You are on page 1of 149

Total Seminars Produ

CompTIA A+ Core 1 (220-1101)

New Exam Release: April 2022

# Episode Name
Chapter 0: All About the CompTIA A+

1 What is the CompTIA A+?

Why Get CompTIA A+


2 Certified?

3 How to Take the A+ Exam

What's on the CompTIA A+


4 Core 1 (220-1101) Exam?

How to Pass the CompTIA A+


6 Exams

7 How to Use this Video


Course
Chapter 1: Safety and Professionalism
5 Tools of the Trade

6 Troubleshooting Theory

Chapter 2: The Visible Computer


1 Primary PC Components

3 Touring a PC

4 What Is a Computer?

Chapter 3: CPUs
1 What Is a CPU?

2 Modern CPUs

3 32-Bit vs. 64-Bit Computing

4 Choosing the Right CPU

CPU Generations and


5 Architecture

6 CPU Cooling

7 Installing and
Troubleshooting a CPU

Chapter 4: RAM

1 RAM Technology

2 RAM Capacity

3 RAM Features

4 Virtual Memory

5 Installing and
Troubleshooting RAM

Chapter 5: Firmware

1 What Is BIOS?

2 POST
3 System Setup

4 Troubleshooting Firmware

Chapter 6: Motherboards

1 Form Factors

2 Chipsets

Choosing the Right


3 Motherboard

Installing and
4 Troubleshooting a
Motherboard

Chapter 7: Power Supplies

1 The Power Supply

2 Choosing a Power Supply

4 Cooling Your System

Installing and
5 Troubleshooting a PSU

Chapter 8: Mass Storage Technologies


Introduction to Mass
1 Storage
2 Magnetic Disk Drives

3 Solid-State Drives (SSDs)

4 SCSI

Chapter 9: Implementing Mass Storage

9 RAID

10 Hardware RAID

Software RAID in Storage


11 Spaces

12 Encrypting Mass Storage

Mass Storage
14 Troubleshooting

Chapter 10: Essential Peripherals

1 USB Standards

2 Understanding USB

3 Configuring USB

4 Thunder and Lightning

5 Optical Media

6 Readers and Scanners


7 Common Peripherals

Webcams and
8 Videoconferencing

Installing and
9 Troubleshooting Expansion
Cards

Chapter 11: Installing and Upgrading Operating Systems


(There are no episodes from
this book chapter in the 220-
1101)

Chapter 12: Working with Operating Systems


(There are no episodes from
this book chapter in the 220-
1101)

Chapter 13: Users, Groups, and Permissions


(There are no episodes from
this book chapter in the 220-
1101)

Chapter 14: Maintaining and Optimizing Operating Systems


(There are no episodes from
this book chapter in the 220-
1101)

Chapter 15: Working with the Command-Line Interface


(There are no episodes from
this book chapter in the 220-
1101)

Chapter 16: Troubleshooting Operating Systems


(There are no episodes from
this book chapter in the 220-
1101)

Chapter 17: Display Technologies

1 Monitor Technologies

2 LCD Breakdown
Graphics Cards and
3 Connections

Resolutions and Aspect


4 Ratios

5 Installing a Graphics Card

6 Multiple Monitors

7 Projectors

Troubleshooting Display
8 Technologies

Chapter 18: Essentials of Networking

1 Introduction to Networking

2 Hubs vs. Switches

3 Hexadecimal

4 WANs and Routers

5 Cables and Connectors

6 Crimping Cables

7 Structured Cabling

8 Network Card
Troubleshooting
Chapter 19: Local Area Networking
1 Introduction to TCP/IP

5 Dynamic IP Addressing

6 IPv6

7 Port Numbers

8 TCP, UDP, and ICMP

10 Understanding DNS

11 Working with DNS

17 Routers

18 Basic Router Configuration

23 Virtual LANs (VLANs)

24 Network Troubleshooting

Chapter 20: Wireless Networking


1 Wireless Network Hardware

2 Wi-Fi Standards

6 It's a Huge Mesh

7 Enterprise Wireless

8 Beyond Wi-Fi

Troubleshooting Wireless
9 Connections

Chapter 21: The Internet

1 Beyond the LAN

2 Internet Tiers

3 Broadband Connections

4 Firewalls and Servers


9 E-Mail

10 Proxy Servers

Virtual Private Networks


11 (VPNs)

12 Internet of Things (IoT)

13 Troubleshooting Internet
Connections, Part 1

Chapter 22: Virtualization

1 Understanding Virtualization

2 Your First Virtual Machine

Advanced Virtualization
3 Setup

4 Cloud Computing

5 Cloud Ownership

6 Cloud-Based Applications

Chapter 23: Portable Computing


1 Laptop Features

Laptop Hardware
2 Troubleshooting - The Tools

Laptop Hardware - Core


3 Hardware

Laptop Hardware - CPU and


4 Motherboard

5 Touring Your Laptop Display

Chapter 24: Mobile Devices

1 What Is a Mobile Device?

2 Mobile Connections

3 Touring Android

Chapter 25: Maintaining and Securing Mobile Devices

1 Maintaining Mobile Devices


2 Mobile Devices and E-mail

3 Mobile Synchronization

4 Mobile Device Security

5 Mobile Security
Troubleshooting

Mobile Device
6 Troubleshooting

Chapter 26: Printers and Multifunction Devices

1 Laser Printers

2 Inkjet Printers

3 Impact Printers

4 Thermal Printers

5 Installing a Local Printer


6 Sharing Printers

Installing Wireless and Cloud


7 Printers

8 Troubleshooting Printers

9 3D Printing

Chapter 27: Securing Computers


(There are no episodes from
this book chapter in the 220-
1101)

Chapter 28: Operational Procedures


(There are no episodes from
this book chapter in the 220-
1101)
Total Seminars Production
CompTIA A+ Core 1 (220-1101) Instructors: Mike Me

New Exam Release: April 2022 Old Exam Retirem

Exam
Description Core
All About the CompTIA A+
CompTIA creates IT certifications that cover topics such as how to build and fix computers or
how to secure businesses from internal and external threats. Every major IT manufacturer is
part of CompTIA. The CompTIA A+ certification is a popular entry point for people looking to N/A
work in IT. The certification requires you to pass two exams, the Core 1 (220-1101) and Core 2
(220-1102), but requires no experience or study (though, as Mike points out, study is good!)

Certifications power the IT industry. CompTIA A+ is the de facto entry point for IT techs, the
first certification you should get. It provides a common language for people in IT, and N/A
prepares you for work in the industry.
In this episode, Steve walks through how to take the CompTIA A+ exam, including the at-
home and in-person options through Pearson Vue. N/A

The Core 1 (220-1101) exam tackles five big subject areas: mobile devices, networking,
hardware, virtualization and cloud computing, and hardware and network troubleshooting.
Steve dives into the sub-objectives in this episode, providing an overview of what you need to N/A
know for success on the Core 1 exam.

In this episode, Steve describes the CompTIA A+ exam process, plus explores a good strategy
for prepping for the exam. Schedule the exam first! The pressure will have you hitting the N/A
books or videos in no time!
Steve shows you how to use this video course alongside the CompTIA A+ Certification All-in- N/A
One Exam Guide, Tenth Edition. He also shows you helpful hints about the videos.
Safety and Professionalism
Technicians need the right tools to do their job. These tools include PC toolkits, mobile device Core 1
toolkits, voltmeters and circuit testers.
The CompTIA A+ defines a very specific workflow process to troubleshoot any problem on a
system. These steps will help you mentally break down the steps to diagnose and repair a Core 1
computer problem.

The Visible Computer


Mike takes you on a tour of the primary PC components including the computer case, Core 1
monitor, and various peripherals including the keyboard, mouse, speakers, and more.

Learn the basic parts of a PC in this episode. Core 1

Computers are everywhere if you know where to look! What are the parts and the functions Core 1
of a computer? What do all these devices have in common?
CPUs
The Central Processing Unit (CPU) is quite possibly the most critical component of a PC. But
what tasks does the CPU deal with, and how does it go about handling them? Let’s dig into Core 1
the core features of a CPU.
The modern processor is loaded with features that you need to know in order to excel as a PC
technician. Let’s examine some of the modern CPU’s abilities and get hands-on with a tool Core 1
that has become a necessity when dealing with central processing units.

As technology evolves, the industry sets standards to define milestones. There is possibly no
standard more prolific than 32-bit and 64-bit computing. Every piece of hardware and Core 1
software released in the last three decades follows either the 32-bit or 64-bit standard.

Choosing a CPU that meets all of your needs is one of the most important decisions that you
will make when building your PC. The wrong choice can mean a computer that does not
perform the needed tasks or quickly becomes outdated. Since we have already learned about Core 1
CPU features such as multi-cores and clock speed, let’s discuss choosing the right CPU for the
job at hand.

By now you are probably wondering what that alphabet soup of letters and numbers
alongside a CPU name means. Understanding the nomenclature of CPU models will ensure
that you fully understand how they work. In this video, we are going to learn about the Core 1
different generations and their corresponding CPU architecture.

While anything that uses electricity generates some heat, no other piece of hardware in our
PC generates more heat than the CPU. Keeping temperatures under control is one of the keys Core 1
to a system’s longevity. Let’s beat the heat and learn all about CPU cooling.

Every computer needs a CPU. The installation steps are straightforward but should be Core 1
handled with care to prevent damage. Additionally, some form of cooling is required.

RAM
Dynamic random access memory (DRAM) comes in a number of versions defined by the
doubling of commands they process per clock cycle. It’s important for techs to recognize Core 1
these technologies and the speed rating systems used.

Individual sticks of DRAM will have very different capacities. It’s important to understand
RAM capacities and how sticks work together to provide the total memory for a system. Core 1

DRAM varies in other ways, such as single-sided or double-sided DRAM. Different


motherboards may or may not be able to take advantage of these features. Core 1

Running out of memory is something we try to avoid. All operating systems use virtual
memory (or RAM), a part of your mass storage set, to act as (very slow) memory in case your Core 1
real memory runs out.

Upgrading your RAM is one of the quickest tasks that you can do to immediately increase
system performance. Whether you are doing a new PC build, or simply updating your system, Core 1
you are going to need to know how to install and troubleshoot RAM.

Firmware
Basic Input/Output Services (BIOS) is code (firmware) built into every motherboard to give the
CPU basic communication with the hardware attached to the motherboard. BIOS is a critical Core 1
part of the PC and a good tech needs to understand its function.
The power-on self-test (POST) takes place every time a system starts. POST checks the system
and communicates any problems it finds to the user. Core 1
A small system-setup program built into the motherboard firmware enables techs to
configure low-level features and options for the system’s hardware. A good tech needs to Core 1
know how to access and use system setup on any computer.

A system’s BIOS is robust and rarely causes trouble, but when it does a good tech must be
ready to troubleshoot. Understanding a few simple tricks can make troubleshooting easier. Core 1

Motherboards
Motherboards, power supplies, and cases are surprisingly interchangeable due to industry
standards called form factors. Techs should know common form factors and the benefits and Core 1
challenges of each.

A motherboard chipset is what determines the RAM capacity, USB capabilities, CPU
architecture, and more. Mike explains how the modern chipsets have evolved over the years Core 1
and why they matter today.

The motherboard is the backbone of a PC. The type and model of motherboard that you
choose can have a profound impact on your system and often determines which components
you are able to use. What should you look for when picking out a new one? We’ll explore that Core 1
and more as we learn about choosing the right motherboard.

Installing a motherboard into a case is part science and part art. The science comes first. The
motherboard must match the case’s form factor, and the motherboard and parts must be
compatible. Then, the art: the subtle crafts of preparing everything you need; organizing your Core 1
workspace as you go; planning a few steps ahead to avoid back-tracking; and the soft, patient
touch to ensure everything fits together properly.

