توضیحاتی در مورد کتاب CompTIA ITF+ CertMike: Prepare. Practice. Pass the Test! Get Certified!: Exam FC0-U61
نام کتاب : CompTIA ITF+ CertMike: Prepare. Practice. Pass the Test! Get Certified!: Exam FC0-U61
عنوان ترجمه شده به فارسی : CompTIA ITF CertMike: آماده کنید. تمرین. آزمون را با موفقیت گذراندن! دریافت گواهینامه!: امتحان FC0-U61
سری : Prepare.Practice. Pass the test
نویسندگان : Mike Chapple
ناشر :
سال نشر : 2023
تعداد صفحات : 0
ISBN (شابک) : 9781119897828 , 9781119898122
زبان کتاب : English
فرمت کتاب : epub درصورت درخواست کاربر به PDF تبدیل می شود
حجم کتاب : 48 مگابایت
بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.
فهرست مطالب :
COVER
2 TITLE PAGE
3 COPYRIGHT
4 DEDICATION
5 ACKNOWLEDGMENTS
6 ABOUT THE AUTHORS
7 ABOUT THE TECHNICAL EDITOR
8 INTRODUCTION
1 THE ITF+ EXAM
2 WHAT DOES THIS BOOK COVER?
3 EXAM FC0-U61 EXAM OBJECTIVES
4 FC0-U61 CERTIFICATION EXAM OBJECTIVE MAP
5 HOW TO CONTACT THE PUBLISHER
6 PART I: Domain 1.0: IT Concepts and Terminology
1 CHAPTER 1: Notational Systems
1 STORING DATA
2 CHARACTER ENCODING
3 CHAPTER 2: Data Types
1 DATA TYPES
2 CHAPTER 3: Computing Basics
1 COMPUTER ACTIONS
2 CHAPTER 4: Value of Data
1 DATA AND INFORMATION
2 INTELLECTUAL PROPERTY
3 SECURING DATA
4 CHAPTER 5: Units of Measure
1 MEASURING DATA STORAGE
2 MEASURING DATA THROUGHPUT
3 MEASURING PROCESSOR SPEED
4 CHAPTER 6: Troubleshooting Methodology
1 TROUBLESHOOTING METHODOLOGY
2 PART II: Domain 2.0: Infrastructure
1 CHAPTER 7: Input/Output Device Interfaces
1 NETWORK INTERFACES
2 PERIPHERAL INTERFACES
3 GRAPHIC INTERFACES
4 CHAPTER 8: Installing Peripherals
1 PERIPHERAL TYPES
2 INSTALLING AND CONFIGURING PERIPHERALS
3 CHAPTER 9: Internal Computing Components
1 CPU
2 MOTHERBOARD
3 FIRMWARE
4 MEMORY
5 DISK DRIVES
6 NETWORK INTERFACE CARDS
7 GPU
8 POWER AND COOLING
9 CHAPTER 10: Internet Service Types
1 SERVICE TYPES
2 CHAPTER 11: Storage
1 VOLATILE STORAGE
2 NONVOLATILE STORAGE
3 CHAPTER 12: Computing Devices
1 COMPUTING DEVICE TYPES
2 INTERNET OF THINGS
CHAPTER 13: TCP/IP Networking
1 NETWORK TYPES
2 TCP/IP NETWORKING
3 NETWORK ADDRESSING
4 CHAPTER 14: Application Protocols
1 APPLICATION PROTOCOLS
2 CHAPTER 15: Network Devices
1 MODEMS
2 SWITCHES
3 ROUTERS
4 FIREWALLS
5 ACCESS POINTS
6 CHAPTER 16: Wireless Networks
1 WIRELESS NETWORKING
2 WIRELESS SIGNAL PROPAGATION
3 WIRELESS SECURITY
4 WIRELESS ENCRYPTION
5 PART III: Domain 3.0: Applications and Software
1 CHAPTER 17: Operating Systems
1 OPERATING SYSTEM ROLES
2 OPERATING SYSTEM TYPES
3 CHAPTER 18: Virtualization
1 VIRTUALIZATION
2 CHAPTER 19: Filesystems
1 FILES AND FILESYSTEMS
2 FILESYSTEM FEATURES
3 FILESYSTEM TYPES
4 CHAPTER 20: Services and Processes
1 APPLICATIONS
2 PROCESSES
