Module 1 - Using Computers
Module 1 - Using Computers
PRACTICE
ITF+
CompTIA certification exam. Featuring question-first design, real-time learning analytics, and
content refreshers, CertMaster Practice quickly assesses what you already know and what you
still need to learn. For those topics where you need more support, CertMaster Practice provides
personalized remediation and feedback.
Student Guide
• Master information quickly
Exam
FC0-U61 Exam FC0-U61
ISBN-13 978-164274-087-5
ISBN-10 1-64274-087-X
Ë|xHSLGOCy740875zv*:+:!:+:!
Official CompTIA Content Series for CompTIA Performance Certifications
CVR2.
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Acknowledgements
PROJECT TEAM
DISCLAIMER
While CompTIA, Inc. takes care to ensure the accuracy and quality of these materials, we cannot
guarantee their accuracy, and all materials are provided without any warranty whatsoever, including, but
not limited to, the implied warranties of merchantability or fitness for a particular purpose. The use of
screenshots, photographs of another entity's products, or another entity's product name or service in this
book is for editorial purposes only. No such use should be construed to imply sponsorship or endorsement
of the book by nor any affiliation of such entity with CompTIA. This courseware may contain links to sites
on the Internet that are owned and operated by third parties (the "External Sites"). CompTIA is not
responsible for the availability of, or the content located on or through, any External Site. Please contact
CompTIA if you have any concerns regarding such links or External Sites.
TRADEMARK NOTICES
CompTIA® and the CompTIA logo are registered trademarks of CompTIA, Inc., in the U.S. and other
countries. All other product and service names used may be common law or registered trademarks of their
respective proprietors.
COPYRIGHT NOTICE
Copyright © 2019 CompTIA, Inc. All rights reserved. Screenshots used for illustrative purposes are the
property of the software proprietor. Except as permitted under the Copyright Act of 1976, no part of this
publication may be reproduced or distributed in any form or by any means, or stored in a database or
retrieval system, without the prior written permission CompTIA, 3500 Lacey Road, Suite 100, Downers
Grove, IL 60515-5439.
This book conveys no rights in the software or other products about which it was written; all use or
licensing of such software or other products is the responsibility of the user according to terms and
conditions of the owner. If you believe that this book, related materials, or any other CompTIA materials
are being reproduced or transmitted without permission, please call 1-866-835-8020 or help.comptia.org.
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Table of Contents Table of Contents
Course Introduction i
Module 1 / Unit 1
Common Computing Devices 3
Module 1 / Unit 2
Using a Workstation 14
Setting up a PC System............................................................................ 15
Ergonomic Concepts ................................................................................ 17
Navigating an OS ..................................................................................... 18
Using Input Devices ................................................................................. 26
Recognizing Desktop Icons ...................................................................... 30
Working with Windows ............................................................................. 31
Module 1 / Unit 3
Using an OS 39
Module 1 / Unit 4
Managing an OS 65
Module 1 / Unit 5
Troubleshooting and Support 85
Module 1 / Summary
Using Computers 105
Module 2 / Unit 1
Using Data Types and Units 109
Module 2 / Unit 2
Using Apps 124
Module 2 / Unit 3
Programming and App Development 144
Module 2 / Unit 4
Using Databases 178
Module 2 / Summary
Using Apps and Databases 205
Page iv
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 3 / Using Computer Hardware 207 Table of Contents
Module 3 / Unit 1
System Components 209
Module 3 / Unit 2
Using Device Interfaces 225
Module 3 / Unit 3
Using Peripheral Devices 249
Module 3 / Unit 4
Using Storage Devices 276
Module 3 / Unit 5
Using File Systems 289
Module 3 / Summary
Using Computer Hardware 325
Page v
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Table of Contents Module 4 / Using Networks 327
Module 4 / Unit 1
Networking Concepts 329
Module 4 / Unit 2
Connecting to a Network 346
Module 4 / Unit 3
Secure Web Browsing 365
Module 4 / Unit 4
Using Shared Storage 386
Module 4 / Unit 5
Using Mobile Devices 410
Module 4 / Summary
Using Networks 421
Page vi
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 5 / Security Concepts 423 Table of Contents
Module 5 / Unit 1
Security Concerns 425
Module 5 / Unit 2
Using Best Practices 437
Module 5 / Unit 3
Using Access Controls 461
Module 5 / Unit 4
Behavioral Security Concepts 477
Module 5 / Summary
Managing Security 485
Glossary 507
Index 531
Page vii
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
About This Course
About This Course
The CompTIA ITF+ exam will certify the successful candidate has the
knowledge and skills required to identify and explain the basics of
computing, IT infrastructure, software development and database use. In
addition, candidates will demonstrate their knowledge to install software,
establish basic network connectivity and identify/prevent basic security risks.
Further, this exam will assess the candidate’s knowledge in the areas of
troubleshooting theory and preventative maintenance of devices. This exam
is intended for candidates who are advanced end users, are considering a
career in IT, and are interested in pursuing professional-level certifications,
such as A+.
This course will prepare you to take the FC0-U61 exam to obtain the ITF+
certification and help you to learn some of the basic principles and techniques
of providing PC, mobile, applications, and network support.
Course Outcomes
This course and the ITF+ certification are designed as the starting point for a
career in IT support. Obtaining ITF+ certification will show that you have the
aptitude to pursue a professional-level certification, such as CompTIA A+.
Completing this course will also help you acquire the knowledge and skills to
set up and use a computer at home securely and keep it in good working order
and to provide informal support for PCs and simple computer networks to your
colleagues in a small business.
■ Explain the functions and types of devices used within a computer system.
Page viii
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Target Audience and Course Prerequisites About This Course
This course is divided into five modules, each covering a different subject
area. Each module is organized into several units, containing related topics for
study.
As you can see, the course modules do not map directly to the CompTIA exam
domains. Instead, we try to present topics and technologies in the order that
will make it easiest for you to understand them. Each module and each unit
starts with a list of the CompTIA domain objectives and content examples that
will be covered so that you can track what you are learning against the original
CompTIA syllabus. Each unit in a module is focused on explaining the exam
objectives and content examples. Each unit has a set of review questions
designed to test your knowledge of the topics covered in the unit.
At the back of the book there is an index to help you look up key terms and
concepts from the course and a glossary of terms and concepts used.