Power Supplies

A PC power supply takes AC power from the grid and transforms it into DC voltage the
system needs to run. This episode explores modular and non-modular power supplies. Core 1

Power supplies come in a dizzying array of power ratings, sizes, and efficiencies. A good tech
understands these factors to make sure a system has the power it needs. Core 1

Previously we discussed the types of heat sinks, fans, and liquid cooling that are used to lower
component and system temperatures. Now we will look at keeping your system cool through Core 1
even the most difficult of tasks.

Knowing how to install and troubleshoot errors with power supplies is essential. While it is
generally a simple process, there are some things to look out for. Let’s go through installing Core 1
and troubleshooting a PSU together.

Mass Storage Technologies


Mass storage (disk drives and solid-state drives) store the operating system and applications.
Despite the different technologies, systems talk to these many devices in similar ways. Core 1
Hard disk drives (HDDs), which store data on rotating magnetic disks, have been the go-to
mass storage media for decades. A good tech understands how this venerable media works Core 1
and understands magnetic media’s unique needs.

Solid-state drives (SSDs) are quickly replacing HDDs for mass storage needs on almost all
computers. SSDs are faster and more robust than HDDs and come with their own Core 1
maintenance needs.
The Small Computer System Interface (SCSI) has been around in one form or another for
decades. Despite its age, SCSI drives still appear in niche systems. It’s important to recognize Core 1
SCSI systems and where they’re used today.

mplementing Mass Storage


The Random Array of Independent (or Inexpensive) Disks (RAID) is a philosophy of using
multiple drives working as a single drive – an array – for speed or redundancy. A good tech Core 1
should understand the many RAID levels and the benefits they provide.
Hardware RAID uses a purpose-built RAID controller to configure and maintain RAID arrays.
It’s important to understand the benefits of hardware RAID and how to configure and Core 1
maintain RAID arrays.
Microsoft’s Storage Spaces feature provides a superb tool to configure many different RAID Core 1
configurations on any Windows system. A good tech knows which types of RAID it supports &
and how to set them up. Core 2

Securing mass storage is a critical aspect of system security. Make sure you know the many Core 1
ways a system’s mass storage can be encrypted. &
Core 2

Mass storage devices sometimes fail, resulting in the potential loss of critical data. A good
tech knows the tools and procedures to diagnose and repair many mass storage problems. Core 1

Essential Peripherals
The Universal Serial Bus (USB) interface is the main peripheral interface these days. Make
sure you’re aware of different USB standards as well as the different types of USB Core 1
connectors.

Why are there USB Type-A and USB Type-B connectors? Why do modern systems still provide Core 1
older USB connectors when the latest USB perfectly supports older devices? It takes a good &
understanding of the USB standards to see how and why. Core 2

Most USB devices work well fresh out-of-the-box. For those that don’t, it’s important to have
a proper USB configuration process to make sure a USB device and all of its features work Core 1
properly.

Thunderbolt and Lightning connectors are high-speed alternatives to USB. A good tech
recognizes when these technologies are used, their unique connectors, and the Core 1
benefits/weaknesses they have compared to USB.

Shiny optical discs are an excellent media for transporting data and are still a very common
tool for delivering drivers and configuration utilities for hardware. There’s several different
optical standards and it’s critical to know that a certain optical drive supports a certain optical Core 1
technology.

A broad cross-section of peripherals scan and read data. From flatbed scanners to barcode
readers and card readers, these devices make our users’ lives easier and more convenient. Core 1
Peripherals allow us to expand our system to support new features such as printing, sound,
and external storage. They also enable a wide array of input devices like mice and keyboards. Core 1
Knowing how to identify each quickly is key to your success in the field and on the exam.

Video conferencing software has changed the way we work, especially with more and more Core 1
companies moving to remote and hybrid workplaces. This episode gives a quick &
demonstration of Microsoft Teams and its screensharing function. Core 2

Even though we live in a world of built-to-exact-specification systems, you will eventually


need to install and possibly troubleshoot expansion cards. Let’s look at the modern expansion Core 1
card formats and then get hands-on and troubleshoot some common issues.

Installing and Upgrading Operating Systems


Why? Our video series is based off our book (McGrawHill's CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 2
together. Since we believe in a foundational curriculum approach, the exams and objectives are spread throughout our book instead of be
chapters will not have any 1101 content in them.

Working with Operating Systems

Users, Groups, and Permissions

Maintaining and Optimizing Operating Systems

Working with the Command-Line Interface

Troubleshooting Operating Systems

Display Technologies
There’s more than one way to make a monitor, but they all share one very important
common feature: the pixel. Once we understand that all monitors have pixels, it’s easier to Core 1
understand the different technologies you might find in a modern monitor.
The Liquid Crystal Display (LCD) is the dominant technology for today’s monitors. A good tech
should possess a deep understand of how LCDs work and how to open and repair an LCD Core 1
monitor.
Monitors don’t create the images they display; that’s the graphics card’s job. Graphics cards
come with different features and capabilities that a good tech understands very well. Core 1

More resolution means a more detailed picture. Monitor resolutions have increased for
decades and a good tech understands common resolutions and aspect ratios. N/A

Graphics cards often require special treatment when installing them in terms of power and
cooling. In addition, systems need special drivers to take full advantage of the power of most Core 1
graphics cards.
The CompTIA A+ concentrates on Windows, but every operating system gives you the ability
to use more than one monitor. Make sure you understand the power of multiple monitors as N/A
well as how to install and configure them.
It’s easy to think of projectors as nothing more than monitors that project on a wall but that’s
a bit short-sighted. Projectors come with their own technologies and configurations that a Core 1
good tech understands.
The CompTIA A+ exams will challenge you on monitor troubleshooting. Whether it’s simply
changing the input or replacing a burned-out bulb, troubleshooting displays is critical for Core 1
techs.

Essentials of Networking
You’ll never understand the power of the Internet without first starting at the most basic
form of networking: the Local Area Network (LAN). LANs use a central piece of hardware to
interconnect individual devices, transferring data from one system to another in discrete Core 1
frames.

The central box that connects devices on our LANs has gone through many advancements
over the years. Whether hubs or switches, a good tech understands the function and features Core 1
of these boxes in our LANs.
Hexadecimal numbering uses a base-16 system that’s very convenient for IT techs. It’s
important to look at a hex value and understand the equivalent binary value. N/A

When a router connects two or more LANs, it creates a Wide Area Network. To understand
WANs, it’s critical to understand routers and how they use logical addressing. Core 1

Networking uses many different types of cables such as coaxial, twisted pair, and even fiber-
optic. These different cables use special connectors and a good tech should recognize the Core 1
different cables and their connectors.

CompTIA doesn’t expect you to prove you can crimp your own cables, but it does expect you
to understand the crimping process. Additionally, you must know EIA standards for crimping Core 1
cables.

Structured cabling is the process of installing and organizing cable systems to ensure long
term, reliable connections. While CompTIA doesn’t want you to be a cable installer, a good Core 1
tech understands structured cabling and can work with installers.

Network hardware failures are often challenging to diagnose and repair. Good techs know a Core 1
few simple tools and procedures to get networks back up and running quickly.
Local Area Networking
The Transmission Control Protocol/Internet Protocol (TCP/IP) is the cornerstone of Internet Core 1
addressing and routing. It’s important to understand IP addressing schemes and to see how &
TCP and IP work together to make the Internet work. Core 2

Manually entering IP addresses into all our devices is an administrative nightmare. To avoid Core 1
this mess, smart techs use the Dynamic Host Configuration Protocol (DHCP) to automatically &
provide IP addressing to individual hosts. Core 2

The traditional IP addressing scheme (called IPv4) is quickly being replaced with the much
more advanced IPv6 scheme. IPv6 adds several benefits over IPv4 and good techs know how Core 1
to use it in our systems.

An IP address directs a packet to the right computer, but it’s the port number that makes a
connection between two applications on separate systems. It’s critical to understand how Core 1
port numbers do their job and to memorize many special port numbers.

TCP is the most popular IP protocol, but it isn’t the only one. User Datagram Protocol (UDP)
and Internet Control Message Protocol (ICMP) both serve important purposes and features Core 1
that techs need to understand.

Individual hosts use IP addresses, but humans are terrible at memorizing long strings of
numbers. To make our lives easier, most TCP/IP networks (and certainly the Internet) use the Core 1
Domain Name System (DNS) to apply more human-friendly names to systems. DNS can also &
make use of various spam management protocols such as DKIM, SPF, and DMARC. Core 2

When a user complains the Internet is down, what’s often happening is that DNS isn’t Core 1
working. There are a few simple tools and procedures to diagnose and repair DNS problems. &
Core 2

The CompTIA A+ exams challenge test takers to perform many configurations of a typical Core 1
home router. But what does a router do for a SOHO network? &
Core 2

All routers share some basic configuration steps every tech must know. From router Core 1
passwords to LAN IDs, this is the place to learn about these settings. &
Core 2

Virtual LANs (VLANs) are common features built into almost all switches. VLANs provide Core 1
superb control of your LAN but have their own quirks that a good tech understands. &
Core 2

Networks sometimes fail. A good network tech knows how read symptoms and diagnose a Core 1
network quickly to enable users to get back to work.
Wireless Networking
The 802.11 standard has had a number of improvements over the years, but every version
shares common devices and functions that haven't changed in over 20 years. This episode
explores wireless access points (WAPs), home routers, and the antennas that make them Core 1
work.

Since the original 802.11 standard back in 1999, there have been five major and hundreds of
minor revisions. It’s impossible to support an 802.11 network without a working Core 1
understanding of these standards.
Mesh networking is here and gaining in popularity daily. But what does mesh networking do
for your 802.11 network? Where do you use it and how is it deployed? Core 1

There’s a big difference between the 802.11 network in your home and small office vs. 802.11
in larger organization such as businesses, schools and government offices. Multiple SSIDS, Core 1
advanced technologies, and more aggressive authentication and encryption are common in &
every enterprise. Core 2

The 802.11 standard isn’t the only wireless out there today. Standards such as Bluetooth,
RFID and NFC also need the support of good techs. Core 1

There are few worse feelings than a wireless connection that just doesn’t...connect. In Core 1
situations like this, good techs will have the right tools and skills to diagnose and repair the &
issue. Core 2

The Internet
In this episode, Mike explores the crazy acronym soup around networking, explaining the
differences among terms like LAN, WAN, MAN, PAN, and HAM. (Just kidding on the last term!) Core 1
This helps minimize confusion in later networking episodes.

In this episode, Mike discusses the structure of the Internet. Starting with the Tier 1 carriers,
he shows how carriers at each layer relate to their peers and also how they interact with Tiers
above and customers below. This episode provides a good structure for layering your wide- Core 1
area-networking knowledge.

In this episode, Mike explores common always-on broadband connections to the Internet.
Starting with DSL, the episode looks also at fiber, cable, satellite, and 802.11 Wi-Fi. Core 1

In this episode, Mike begins the discussion of Application-layer protocols. Starting with a
review of the interaction between IP packets and servers, the episode analyzes the functions Core 1
of local and server-based firewalls.
Continuing with the Application-layer protocols, this episode explores e-mail. Mike covers the
three classic e-mail protocols, SMTP for sending and POP3 and IMAP4 for receiving. The Core 1
episode covers typical client configuration using the classic protocols and port numbers.

In this episode, Mike describes how proxy servers work to block certain web sites and filter Core 1
outgoing or incoming content. The episode shows how to set up a browser to connect to a &
proxy server. Core 2

In this episode, Mike shows how Virtual Private Networks (VPNs) work and why people use Core 1
VPN connections. He discusses the types of protocols and clients that make this work today &
and walks through a generic VPN setup. Core 2

Mike explores some of the latest and greatest networking technologies with the Internet of
Things (IoT). He describes the three common wireless technologies used to connect to IoT Core 1
devices, 802.11, Zigbee, and Z-wave. Mike finishes with a discussion and demonstration of &
typical IoT set ups and configurations. Core 2

The CompTIA A+ exams have many network troubleshooting scenario questions. The Great Core 1
Mikestrami gives you a few rules to help you get through these questions. In addition, a few &
basic tools and preparation makes troubleshooting most problems easy if not trivial. Core 2

Virtualization
In the first virtualization episode, Mike explores the concepts behind virtual machines. He
discusses virtualization vs. emulation, how modern VMs work, and the differences between Core 1
Type 1 and Type 2 hypervisors (the different hosts for virtual machines).

