CompTIA ITF+ CertMike Prepare. Practice. Pass the Test! Get Certified! : Exam FC0-U61
The leading, no-nonsense guide to get you up to speed on the fundamentals of IT In CompTIA ITF+ CertMike: Prepare. Practice. Pass the Exam! Get Certified! Exam FC0-U61, experienced tech education guru Mike Chapple delivers an essential and efficient guide to acing the ITF+ (IT Fundamentals+) exam ad...
Otros Autores: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Hoboken, New Jersey :
John Wiley & Sons, Inc
[2023]
|
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009752726506719 |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright Page
- Contents
- Introduction
- The ITF+ Exam
- What Does This Book Cover?
- Exam FC0-U61 Exam Objectives
- FC0-U61 Certification Exam Objective Map
- How to Contact the Publisher
- Part I Domain 1.0: IT Concepts and Terminology
- Chapter 1 Notational Systems: Objective 1.1: Compare and contrast notational systems
- Storing Data
- Character Encoding
- Chapter 2 Data Types: Objective 1.2: Compare and contrast fundamental data types and their characteristics
- Data Types
- Chapter 3 Computing Basics: Objective 1.3: Illustrate the basics of computing and processing
- Computer Actions
- Chapter 4 Value of Data: Objective 1.4: Explain the value of data and information
- Data and Information
- Intellectual Property
- Securing Data
- Chapter 5 Units of Measure: Objective 1.5: Compare and contrast common units of measure
- Measuring Data Storage
- Measuring Data Throughput
- Measuring Processor Speed
- Chapter 6 Troubleshooting Methodology: Objective 1.6: Explain the troubleshooting methodology
- Troubleshooting Methodology
- Part II Domain 2.0: Infrastructure
- Chapter 7 Input/Output Device Interfaces: Objective 2.1: Classify common types of input/output device interfaces
- Network Interfaces
- Peripheral Interfaces
- Graphic Interfaces
- Chapter 8 Installing Peripherals: Objective 2.2: Given a scenario, set up and install common peripheral devices to a laptop/PC
- Peripheral Types
- Installing and Configuring Peripherals
- Chapter 9 Internal Computing Components: Objective 2.3: Explain the purpose of common internal computing components.
- CPU
- Motherboard
- Firmware
- Memory
- Disk Drives
- Network Interface Cards
- GPU
- Power and Cooling
- Chapter 10 Internet Service Types: Objective 2.4: Compare and contrast common Internet service types
- Service Types.
- Chapter 11 Storage: Objective 2.5: Compare and contrast storage types
- Volatile Storage
- Nonvolatile Storage
- Chapter 12 Computing Devices: Objective 2.6: Compare and contrast common computing devices and their purposes
- Computing Device Types
- Internet of Things
- Chapter 13 TCP/IP Networking: Objective 2.7: Explain basic networking concepts
- Network Types
- TCP/IP Networking
- Network Addressing
- Chapter 14 Application Protocols: Objective 2.7: Explain basic networking concepts
- Application Protocols
- Chapter 15 Network Devices: Objective 2.7: Explain basic networking concepts
- Modems
- Switches
- Routers
- Firewalls
- Access Points
- Chapter 16 Wireless Networks: Objective 2.8: Given a scenario, install, configure, and secure a basic wireless network
- Wireless Networking
- Wireless Signal Propagation
- Wireless Security
- Wireless Encryption
- Part III Domain 3.0: Applications and Software
- Chapter 17 Operating Systems: Objective 3.1: Explain the purpose of operating systems
- Operating System Roles
- Operating System Types
- Chapter 18 Virtualization: Objective 3.1: Explain the purpose of operating systems
- Virtualization
- Chapter 19 Filesystems: Objective 3.2: Compare and contrast components of an operating system
- Files and Filesystems
- Filesystem Features
- Filesystem Types
- Chapter 20 Services and Processes: Objective 3.2: Compare and contrast components of an operating system
- Applications
- Processes
- Services
- Chapter 21 Drivers, Utilities, and Interfaces: Objective 3.2: Compare and contrast components of an operating system
- Drivers
- Interfaces
- Utilities
- Chapter 22 Software Types: Objective 3.3: Explain the purpose and proper use of software
- Software.
- Chapter 23 Application Architecture and Delivery: Objective 3.4: Explain methods of application architecture and delivery models
- Application Delivery
- Application Architecture
- Chapter 24 Web Browsers: Objective 3.5: Given a scenario, configure and use web browsers
- How the Web Works
- Configuring Web Browsers
- Proxy Servers
- Digital Certificates
- Chapter 25 Application Concepts and Uses: Objective 3.6: Compare and contrast general application concepts and uses
- Software Compatibility
- Software Installation Best Practices
- Software Licensing
- Part IV Domain 4.0: Software Development Concepts
- Chapter 26 Programming Languages: Objective 4.1: Compare and contrast programming language categories
- Programming Language Categories
- Specialized Languages
- Identifying Languages
- Chapter 27 Programming Organizational Techniques: Objective 4.2: Given a scenario, use programming organizational techniques and interpret logic
- Pseudocode
- Flowcharts
- Chapter 28 Logic Components: Objective 4.2: Given a scenario, use programming organizational techniques and interpret logic
- Branching
- Looping
- Chapter 29 Programming Concepts: Objective 4.3: Explain the purpose and use of programming concepts
- Variables and Arrays
- Data Types
- Functions
- Objects
- Part V Domain 5.0: Database Fundamentals
- Chapter 30 Database Concepts: Objective 5.1: Explain database concepts and the purpose of a database
- Databases
- Using a Database
- Chapter 31 Database Structures: Objective 5.2: Compare and contrast various database structures
- Structuring Data
- Relational Databases
- Nonrelational Databases
- Chapter 32 Database Interfaces: Objective 5.3: Summarize methods used to interface with databases
- Structured Query Language (SQL)
- Database Access Methods
- Part VI Domain 6.0: Security.
- Chapter 33 Confidentiality, Integrity, and Availability: Objective 6.1: Summarize confidentiality, integrity, and availability concerns
- The CIA Triad
- Confidentiality
- Integrity
- Availability
- Chapter 34 Securing Devices: Objective 6.2: Explain methods to secure devices and best practices
- Device Security
- Software Security
- Chapter 35 Behavioral Security: Objective 6.3: Summarize behavioral security concepts
- Privacy
- Security Policies and Procedures
- Chapter 36 Authentication, Authorization, Accounting, and Nonrepudiation: Objective 6.4: Compare and contrast authentication, authorization, accounting, and nonrepudiation concepts
- Access Control
- Authentication Factors
- Authorization
- Account Types
- Nonrepudiation
- Chapter 37 Password Best Practices: Objective 6.5: Explain password best practices
- Password Policies
- Chapter 38 Encryption: Objective 6.6: Explain common uses of encryption
- Cryptography
- Uses of Encryption
- Chapter 39 Business Continuity and Disaster Recovery: Objective 6.7: Explain business continuity concepts
- Business Continuity
- Disaster Recovery
- Index
- Online Test Bank
- EULA.