Page ix
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
About This Course The following symbols are used to indicate different features in the course
book:
Icon Meaning
A tip or warning about a feature or topic.
Page x
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Completing the Labs About This Course
Finding a Job
The CompTIA ITF+ certification is a great thing to have to prove to employers
that you know the basics of Information Technology and support, but it is not a
golden ticket into employment. To get a job, you need to know where to look,
how to write an effective resume and application letter, how to prepare for an
interview, and generally how to impress potential employers.
Knowing where to start when looking for a job can be daunting, so the last
section of the course contains a guide to help you research the local job
market, write a resume and application letter, and prepare for an interview.
There's also advice on the next steps you might take in your career in IT
support.
2) After you have studied for the certification, use the "Taking the Exam"
chapter to find tips on booking the test, the format of the exam, and what to
expect. You can also take a free assessment and sample test from
CompTIA at certification.comptia.org/training/practice-questions to get an
idea what type of questions might be on the exam.
4) Select a certification exam provider and schedule a time to take your exam.
You can find exam providers at www.pearsonvue.com/comptia/.
Page xi
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
About This Course Visit CompTIA online at comptia.org to learn more about getting CompTIA
certified.
CompTIA offers a number of credentials that form a foundation for your career
in technology and allow you to pursue specific areas of concentration.
Depending on the path you choose to take, CompTIA certifications help you
build upon your skills and knowledge, supporting learning throughout your
entire career.
Page xii
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Using Computers Using Computers
The following CompTIA ITF+ domain objectives and examples are covered in
this module:
Page 1
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 1
Refer To Domain Objectives/Examples
Unit 1.5 / 1.6 Explain the troubleshooting methodology.
Troubleshooting and Identify the problem (Gather information, Duplicate
Support the problem, if possible, Question users, Identify
symptoms, Determine if anything has changed,
Approach multiple problems individually) •
Research knowledge base/Internet, if applicable •
Establish a theory of probable cause (Question the
obvious, Consider multiple approaches, Divide and
conquer) • Test the theory to determine the cause
(Once the theory is confirmed [confirmed root
cause], determine the next steps to resolve the
problem, If the theory is not confirmed, establish a
new theory or escalate) • Establish a plan of action
to resolve the problem and identify potential effects
• Implement the solution or escalate as necessary
• Verify full system functionality and, if applicable,
implement preventive measures • Document
findings/lessons learned, actions and outcomes
Page 2
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 1 Common Computing
Devices
Objectives
On completion of this unit, you will be able to:
□ 2.6 Compare and contrast common computing devices and their purposes.
Mobile phones • Tablets • Laptops • Workstations • Servers • Gaming
consoles • IoT (Home appliances, Home automation devices, Thermostats,
Security systems, Modern cars, IP cameras, Streaming media devices,
Medical devices)
Page 3
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 1
Information Technology
■ The devices and components that make up a computer system are called
hardware. Many parts are contained within the computer's case. Other
parts are connected to the computer and are referred to as peripheral
devices. Most peripherals allow information to be entered (input) and
retrieved (output).
■ The Central Processing Unit (CPU) retrieves each instruction or data file
from memory and processes it.
■ The CPU then writes the result back to memory and directs other
components to perform actions. For example, it may instruct the display
subsystem to update the image shown to the user or the storage
subsystem to save data to a disk.
Page 5
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 1
Personal Computers (PC)
There are many different types of computer. Some of the first types of
mainframe computers created in the 1960s and 1970s are unrecognizable
from the sorts of desktop and laptop computers you may be familiar with. The
term "Personal Computer" is generally understood to apply to versions of the
IBM PC, developed in 1981. The IBM PC was based on a microprocessor or
Central Processing Unit (CPU) designed by Intel. This is also called the x86
architecture or platform. This type of computer was fundamentally different to
mainframes as it was operated directly by the end user.
PC system showing processing and storage components (within case), input components
(keyboard and mouse), and output components (display, speakers, printer). Image © 123rf.com.
Page 6
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Common Computing
Devices
Sometimes the terms PC, desktop computer, and workstation are
used interchangeably. Quite often however, the term workstation is
used to mean a particularly powerful type of desktop computer.
The advantage of desktops is that the basic design can be modified with higher
or lower specified components and optional features, making a particular
model better suited to different tasks. A workstation-class computer with higher
specification components, such as CPU and system memory, will cost more
but be able to process data faster. The computer's performance is largely
determined by the following factors:
■ The speed of the CPU determines the basic speed of the computer.
■ The capacity of the main storage drive determines how much data can be
stored on the computer when it is switched off.
■ Optional components extend the range of things the computer can do (for
example, a sound card makes it possible to play audio while a webcam
allows sound and video recording).
■ The quality of peripherals such as the display, mouse, and keyboard make
the computer more comfortable to use (this is referred to as ergonomics).
We are simplifying a bit here. In fact, the type and speed of the
main storage drive also has a big impact on system speed. Legacy
hard drives were a serious performance bottleneck, but these are
being replaced by solid state drives, which can work much more
quickly. Storage devices are discussed in more detail in Unit 3.4.
The graphics subsystem is also an important performance factor.
Page 7
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 1 Desktop PCs can also be purchased as "all-in-one" units. All-in-one means that
the computer components (except the keyboard and mouse) are contained
within the monitor case.
All-in-One PC—the system components are all contained within the monitor case. Image ©
123rf.com.
Servers
A server is any computer providing services to other computers, but usually
the term server implies a powerful computer that supports a number of users
simultaneously in a computer network. Most servers use the same type of
components as a desktop. The main difference is that the components are
more powerful and more reliable, and consequently more expensive. If a
desktop PC stops working, a single user may be unable to do their job; if a
server computer stops working, tens or even hundreds of users may not be
able to do their jobs. Consequently, servers need to be very reliable. This is
achieved by specifying high quality components and also by using extra copies
of components for redundancy. This makes a server system fault tolerant.
Server systems are also, usually designed to be easy to expand and upgrade
with additional or improved components. Very often, server computers use a
special type of case designed to fit into a steel rack shelving system.
You should also understand that the term server can refer either to
hardware or software. A hardware server may be running many
software servers and sometimes different types of software servers.
Examples of types of software servers include web servers, email
Page 8 servers, database servers, authentication servers, and so on.