In this episode, Mike walks the viewer through the process of setting up a new virtual
machine. The host OS is Windows 10; Oracle VM VirtualBox is the type 2 hypervisor. The VM
Mike installs runs Ubuntu Linux. During the setup, Mike explains details specific to VirtualBox Core 1
and Ubuntu, and details that apply to any virtual machine installation.

Mike describes the process of changing one or more VMs, such as modifying the number and
size of mass storage available. You can use a VM to explore the many options available in Disk
Management with multiple drives. The episode also covers networking with VMs, via Core 1
bridging, NAT, and NAT network options.

In this episode, Mike looks at the benefits of cloud computing (or moving virtual machines out
onto the Internet). The cloud VMs enable benefits such as rapid elasticity and on-demand
scaling, so you can quickly support any Internet application that needs it. Mike also describes Core 1
the functions behind the buzzwords Infrastructure-as-a-Service, Platform-as-a-Service, and
Software-as-a-Service.

In this episode, Mike looks at concepts of security, ownership, and access to cloud resources.
Specifically, he explores the differences among public, private, hybrid, and community cloud Core 1
computing.

In this episode, Mike looks at applications in the cloud. Cloud-based storage enables access to
files from any connected device. Cloud-based applications enable easy configuration and
management. Virtual desktops create a consistent workspace online. And virtual application Core 1
streaming gives you the programs you need without local installation.

Portable Computing
Portable computers use the function key (Fn) to activate alternative features. These include
screen sharing, power settings, audio options, and more. The Settings app in Windows Core 1
enables you to adjust a host of laptop settings (which mirror desktop settings as well).

Laptops have many technician-replaceable parts. Check for online documentation before
starting and proceed with caution. Mike explores laptop dissection in this episode. Core 1

Laptops have many technician-replaceable parts. Check for online documentation before
starting and proceed with caution. Mike explores laptop dissection in this episode. Core 1

Laptops have many technician-replaceable parts. Check for online documentation before
starting and proceed with caution. Mike explores laptop dissection in this episode. Core 1

Replacing a laptop monitor requires careful connectivity for the many internal components.
Aside from the display, the laptop monitor can have a Wi-Fi antenna, webcam, touch screen Core 1
sensors, and more.

Mobile Devices
Mobile devices come in a variety of sealed forms and run mobile-specific operating systems.
Devices include smartphones, tablets, wearables, e-readers, and more. OSes are Android, iOS, Core 1
and a few others to a lesser extent. This episode tours the common mobile devices.

Mobile devices connect to other devices via wired or wireless. Wired connections are used for
power and data transfer. Wireless options include NFC, Bluetooth, infrared, or 802.11 (Wi-Fi). Core 1
These connections are used for a variety of purposes, including file sharing, enhanced
features (adding headphones, for example), and general networking.

Android devices are very customizable. The Google Play store offers shopping options for new Core 1
applications (apps). Google accounts are mandatory. This episode explores features specific &
to Android devices. Core 2

Maintaining and Securing Mobile Devices

Mobile devices are surprisingly self-maintaining these days, but there are a few issues that Core 1
come up occasionally. A big part of this is understanding the names and functions of certain &
settings unique to smartphones. Core 2
Corporate or ISP e-mail setup requires various configuration options, such as POP or IMAP for
incoming mail and SMTP for outgoing mail. S/MIME was a way to encrypt e-mail attachments. Core 1
Standard Google or Apple accounts set up with a simple username and password. This &
episode explores these options. Core 2

Synchronization keeps data up-to-date on each of your mobile devices and other connected
devices. This episode explores syncing to the desktop, automobile, cloud, and more. Core 1

Mobile device security starts with a lock screen but goes beyond with multifactor Core 1
authentication (MFA) and remote find, lock, and wipe. Corporate environments use mobile &
device management (MDM) services for even more control over mobile devices. Core 2

A lot of symptoms point to potential attacks on a mobile device, such as connection loss,
power drain, slow data speeds, high resource utilization, and unintended connections. Others Core 1
point at attacks that have already happened, such as leaked personal files, unauthorized
account access, or unauthorized access to microphone or camera.

Mobile devices can encounter problems ranging from unresponsive touchscreens to complete Core 1
system lockout. This episode explores common symptoms, such as slow performance (caused &
by excessive apps running) or overheating, and their solutions. Core 2

Printers and Multifunction Devices


Laser printers provide excellent print output on paper in both black and white and full color.
Laser printers use a fairly complicated printing process that techs should understand. This Core 1
episode details the processes and components for techs to maintain and service in all sorts of
laser printers.

Inkjet printers offer relatively inexpensive color printing for everyone. Techs need to
understand how inkjets work for maintenance and troubleshooting. This episode covers all Core 1
the components and processes involved.

Impact (or dot matrix) printers use a mechanical print head with print wires that strike a
ribbon to print on paper. Impact printers are still around, and techs need to know how they
work for maintenance and service. Mike describes the pieces and processes involved in taking Core 1
care of impact printers.

Thermal printers use heat to mark text on special thermal paper. They’re used in many point-
of-sale systems and kiosks. Mike describes the features of thermal printers and what techs Core 1
need to know to maintain and service the machines.

Installing a printer attached to a computer (a local printer) is a bread-and-butter task for


techs. This episode describes the installation process using the Devices & Printers section of Core 1
the Settings app in Windows.
It rarely makes sense for every computer in an office or lab to have its own dedicated printer.
This episode looks at printer sharing and security options in Windows, so techs can set up,
maintain, and remove shared printers. Mike also covers how to access shared printers from Core 1
other computers on a network.

Many printers today come with wireless capabilities and can connect directly to an
infrastructure or ad hoc 802.11 network. This episode looks at manual and automatic setup Core 1
options, plus how to connect a printer for cloud-based printing.
Good techs understand the many general issues with printers misbehaving. This episode
covers a lot of these issues, such as permissions, connectivity (physical/wireless and Core 1
configuration errors), and mechanical issues.
3D printers use some material (such as plastic) to create a physical object from a 3D model
file. This episode explores the concepts in 3D printing and provides examples of software for Core 1
controlling the printer output.

Securing Computers

Operational Procedures
oduction
Instructors: Mike Meyers and Steve Nicholson

Old Exam Retirement: October 20, 2022

Exam Objective(s) Covered

N/A

N/A

N/A

N/A

N/A

N/A

Core 1: 2.8 Given a scenario, use networking tools.

Core 1: 5.1 Given a scenario, apply the best practice methodology to resolve
problems

Core 1: 3.0 Hardware

Core 1: 3.1.Explain basic cable types and their connectors, features, and purposes.

Core 1: 3.0 Hardware


Core 1: 3.4 Given a scenario, install and configure motherboards, central processing
units (CPUs), and add-on cards.

Core 1: 3.4 Given a scenario, install and configure motherboards, central processing
units (CPUs), and add-on cards.

Core 1: 3.4 Given a scenario, install and configure motherboards, central processing
units (CPUs), and add-on cards.
Core 1: 5.1 Given a scenario, apply the best practice methodology to resolve
problems.

Core 1: 3.4 Given a scenario, install and configure motherboards, central processing
units (CPUs), and add-on cards.
Core 1: 5.1 Given a scenario, apply the best practice methodology to resolve
problems.

Core 1: 3.4 Given a scenario, install and configure motherboards, central processing
units (CPUs), and add-on cards

Core 1: 3.4 Given a scenario, install and configure motherboards, central processing
units (CPUs), and add-on cards

Core 1: 3.4 Given a scenario, install and configure motherboards, central processing
units (CPUs), and add-on cards.
Core 1: 5.1 Given a scenario, apply the best practice methodology to resolve
problems.

Core 1: 3.2 Given a scenario, install the appropriate RAM.

Core 1: 3.2 Given a scenario, install the appropriate RAM.

Core 1: 3.2 Given a scenario, install the appropriate RAM.

Core 1: 3.2 Given a scenario, install the appropriate RAM.

Core 1: 3.2 Given a scenario, install the appropriate RAM.

Core 1: 3.4 Given a scenario, install and configure motherboards, central processing
units (CPUs), and add-on cards.

Core 1: 5.2 Given a scenario, troubleshoot problems related to motherboards, RAM,


CPU, and power.
Core 1: 2.6. Given a scenario, configure a workstation to meet best practices for
security.
Core 1: 3.4. Given a scenario, install and configure motherboards, central processing
units (CPUs), and add-on cards.

Core 1: 5.2 Given a scenario, troubleshoot problems related to motherboards, RAM,


CPU, and power.

Core 1: 3.4 Given a scenario, install and configure motherboards, central processing
units (CPUs), and add-on cards.
Core 1: 5.2 Given a scenario, troubleshoot problems related to motherboards, RAM,
CPU, and power.

Core 1: 3.4 Given a scenario, install and configure motherboards, central processing
units (CPUs), and add-on cards.
Core 1: 5.2 Given a scenario, troubleshoot problems related to motherboards, RAM,
CPU, and power.

Core 1: 3.4 Given a scenario, install and configure motherboards, central processing
units (CPUs), and add-on cards.

Core 1: 3.4 Given a scenario, install and configure motherboards, central processing
units (CPUs), and add-on cards.
Core 1: 5.1.Given a scenario, apply the best practice methodology to resolve
problems.
Core 1: 5.2 Given a scenario, troubleshoot problems related to motherboards, RAM,
CPU, and power.

Core 1: 3.1 Explain basic cable types and their connectors, features, and purposes.
Core 1: 3.4 Given a scenario, install and configure motherboards, central processing
units (CPUs), and add-on cards.
Core 1: 3.5 Given a scenario, install or replace the appropriate power supply.

Core 1: 3.5 Given a scenario, install or replace the appropriate power supply.

Core 1: 3.4 Given a scenario, install and configure motherboards, central processing
units (CPUs), and add-on cards.
Core 2: 4.5 Summarize environmental impacts and local environmental controls.

3.4.Given a scenario, install and configure motherboards, central processing units


(CPUs), and add-on cards.
3.5 Given a scenario, install or replace the appropriate power
5.1 Given a scenario, apply the best practice methodology to resolve problems.
supply.

Core 1: 3.3 Given a scenario, select and install storage devices.


Core 1: 3.4 Given a scenario, install and configure motherboards, central processing
units (CPUs), and add-on cards.
Core 1: 3.1 Explain basic cable types and their connectors, features, and purposes.
Core 1: 3.3 Given a scenario, select and install storage devices.
Core 1: 3.4 Given a scenario, install and configure motherboards, central processing
units (CPUs), and add-on cards.

Core 1: 3.3 Given a scenario, select and install storage devices.


Core 1: 3.4 Given a scenario, install and configure motherboards, central processing
units (CPUs), and add-on cards.

Core 1: 3.1 Explain basic cable types and their connectors, features, and purposes.

Core 1: 3.3 Given a scenario, select and install storage devices.


Core 1: 5.3 Given a scenario, troubleshoot and diagnose problems with storage
drives and RAID arrays.
Core 1: 3.3 Given a scenario, select and install storage devices.
Core 2: 1.9 Given a scenario, perform OS installations and upgrades in a diverse OS
environment.
Core 1: 3.3 Given a scenario, select and install storage devices.
Core 2: 1.3 Given a scenario, use features and tools of the Microsoft Windows 10
operating system (OS).

Core 1: 3.4 Given a scenario, install and configure motherboards, central processing
units (CPUs), and add-on cards.
Core 2: 2.5 Given a scenario, manage and configure basic security settings in the
Microsoft Windows OS.

