Use
a
vic9m's
PC
for
spamming
and
blas9ng
email
messages
How do you know?
• CD-‐ROM
drawer
opens
and
closes
by
itself
• Computer
browser
is
redirected
to
unknown
pages
• Strange
chat
boxes
appear
on
target's
computer
• Documents
or
messages
are
printed
from
the
printer
• Func9ons
of
the
right
and
leF
mouse
bu|ons
are
reversed
• Abnormal
ac9vity
by
the
modem,
network
adapter,
or
hard
drive
• The
account
passwords
are
changed
or
unauthorized
access
• Strange
purchase
statements
appear
in
the
credit
card
bills
• The
ISP
complains
to
the
target
that
his
or
her
computer
is
IP
scanning
How did you get a Trojan?
• Trojans
are
included
in
bundled
shareware
or
downloadable
soFware.
When
a
user
downloads
those
files,
Trojans
are
installed
onto
the
systems
automa9cally.
• Users
are
tricked
with
the
different
pop-‐up
ads.
It
is
programmed
by
the
a|acker
in
such
a
way
that
it
doesn't
ma|er
if
is
the
user
clicks
YES
or
NO;
a
download
starts
and
the
Trojan
is
installed
onto
the
system
automa9cally.
• A|ackers
send
Trojans
through
email
a|achments.
When
those
a|achments
are
opened,
the
Trojan
is
installed
on
the
system.
• Users
are
some9mes
tempted
to
click
on
different
kinds
of
files
such
as
gree9ng
cards,
porn
videos,
images,
etc.,
where
Trojans
are
silently
installed
one
the
system.
How does the Trojan get in?
• Many
different
ways
but
here
are
a
few
• Email
A|achments
• Instant
Messenger
• IRC
• Physical
Access
• Fake
programs/Freeware/Shareware
• Downloads
from
the
Internet
Worms
• A
worm
is
a
malicious
program
that
can
infect
both
local
and
remote
machines.
• Worms
spread
automa9cally
by
infec9ng
system
aFer
system
in
a
network
,
and
even
spreading
further
to
other
networks.
• Worms
have
a
greater
poten9al
for
causing
damage
because
they
do
not
rely
on
the
user's
ac9ons
for
execu9on.
Spyware
• Spyware
is
stealthy
computer
monitoring
soFware
that
allows
you
to
secretly
ecord
all
ac9vi9es
of
a
computer
user.
• It
automa9cally
delivers
logs
to
you
via
email
or
FTP,
including
all
areas
of
the
system
such
as
email
sent,
websites
visited
,
every
keystroke
,
file
opera9ons
,
and
online
chat
conversa9ons.
• It
also
takes
screenshots
at
set
intervals
,
just
like
a
surveillance
camera
directly
pointed
at
the
computer
monitor.
• Spyware
is
usually
bundled
as
a
hidden
component
of
freeware
or
shareware
programs
that
can
be
downloaded
from
the
Internet.
Types of Spyware
• Desktop
Spyware
• Email
and
Internet
Spyware
• Child
Monitoring
Spyware
• Audio
Spyware
• USB
Spyware
• Telephone/Cellphone
Spyware
• GPS
Spyware
• Print
Spyware
• Video
Spyware
• Screen
Capturing
Spyware
Ransomware
• A|ackers
will
compromise
you
system
and
encrypt
files
holding
them
ransom
• You
agree
to
pay
a
certain
amount
and
they
will
give
the
encryp9on
key
to
unlock
your
data
Scareware
• A|ackers
trick
you
into
downloading
and
installing
an
unneeded
program
in
order
to
“protect”
yourself
Social Engineering
• Social
engineering
refers
to
the
method
of
influencing
and
persuading
people
to
reveal
sensi9ve
in
forma9on
in
order
to
perform
some
malicious
ac9on.
• With
the
help
of
social
engineering
tricks,
a|ackers
can
obtain
confiden9al
informa9on
,
authoriza9on
details,
and
access
details
of
people
by
deceiving
and
manipula9ng
them.
Why does it work?