3 SERVICES
4 CHAPTER 21: Drivers, Utilities, and Interfaces
1 DRIVERS
2 INTERFACES
3 UTILITIES
4 CHAPTER 22: Software Types
1 SOFTWARE
2 CHAPTER 23: Application Architecture and Delivery
1 APPLICATION DELIVERY
2 APPLICATION ARCHITECTURE
3 CHAPTER 24: Web Browsers
1 HOW THE WEB WORKS
2 CONFIGURING WEB BROWSERS
3 PROXY SERVERS
4 DIGITAL CERTIFICATES
5 CHAPTER 25: Application Concepts and Uses
1 SOFTWARE COMPATIBILITY
2 SOFTWARE INSTALLATION BEST PRACTICES
3 SOFTWARE LICENSING
4 PART IV: Domain 4.0: Software Development Concepts
1 CHAPTER 26: Programming Languages
1 PROGRAMMING LANGUAGE CATEGORIES
2 SPECIALIZED LANGUAGES
3 IDENTIFYING LANGUAGES
4 CHAPTER 27: Programming Organizational Techniques
1 PSEUDOCODE
2 FLOWCHARTS
3 CHAPTER 28: Logic Components
1 BRANCHING
2 LOOPING
CHAPTER 29: Programming Concepts
1 VARIABLES AND ARRAYS
2 DATA TYPES
3 FUNCTIONS
4 OBJECTS
5 PART V: Domain 5.0: Database Fundamentals
1 CHAPTER 30: Database Concepts
1 DATABASES
2 USING A DATABASE
3 CHAPTER 31: Database Structures
1 STRUCTURING DATA
2 RELATIONAL DATABASES
3 NONRELATIONAL DATABASES
4 CHAPTER 32: Database Interfaces
1 STRUCTURED QUERY LANGUAGE (SQL)
2 DATABASE ACCESS METHODS
3 PART VI: Domain 6.0: Security
1 CHAPTER 33: Confidentiality, Integrity, and Availability
1 THE CIA TRIAD
2 CONFIDENTIALITY
3 INTEGRITY
4 AVAILABILITY
5 CHAPTER 34: Securing Devices
1 DEVICE SECURITY
2 SOFTWARE SECURITY
3 CHAPTER 35: Behavioral Security
1 PRIVACY
2 SECURITY POLICIES AND PROCEDURES
3 CHAPTER 36: Authentication, Authorization, Accounting, and Nonrepudiation
1 ACCESS CONTROL
2 AUTHENTICATION FACTORS
3 AUTHORIZATION
4 ACCOUNT TYPES
5 NONREPUDIATION
6 CHAPTER 37: Password Best Practices
1 PASSWORD POLICIES
2 CHAPTER 38: Encryption
1 CRYPTOGRAPHY
2 USES OF ENCRYPTION
3 CHAPTER 39: Business Continuity and Disaster Recovery
1 BUSINESS CONTINUITY
2 DISASTER RECOVERY
3 INDEX
4 END USER LICENSE AGREEMENT
List of Tables
1 Chapter 1
1 TABLE 1.1 Decimal conversion of 2-bit values
2 TABLE 1.2 Decimal conversion of 3-bit values
3 TABLE 1.3 Binary, decimal, and hexadecimal equivalent values
4 Chapter 2
1 TABLE 2.1 Product information
2 Chapter 5
1 TABLE 5.1 Possible combinations of 2 bits
2 TABLE 5.2 Possible combinations of 3 bits
3 TABLE 5.3 Data storage units
4 TABLE 5.4 Data throughput units
5 Chapter 11
1 TABLE 11.1 Common disc types
Chapter 16
1 TABLE 16.1 Wireless standard frequencies and speed
2 TABLE 16.2 Wireless encryption options
3 Chapter 19
1 TABLE 19.1 Summary of filesystem characteristics
2 Chapter 30
1 TABLE 30.1
2 TABLE 30.2 Customer contact information stored in a database table
3 TABLE 30.3 Restaurant location information stored in a database table