Core 1: 5.3 Given a scenario, troubleshoot and diagnose problems with storage
drives and RAID arrays.

Core 1: 1.3 Given a scenario, set up and configure accessories and ports of mobile
devices.
Core 1: 3.1 Explain basic cable types and their connectors, features, and purposes.

Core 1: 1.3 Given a scenario, set up and configure accessories and ports of mobile
devices.
Core 2: 1.3 Given a scenario, use features and tools of the Microsoft Windows 10
operating system (OS).

Core 1: 1.3 Given a scenario, set up and configure accessories and ports of mobile
devices.

Core 1: 1.3 Given a scenario, set up and configure accessories and ports of mobile
devices.
Core 1: 3.1 Explain basic cable types and their connectors, features, and purposes.

Core 1: 3.3 Given a scenario, select and install storage devices.

Core 1: 3.3 Given a scenario, select and install storage devices.


Core 1: 3.1 Explain basic cable types and their connectors, features, and purposes.
Core 1: 3.4 Given a scenario, install and configure motherboards, central processing
units (CPUs), and add-on cards.

Core 1: 1.2 Compare and contrast the display components of mobile devices.
Core 1: 1.3 Given a scenario, set up and configure accessories and ports of mobile
devices.
Core 2: 4.9 Given a scenario, use remote access technologies.

Core 1: 3.3 Given a scenario, select and install storage devices.


Core 1: 3.4 Given a scenario, install and configure motherboards, central processing
units (CPUs), and add-on cards.

n-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102)) which covers both exams
are spread throughout our book instead of being split between 1101 and 1102. This is why some
any 1101 content in them.

Core 1: 1.2. Compare and contrast the display components of mobile devices

Core 1: 1.2 Compare and contrast the display components of mobile devices.
Core 1: 3.1 Explain basic cable types and their connectors, features, and purposes.
Core 2: 1.7 Given a scenario, apply application installation and configuration
concepts.
Core 2: 4.6 Explain the importance of prohibited content/activity and privacy,
licensing, and policy concepts.

No exam-specific objectives

Core 1: 3.4 Given a scenario, install and configure motherboards, central processing
units (CPUs), and add-on cards.

No exam-specific objectives

Core 1: 5.4 Given a scenario, troubleshoot video, projector, and display issues.

Core 1: 5.4 Given a scenario, troubleshoot video, projector, and display issues.

Core 1: 2.7. Compare and contrast Internet connection types, network types, and
their features.​

Core 2: 1.2. Given a scenario, use the appropriate Microsoft command-line tool.​

Core 1: 2.2.Compare and contrast common networking hardware.​

No exam-specific objectives

Core 1: 2.7.Compare and contrast Internet connection types, network types, and
their features.​

Core 1: 2.2.Compare and contrast common networking hardware.

Core 1: 2.7.Compare and contrast Internet connection types, network types, and
their features.​
Core 1: 3.1.Explain basic cable types and their connectors, features, and purposes.​

Core 1: 2.8.Given a scenario, use networking tools.​

Core 1: 3.1.Explain basic cable types and their connectors, features, and purposes.​

Core 1: 2.8. Given a scenario, use networking tools.​

Core 1: 3.1. Explain basic cable types and their connectors, features, and purposes.

Core 1: 2.2.Compare and contrast common networking hardware.


Core 1: 2.5 Given a scenario, install and configure basic wired/wireless small
office/home office (SOHO) networks.
Core 2: 1.6 Given a scenario, configure Microsoft Windows networking features on a
client/desktop.

Core 1: 2.4 Summarize services provided by networked hosts.


Core 1: 2.5 Given a scenario, install and configure basic wired/wireless small
office/home office (SOHO) networks.
Core 1: 2.6 Compare and contrast common network configuration concepts.
Core 2: 1.2 Given a scenario, use the appropriate Microsoft command-line tool.
Core 2: 1.6 Given a scenario, configure Microsoft Windows networking features on a
client/desktop.

Core 1: 2.5 Given a scenario, install and configure basic wired/wireless small
office/home office (SOHO) networks.

Core 1: 2.1 Compare and contrast Transmission Control Protocol (TCP) and User
Datagram Protocol (UDP) ports, protocols, and their purposes.
Core 1: 2.4 Summarize services provided by networked hosts.

Core 1: 2.1 Compare and contrast Transmission Control Protocol (TCP) and User
Datagram Protocol (UDP) ports, protocols, and their purposes.

Core 1: 2.4 Summarize services provided by networked hosts.


Core 1: 2.6 Compare and contrast common network configuration concepts.

Core 1: 2.6 Compare and contrast common network configuration concepts.


Core 2: 1.2 Given a scenario, use the appropriate Microsoft command-line tool.
Core 2: 1.6 Given a scenario, configure Microsoft Windows networking features on a
client/desktop.

Core 1: 1.3 Given a scenario, set up and configure accessories and ports of mobile
devices.
Core 1: 2.2 Compare and contrast common networking hardware.
Core 1: 3.1 Explain basic cable types and their connectors, features, and purposes.
Core 1: 2.6 Compare and contrast common network configuration concepts.
Core 2: 2.9 Given a scenario, configure appropriate security settings on small
office/home office (SOHO) wireless and wired networks.

Core 1: 2.5 Given a scenario, install and configure basic wired/wireless small
office/home office (SOHO) networks.
Core 1: 2.6 Compare and contrast common network configuration concepts.
Core 2: 2.9 Given a scenario, configure appropriate security settings on small
office/home office (SOHO) wireless and wired networks.

Core 1: 2.2 Compare and contrast common networking hardware.


Core 1: 2.6 Compare and contrast common network configuration concepts.
Core 2: 2.5 Given a scenario, manage and configure basic security settings in the
Microsoft Windows OS.
Core 2: 2.9 Given a scenario, configure appropriate security settings on small
office/home office (SOHO) wireless and wired networks.

Core 1: 5.7 Given a scenario, troubleshoot problems with wired and wireless
networks.
Core 1: 1.2 Compare and contrast the display components of mobile devices.
Core 1: 2.2 Compare and contrast common networking hardware.
Core 1: 2.3 Compare and contrast protocols for wireless networking.
Core 2: 2.9 Given a scenario, configure appropriate security settings on small
office/home office (SOHO) wireless and wired networks.

Core 1: 2.3 Compare and contrast protocols for wireless networking.

Core 1: 2.5 Given a scenario, install and configure basic wired/wireless small
office/home office (SOHO) networks.
Core 1: 2.2 Compare and contrast common networking hardware.
Core 2: 2.2 Compare and contrast wireless security protocols and authentication
methods.
Core 2: 2.9 Given a scenario, configure appropriate security settings on small
office/home office (SOHO) wireless and wired networks.

Core 1: 1.3 Given a scenario, set up and configure accessories and ports of mobile
devices.
Core 1: 1.4 Given a scenario, configure basic mobile-device network connectivity
and application support.
Core 1: 2.3 Compare and contrast protocols for wireless networking.
Core 1: 2.7 Compare and contrast Internet connection types, network types, and
their features.
Core 2: 3.4 Given a scenario, troubleshoot common mobile OS and application
issues.

Core 1: 2.8 Given a scenario, use networking tools.


Core 1: 5.7 Given a scenario, troubleshoot problems with wired and wireless
networks.
Core 2: 2.9 Given a scenario, configure appropriate security settings on small
office/home office (SOHO) wireless and wired networks.
Core 2: 3.5 Given a scenario, troubleshoot common mobile OS and application
security issues.

Core 1: Compare and contrast Internet connection types, network types, and their
features.

Core 1: 2.7 Compare and contrast Internet connection types, network types, and
their features.

Core 1: 2.2 Compare and contrast common networking hardware


Core 1: 2.3 Compare and contrast protocols for wireless networking
Core 1: 2.7 Compare and contrast Internet connection types, network types, and
their features.
Core 1: 5.7 Given a scenario, troubleshoot problems with wired and wireless
networks.

Core 1: 2.1 Compare and contrast Transmission Control Protocol (TCP) and User
Datagram Protocol (UDP) ports, protocols, and their purposes.
Core 1: 2.2 Compare and contrast common networking hardware.
Core 1: 2.4 Summarize services provided by networked hosts.
Core 1: 2.1 Compare and contrast Transmission Control Protocol (TCP) and User
Datagram Protocol (UDP) ports, protocols, and their purposes.
Core 1: 2.4 Summarize services provided by networked hosts.

Core 1: 2.4 Summarize services provided by networked hosts.


Core 2: 1.6 Given a scenario, configure Microsoft Windows networking features on a
client/desktop.
Core 2: 2.9 Given a scenario, configure appropriate security settings on small
office/home office (SOHO) wireless and wired networks.

Core 1: 2.6 Compare and contrast common network configuration concepts.


Core 2: 1.6 Given a scenario, configure Microsoft Windows networking features on a
client/desktop.
Core 2: 4.9 Given a scenario, use remote access technologies.

Core 1: 2.3 Compare and contrast protocols for wireless networking.


Core 1: 2.4 Summarize services provided by networked hosts.
Core 2: 2.7 Explain common methods for securing mobile and embedded devices.

Core 1: 5.7 Given a scenario, troubleshoot problems with wired and wireless
networks.
Core 2: 1.2 Given a scenario, use the appropriate Microsoft command-line tool.

Core 1: 3.4 Given a scenario, install and configure motherboards, central processing
units (CPUs), and add-on cards.
Core 1: 4.2 Summarize aspects of client-side virtualization.

Core 1: 4.2 Summarize aspects of client-side virtualization.

Core 1: 4.2 Summarize aspects of client-side virtualization.

Core 1: 4.1 Summarize cloud-computing concepts.

Core 1: 4.1 Summarize cloud-computing concepts.

Core 1: 4.1 Summarize cloud-computing concepts.


Core 1: 1.1 Given a scenario, install and configure laptop hardware and components.
Core 1: 1.2 Compare and contrast the display components of mobile devices.
Core 1: 1.3 Given a scenario, set up and configure accessories and ports of mobile
devices.
Core 1: 1.4 Given a scenario, configure basic mobile-device network connectivity
and application support.
Core 2: 2.1 Summarize various security measures and their purposes.

Core 1: 1.1 Given a scenario, install and configure laptop hardware and components.
Core 2: 5.5 Given a scenario, troubleshoot common issues with mobile devices.

Core 1: 1.1 Given a scenario, install and configure laptop hardware and components.
Core 1: 1.2 Compare and contrast the display components of mobile devices.
Core 1: 3.3 Given a scenario, select and install storage devices.

Core 1: 1.1 Given a scenario, install and configure laptop hardware and components.
Core 1: 1.2 Compare and contrast the display components of mobile devices.

Core 1: 1.1 Given a scenario, install and configure laptop hardware and components.
Core 1: 1.2 Compare and contrast the display components of mobile devices.

Core 1: Domain 1: Mobile Devices


Core 1: 1.4 Given a scenario, configure basic mobile-device network connectivity
and application support.
Core 1: 2.4 Summarize services provided by networked hosts.

Core 1: 1.3 Given a scenario, set up and configure accessories and ports of mobile
devices.
Core 1: 1.4 Given a scenario, configure basic mobile-device network connectivity
and application support.
Core 1: 2.3 Compare and contrast protocols for wireless networking.
Core 1: 2.7 Compare and contrast Internet connection types, network types, and
their features.
Core 1: 3.1 Explain basic cable types and their connectors, features, and purposes.

Core 1: 1.4 Given a scenario, configure basic mobile-device network connectivity


and application support.
Core 2: 1.8 Explain common OS types and their purposes.