• Human
nature
of
trust
• Ignorance
of
Social
Engineering
• Threats
for
non-‐compliance
of
requests
• Promise
something
for
nothing
• Targets
feel
a
sense
for
moral
obliga9on
Phases of Social Engineering
• Research
on
Target
Company
• Select
a
vic9m
in
the
Target
Company
• Develop
a
rela9onship
• Exploit
the
rela9onship
Type of Social Engineering
• Human
based
• Face
to
face,
dressing
as
legi9mate
person
• Computer
based
• Email,
IMs,
Chat,
Phishing
• Mobile
based
• Texts,
malicious
apps
Phishing
• A
social
engineering
technique
• Email
asking
you
to
click
on
a
link
to
“update
your
informa9on”
• They
are
trying
to
trick
you
into
clicking
on
a
link
and
providing
your
login
informa9on
• Very
popular
aFer
a
cyber
a|ack
on
a
par9cular
company
Spam
• Unwanted
or
solicited
emails
• Doesn’t
always
have
to
be
emails
• Can
spam
forums,
text
messaging,
instant
messaging
• Protect
what
you
are
doing
and
make
sure
nobody
is
close
by
Dumpster Diving
• Illegal
to
do
by
the
way
–
not
your
trash
to
be
going
through
*
Security best pracFces
• Password
management
• Device
hardening
• Open
WiFi
vs.
secure
WiFi
• Mul9factor
authen9ca9on
• Suspicious
emails
• Act
on
security
soFware
alerts
• Admin
vs.
user
vs.
guest
account
Password management
• Password
complexity
• 3
of
4
• Change
default
passwords
• Password
confiden9ality
• Keep
it
secret
• Password
expira9on
• Don’t
allow
password
to
last
forever
• Password
reuse
• Don’t
allow
reuse
of
X
number
of
passwords
• Awareness
of
Single
Sign
On
Device hardening
• Disable
unused
features
• Disable
Bluetooth
• Disable
NFC
• Timeout
/
lock
op9ons
• Enable
security
soFware/features
• SoFware
firewall
• An9-‐malware
• Encryp9on
op9ons
Open WiFi vs. secure WiFi
• Do
we
want
it
“secure”
or
“unsecure”
• If
you
want
it
secure
we
want
to
make
sure
we
have
a
SSID
set
and
a
“Key”
MulFfactor authenFcaFon
• Authen9ca9on
Factors
• Something
you
know
• Something
you
have
• Something
you
are
• Mul9factor
is
using
more
than
one
of
these
authen9ca9on
methods
Suspicious emails
• A|achments
• If
it’s
an
untrusted
user
–
DO
NOT
OPEN
THE
ATTACHMENT!
• Hyperlinks
• Untrusted
sender,
be
mindful
about
the
Hyperlink
Act on security so1ware alerts
• If
you
computer
is
telling
you
something
–
pay
a|en9on
• Opera9ng
systems
will
also
tell
you
if
you
have
An9-‐virus
installed
or
not,
have
you
done
your
updates
lately,
etc…
Admin vs. user vs. guest account
• Admin
• Full
control
of
your
system
• User
• Can
run
programs
but
cannot
install/uninstall
• Guest
Account
• Disable!
Allows
guest
users
to
surf
the
web,
maybe
use
some
programs,
but
not
much
access
Coming Up
• Next
we
are
going
to
talk
about
web-‐browsing
best
prac9ces
to
keep
use
save,
protec9ng
our
iden9ty
and
sanity.
Web-‐browsing best pracFces
• Recognize
a
secure
connec9on/ • Update
browsers
and
plugins
website
• Disable
unneeded/suspicious
• Recognize
invalid
cer9ficate
browser
plugins,
toolbars
and
warnings
extensions
• Recognize
suspicious
links
• Disable
autofill
forms/passwords
• Recognize
suspicious
banner
ads
• Clear
browser
cache/history/
• Recognize
adware
symptoms
cookies
• Limit
the
use
of
personal
• Recognize
untrusted
source
informa9on
(PII)
warnings
• Risks
of
using
public
worksta9ons
Wrap it Up
• That
does
it
for
Domain
3,
Security
• We
looked
at
a
ton
of
topics
that
will
be
necessary
for
us
to
know
come
test
9me.
• Sec9ons
we
covered
were:
• Define
basic
security
threats
• Use
security
best
prac9ces
• Use
web-‐browsing
best
prac9ces
• Now
that
we
have
Security
under
our
belts
we
can
move
forward
with
the
next
Domain
IT Fundamentals
FC0-‐U51
Domain 4 -‐ Networking
1. Set
up
and
configure
a
basic
SOHO
router
(wired
/
wireless)
2. Compare
and
contrast
cellular,
wireless
and
wired
data
connec9ons
3. Compare
and
contrast
different
methods
of
sharing
and
storage
Set up and configure a basic SOHO router
(wired / wireless)
• Verify
wired
connec9on,
if
applicable
• Set
WEP
vs.