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Laptops Common Computing
Devices
A laptop computer is one that integrates the display, system components, and
input/output devices within a single, portable case (or chassis).
Distinctive features of a laptop computer, including the built-in screen, Integrated keyboard,
touchpad pointer control, and I/O ports (on both sides and rear of chassis). Image © 123rf.com.
■ Input devices—the main input devices are integrated into the case, such
as a built-in keyboard, a touchpad instead of mouse, and/or a touchscreen.
Page 9
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 1 PC and Laptop Vendors
Most companies producing PCs and laptops are referred to as Original
Equipment Manufacturers (OEM). This is because rather than making each
component that goes into a PC, they source components such as CPUs and
RAM modules from manufacturers and put them together as a branded PC
system.
While there are many vendors serving local and special interest markets,
global PC manufacturing is dominated by Dell, Hewlett-Packard (HP)/Compaq,
Lenovo (previously IBM's PC division), Acer, and Huawei with Samsung, Sony,
Toshiba, and Asus also strong in the laptop and hybrid markets. Another
personal computer vendor, Apple, ship Macintosh computers with a different
operating system (Apple Mac OS) and a different hardware platform to the IBM
PC-compatible vendors. There are also chromebooks, laptops built to run
Chrome OS and interface primarily with Google's web apps.
Mobile Devices
Many of the uses of PCs and laptops have been superseded by smaller
personal devices or by specialized devices.
Prior to the Apple iPad, tablet PCs were usually laptops with touchscreens.
The iPad defined a new form factor; smaller than a laptop and with no
Page 10 keyboard. Tablet screens tend to be sized between 7” and 10”.
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Common Computing
Devices
Smartphones sized between the 5" and 7" form factors are often
called phablets.
Many Windows mobile devices adopt a hybrid approach where a laptop can be
converted into a tablet by flipping the screen. Microsoft's Surface Pro tablet is
available with a detachable keyboard, which can also function as a cover for
the screen. Other vendors are also producing "two-in-one" devices that can
function as both a laptop and a tablet.
The main smartphone and tablet vendors are Apple and Samsung. Other
vendors include LG, HTC, Huawei, Motorola/Lenovo, Microsoft, Nokia, Sony,
and Amazon.
Aside from devices easily recognizable as "computers," your home and office
are quite likely populated by other consumer electronics devices connected to
each other and to the Internet. The Internet of Things (IoT) refers to a world
in which many different types of things are embedded with processing and
networking functionality. Processing and networking functionality can be
provisioned by very small chips, so the "things" can range from motor vehicles
and washing machines to clothing and birthday cards.
Home Automation
Pretty much anything from a clock to an alarm system or a refrigerator can be
controlled over the Internet by home automation software, if the appliance or
device is "smart." Often, sitting at the heart of this automation, is a hub to which
other devices connect. Hubs are usually controlled using voice recognition
systems and smartphone apps. Some of the major vendors include Amazon
(Alexa voice recognition), Samsung (S Voice), Apple (Siri), and Logitech (working
with either Alexa or Google Assistant), but there are many others.
One of the critical points in building a "smart" or "digital" home or office solution is
ensuring compatibility between the networking or communications standards
supported by the hub and the appliances. Most devices support ordinary Wi-Fi
standards-based wireless networking, but some may require connectivity
standards designed for low power use, such as Z-Wave, ZigBee, or Bluetooth LE.
There are also sophisticated systems to control the vehicle on behalf of the
driver, including automatic collision detection and avoidance, and parking
assist. Companies are experimenting with fully-automated self-driving or
autonomous vehicles.
Medical Devices
Medical devices represent another class of devices where use of electronics
to remotely monitor and configure the appliance is expanding rapidly. It is
important to recognize that use of these devices is not confined to hospitals
and clinics but includes portable devices such as cardiac monitors/defibrillators
and insulin pumps. These allow doctors and nurses to remotely monitor a
patient and potentially to adjust dosage levels or other settings without the
patient having to visit the care provider.
Gaming Consoles
A gaming console contains many of the same components as a workstation.
Gaming consoles have powerful CPUs and graphics processors, plus Ethernet
and Wi-Fi for wired and wireless home networking and Internet connectivity.
Web cameras and microphones are also available as peripherals. The main
difference to a workstation is that a console is designed to be operated by a
gaming pad rather than a keyboard and mouse, though these are often also
available as options. A gaming console would use an HD (High Definition) TV
for a display.
There are also handheld game consoles, such as Nintendo's 3DS and Switch,
and Sony's Vita. These come with Wi-Fi to connect to the Internet or to other
consoles.
Page 12
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Common Computing
Devices
1) True or false? All types of computers use CPU and system memory.
3) What type of computer is best suited for using in a job where you have to
make notes and be able to move around easily?
6) What type(s) of IoT appliance are less likely to be controlled via a home
automation hub?
Page 13
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 2
Module 1 / Unit 2
Using a Workstation
Objectives
On completion of this unit, you will be able to:
□ Set up a computer system with regard for safety and healthy working
practices.
Page 14
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Setting up a PC System Using a Workstation
When you install a computer system, you need to consider the following:
■ Is the environment suitable for the computer? Dust, dirt, heat (or extreme
cold), and dampness can be very damaging to computers.
■ Is the installation safe for yourself and passers-by? The main risks
associated with computer equipment are electrical and trip hazards.
1) If the computer has just been delivered, check the contents of the box, read
the instruction manual, and allow at least 30–60 minutes for the
components to adjust to room temperature. There is a slight risk from
condensation if you unpack a computer and start it immediately.
2) Read the manufacturer's setup and safety guidelines and plan the
installation of the computer to comply with them.
3) Position the monitor and system unit so that cables can be tucked away
neatly and do not cross any walkways. When lifting a heavy object such as
a monitor, take care to protect your back. Ensure that any object placed on
a desk is not at risk of toppling.
4) Ensure there is adequate air flow around the monitor, system unit, and
larger peripherals, such as a printer or scanner.
5) Check that the screen is not exposed to excessive glare from windows or
lighting and that equipment is not in direct sunlight.
6) Adjust the monitor, chair, and position of the mouse and keyboard so that
the user can sit and type comfortably.
Page 15
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 2
Built-in cable management such as on this flat-panel monitor make it less likely trailing wires will
cause an accident.