Core 1: 1.4 Given a scenario, configure basic mobile-device network connectivity


and application support.
Core 2: 2.7 Explain common methods for securing mobile and embedded devices.
Core 2: 3.5 Given a scenario, troubleshoot common mobile OS and application
security issues.
Core 1: 1.4 Given a scenario, configure basic mobile-device network connectivity
and application support.
Core 1: 2.1 Compare and contrast Transmission Control Protocol (TCP) and User
Datagram Protocol (UDP) ports, protocols, and their purposes.
Core 1: 2.4 Summarize services provided by networked hosts.
Core 2: 2.1 Summarize various security measures and their purposes.
Core 2: 2.7 Explain common methods for securing mobile and embedded devices.

Core 1: 1.4 Given a scenario, configure basic mobile-device network connectivity


and application support.
Core 2: 2.10 Given a scenario, install and configure browsers and relevant security
settings.

Core 1: 1.4 Given a scenario, configure basic mobile-device network connectivity


and application support.
Core 2: 2.1 Summarize various security measures and their purposes.
Core 2: 2.7 Explain common methods for securing mobile and embedded devices.

Core 1: 1.4 Given a scenario, configure basic mobile-device network connectivity


and application support.​
Core 1: 5.5 Given a scenario, troubleshoot common issues with mobile devices.​
Core 2: 2.3 Given a scenario, detect, remove, and prevent malware using the
appropriate tools and methods.​
Core 2: 2.7 Explain common methods for securing mobile and embedded devices.​
Core 2: 3.4 Given a scenario, troubleshoot common mobile OS and application
issues.​

Core 1: 5.5 Given a scenario, troubleshoot common issues with mobile devices.

Core 1: 3.7 Given a scenario, install and replace printer consumables.

Core 1: 3.7 Given a scenario, install and replace printer consumables.

Core 1: 3.7 Given a scenario, install and replace printer consumables.

Core 1: 3.7 Given a scenario, install and replace printer consumables.

Core 1: 3.1 Explain basic cable types and their connectors, features, and purposes.
Core 1: 3.6 Given a scenario, deploy and configure multifunction devices/printers
and settings.
Core 1: 5.6 Given a scenario, troubleshoot and resolve printer issues.
Core 2: 1.4 Given a scenario, use the appropriate Microsoft Windows 10 Control
Panel utility.
Core 1: 3.6 Given a scenario, deploy and configure multifunction devices/printers
and settings.
Core 2: 1.6 Given a scenario, configure Microsoft Windows networking features on a
client/desktop.

Core 1: 3.6 Given a scenario, deploy and configure multifunction devices/printers


and settings.

Core 1: 5.6 Given a scenario, troubleshoot and resolve printer issues.

Core 1: 3.7 Given a scenario, install and replace printer consumables.


Question Answer Option 1
Chapter 1 - Safety and Professionalism
Which item is NOT likely to be found in a technician's toolkit? Thumb drive

A tech might use this tool to check power supplied by a wall socket: RFI meter

Ask the customer for


What should a tech do when solving a problem is beyond their ability?
advice
Answer Option 2 Answer Option 3 Answer Option 4 Correct

Nut driver Voltage tester EMP 4

ESD meter Voltmeter Tweezers 3

Disassemble the Tell the customer


system and rebuild that the problem Escalate the issue 4
it from scratch can't be fixed
Explanation

Electromagnetic pulse (EMP) is not a tool, it is a cause of problems. All of the other
choices are common tools used by technicians.
A voltmeter can test wall power. Radio frequency interference (RFI) and electrostatic
discharge (ESD) meters don't test wall power. Using tweezers to test for power can
cause equipment damage, injury, or death.
In order to solve the problem quickly, escalating the issue is often good for the
customer and is an opportunity for the technician to learn. The other options are poor
choices for a technician.
Related Episode Exam Core

Tools of the Trade Core 1

Tools of the Trade Core 1

Troubleshooting Theory Core 1


Question Answer Option 1
Chapter 2 - The Visible Computer
Which primary PC component is an output device? Microphone

Which of the following is NOT a part of a PC? GPU

Many cities have a makerspace where you can get hands-on with
1
hardware at little to no cost.
Answer Option 2 Answer Option 3 Answer Option 4 Correct R

Printer Web camera Keyboard 2

RAM CPU TPU 4

FALSE 1
Explanation

A printer is an output device. Microphones, keyboards, and web cameras input information
to the computer, so they are input devices.
TPU is a made-up term. Graphics processing units (GPUs) send the display signal to the
monitor, random access memory (RAM) sticks are where short-term memory is stored, and
the central processing unit (CPU) is the "brain" of the computer.
Makerspaces are facilities for making, learning, and exploring technology that use both high
tech and no tech tools. Many cities have makerspaces located within colleges and public
libraries.
Related Episode Exam Core

Primary PC Components Core 1

Touring a PC Core 1

Touring a PC Core 1
Question Answer Option 1
Chapter 3 - CPUs
When an instruction is sent to the CPU in a binary pattern, how does
External data bus
the CPU know what instruction the pattern means?

Which of the following is NOT an example of an Instruction Set


x64
Architecture (ISA)?
In the following example, which part of the CPU information
corresponds to the generation? Intel
Intel Core i9 12900K

What is a benefit of liquid cooling over fan cooling? Overclocking

Before installing a CPU, what's the best way to protect it? ESD mat
Answer Option 2 Answer Option 3 Answer Option 4 Correct

Register Translator Code book 4

x86 x84 x86-64 3

Core i9 12 900 3

Quieter operation ZIF sockets Cool-looking fins 2,4

OEM fan Thermal paste Orientation notch 1


Explanation

The CPU has an internal code book that identifies each instruction pattern. A register is a memory location inside a
CPU. The external data bus is the set of wires that carry data and instructions between the CPU and RAM. In this
context, translator is a made-up term.

x84 is not an ISA standard. x64, x86, and x86-64 are all ISA standards.

12 corresponds to the generation. Intel is the brand, Core i9 is the tier, 900 is the model, and K is the suffix.

Liquid cooling is quieter and more powerful than traditional air/fan cooling. Liquid cooling may help overclock a
CPU, but overclocking is not an automatic benefit of liquid cooling. ZIF sockets are the type of sockets that CPUs
lock into when installed on the motherboard; they have nothing to do with cooling. Both air fans and liquid cooling
units have cool-looking fins that draw hot air away, so it's not a benefit of liquid cooling over air-cooled systems.

An electrostatic discharge (ESD) mat protects chips and electronics from electrostatic discharges while you're
installing the equipment. A fan keeps the chip cool after it has been installed. Thermal paste helps transfer heat
from the CPU to the heat sink/fan after it has been installed. The orientation notch identifies which direction the
CPU should face so that it seats correctly in the socket.
Related Episode Exam Core

What is a CPU? Core 1

32-Bit vs. 64-Bit Computing Core 1

CPU Generations and Core 1


Architecture

CPU Cooling Core 1

Installing and Core 1


Troubleshooting a CPU
Question Answer Option 1 Answer Option 2
Chapter 4 - RAM
DDR4 RAM modules have how many pins? 168 240

Which type of RAM sticks have 240 pins? (Choose


DDR2 DDR3
two)

Which RAM would typically be installed into a laptop


ECC SPD RAM
computer?

Which types of RAM can function even if one of its


SO-DIMMs ECC
memory chips fails?

Whatever order the


Closest to the CPU to
In what order should memory slots be filled? motherboard manual
farthest from the CPU
specifies

What should a technician do to improve performance Increase the size of the Add more RAM to the
if the virtual memory file is constantly full? virtual memory file computer

You are using the CompTIA Troubleshooting


Methodology to determine the cause of some faulty Identify the problem by
remove the RAM and
RAM. You theorize that one or more RAM modules removing all hardware
replace with new
might not be properly seated. You test the theory, components from the
modules
and it seems like a probable assumption. What is motherboard
your next step?
Answer Option 3 Answer Option 4 Correct

288 184 3

SDRAM DDR4 1,2

SDRAM SO-DIMMs 4

Double-sided RAM Dual-Channel RAM 2

Alternate slots starting Farthest from the CPU


1
farthest from the CPU to closest to the CPU

The technician should


do nothing; virtual
Close some applications 2
memory works best
when the file is full

Verify full system


functionality by Implement the solution
4
by reseating the RAM
rebooting the PC
Explanation

DDR4 RAM sticks have 288 pins. SDRAM has 128 pins, DDR has 184 pins, DDR2 and DDR3 have 240
pins.

DDR2 and DDR3 RAM sticks have 240 pins. SDRAM has 128 pins, and DDR4 has 288 pins.

Laptops and other small form factor motherboards typically use SO-DIMM memory modules. ECC
RAM is usually found in server-grade computers. SDRAM is an early generation of RAM technology
but it is not specific to laptops. There is no such thing as SPD RAM.

Error correction code (ECC) RAM and parity RAM can function with a failed memory chip. SO-DIMMs
are small outline (form factor) memory modules. Dual-channel is technology that supports
simultaneous access to multiple RAM modules. Double-sided RAM are RAM modules that are
organized into 4 bits.

The best practice is to follow whatever the motherboard manual specifies. Every motherboard is
slightly different, so what works in one may not work in another.

The best answer for performance is to add RAM. It is generally recommended to let the operating
system manage the size of the virtual memory file. Closing applications is a short-term solution but
eventually, the user will reopen them. Because virtual memory is slower than physical memory,
using large amounts of virtual memory will slow the system down significantly.

CompTIA’s Troubleshooting Methodology offers a simplified list of steps that can help you
troubleshoot and resolve almost any issue that you will run in to. After establishing and testing a
theory, the next step would be to establish a plan of action to resolve the problem and implement
the solution. Since we surmised that our RAM sticks weren’t seated properly, the solution to the
would be to reseat the RAM.
Related Episode Exam Core

RAM Technology Core 1

RAM Technology Core 1

RAM Features Core 1

RAM Features Core 1

Installing and
Troubleshooting Core 1
RAM

Virtual RAM Core 1

Installing and
Troubleshooting Core 1
RAM
Question Answer Option 1 Answer Option 2
Chapter 5 - Firmware
BIOS programs that enable hardware to function are called
POST Services
what?

Which are found in BIOS? (Choose two) CMOS battery Services

It is an add-on card to It applies power to the


What is the primary purpose of POST?
test the computer CPU

For which failures would you expect POST to issue beep


Video card Missing keyboard
codes?

Touch the system Press a certain key


setup button on the before the computer
How would a technician start the system setup program?
front panel of the boots the operating
computer system

To prevent random people from booting the OS, a technician Set an administrator
Set a user password
should do what? password

The computer was not


Which is more likely to cause a computer's reported time to Earth is spinning more
programmed to
fall behind? slowly
recognize leap year

Which battery provides power to the RTC and CMOS chip? CR3022 CR2032
Answer Option 3 Answer Option 4 Correct

CMOS Device drivers 3

POST Real-time clock 2,3

It performs
It enables hardware to
diagnostic tests
function before the OS 4
before booting the
boots
operating system

No CPU installed No printer found 1

Turn off the power switch


and unplug the computer, Enter the
then plug in the computer administrator
2
and press the power switch password during
to automatically start the bootup
setup program

Remove the CMOS


Flash the BIOS chip 1
battery

The CMOS battery is weak The wall voltage is


3
or failing too low

AA Battery 9 Volt Battery 2


Explanation Related Episode

Services are BIOS programs that make hardware functional. POST is a testing
program in BIOS. CMOS is a type of memory chip. Device drivers make hardware What Is BIOS?
function in an operating system.
The Power On Self Test (POST) program and the services are contained in the
BIOS chip. The CMOS battery is not inside a chip. The real-time clock (RTC) is in What Is BIOS?
the CMOS chip, not the BIOS chip.

POST is a program in the computer's BIOS chip that performs diagnostics prior to
the computer booting an operating system. POST can send messages to a POST
POST
card but the card does not contain the POST program. A power supply provides
power to the CPU. POST does not enable hardware, it tests hardware.

Beep codes are issued when error messages can't be displayed on the screen,
thus a bad video card would cause beep codes. Missing keyboard, printers, and
POST
network connection failures can all be shown on a screen. The POST program will
not run at all without a CPU installed (and thus would not generate a beep code).