WPA
vs.
WPA2
• Change
SSID
from
default
• Apply
a
new
wireless
password
• Change
admin
password
for
router
• Connect
to
the
new
network
• Verify
internet
connec9vity
• Update
firmware
if
necessary
WEP
• Wired Equivalent Privacy (WEP)
• A wireless protocol designed to provide privacy equivalent to that of a
wired network
• Vulnerable due to weaknesses in the way the RC4 encryption is
deployed
• Can be cracked in as little as 5 minutes
• The Initialization Vector (IV) of WEP uses 24-bit encryption, which is
too small to be secure
• By examining multiple packets, it can be easily cracked, known as an IV
attack
• Upgraded to use Temporal Key Integrity Protocol (TKIP), a 128-bit
wrapper using MAC and packet serial number (WPA)
WPA / WPA2
• Wi-Fi Protected Access (WPA) and WPA2
• Technologies designed to address the core problems with WEP.
• Implemented by the 802.11i standard
• WPA uses RC4 with TKIP
• Was an intermediate solution for the problems with WEP
• Compatible with older Wireless NICs
• WPA2 employs Counter Mode with Cipher Block Chaining Message Authentication
Code Protocol (CCMP)
• CCMP uses 128-bit AES encryption (AES-CCMP)
• Not backwards compatible to older wireless NICs
Sefng up a Wireless Router
Demo
Compare and contrast cellular, wireless and
wired data connecFons
• High
vs.
low
mobility
• High
vs.
low
availability
• High
vs.
low
throughput/bandwidth
• High
vs.
low
reliability
• Connec9on
delay
• Number
of
concurrent
connec9ons
• Levels
of
security
High vs. low mobility
• Cellular
• Very
High
Mobility
• Wireless
• High
Mobility
• Wired
• Low
Mobility
High vs. low availability
• Cellular
• Very
High
Availability
• Wireless
• High
Availability
-‐
depends
• Wired
• High
Availability
-‐
depends
High vs. low throughput/bandwidth
• Cellular
• Medium
Throughput
• Wireless
• High
Throughput
• Wired
• Very
High
Throughput
High vs. low reliability
• Cellular
• High
reliability
• Wireless
• High
reliability
• Wired
• Very
High
reliability
ConnecFon delay
• Cellular
• Medium
Connec9on
delay
• Wireless
• Low
Connec9on
delay
• Wired
• Very
Low
Connec9on
delay
Number of concurrent connecFons
• Cellular
• Very
High
Mobility
• Wireless
• High
Mobility
• Wired
• Low
Mobility
Levels of security
• Cellular
• Medium
Security
• Wireless
• Low
to
Medium
Security
• Wired
• High
Security
3. Compare and contrast different methods of
sharing and storage
• HTTP
vs.
HTTPS
• FTP
vs.
FTPS
vs.
SFTP
(Secure
File
Transfer
Protocol)
• Local
vs.
hosted
storage
• Peer-‐to-‐peer
• Network
vs.
local
prin9ng
HTTP vs. HTTPS
• HTTP
• Unsecure
• Plain
Text
data
• Port
80
for
communica9on
• HTTPS
• Secure
using
SSL
(Secure
Socket
Layer)
• Encrypted
data
• Port
443
for
communica9on
FTP vs. FTPS vs. SFTP
• FTP
• Plain
text
• No
protec9on
• Ports
20/21
• FTPS
• Encrypted
data
with
SSL
• Port
21/990
• SFTP
• Encrypted
data
with
SSH
• Port
22
Local vs. Hosted Storage
Cloud-‐based services
• Cloud-‐based
collabora9ve
applica9ons
• Office
365
for
example
• Super
accessible
from
mul9ple
devices
and
loca9ons
• Very
flexible
• Cloud-‐based
storage
• Google
Drive,
OneDrive,
DropBox
File and print sharing
• Workgroup
• Can
share
a
printer
on
the
network
or
a|ached
to
a
system
in
the
“workgroup”
• Workgroup
is
a
name
for
computers
that
share
a
workgroup
name
in
the
TCP/IP
Setngs
on
the
system
• Can
share
files
with
network
shares
or
shares
setup
manually
• Homegroup
• For
home
users
to
make
prin9ng
at
home
easier
without
having
to
setup
a
workgroup
• Can
decide
if
you
want
to
share
Pictures,
Music,
Documents
• Need
a
code
to
join
the
homegroup
Network drives
• Drives
that
are
physically
on
another
computer/server
• Allows
you
to
share
files/data
among
the
users
of
the
network
• Can
be
on
a
dedicated
server
• Can
be
on
a
worksta9on
that
is
used
daily
• Can
be
built
into
wireless
routers
now
days
Network Aaached Storage
• A
NAS
• Storage
or
a
data
storage
device,
such
as
a
hard
drive
or
RAID
array,
connected
to
a
computer
network,
providing
data
access
to
different
network
clients
Direct Aaached Storage
• Like
the
opposite
of
NAS
• Digital