4 TABLE 30.4 Product inventory information stored in a database table
List of Illustrations
1 Chapter 1
1 FIGURE 1.1 A single bit can only hold two values: 0 and 1.
2 FIGURE 1.2 Two bits can hold four possible values.
3 FIGURE 1.3 One decimal digit can hold 10 possible values.
4 FIGURE 1.4 A single hexadecimal digit can hold 16 possible values.
5 Chapter 2
1 FIGURE 2.1 Data type flowchart
2 Chapter 4
1 FIGURE 4.1 A spreadsheet of temperature readings is only data.
2 FIGURE 4.2 Plotting data over time is one way we can transform it into infor...
3 FIGURE 4.3 Information can drive action.
4 FIGURE 4.4 Copyright symbol
5 FIGURE 4.5 Symbols used to denote (a) trademarks and (b) registered trademar...
6 Chapter 6
1 FIGURE 6.1 CompTIA\'s eight-step troubleshooting methodology
2 Chapter 7
1 FIGURE 7.1 Wall plate containing four network jacks
2 FIGURE 7.2 RJ-45 network connector
3 FIGURE 7.3 RJ-11 telephone connector
4 FIGURE 7.4 USB connectors
5 FIGURE 7.5 FireWire connectors
6 FIGURE 7.6 SATA and eSATA connectors
7 FIGURE 7.7 VGA connector
8 FIGURE 7.8 DVI connectors
9 FIGURE 7.9 HDMI connector
10 FIGURE 7.10 DisplayPort and Mini DisplayPort connectors
11 Chapter 8
1 FIGURE 8.1 Keyboard and mouse
2 FIGURE 8.2 Typical computer display
3 FIGURE 8.3 Computer speakers
4 FIGURE 8.4 Typical desktop printer
5 FIGURE 8.5 Typical desktop scanner
6 FIGURE 8.6 Camera used to capture still images and video
7 Chapter 9
1 FIGURE 9.1 Central processing unit (CPU)
2 FIGURE 9.2 Motherboard
3 FIGURE 9.3 Dual in-line memory module (DIMM)
4 FIGURE 9.4 Hard disk drive (HDD)
5 FIGURE 9.5 Solid-state drive (SSD)
6 FIGURE 9.6 Network interface card (NIC)
7 FIGURE 9.7 Graphics processing unit (GPU)
8 FIGURE 9.8 Computer power supply unit (PSU)
9 Chapter 11
FIGURE 11.1 Magnetic hard disk drive (HDD)
2 FIGURE 11.2 Solid-state drive (SDD)
3 FIGURE 11.3 USB flash drive
4 FIGURE 11.4 SD card
5 FIGURE 11.5 Optical disc
6 FIGURE 11.6 Network attached storage (NAS) array
7 Chapter 12
1 FIGURE 12.1 Desktop computer system
2 FIGURE 12.2 Server racks in a data center
3 FIGURE 12.3 Laptop computer
4 FIGURE 12.4 Smartphone
5 FIGURE 12.5 Tablet computer
6 FIGURE 12.6 Convertible laptop being used as a tablet
7 FIGURE 12.7 Gaming console
8 Chapter 13
1 FIGURE 13.1 Communication from a user to a web server
2 FIGURE 13.2 Communication from a web server to a user
3 Chapter 15
1 FIGURE 15.1 Cable modem
2 FIGURE 15.2 Network switches
3 FIGURE 15.3 Network firewall deployment
4 FIGURE 15.4 Wireless access point
5 Chapter 16
1 FIGURE 16.1 SOHO wireless access point
2 Chapter 19
1 FIGURE 19.1 Directory structure
2 FIGURE 19.2 File permission settings
3 FIGURE 19.3 Uncompressed Macbeth script