Every computer has a certain key on the keyboard that must be pressed before
the OS boots to launch the setup program. There is no automatic procedure or
System Setup
button to start the setup program. The administrator password is not entered
until after the setup program has started.

A user password prevents the OS from booting until the password is entered.
The administrator password prevents access to the setup program until the
password is entered. Flashing the BIOS is for fixing bugs and adding features to System Setup
the contents of the BIOS chip. Removing the CMOS battery might prevent the OS
from booting, but it is not the best answer.

A weak or failed CMOS battery will slow the system clock and may cause other
Troubleshooting
problems. Missing a leap year won't affect the computer's clock rate. Low wall
Firmware
voltage is adjusted in the power supply; if it is too low, the computer won't boot.

CR2032 is the standard CMOS battery. The other choices are not normally used Troubleshooting
for CMOS in a computer. Firmware
Exam Core

Core 1

Core 1

Core 1

Core 1

Core 1

Core 1

Core 1

Core 1
Question Answer Option 1
Chapter 6 - Motherboards
The largest motherboard form factor is? ATX

The I/O shield must be


Which is true of an I/O shield?
customized to fit the case

Which chip is typically found on modern motherboards? CMOS battery

The job of the southbridge is to act as the interface between


Slow hardware
the CPU and what?

Which is typically not found on a motherboard? PCIe slots

The small, metal items that screw into a case and keep the
Dongles
motherboard from touching the case are called:

How can you protect your system from ESD while installing the
I/O shields
motherboard?

Which must be done before installing a motherboard into a


Install case fans
case?
Answer Option 2 Answer Option 3 Answer Option 4 Correct

Micro-ATX ITX Mini-ITX 1

The I/O shield is The dimensions of the I/O shield for a All I/O shields are
customized to fit the Micro-ATX motherboard are 9.6 inches standardized to fit all 2
motherboard I/O area by 9.6 inches motherboard I/O areas

Second bridge Northbridge Southbridge 4

Fast hardware RAM Video card 1

SATA cables Voltage regulators Power connectors 2

Standoffs Slots I/O shields 2

Use fans to blow cool air


Antistatic wrist strap Drinking hot coffee over your system 2
throughout the room

Install a video card into a


Install the I/O shield Install the SATA cables 2
PCIe slot
Explanation

In order of largest to smallest, the form factors are ATX, Micro-ATX, ITX, and Mini-ITX.
I/O shields are customized to fit the motherboard I/O area. I/O shields have standard
dimensions to fit standard form factor cases. Micro-ATX motherboards are 9.6 x 9.6, not their
I/O shields. Different motherboards have different I/O ports so it is impossible to create a one-
size-fits-all I/O shield for different motherboards.

The southbridge is typically found on modern motherboards. The functions of the old
northbridge chip have been moved onto modern CPUs. The CMOS battery is mounted on the
motherboard, but it is not a chip, it is a battery. Second bridge is a made-up term.
The southbridge interfaces slow hardware such as hard drives and keyboards to the CPU. The
CPU interacts directly with fast hardware including RAM and video cards.
SATA cables attach to connectors on the motherboard, but they are not part of the
motherboard. PCIe slots, voltage regulators, and power connectors are all found on
motherboards.
Standoffs are the screws used to keep the motherboard from touching the case so that there
isn't an electric short, which could damage the components. Slots are for plugging in RAM and
expansion cards. I/O shields protect the motherboard from dust and debris.

Antistatic (or ESD) wrist straps protect from ESD by dispersing the electricy generated by your
body so it doesn't get dispersed into the components instead. I/O shields protect the
motherboard from dust and debris. Drinking hot coffee over a system you're building is NEVER
a good idea, as liquids can ruin electronic equipment. Using fans to blow cool air throughout
the room isn't necessary at this point of your PC build, since none of the heat-producing
componenets are installed and turned on yet.

The I/O shield must be installed before the motherboard is installed; it won't fit after the
board is in place. Case fans and SATA cables can be installed at any time. Installing a video
card into the motherboard may make it challenging or impossible to install the motherboard
into the case.
Related Episode Exam Core

Form Factors Core 1

Form Factors Core 1

Chipsets Core 1

Chipsets Core 1

Installing and
Troubleshooting a Core 1
Motherboard
Installing and
Troubleshooting a Core 1
Motherboard

Installing and
Troubleshooting a Core 1
Motherboard

Installing and
Troubleshooting a Core 1
Motherboard
Question Answer Option 1
Chapter 7 - Power Supplies

A power supply with optional cable plug-ins is known as a


Soldered power supply
what?

Provides wall power to


What does the on/off switch on a power supply do?
the power supply

Which is a primary characteristic to be considered when


Cable lengths
choosing a power supply?

Which is a primary characteristic to be considered when


Trip alert
choosing a power supply?
Generate loud noises
Normal vacuums are dangerous to use inside of a PC due to
which interferes with
their ability to:
productivity

Practice proper power


A client’s PC will no longer boot up. You suspect the PSU is handling and then double
the cause. Which of these actions would be appropriate to check all connectors and
take to resolve the issue?
cables
Answer Option 2 Answer Option 3 Answer Option 4 Correct

Option power supply Flex power supply Modular power supply 4

Nothing; power
Applies power to the supplies autodetect
Turns on the computer 1
"power good" wire power and turn on or
off accordingly

Efficiency UPS compatibility Power sag rating 2

Number of USB power


Airflow volume Wattage 3
plugs
Scrub off thermal Accidentally suck up
Build up static electricity paste with the brush capacitors and other 2
nozzle components

Verify functionality with a power supply Swap the PSU for a


All of the above 4
tester known working one
Explanation

A modular power supply simplifies cable management by enabling you to add and remove optional plug-in
cables as needed to power components. Option power supply is a made-up term. A Flex power supply is a small-
form-factor power supply. A soldered power supply has all of its power cables soldered to the power supply unit
(PSU).

It allows power to flow from the plug into the power supply. The computer has its own on/off switch. The power
supply powers the "power good" wire (if the power is good) but the power supply switch does not do this
directly. Power supplies (mostly) do not autodetect power and then react.

Efficiency is a major consideration. Cable length is important, but most power cables are of sufficient length and
don't typically need to be measured or checked. Power supplies do not have a sag rating. UPS compatibility is
not a real specification.
Wattage is the primary concern in selecting a power supply. Airflow on a power supply is pre-designed for the
maximum capability of the power supply. Power supplies do not have trip alerts or USB power plugs.

Vacuums generate a lot of static electricity, specifically on the plastic areas of the device, including the nozzle.
While niche anti-static PC vacuums exist, it is always best to use canned air to blow dust out of your PC.

We always want to practice proper power handling, especially when dealing with the source of the power, our
PSU. Power supply testers can be used to test a PSU and verify that it is functioning as intended. Many
technicians keep spares of common components such as PSUs, so that they can swap a known working one into
the system and test their theory of probable causation.
Related Episode Exam Core

The Power Supply Core 1

The Power Supply Core 1

Choosing a Power Supply Core 1

Choosing a Power Supply Core 1

Cooling Your System Core 1

Installing and Troubleshooting Core 1


a PSU
Question Answer Option 1 Answer Option 2
Chapter 8 - Mass Storage Technologies

Mass storage is organized into __________? Gibibytes LBAs

Which does NOT describe a mass storage device? Optical drive M.1 drive

Which is a standard command and connection standard for mass


ATA LBA
storage devices?

SATA drives use how many wires to transfer data to and from the
8 4
computer?
SSDs are organized into logical blocks, but their memory storage cells
Sectors Slots
are called what?

Which interface is the fastest? SATA SCSI

Combine SCSI with SATA to get ____________? SSCSI SAS

Running SCSI commands over Ethernet is called __________? iSCSI SCSIi


Answer Option 3 Answer Option 4 Correct

Pages Gigabytes 2

Magnetic disk SSD 2

2.5" form factor 3.5" form factor 1

2 1 4

Pages Sockets 3

NVMe PATA 3

M.2 SASI 2

eSCSI SCSIe 1
Explanation

Storage is organized into Logical Blocks (LBAs). Gigabytes and Gibibytes describe capacity, not
organizational structure. Pages are the organizational structure of SSDs but not of all mass
storage devices.
An M.1 drive is not a mass storage device; it is a made-up term that closely resembles the M.2
form factor. Optical drives, magnetic drives, and SSDs are all mass storage.
Advanced Technology Attachment (ATA) is a command and connection standard for mass
storage devices. Form factors are not command or connection standards. LBA is an organization
structure for mass storage devices.
SATA is a serial interface; all data moves in sequence (serial) over a single wire. SATA does not
use 2, 4, or 8 wires to transfer data.
SSD memory cells are called pages. Magnetic drive storage units are called sectors. Slots and
sockets are not terms to describe storage units.
NVMe uses PCIe lanes and is the fastest of these interface choices. PATA is the slowest; SATA
and SCSI speeds fall between NVMe and PATA.
Serial Attached SCSI (SAS) uses the SATA connector with the SCSI command language. M.2 is a
connector interface and form factor. SSCSI and SASI are made up terms.
iSCSI uses SCSI commands sent over Ethernet. SCSIi, eSCSI, and SCSIe are made up terms.
Related Episode Exam Core

Introduction to Mass Storage Core 1

Introduction to Mass Storage Core 1

Magnetic Disk Drive Core 1

Magnetic Disk Drive Core 1

Solid-State Drives (SSDs) Core 1

Solid-State Drives (SSDs) Core 1

SCSI Core 1

SCSI Core 1
Question Answer Option 1
Chapter 9 - Implementing Mass Storage
What is the minimum number of drives to perform RAID 5? 2
What is the maximum number of drive failures under RAID 6 at
0
which the array will still function?

Which is an example of a hardware RAID controller? Storage Spaces

RAID 10 requires how many drives? 4

Which is NOT a Storage Solution RAID configuration? Parity

A RAID expansion
What operates a software RAID solution?
card

What kind of chip holds a BitLocker key? TPM

The system
attempts to boot
Which is most likely the result of a corrupted operating system?
from the wrong
device
Answer Option 2 Answer Option 3 Answer Option 4 Correct

3 4 5 2

1 2 3 3

Dedicated expansion card Dynamic disks Basic disks 2

3 2 8 1

Simple Two-way mirror RAID 10 4

A RAID controller built into


The OS and CPU The drives in the array 3
the motherboard

MPT TMP PTM 1

The hard drive makes a loud


Slow performance Continuous rebooting 4
clicking noise
Explanation

It takes a minimum of three drives to create a RAID 5 array.

A RAID 6 array will function with up to two drive failures.

A dedicated RAID controller comes in the form of an expansion card. Storage


Spaces is a Microsoft software RAID implementation. Dynamic and basic disks are
not RAID controllers.
RAID 10 requires 4 drives.

Storage Spaces does not have a RAID 10 configuration. Simple (JBOD), two-way
mirror, and parity (RAID 5) are all supported configurations under Storage Spaces.

Software RAID is controlled by the operating system and the CPU. RAID expansion
cards and motherboard-based RAID controllers are examples of hardware RAID.
Drives don't have built-in RAID controllers.

A Trusted Platform Module (TPM) chip holds a BitLocker key. The rest are made-up
terms.

Of the choices here, the most likely result of a corrupt operating system is
continuous reboots. Boot order is set in the UEFI/BIOS system setup utility. A
corrupt OS can cause crashes and reboots, not slow performance. Hard drive
clicking comes from a mechanical failure inside the hard drive.
Related Episode Exam Core

RAID Core 1

RAID Core 1

Hardware RAID Core 1

Hardware RAID Core 1


Core 1
Software RAID in Storage Spaces &
Core 2

Core 1
Software RAID in Storage Spaces &
Core 2

Core 1
Encrypting Mass Storage &
Core 2

Mass Storage Troubleshooting Core 1


Question Answer Option 1
Chapter 10 - Essential Peripherals
Which is not a valid USB speed? 12 Mbps

Each version of USB in a computer has its own what? USB hub

Most USB peripherals already have a what? Windows driver

Which is not a valid Thunderbolt speed? 10 Gbps


Which is a valid Compact Disc capacity? 74 megabytes

The term peripheral refers to both ______ and _______ devices. digital, analog

Videoconferencing software allows viewing of remote desktops


pixelated productivity
through a feature known as _____________.