You will learn how to identify ports and connectors in Unit 3.2.
8) Connect the power cables from the monitor, system unit, and any
peripherals to electrical outlets, again checking that the cables are
undamaged and the plugs are fitted with fuses of the correct rating. Ensure
that the electrical outlets are not overloaded.
9) Switch on any peripherals connected to the computer that you want to use
then switch on the system unit.
You start a computer by pressing the power switch, which will be marked by
the following symbol: . If the computer does not start, check that a power
cable connects the back of the computer to a wall socket and that the socket is
switched on.
Setting up a Laptop
You should follow the same basic principles when using a laptop for the first
time. Read the instruction manual and let the system acclimatize if it has just
been delivered. You will probably have to insert the battery pack, which should
clip into a slot on the underside of the laptop. When you use the laptop for the
first time, you will probably have to connect it to the building power supply
using the supplied AC adapter to charge the battery.
Obviously, you can use a laptop without connecting any peripherals, unlike a
desktop computer, but there may be some optional components to plug in.
When you have set up the laptop as explained in the documentation, use the
catch on the lid to open it. Press the power switch or key with the symbol
and wait for the laptop to start.
Page 16
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Ergonomic Concepts Using a Workstation
RSI has been linked with the use of keyboards and mice. When you use a
mouse, keep your wrist straight and rest your palm on the body of the mouse.
When using a keyboard, keep your forearms parallel with the keyboard. It will
help if you learn to touch-type. With both devices, avoid working with your
wrists bent, do not hunch your shoulders or bend forward, and take frequent
breaks, to stretch or walk around for instance.
You should be able to sit up straight with the top of the monitor at or slightly
below eye level. You should be able to rest your feet flat on the floor
comfortably and your thighs should be parallel with the floor. You should be
able to hold your forearms level with the desk.
As you work, try to avoid hunching your shoulders forward and remember to
take frequent breaks to stretch your arms and legs.
Page 17
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 2
Position the monitor so that you can sit up straight. Photo by Samule Sun on Unsplash.
If you need to type a lot of text from a source document, use a copyholder to
position the source text at eye-level rather than flat on the desk.
For more detailed advice, read HP's Safety & Comfort Guide at
hp.com/ergo.
Navigating an OS
One of the first set of tasks to master is to be able to sign in to Windows, start
applications, and use the features of the desktop.
Page 18
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Signing in to Windows Using a Workstation
Some text or a logo may be displayed on-screen while the computer starts up
("boots"). The computer performs a Power-On Self-Test (POST) to check that
the main components work and then loads Windows. After a minute or so, a
screen prompting you to sign in to the computer is displayed.
A sign in means that changes you make to the desktop are saved as your own
personal settings. It may also give you access to resources on a computer
network. At work, you will be given a sign in ID (a user name and password)
by your IT Department. At home you will create user accounts for yourself and
your family. Signing in using a password that only you know means that you
are authenticated as the valid owner of the computer account.
1) When Windows 10 has loaded, the Lock Screen is displayed. Press a key,
click the mouse, or (if you have a touchscreen) swipe to open the sign in
prompt.
Windows 10 lock screen—press a key or click with the mouse to start sign in. Screenshot used
with permission from Microsoft.
Page 19
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 2 2) The sign in prompt displays the last user account that accessed the
machine. If necessary, click the icon representing your account on the left
of the display.
Windows sign in screen. Enter a password or click the appropriate user icon to sign in with a
different account. Each account is represented by its own name and, optionally, a picture.
Screenshot used with permission from Microsoft.
3) With your user name shown, type your password into the box.
What you type will be shown as black dots so that no one else can see
your password. Note that the password is case-sensitive.
4) Point to the arrow button then click once (or press ENTER).
Windows will start and, after a few seconds, the desktop is shown.
Page 20
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Using the Desktop and Taskbar Using a Workstation
The desktop contains several tools to help you start and switch between
software applications. The desktop itself can contain shortcut icons used to
open applications, folders, and files.
Windows 10 desktop showing 1) Shortcut icon; 2) Start button; 3) Start Screen with apps and tiles;
4) Programs pinned to the taskbar; 5) Notification area. Screenshot used with permission from
Microsoft.
When you run applications, each program appears as an icon on the taskbar.
You can click the icons to switch between windows. Alternatively, hold the ALT
key then press TAB to cycle through the windows or on a touch-enabled
screen, swipe from the left edge. You can also click the Task View button
to list running programs. This is located to the right of the search box
on the taskbar.
Page 21
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 2 Each icon has a shortcut menu, allowing you to close the program or access
recently used documents. Pointing at an icon shows a preview of any open
windows, which you can select by clicking. Right-clicking an icon exposes a
context menu which you can use to perform functions that relate to that icon.
For example, right-clicking the icon for Microsoft Word exposes pinned and
recently opened document files.
The taskbar also contains "pinned" icons for frequently used programs, such
as email and web browser. Pinned items always remain on the taskbar. A
program with open windows is shown with a highlight. You can add, remove, or
reposition pinned items by dragging and dropping.
Notification area in Windows 10. Screenshot used with permission from Microsoft.
The Notification Area on the right-hand side of the taskbar displays the
current time and icons for programs that run without a window, such as anti-
virus software, the volume control, battery meter, network status, and so on.
These icons have shortcut menus for enabling, disabling, and configuring the
related application or setting. You can configure what displays in the
notification area and also control application notification settings.
Page 22
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Using the Start Screen Using a Workstation
The Start Screen in Windows 10, or Start Menu in earlier versions, is used to
manage apps and PC settings and launch desktop software applications. It is
accessed by clicking the Start button on the left-hand side of the taskbar or by
Windows 10 Start Screen in Tablet mode. Screenshot used with permission from Microsoft.
To display all applications in tablet mode, click the All apps icon on the upper
left of the display. In desktop mode, all applications are displayed in Start on
the left side without intervention by the user.
Page 23
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 2
Viewing installed apps from the Start Screen in Windows 10 in tablet mode. Screenshot used with
permission from Microsoft.
Apps are installed and managed by using the Microsoft Store app.
Desktop software programs are managed with Control Panel. See
Unit 2.2 for more information about different types of software.
Any app, program, or file can be launched from the Start Screen by typing its
name and selecting the icon from the list of search results. The Search box is
on the taskbar next to Start.