storage
system
directly
a|ached
to
a
server
or
worksta9on
External hard drives
• Like
a
thumb
drive
but
much
more
capacity
• Require
power
to
work
unlike
a
thumb
drive
• Can
be
used
for
backup
purposes
• File
archiving
• Transpor9ng
large
files
Peer-‐to-‐peer
• Local
adhoc
network
• Bluetooth
sharing
• Direct
link
(PC-‐to-‐PC)
• Cross-‐over
cable
• Online
peer-‐to-‐peer
network
• Using
Switches
(local)
• Using
soFware
to
communicate
• Bit
torrent
for
example
Network vs. local prinFng
• Network
prin9ng
is
allowed
over
the
network
(LAN
or
WAN)
• Can
be
a
dedicated
printer
• Can
be
a
printer
a|ached
to
a
worksta9on
and
shared
out
• Can
be
a
wireless
printer
to
support
mobile
devices
• Local
prin9ng
is
just
prin9ng
from
one
device
to
a
locally
or
directly
a|ached
printer
• A|ached
by
USB
cable
usually
now
days
Wrap it Up
• That
does
it
for
Domain
4,
Networking
• We
looked
at
a
ton
of
topics
that
will
be
necessary
for
us
to
know
come
test
9me.
• Sec9ons
we
covered
were:
• Define
basic
Set
up
and
configure
a
basic
SOHO
router
(wired
/
wireless)
• Compare
and
contrast
cellular,
wireless
and
wired
data
connec9ons
• Compare
and
contrast
different
methods
of
sharing
and
storage
• Now
that
we
have
Networking
under
our
belts
we
can
move
forward
with
the
next
Domain
IT Fundamentals
FC0-‐U51
Domain 5 – Basic IT Literacy
1. Perform
appropriate
steps
to
set
up
a
basic
worksta9on
2. Explain
the
basic
methods
of
naviga9ng
an
opera9ng
system
3. Given
a
scenario,
implement
basic
support
concepts
4. Explain
basic
backup
concepts
5. Describe
the
importance
and
impact
of
various
environmental
and
safety
concepts
Perform appropriate steps to set up a basic
workstaFon
• Plug
in
cables
• Uninstall
unneeded
soFware
(if
• Power
on
computer
applicable)
• Follow
ini9al
opera9ng
system
• Configure
and
verify
internet
setup
wizard
connec9on
• Localiza9on
setngs
• Install
addi9onal
soFware
(if
• Screen
resolu9on
applicable)
• Audio
setngs
• Run
soFware
and
security
updates
• Install
security
soFware
• Other
user
accounts
(if
applicable)
• Configure
peripherals
(if
• Basic
cable
management
applicable)
Plug in cables
We
will
want
to
make
sure
all
the
power
cables
are
correctly
inserted
Connect
the
keyboard
Connect
the
mouse
Connect
the
monitor
cable
Connect
any
audio
cables
if
wanted
Power on computer
May
seem
like
a
no
brainer,
but
we
have
to
find
the
power
bu|on
to
get
it
turned
on
Follow iniFal operaFng system setup wizard
• Localiza9on
setngs
• Screen
resolu9on
• Audio
setngs
• Might
not
be
able
to
do
this
step
if
you
need
to
download
it
first
(try
to
get
a
copy
without
downloading
if
possible)
Configure peripherals (if applicable)
• Printers
• Scanners
• External
Storage
Devices
Uninstall unneeded so1ware (if applicable)
• Get
rid
of
the
“bloat
ware”
that
vendors
will
put
on
your
system
• If
you
have
a
wired
connec9on,
then
you
can
simply
plug
up
the
RJ-‐45
connector
for
the
Cat5e
(network
cable)
to
your
computer
• Once
connected,
give
it
a
few
seconds
to
recognize
the
network,
then
try
to
visit
a
website
to
test
the
connec9on
Install addiFonal so1ware (if applicable)
• Install
any
addi9onal
soFware
you
may
want
• Produc9vity
soFware
• Games
• U9li9es
Run so1ware and security updates
• Update
your
an9-‐virus
asap
to
make
sure
you
have
the
latest
virus
defini9ons
to
provide
maximum
protec9on
• Might
take
awhile
depending
on
your
opera9ng
system,
connec9on
speed
and
the
number
of
updates
you
will
need
to
download
Other user accounts (if applicable)
Basic Cable Management
4. Explain basic backup concepts
• Importance
of
backups
• Scheduling
• Frequency
• Storage
mediums
• Locally
a|ached
storage
• Offsite/cloud-‐based
• Network
a|ached
storage
• Backup
verifica9on
and
tes9ng
Importance of backups
Scheduling
Frequency
Storage mediums
• Locally
a|ached
storage
• Offsite/cloud-‐based
• Network
a|ached
storage
Backup verificaFon and tesFng
Coming Up
• Next
we
are
going
to
wrap
up
our
Basic
IT
Literacy
Domain
talking
about
Going
Green
for
IT
by
Describing
the
importance
and
impact
of
various
environmental
and
safety
concepts.