Modern GPUs are installed in a _____ slot, which enables high


PSU
speed communication between the GPU, the CPU, and RAM.
Answer Option 2 Answer Option 3 Answer Option 4 Correct

480 Mbps 5 Gbps 1.1 Gbps 4

USB Type-B
USB controller USB peripheral 2
connector

USB lock HID interface Lightning connector 1

20 Gbps 30 Gbps 40 Gbps 3


74 minutes 80 megabytes 4.37 gigabytes 2

input, output real, virtual serial, DHCP 2

remote ready world workgroup screen sharing 4

PCIe PCI AGP 2


Explanation

1.1 Gbps is not a valid USB speed. USB 1.1 Full Speed runs at 12 Mbps. USB 2.0 Hi Speed
runs at 480 Mbps. USB 3 and 3.1 Gen 1 run at 5 Gbps (SuperSpeed).
Each version of USB in a computer has its own USB controller which is then connected to
a USB hub. USB Type-B connectors connect to a downstream peripheral (such as a
printer). A USB hub is a circuit or device with one or more upstream USB ports. Each
version of USB does not have its own peripheral.

Windows comes with drivers for many common USB devices. A USB lock is an unpowered
physical plug that secures open USB ports on a computer, not part of a USB peripheral.
There is no such thing as an HID interface. USB devices come with USB connectors, not
Lightning connectors.
30 Gbps is not a valid Thunderbolt speed. Thunderbolt 1 runs at 10 Gbps, Thunderbolt 2
runs at 20 Gbps, and Thunderbolt 3 runs at 40 Gbps.
74 minutes is a valid CD capacity. The other values are not valid for CDs.

Peripheral is a term used to describe any and all input and output devices that can be
connected to a computer. Things like monitors and printers are peripherals that output
data, while keyboards and webcams are peripherals that input data.

Screen sharing is a fantastic feature included in most video conferencing tools that allows
us to view and sometimes interact with another user’s desktop. It is highly useful when
someone needs to display and collaborate information with many users at once. The
other terms are made up.

The Peripheral Component Interconnect Express (PCIe) slot enables high speed
communication between GPUs, the CPU, and RAM. PCIe slots come in multiple size
formats, known as lanes, and are denoted as x1, x4, x8, and x16 accordingly. A power
supply unit (PSU) supplies power to the system. PCI is an older standard. AGP is a made-
up term.
Related Episode Exam Core

USB Standards Core 1

Core 1
Understanding USB &
Core 2

`Configuring USB Core 1

Thunder and Lightning Core 1

Optical Media Core 1

Common Peripherals Core 1

Webcams and Core 1


&
Videoconferencing Core 2

Installing and
Troubleshooting Core 1
Expansion Cards
Question Answer Option 1
Chapter 11 - Installing and Upgrading Operating Systems
(There are no episodes, and therefore no quiz questions, from this book
chapter in the 220-1101)
Answer Option 2 Answer Option 3 Answer Option 4 Correct
Explanation Related Episode
Exam Core
Question Answer Option 1
Chapter 12 - Working with Operating Systems
(There are no episodes, and therefore no quiz questions, from this book
chapter in the 220-1101)
Answer Option 2 Answer Option 3 Answer Option 4 Correct
Explanation
Related Episode Exam Core
Question Answer Option 1
Chapter 13 - Users, Groups, and Permissions
(There are no episodes, and therefore no quiz questions, from this
book chapter in the 220-1101)
Answer Option 2 Answer Option 3 Answer Option 4 Correct
Explanation
Related Episode Exam Core
Question Answer Option 1
Chapter 14 - Maintaining and Optimizing Operating Systems
(There are no episodes, and therefore no quiz questions, from
this book chapter in the 220-1101)
Answer Option 2 Answer Option 3 Answer Option 4 Correct
Explanation
Related Episode Exam Core
Question Answer Option 1 Answer Option 2
Chapter 15 - Working with the Command-Line Interface
(There are no episodes, and therefore no quiz questions, from this
book chapter in the 220-1101)
Answer Option 3 Answer Option 4 Correct
Explanation
Related Episode Exam Core
Question Answer Option 1
Chapter 16 - Troubleshooting Operating Systems
(There are no episodes, and therefore no quiz questions, from this
book chapter in the 220-1101)
Answer Option 2 Answer Option 3 Answer Option 4 Correct
Explanation
Related Episode Exam Core
Question Answer Option 1
Chapter 17 - Display Technologies

Which is a monitor backlight technology? LCD

Which display technology uses moving mirrors? CCFL

A CPU with a built-in graphics processor is a what? DVI

Which interface supports DRM? HDMI


Which is not a task performed in Windows when installing a video
Adjust PCIe power
card?

Which is not a standard projector adjustment? Keystone


Answer Option 2 Answer Option 3 Answer Option 4 Correct

LED OLED Nit 2

RGB DLP LCD 3

APU VGA GPU 2

DVI-D VGA DVI-I 1


Set resolution to
Adjust font size Update drivers 1
native

Pincushion Skew Threading 4


Explanation

LEDs are a monitor backlight technology. LCDs don't make their own light (thus the need for a
backlight). OLEDs make their own light (they don't need a backlight). Nit is a unit used to
measure monitor brightness.
DLP uses tiny, moving mirrors to create the projected image. CCFL is a back lighting technology.
Red, green, and blue (RGB) are the subpixel colors. A liquid crystal display (LCD) contains liquid
crystal that changes opacity.

An APU includes a CPU and GPU on the same chip. VGA and DVI are video connectors. A graphics
processing unit (GPU) can refer to either the core graphics processor or a standalone video card.

HDMI supports DRM. The other interfaces do not.


PCIe power is not adjustable. All of the other tasks are performed in Windows as part of a video
card installation.
Threading is not a projector adjustment. Keystone, skew and pincushion are all standard
projector adjustments.
Related Episode Exam Core

Monitor Technologies Core 1

Monitor Technologies Core 1

Graphics Cards and Connections Part 1 Core 1

Graphics Cards and Connections Part 2 Core 1

Installing a Graphics Card Core 1

Projectors Core 1
Question Answer Option 1 Answer Option 2
Chapter 18 - Essentials of Networking
What goes at the end of an Ethernet frame? FCS Destination MAC
MAC addresses are made up of how many bits? 24 48

Which device retransmits any inbound message out all of its other
Switch Router
ports?

Switches don't know Switches query each


How does a switch know the MAC addresses of connected devices?
MAC addresses connected host

How are WANs identified? Logical addresses Physical addresses

Which device forwards data from one network to another? Hub Switch

Which is not a network cable type? Coaxial Plenum


Multimode fiber optic cables use what for their light source? Lasers Infrared light
How many pairs of wires are in UTP Ethernet cables? 2 3

Which is the best tool to identify a specific cable within a bundle of


Fox and Hound TDR
cables?

To connect a switch To connect a


Solid-core cabling is best used where? to a patch bay in a computer to a wall
patch panel jack

Which do link lights not normally indicate? Connection/link Duplex status


Wake-on-LAN is triggered by what? Magic bullet Magic frame
Answer Option 3 Answer Option 4 Correct

Source MAC Data 1


64 128 2

Hub Smart Repeater 3

An administrator must The switch learns the


program the MAC-to-port addresses by watching 4
table frames

MAC addresses Ethernet address 1

e-mail Router 4

UTP STP 2
LEDs Halogen bulbs 3
4 8 3

Continuity tester Punch down tool 1

To connect distant
To connect rarely-moved
locations with horizontal
office equipment such as 3
runs and drops inside walls
printers and copiers
and plenum spaces

Speed Activity 2
Magic message Magic packet 4
Explanation

The frame check sequence (FCS) goes at the end of an Ethernet frame. In order, an Ethernet frame includes the
destination MAC addresses, the source MAC address, the data payload, and finally the FCS.
MAC addresses are made up of 48 bits. The other answers are incorrect.
A hub repeats inbound traffic out all of its other ports. Switches only retransmit data out the port that the
intended receiver is connected to. Routers forward traffic to remote networks as required. Smart repeater is an
unofficial term for a switch.

Switches watch all inbound frames and learn MAC addresses from them. Switches definitely need to know MAC
addresses, which they learn automatically without needing to query hosts or be manually programmed.

Networks are identified by logical addresses (IP addresses). Physical, MAC, and Ethernet addresses are all different
names for the same thing.
A router forwards network traffic from one network to another. Switches and hubs transmit traffic within a LAN.
e-mail may send data from one network to another but it is an application/protocol, not a device.
Plenum describes any type of cable with a fire-resistant jacket. Coax, unshielded twisted pair (UTP) and shielded
twisted pair (STP) are all types of network cable.
Multimode fiber cables use LEDs to generate light pulses. The other answers are incorrect.
UTP Ethernet cables have four pairs of wires. The other choices are incorrect.
A tone probe and tone generator, also called a Fox and Hound, can easily identify a specific cable within a bundle.
Neither a TDR nor a continuity tester can identify a specific cable in a bundle. A punch down tool is not a
diagnostic tool.

Solid-core cable is used in walls and horizontal runs because it is good for long runs and is not exposed to frequent
bending. It is not used in environments where frequent bending occurs such as in patch panels, workspaces, or
anywhere that it will be flexed regularly by people handling, stepping on, or tripping over it.

Link lights do not normally indicate duplex status. They do show link/connection status, indicate connection
speed, and show activity.
When supported, a magic packet triggers Wake-on-LAN. The other choices are incorrect.
Related Episode Exam Core

Introduction to Networking Core 1

Introduction to Networking Core 1

Hubs vs Switches Core 1

Hubs vs Switches Core 1

WANs and Routers Core 1

WANs and Routers Core 1

Cables and Connectors Core 1

Cables and Connectors Core 1


Crimping Cables Core 1

Structured Cabling Core 1

Structured Cabling Core 1

Network Card Troubleshooting Core 1

Network Card Troubleshooting Core 1


Question Answer Option 1
Chapter 19 - Local Area Networking

A Class A IP address has how many locked octets? One

How many bits are in an IPv6 address? 32

Which service uses port 445? HTTPS

What is the maximum number of characters in an FQDN? 128 (including dots)


Answer Option 2 Answer Option 3 Answer Option 4 Correct

Two Three Four 1

64 128 256 3

SMB IMAP SLP 2

128 (not including dots) 255 (including dots) 255 (not including dots) 3
Explanation Related Episode

The first octet of a Class A address, the network address, is locked. The
Introduction to TCP/IP
other choices are incorrect.

IPv6 addresses are 128 bits long. IPv4 address are 32 bits long. No IP
IPv6
address versions are 64 or 256 bits long.
SMB uses port 445. HTTPS uses port 443. IMAP uses port 143. SLP uses
Port Numbers
port 427.

Fully-qualified domain names (FQDNs) can have up to 255 characters,


Understanding DNS
including dots. The other choices are not correct.
Exam Core

Core 1
&
Core 2

Core 1

Core 1

Core 1
&
Core 2
Question Answer Option 1 Answer Option 2
Chapter 20 - Wireless Networking
Which is not a Wi-Fi capable device? WAP Switch
Which 802.11 standard runs on 5GHz? 802.11a 802.11b

Mesh networks are


Mesh networks have
Which is not true of wireless mesh networks? best for large
a single base station
enterprise networks

If you spot a WAP on the ceiling of a large room with no obvious


PoE RADIUS
power outlet nearby, how is it most-likely powered?

Which is not a wireless radio technology found in computers,


Infrared Bluetooth
tablets, or phones?