Launching applications by using search. Screenshot used with permission from Microsoft.
Page 24
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Customizing the Start Screen and Taskbar Using a Workstation
You can configure the look and behavior of the tiles showing in Start. Select
Start > All Apps, right-click the application you want to configure, and select
Pin to Start. After a tile is pinned, you can configure it. Right-click the tile and
then choose from the following options:
■ Uninstall.
■ More (for Microsoft Store apps)—select from Turn Live Tile Off, Pin to
taskbar, Rate and review, Share.
Once you have pinned and configured your tiles on Start, you can group the
tiles. If you want to create a new group for your tiles, drag one of the tiles to an
unused area. Drag additional tiles to the new group. You can drag tiles
between groups if you want to move them. Hover your mouse above the new
group of tiles and type a name for your group.
Page 25
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 2 You can set options for how the taskbar and Start Menu are displayed. Select
Start > Settings > Personalization, and click Start or Taskbar as required.
To operate a PC, you need to be familiar with the operation of input devices,
such as a mouse, keyboard, and touchscreen.
■ To select an object such as an icon, point to it with the cursor then click the
main mouse button once. To open an object, double-click it with the main
mouse button.
You can configure the main mouse button as either the left or right
button depending on whether you are right- or left-handed. See
Unit 3.2 for notes on configuring mouse properties.
Page 26
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Using a Workstation
A touchpad will come with buttons and may also support tapping
the surface of the pad to perform a mouse click.
■ To select the shortcut menu for an object, point the cursor at it then click
with the second mouse button (right-click).
Laptop touchpad—note the scroll areas and left and right buttons. Image © 123rf.com.
■ To move an icon or window, point to it and hold down the main mouse
button. Move the mouse to the target then release the button. This process
is called Drag and Drop.
■ To scroll within a window, rotate the scroll wheel or drag your finger in the
marked scroll area of the touchpad.
Page 27
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 2 Using a Keyboard
The keyboard is used for simple typing and also to issue commands.
Ideally, you should learn to touch type. This will make operating the computer
more comfortable and efficient. To touch type, you use the A to F and J to ;
keys as a "base" for your fingers. Once you have learned the position of the
other keys, you can reach for them without looking. For example, you use the
little finger on your left hand to press Q then return it to rest on A.
Most keyboards designed for use with Latin scripts use the
QWERTY key layout. There are different layouts though, such as
the small differences between US and UK layouts, the Dvorak
alternative layout for Latin script, and keyboards for different
scripts, such as Cyrillic. It is important that the keyboard type is set
correctly in the OS. See Unit 3.2 for notes on configuring keyboard
properties.
■ ENTER (or RETURN) is usually used to confirm a command. ESC can often
be used to cancel a command.
■ CTRL and ALT are often used with other keys to activate a special command.
The ALT key also activates an application's menu. You can navigate menus
using the underlined access keys or using the ARROW keys.
Menus in Windows 10 are not shown until you press the ALT key.
Most other software applications show the menu all the time.
Page 28
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
■ TAB can be used in a Using a Workstation
window to move to the
next pane. SHIFT+TAB
moves back. Use the
ARROW keys and the PAGE
UP / DOWN, HOME, and END
to navigate between icons
or within a text file.
■ When NUM LOCK is off, the keypad works like the ARROW keys; when it is
on, the keypad works like a calculator keypad.
■ Press START to display the Start Screen or Start Menu and enable Instant
Search. Press SHORTCUT to display a context menu for the selected object.
■ The function keys (F1, F2, and so on) perform special actions (for example,
F1 always activates the help file for an application).
Using a Touchscreen
Most portable devices can be operated using a touchscreen. Touchscreen
input is made by performing gestures or using the on-screen keyboard.
Some of the basic Windows 10 gestures are as follows:
You need to be familiar with some of the standard types of objects and
interface controls you see on-screen.
Icons are the pictures used in an operating system to represent folders, files,
and other system objects. The main types of icons are as follows:
In Windows, shortcuts to all your programs are located in the Start Menu or
Start Screen. Programs may also put shortcuts on the desktop, and you
can add desktop shortcuts to files or folders that you use often.
Page 30
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Using a Workstation
Hard Disk, Blu-Ray/DVD Drive, and Printer icons. Screenshot used with permission from
Microsoft.
Every desktop application runs in a window. You can open multiple windows
and switch between them. All windows share some basic features in common.
Some windows are split into multiple panes; click or press TAB and
SHIFT+TAB to navigate between them. If the window is not large enough to
display its contents, a scroll bar is shown. Click the arrows or click the button
on the scroll bar to move it (or use the scroll wheel on the mouse).
The application controls are displayed as toolbars and/or a menu bar at the top
of the window.
The Status bar shows useful information about whatever is selected in the rest
of the window. When selecting files, you can enter information about the file
here.
Page 31
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 2 A window can either fill the whole desktop or occupy a part of it. This is done
by clicking the Maximize /Restore button. To resize a window, you
can click-and-drag on the window's border. To move a window, click-and-drag
the title bar. Right-clicking the taskbar gives you options for arranging windows
in a single pattern.
The Minimize button hides the window from the desktop. You can re-
activate it by clicking its taskbar icon. You can also use the taskbar to switch
between windows.
Typical window layout with 1) Title bar; 2) Control icons; 3) Menu bar and toolbars; 4) Panes;
5) Scroll bars. Screenshot used with permission from Microsoft.
You can work with several programs at the same time, but you should note that
each program takes up memory. If you open too many windows, your
computer will slow down. If you have finished using a program, close the
window to free up resources.
To close a window, either select Close or Exit from the File menu, click the
Page 32
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Using a Workstation
3) What factors should you consider when positioning input and output
devices?
5) You have to open a word processing application but you cannot see an
icon on the desktop. What should you do?
6) Your colleague has to run many applications at the same time and finds it
difficult to know which icon to choose when switching between them. What
alternative method could you suggest?
7) Your colleague is using a laptop and you notice that he laboriously clicks
the mouse repeatedly to scroll through the document you are co-editing.
What technique could he use to be more productive?
Page 33
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 2
1) Read the PC's instruction manual and make sure the contents listed on the
box are all present.
2) Put the system unit on the desk or floor—remember the following points:
○ Close enough to your desk so that cables for the mouse and keyboard
are not stretched.