4 FIGURE 19.4 Compressed Macbeth script
5 Chapter 20
1 FIGURE 20.1 Activity Monitor on a Mac
2 FIGURE 20.2 Windows Task Manager
3 Chapter 21
1 FIGURE 21.1 GUI on a Mac
2 FIGURE 21.2 GUI on a Windows system
3 FIGURE 21.3 Terminal on a Mac
4 FIGURE 21.4 Command shell on a Windows system
5 Chapter 22
1 FIGURE 22.1 Editing a chapter in Microsoft Word
2 FIGURE 22.2 Creating a pie chart in Google Sheets
3 FIGURE 22.3 Editing a slide deck in Apple Keynote
4 FIGURE 22.4 Accessing comptia.org using Google Chrome
5 FIGURE 22.5 Creating a network diagram in Lucidchart
6 FIGURE 22.6 Conferencing software hosting a video meeting
7 FIGURE 22.7 Collaborating with Microsoft Teams
8 Chapter 23
1 FIGURE 23.1 Two-tier applications involve the client and one server.
2 FIGURE 23.2 Three-tier applications involve the client and two tiers of serv...
3 Chapter 24
1 FIGURE 24.1 Retrieving a web page
2 FIGURE 24.2 Clearing browsing data in Chrome
3 FIGURE 24.3 Activating incognito mode in Chrome
4 FIGURE 24.4 Deactivating client-side scripting in Chrome
5 FIGURE 24.5 Managing browser extensions in Chrome
6 FIGURE 24.6 Disabling pop-ups and redirects in Chrome
7 FIGURE 24.7 Configuring a proxy server on a Mac
FIGURE 24.8 Valid certificate for CertMike.com 9 FIGURE 24.9 Invalid certificate warning for wrong.host.badssl.com 10 Chapter 26
1 FIGURE 26.1 Code written in the R programming language
2 FIGURE 26.2 Web page written in HTML
3 FIGURE 26.3 Document written in XML
4 FIGURE 26.4 Language summary chart
5 Chapter 27
1 FIGURE 27.1 Temperature adjustment flowchart
2 FIGURE 27.2 Common flowchart shapes
3 Chapter 29
1 FIGURE 29.1 The Product object
2 FIGURE 29.2 Instances of the Product object for a bicycle and a TV
3 FIGURE 29.3 Updated instances of the Product object for a bicycle and a TV
4 Chapter 30
1 FIGURE 30.1 Recipe example
2 Chapter 31
1 FIGURE 31.1 Microsoft Excel spreadsheet
2 FIGURE 31.2 AdventureWorks database schema
3 FIGURE 31.3 Customers database table
4 FIGURE 31.4 Orders database table
5 FIGURE 31.5 CustomerID is a foreign key from the Orders table to the Custome...
6 FIGURE 31.6 Table from a key-value store
7 Chapter 32
1 FIGURE 32.1 SQL command summary
2 FIGURE 32.2 Executing a SQL command in Azure Data Studio
3 Chapter 33
1 FIGURE 33.1 The CIA triad summarizes the three main concerns of cybersecurit...
2 Chapter 36
1 FIGURE 36.1 Fingerprint authentication on a smartphone
2 FIGURE 36.2 Eye scan authentication entering a facility
3 FIGURE 36.3 Microsoft Windows access control list
4 Chapter 37
1 FIGURE 37.1 Creating a password in LastPass
2 Chapter 38
1 FIGURE 38.1 Plain text message
2 FIGURE 38.2 Ciphertext message obtained by encrypting the plain text in Figu...