Which is most-likely to prevent a device from connecting to a The antenna(s) are The SSID has
previously-used Wi-Fi network? poorly oriented changed
Answer Option 3 Answer Option 4 Correct

Smartphone Tablet 2
802.11g 802.11c 1
Mesh networks have Mesh networks
one or more provide wide
2
beacon/satellite coverage in homes
stations and small offices

Battery Solar 1

RFID NFC 1

Too many devices The WAP is


are accessing the disconnected from 2
WAP the Internet
Explanation

A switch is a hard-wired network device. WAPs, smartphones, and tablets are all Wi-Fi capable.
802.11a runs on 5GHz. 802.11b and 802.11g run on 2.4GHz. 802.11c is not a Wi-Fi standard.

Mesh networks don't provide the customized configuration required for enterprise-sized networks. All
of the other statements are true of wireless mesh networks.

Power over Ethernet is a common way to provide power to a WAP. RADIUS is an authentication
protocol. Battery and solar power have limited use for powering a WAP mounted in a hard-to-reach
location indoors.
Infrared is a rarely-used wireless technology that communicates with infrared light, not radio waves.
Bluetooth, RFID and NFC are all wireless radio technologies.
The most-likely answer is that the SSID changed. Poor antenna orientation may reduce speed or range.
Too many devices using the WAP are likely to cause low or intermittent connectivity. Even if a WAP is
disconnected from the Internet, devices can still connect to it.
Related Episode Exam Core

Wireless Network Hardware Core 1

Wi-Fi Standards Core 1

It's a Huge Mesh Core 1

Core 1
Enterprise Wireless Configuration &
Core 2

Beyond Wi-Fi Core 1

Core 1
Troubleshooting Wireless Connections &
Core 2
Question Answer Option 1 Answer Option 2
Chapter 21 - The Internet
Which firewall exception must be enabled on a client to connect to
Port 143 (inbound) Port 143 (outbound)
a webserver?

Which is not an e-mail protocol port? 25 110

Which is not a wireless technology used in IoT? Ethernet 802.11


Answer Option 3 Answer Option 4 Correct

Port 80 (inbound) Port 80 (outbound) 4

143 443 4

Zigbee Z-wave 1
Explanation

The client (the system running the browser) must allow outbound traffic on port 80. Inbound port 80
traffic should be blocked on the web client. Port 143 is used for IMAP; it has nothing to do with web
servers or clients.
Port 443 is for HTTPS, which is not an e-mail protocol. Port 25 is for the Simple Mail Transfer Protocol
(SMTP), port 110 is for the Post Office Protocol (POP/POP3) ,and port 143 is for the Internet Message
Access Protocol (IMAP).

Ethernet is not wireless (and most IoT devices don't have an Ethernet port). 802.11/Wi-Fi, Zigbee, and Z-
wave are all common wireless IoT connection schemes.
Related Episode Exam Core

Firewalls and Servers Core 1

E-Mail Core 1

Core 1
Internet of Things &
Core 2
Question Answer Option 1 Answer Option 2
Chapter 22 - Virtualization

A virtual machine is a _______ OS running within a ________ OS. hypervisor, host guest, hypervisor

Which is not needed to install a virtual machine? Hypervisor Guest OS .iso file

Experiment with
Practice administering
multiple drives
Which is not a good uses of a virtual machine? different operating
without purchasing
systems
hardware

Which is not a cloud ownership category? Corporate Private


Answer Option 3 Answer Option 4 Correct

guest, host host, guest 3

Virtual disk Optical drive 4

Configure virtual
Install 3D games 4
networking

Public Hybrid 1
Explanation

A VM is a guest operating system that runs within a host operating system. The hypervisor manages the
guest OS and the interface between the guest OS and the shared physical hardware of the host OS.

A physical optical drive isn't necessary; the hypervisor can create a virtual optical drive from the guest
OS .iso file. The installation needs a hypervisor, a guest OS .iso file and a virtual disk.
While many VMs support 3D technology, resource sharing with the host OS and other VMs limits a guest's
3D performance. VMs are a great way to practice administering different operating systems, configure
and experiment with virtual networking, and experiment with multiple drives by using virtual disks
instead of purchasing more physical hard drives.

There is no cloud ownership category known as a corporate cloud. While most of the physical equipment
that makes up the cloud is owned by corporations, cloud ownership models focus on who is able to use
services provided by a given cloud. Public, private and hybrid are each cloud ownership models.
Related Episode Exam Core

Understanding Virtualization Core 1

Your First Virtual Machine Core 1

Advanced Virtualization Setup Core 1

Cloud Ownership Core 1


Question Answer Option 1
Chapter 23 - Portable Computing
Store all removed screws
Which is a good technique to use when working inside a laptop? and hardware in a bowl to
avoid losing them

Consult pictures taken when


Which technique is most helpful when reassembling a laptop?
disassembling the laptop

Which component usually takes the most disassembly to replace in a


RAM
laptop?

Laptop monitors can be challenging to work on for what reason? They use high power
Answer Option 2 Answer Option 3 Answer Option 4 Correct

Use a butter knife to separate


Keep the battery attached Review a disassembly
case halves because it is dull but 3
so you can test as you go guide or manual
strong

Use larger replacement Upgrade all upgradeable Have a second laptop of the
screws than the ones components during same model to review during 1
removed reassembly reassembly

Battery Hard drive CPU 4

They have built-in


They are sealed They use chemical backlighting 2
batteries
Explanation

Review the disassembly process. Keeping all hardware and components in a single container can
make small parts tough to find and identify when reassembling the computer. The battery should
be removed or disconnected to avoid short circuits while working inside the computer. Avoid
using tools that are not specifically designed to perform disassembly tasks.

Pictures are the easiest and most practical tool to help with reassembly. Use the original
hardware to reassemble a laptop. Upgrading during reassembly is a good idea but it won't help
the reassembly process. It is likely impractical to have an identical laptop to reference during
reassembly.
The CPU is usually buried deep inside a laptop. RAM, batteries, and hard drives are usually easily
accessible.
Laptop displays tend to be sealed. Laptop displays do not have built-in batteries. Laptop displays
use the same backlighting technology as desktop displays: LEDs and CCFLs. Laptop displays
generally use less power than desktop displays of the same size.
Related Episode Exam Core

Laptop Hardware - The Tools Core 1

Laptop Hardware - Core Hardware Core 1

Laptop Hardware - CPU and Motherboard Core 1

Touring Your Laptop Display Core 1


Question Answer Option 1
Chapter 24 - Mobile Devices
Which is not true of a mobile device? It is a single, sealed unit

Which is not a wired connection for a smart phone? Lightning

Where can users get Android apps? Play Store


Answer Option 2 Answer Option 3 Answer Option 4 Correct

It runs a mobile operating It supports wireless It can be easily serviced and


4
system connectivity upgraded

Ethernet Micro USB USB C 2

App Store Microsoft Store Steam store 1


Explanation

Being sealed, mobile devices are not easily serviceable and they are not designed to be
upgraded. The other choices are true of mobile devices.
Smart phones do not come with Ethernet connectors. Smart phones commonly have
Lightning, micro USB, or USB Type-C connectors.
Google Play is the primary source for Android apps. The Apple App Store provides access to
iOS apps. Neither the Microsoft Store nor Steam distribute Android apps.
Related Episode Exam Core

What is a Mobile Device? Core 1

Mobile Connections Core 1


Core 1
Touring Android &
Core 2
Question Answer Option 1 Answer Option 2
Chapter 25 - Maintaining and Securing Mobile Devices

Which is not a mobile device maintenance practice? Update the PRL Update the firmware

Which port number is not used by an encrypted e-mail protocol? 143 993

Synchronization is least concerned with which choice? Contacts Calendar

Which is not a typical Android screen lock option? Swipe Token

Adjust the display's


Which is least likely solution for a dim mobile device screen? Charge the battery
brightness
Answer Option 3 Answer Option 4 Correct

Back up the data and Back up the data and


4
apps apps

587 995 1

Backups Files 3

Pattern PIN 2

Enable automatic
Replace the display or its
brightness 1
backlight
adjustments
Explanation

Android Package (APK) files contain installable applications; installing applications isn't part of the normal
mobile-device maintenance process. PRL updates, firmware updates, and backups are all mobile device
maintenance techniques.

143 is the unencrypted IMAP port. 993 is the encrypted IMAP port. 587 is one of the encrypted SMTP port
numbers. 995 is the encrypted POP3 port.

Backups are only in sync at the instant of backup - after that, the original source may undergo changes
until the next backup session. Synchronization is concerned with keeping current, identical copies of
contacts, calendar events and files across multiple devices.

Tokens are not used to unlock Android screens. Swipes, patterns and pins are commonly used to unlock
screens.

A dead or low battery that is low enough to cause a dim display will likely prevent the device from
functioning at all. Adjusting brightness, enabling automatic brightness adjustments, or replacing a bad
display/backlight may all fix a dim screen.
Related Episode Exam Core

Core 1
Maintaining Mobile Devices &
Core 2

Core 1
Mobile Devices and E-mail &
Core 2

Mobile Synchronization Core 1

Core 1
Mobile Device Security &
Core 2

Mobile Security Troubleshooting Core 1


Question Answer Option 1
Chapter 26 - Printers and Multifunction Devices
What material do laser printers use to create the final printed
Heated thermal plastic
image?
Which letters represent the ink colors normally used in color inkjet
RGB, Bk, Wh
printers?

Which is not part of the impact-printing process? Pins pop out of the printhead

Which is not a maintenance task for thermal printers? Replace the paper

Connecting a local printer to a computer is usually done with what


USB
kind of connection?

To access a shared printer,


Which is not true of shared printers? create a local printer and then
convert it to shared

Which is not part of the 3D-printing process? Create the 3D image


Answer Option 2 Answer Option 3 Answer Option 4 Correct

Heat Ink Toner 4

RGBKW RGB CMYK 4

Pins strike an inked Inked ribbon makes contact


Pre-heat the printhead 2
ribbon with paper

Clean the printhead Replace the fuser Blow out any debris 3

Serial Ethernet Infrared 1

To create a shared To create a shared To access a shared printer,


printer, enable file and printer, give it a share add a printer and then select 1
printer sharing name the shared printer

Create the slice file Print a 2D test Preheat the extruder and bed 3
Explanation

Laser printers create the final printed image by fusing toner to the page. The other choices are incorrect.

Inkjet printers typically use cyan, magenta, yellow and black (CMYK) ink. Red, green, and blue (RGB) are the
colors of light used by monitors. White ink is seldom used in inkjet printers.
The printhead of a dot matrix (impact) printer does not require heating. All of the other options are part of the
process of impact printing with a dot matrix printer.
Thermal printers do not have fusers. Replace paper as needed. Clean the printheads and blow out debris
regularly.
Most printers have a USB port for connecting to a computer. Some niche industry printers use serial ports. Many
printers have an Ethernet port, but they are normally used as network printers, not directly attached to a local
computer. Infrared interfaces are not found on printers.

A shared printer cannot be accessed by creating a local printer. The other statements about shared printers are
true.

Printing a 2D test is not part of the 3D-printing process. All of the other choices are part of the 3D-printing
process.
Related Episode Exam Core

Laser Printers Core 1

Inkjet Printers Core 1

Impact Printers Core 1

Thermal Printers Core 1

Installing a Local Printer Core 1

Sharing Printers Core 1

3D Printing Core 1
Question Answer Option 1
Chapter 27 - Securing Computers
(There are no episodes, and therefore no quiz questions, from this
book chapter in the 220-1101)
Answer Option 2 Answer Option 3 Answer Option 4 Correct
Explanation
Related Episode Exam Core
Question Answer Option 1
Chapter 28 - Operational Procedures
(There are no episodes, and therefore no quiz questions, from this
book chapter in the 220-1101)
Answer Option 2 Answer Option 3 Answer Option 4 Correct
Explanation
Related Episode Exam Core

You might also like