3) Position the monitor on your desk and adjust it and your chair so that the
top of the screen is level with your eyes.
4) Connect the monitor to the port on the system unit, using the connector as
shown in your system documentation.
5) Connect the mouse and keyboard to the ports on the system unit, using the
connector as shown in your system documentation.
6) Try to keep the cables tidy so that they do not trail under your desk or cross
walkways.
7) Plug the monitor into a building power outlet or into the power socket on
the system unit (check the system documentation to find out how the
monitor is powered).
8) Plug the power cable into the back of the system unit and then into the
building power. Turn on the building power wall switch.
9) Press the power switch on the monitor then the power switch on the PC.
10) Wait for the computer to start ("boot"). As the PC powers up, listen and
look for the following signs that the computer is operating normally:
○ Single short beep (most computers these days do not beep though)
○ Hard disk activity (LED flickers and there may be some soft noise
[grinding or clicking indicates a problem])
Page 34
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Using a Workstation
1) Press a key to open the privacy shade then, if necessary, click the icon
representing your computer account.
2) With your account name and picture showing, type your password.
Remember that this is case-sensitive, so upper and lower case characters
are treated as different.
3) Press ENTER or click the arrow button . Wait for the desktop to load.
4) Point to the Start button and click once to show the Start Screen
menu.
6) At the top of the Start Screen on the left-hand side, click All Apps
then locate and click the Tips tile.
9) Back on the main part of the Start Screen practice customizing the tile
layout:
10) From the Start Screen, if you have a touchscreen, swipe from the right
edge to view Notifications. Otherwise, click Notifications on the taskbar.
14) Click Start, click Settings and then click Personalization. You can make
any changes you want to the pictures and colors used on the desktop.
2) Open the Photos tile. If prompted to add a Microsoft account, click the
Close button to cancel the dialog.
3) Click Start and then type paint, then click the icon that appears in the
search results. This loads the Paint application. This is an example of a
desktop application.
5) When you have created a picture, click the File menu on the ribbon once.
Move the mouse down the menu to point to the Save command and click
once.
6) Enter a file name of The Sea, double-click the Pictures folder, and then
click the Save button.
7) Press the keys START+E together (hold down START and press E then
release both at the same time). This should open a File Explorer window.
8) Double-click the Pictures folder to view the file where you saved it.
There are various ways to switch between windows when you have more
than one open. We’ll take a look at each of these methods.
9) Look at the taskbar—you should see underlined icons for the three
windows you have open. Note the difference between open windows and
icons that have been "pinned" to the taskbar but that aren't currently
running. Also, the active (currently selected) window is shown with a
highlight.
10) Click the icons to switch between the windows. Right-click the icons to
observe their shortcut menus (do not select anything from the menus
though).
Page 36
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
11) Try using the ALT+TAB keyboard shortcut. Hold down the ALT key then Using a Workstation
press-and-release TAB. This shows a list of open desktop windows and
Start Screen apps. Still holding ALT, press TAB again and keep pressing it
to cycle through the icons until you have found one you want to look at.
Release the ALT key to open the selected app or window.
Using Alt+Tab to switch between windows. Screenshot used with permission from Microsoft.
12) Press START+TAB or click the taskbar icon to open Task View.
Alternatively, if you have a touchscreen, you can swipe from the left edge.
Task View shows previews of all open windows, whether they are
minimized or not. You can also use Task View to configure multiple
desktops, but we won't explore that feature here. In Windows 10 (1803),
you'll also see a timeline of previously used apps. You can choose to sync
this with other devices, via a Microsoft account.
14) Press START+D or click the empty space on the taskbar to the right of the
date and time to minimize all windows. You can also use START+D to
return to the desktop from the Start Screen quickly.
15) Press START+D to show all the windows again then practice using the
window control icons to maximize, restore, and minimize them.
○ Using its title bar, drag the File Explorer window to the left edge. Select
the Paint window to display alongside it.
○ Drag the Paint window out of its current position and then to the top of
the screen to maximize it.
○ Drag the Paint window back to the middle of the screen to restore the
window size then use the window borders to resize it manually.
○ Drag the title bar on the Paint window then shake the window to
minimize all other windows. Shake again to restore them. Page 37
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 2 17) Close all the open windows using either the button or by pressing ALT+F4.
You can close minimized windows from the taskbar by right-clicking and
selecting Close window.
18) Point to each of the icons in the Notification Area in turn. A ScreenTip will
be displayed to identify each one.
19) Right-click an empty part of the taskbar and select Taskbar settings. This
opens a dialog to configure the taskbar.
When you have finished using the computer, you should shut it down.
23) Open the Start Screen, click the Power icon in the bottom-left. Select
Shut down from the submenu.
Page 38
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 3 Using an OS
Using an OS
Objectives
On completion of this unit, you will be able to:
Page 39
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 3
Functions of an Operating System
Consequently, an OS may have more than one shell. For example, it might
have a graphical shell, allowing users to select commands via icons and
menus, and it might have a command line shell, allowing the user to access
functions by typing commands.
A shell will allow the user to configure the computer hardware, install and
manage software applications, and access programs and files.
A computer with a 64-bit CPU can run either 64-bit operating systems and 64-
bit and/or 32-bit applications or a 32-bit operating system and 32-bit
applications. A computer with a 32-bit CPU cannot run 64-bit OS or
applications software at all.
Page 40
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
An OS provides a common environment within which different software Using an OS
applications can run. Application software is the programs that allow users to
perform different tasks, such as web browsing, email, and word processing.
With an OS, application software developers do not need to worry about
writing routines to access the hard disk or send a document to a printer; they
simply "call" functions of the OS that allow them to do these things.
Data Management
Another class of utility software provides an interface between the user and the
storage devices and mechanisms available to the computer. In a computer,
information is stored as files. There are many different types of files. The OS
and software applications are made up of executable and configuration files.
Users can also create data files in different formats using different software
applications.
Files must be saved to some sort of persistent storage, such as a hard disk.
To organize files on a storage device, the OS creates a directory (or folder)
structure. Files are saved to the storage device within a particular directory.
Operating systems may also provide tools for the user to manage directories,
allowing them to create directories and move or copy files between them.
Page 41
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 3
Types of Operating System
While they share the same basic functions, there are many different types of
operating systems. These support different commercial models and types of
devices.