5. Describe the importance and impact of
various environmental and safety concepts
• Proper
disposal
methods
• Power
• Device
placement
• Electrosta9c
discharge
concepts
• Ergonomic
concepts
• Follow
manufacturer
safety
guidelines
Proper disposal methods
• RoHS
• Restric9on
of
Hazardous
Substances
• Lead
Free
Direc9ve
• 6
substances
you
cannot
just
toss
• Lead
(Pb)
• Mercury
(Hg)
• Cadmium
(Cd)
• Hexavalent
chromium
(Cr6+)
• Polybrominated
biphenyls
(PBB)
• Polybrominated
diphenyl
ether
(PBDE)
• Anything
with
a
circuit
board
in
it,
including
computers,
cell
phones,
routers,
and
printers
Proper disposal methods
• CRT
monitors
• CRTs
contain
many
environmentally
harmful
elements,
including
the
phosphorous
coa9ng
on
the
inside
of
the
monitor
glass.
Phosphorous
is
vola9le,
and
it
can
explode
or
start
a
fire
when
it
combines
with
the
oxygen
molecules
in
water.
• Ba|eries
• Contain
heavy
metals
such
as
mercury,
lead,
cadmium,
and
nickel,
all
of
which
can
contaminate
the
environment
when
not
disposed
of
properly,
and
they
can
release
toxic
chemicals
into
the
air
when
incinerated
• Portable
compu9ng
devices
(laptops,
phones,
and
so
on)
• Wireless
input
devices,
such
as
wireless
mice
and
keyboards
• Motherboards
• Uninterrup9ble
power
supplies
(UPSs)
Proper disposal methods
• Ink/toner
• The
toner
used
in
laser
printers
and
photocopiers
is
carcinogenic,
so
proper
disposal
of
toner
is
a
ma|er
of
public
safety.
Toner
cartridges
should
be
returned
to
the
manufacturer
or
another
company
that
reclaims
and
recycles
them.
Don’t
breathe
any
released
toner!
• Hard
drives
• You
want
to
make
sure
the
hard
drive
is
“clean”
before
you
dispose
of
the
device.
Using
a
recycling
facility
where
they
destroy
the
drive
professionally
is
your
best
bet.
Power
• Energy
efficient
devices
• Power
profiles
• Power
op9ons
• Sleep
/
hiberna9on
• UPS
vs.
surge
protector
vs.
power
strip
• Power
limita9ons
• Interna9onal
power
differences
Energy efficient devices
• In
addi9on
to
the
OS
setngs
for
conserving
power,
some
hardware
devices
also
have
their
own
power
savings
• Flat
panels
over
CRTs
• LED
over
LCD
• Solid
State
Hard
drives
over
tradi9onal
SATA
drives
• Sleep
/
hiberna9on
• Sleep
• Like
a
pause
bu|on
• Hiberna9on
• Most
power
savings
UPS vs. surge protector vs. power strip
• UPS
• Uninterrup9ble
power
supply
• Surge
Protector
• Provides
protec9on
from
spikes
or
lags
of
power
• Power
Strip
• Just
spreads
out
the
power
equally
–
no
protec9on
• Power
limita9ons
Device placement
• Airflow
• Hot/Cool
Isles
• Humidity
• Not
too
low,
not
too
high
• Temperature
• Cooler
• Dust
accumula9on
• At
a
very
minimum
• EMI
• Keep
the
power
away
from
Data!
ElectrostaFc discharge concepts
• Sta9c
electricity