Page 42
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Open source means that the programming code used to design the software Using an OS
is freely available. Open source doesn't necessarily mean available for free
(although many distributions are); it means that developers are free to make
changes to the way the operating system works, so long as they make the
changes they have made available in turn. Some software vendors are
reluctant to make their source code available to third parties fearing piracy,
infringement of copyright, and loss of market position. This means that users of
these systems must wait for the vendor to make the modifications they need, if
they make them at all. The open source model claims to make improvements
to software available more quickly and cost-effectively.
UNIX, Linux, and Android are examples of open source operating systems.
Embedded OS
With a workstation, laptop, or server, you can delete the operating system and
install a different one. These are general purpose types of computer systems
capable of running software to perform a variety of different tasks. An
embedded system by contrast is a computer or appliance designed for a very
specific function. These systems can be as contained as a microcontroller in
an intravenous drip-rate meter or as large and complex as an industrial control
system managing a water treatment plant.
You could also think of home automation hubs, smart TVs, and
gaming consoles as running an embedded OS in that the OS that
ships with the device cannot usually be changed. These devices do
have more scope for modification than the more industrial
embedded systems though. You can install apps and games, add
peripheral devices, and configure network connectivity for instance.
Many embedded systems operate devices, such as drip meters or flow valves,
that perform acutely time-sensitive tasks. The kernels or operating systems
that run these devices must be much more stable and reliable than the OS that
runs a desktop computer or server. Embedded systems typically cannot
tolerate reboots or crashes and must have response times that are predictable
to within microsecond tolerances. Consequently, these systems often use
differently engineered platforms called Real Time Operating Systems
(RTOS).
Page 43
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 3 Firmware
In an embedded system, the embedded OS acts as firmware. It provides all
the functions for interacting with the device hardware. The term "firmware" is
used because unlike regular software, the firmware is not designed to be
continually changed. Firmware can support updates, but such updates or
configuration changes are supposed to be infrequent.
Virtualization
For most of the history of the microcomputer, a single computer has been able
to run a single operating system at any one time. This makes multiple
applications available on that computer (whether it be a workstation or server),
but the applications must all share a common environment. Virtualization
means that multiple operating systems can be installed and run simultaneously
on a single computer.
The hypervisor determines the resources allocated to a virtual machine. Screenshot used with
permission from Microsoft.
Page 45
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 3
Microsoft Windows
Like most software, Windows and Windows Server have been released in a
number of versions over the years. Historically, a new version would have to
be purchased, though upgrade discounts are usually available. A new version
may introduce significant changes in the look of Windows and add new
features and support for new types of hardware. On the downside, a new
version may not be compatible with hardware and software applications
designed for earlier versions.
Windows 10
Windows 10, first released in 2015, is the current version. In fact, Microsoft
indicated that they would no longer release new versions of Windows, but
would instead maintain Windows 10 with feature updates on a periodic basis.
Thus, the current version of Windows (at the time of writing) is still Windows
10. This approach is known as “Windows as a service” and promises continued
updates to the operating system.
Feature updates for Windows 10 are identified with a name and number. For
example, in July 2016, Microsoft released a Windows 10 feature update called
Windows 10 Anniversary Update. This release was identified with a number:
1607. This number corresponds to the year and month of release. Therefore,
the full name of the current version of Windows 10 at the time of writing (June
2018) is Windows 10 Spring Creators Update (1803), replacing the Fall
Page 46 Creators Update (1709).
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
In addition to feature updates, Windows is updated periodically with quality Using an OS
updates. Quality updates do not usually make radical changes to Windows,
though some do include new features. Quality updates might sometimes cause
compatibility problems with some hardware devices and software applications,
but this is less likely than with feature updates.
Page 47
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 3 Windows Editions
Each version of Windows is available in different editions. Editions are used
by Microsoft to create different markets for Windows. Windows 7 editions
included Home Basic, Home Premium, Professional, Enterprise, and Ultimate.
Windows 10 is available in the following editions:
64-bit Windows
Each version and edition of Windows is available as 32-bit or 64-bit (x64)
software. 64-bit editions of Windows can run most 32-bit applications software,
though there may be some exceptions (you should check with the software
vendor). The reverse is not true however; a 32-bit version of Windows cannot
run 64-bit applications software.
Windows 10 Mobile
Microsoft has developed versions of Windows for mobile devices, including
Windows CE, Windows Phone 7, and Windows Phone 8. None of these have
enjoyed the same sort of success as Windows has in the PC market.
Page 48
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Apple macOS and iOS Using an OS
In 1984, when the IBM PC was the dominant desktop standard, Steve Jobs
and Steve Wozniak created a new type of personal computer—the Apple
Macintosh (or Mac). It was revolutionary because it came with a graphical user
interface at a time when IBM's PC used the command-line DOS operating
system. The Mac has never matched Windows' huge user base, although its
current incarnation does have a truly devoted following.
macOS desktop.
Page 49
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 3 Apple iOS
iOS is the operating system for Apple's iPhone smartphone and iPad tablet.
New versions are released approximately every year with various .x updates.
Version 11 is current at time of writing with version 12 due for release shortly.
Apple makes new versions freely available, though older hardware devices
may not support all the features of a new version, or may not be supported at
all. While also derived from UNIX (through macOS), iOS is a closed source
operating system. This means that the code used to design the software is
kept confidential and can only be modified by Apple.
The interface is then entirely controlled via touch. Point to icons to open apps,
swipe or flick from left-to-right to access the keyboard and search, or flick right-
to-left to view more icons. Re-arrange icons by tapping and holding for a few
seconds. The icons will then "wobble" and can be dragged to a different page
Page 50 or into the dock taskbar at the bottom. Press the Home key to save.
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
To view and manage open apps, double-click the Home key to open the Using an OS
Multitasking bar.
Touch can be operated either with your fingers or with a special soft-touch
stylus. There are many more gestures in addition to those listed above. For
example, shaking the device is often used to activate undo. There are also
external keyboards available and most Apple devices support Siri, a voice
recognition system and personal assistant.
Ubuntu Linux.
Linux can be used as a desktop or server OS. There are many distributions
or distros, notably SUSE, Red Hat, Fedora, Debian, Ubuntu, and Mint. Each
distro adds specific packages and interfaces to the generic Linux Kernel and
provides different support options. Linux does not require a graphical interface,
though most distributions provide one.
Page 51
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 3 IBM, Sun/Oracle, and Novell are among the vendors producing end-user
applications for Linux. As a desktop OS it tends to be used in schools and
universities more than in business or in the home. As a server OS, it is very
widely deployed on web servers.
Chrome OS
Chrome OS is derived from Linux, via an open source OS called Chromium.
Chrome OS itself is proprietary. Chrome OS is developed by Google to run on
specific laptop (Chromebook) and PC (Chromebox) hardware. This hardware
is designed for the budget market.
There are also "packaged" apps available for use offline and Chrome OS can
run apps developed for Android.
Android
Android is a smartphone/tablet OS
developed by the Open Handset
Alliance, primarily driven by Google.
Unlike iOS it is an open-source OS,
based on Linux. The software code
is made publicly available
(source.android.com). This means
that there is more scope for
hardware vendors, such as Acer,
Asus, HTC, Huawei, LG, Motorola,
OnePlus, Oppo, Samsung, Sony,
and Xiamoi to produce vendor-
specific versions.
Page 52
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
File Explorer Using an OS
Once you have learned how to use icons and windows, another crucial step in
learning to use an operating system is being able to navigate around the file
system.
You can open an Explorer window by selecting its taskbar icon . You
can also right-click any folder object and select Explore or you can press
START+E.
File Explorer in Windows 10. Screenshot used with permission from Microsoft.
Page 53
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 3 This PC
The This PC represents the local PC. When you open This PC, you
get an Explorer window showing the local, removable, and network drives
available to the PC.
The This PC object also allows you to change configuration settings by right-
clicking it and selecting Properties (to access System properties) or Manage
(to access the default Computer Management console).
Network
The Network object is a container for any network servers that the
computer is connected to. A server is a computer that can make folders or
printers available to other computers.
The Properties shortcut menu option for Network opens the Network and
Sharing Center, which you can use to view the status of network links and
configure options for sharing folders.
Browsing the network using File Explorer—you can see other computers plus a networked
printer/scanner and a router (network infrastructure). Screenshot used with permission from
Microsoft.
Page 54
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Windows Settings and Control Panel Using an OS
As well as navigating the file system, you should also understand the tools
used to configure settings and features in an operating system.
Windows Settings
Windows Settings is a touchscreen-enabled "app" interface for managing the
computer. Most of the standard Windows 10 configuration settings can be
located within Windows Settings but not all of them.
Control Panel
Control Panel in Windows 10 version 1803 showing 1) Navigation breadcrumb; 2) Task groups; 3)
Configuration applets; 4) Search box; 5) View options. Screenshot used with permission from
Microsoft.
In Control Panel, the default view displays a task-based list of the most
commonly-used Control Panel options. You can also display all Control Panel
applets by clicking the arrow in the navigation breadcrumb, changing the View
by option, or by using the Search box to find a particular item.
Page 56
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Using an OS
Use the Ease of Access Center in Windows to set up accessibility options. Screenshot used with
permission from Microsoft.
Two browsers are shipped with Windows 10: Microsoft Edge and Internet
Explorer. Generally, it is recommended that you use Microsoft Edge; this
provides a consistent browser experience across devices because Microsoft
provides Microsoft Edge for other platforms, including Android and iOS.
Internet Explorer is provided for backwards compatibility for certain website
functions important for users in large, enterprise networks.
You can also install and use a third-party browser. Mozilla Firefox
(www.mozilla.org/en-US/firefox/new/) and Google Chrome
(www.google.com/chrome/) are popular, but there are many others.
Apple iOS and macOS ship with the Safari browser.
To open a page, you just open the browser icon located on the taskbar
then enter the page's address into the address bar. You can open several
pages at the same time by clicking the tab icon. Alternatively, press CTRL+T to
open a new tab. You can press CTRL+TAB to cycle through open tabs.
Edge browser window showing 1) Navigation buttons and address bar; 2) Tabs; 3) Site navigation
menu. Screenshot used with permission from Microsoft.
Page 58
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
URLs, Websites, and Hyperlinks Using an OS
You do not need to type the http:// part of the URL, but when
the page opens, the full URL is shown in the address bar. A web
browser will always interpret the http:// bit for you. In fact, you can
often leave off "www" as well. For example, entering
comptia.org would get you to the same place as
www.comptia.org.
A hyperlink appears either as text or as a picture. When you point the cursor at
a hyperlink, it appears as a pointing finger .
When you open a link, it may open in the same tab, in a different tab, or in a
new browser window. The web designer sets the default action, but you can
choose how to open any link by right-clicking it then selecting from the shortcut
menu.
Page 59
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 3 Using Browser Controls
A web browser has a number of tools to help you visit pages you have been to
previously.
■ Back (BACKSPACE)—visit the page you just left. If you click the arrow
on the button, you can select from a list of pages you have visited before.
A browser stores pages you have visited in its cache and uses the
cached pages to save time. If you suspect a page is out of date,
use Refresh to update it. If it still seems out-of-date, press
CTRL+F5. This forces the browser to ignore the cached files.
■ Address bar—if you click the arrow on the address bar, you can select
from the AutoComplete list of sites you have entered previously.
Page 60
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Setting the Home Page Using an OS
The home page of a website is the default page that opens when you enter the
site's simplest URL: comptia.com or microsoft.com for example. It acts like a
front door for the site. Your home page is the page that Microsoft Edge
displays when it is started. You can choose any address you like for your home
page (or choose more than one home page and open multiple tabs by default
when the browser starts).
Setting the home page through the Settings menu. Screenshot used with permission from
Microsoft.
To set the home page, click the ellipse button and select Settings.
From the Open Microsoft Edge with list box, select A specific page or
pages. In the "Enter a URL" box, type the URL to your homepage, and then
click Save.
Open your home page by clicking the Home button (or press ALT+HOME).
Page 61
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 3
6) You have to open a file located on a network server. What should be your
first step?
8) What key combination can you use to force the browser to ignore any
locally cached files when refreshing a page?
Page 62
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Using an OS
Windows 10 provides two web browsers: Microsoft Edge and Microsoft Internet
Explorer.
1) Start the computer and sign in. Then, if necessary, show the desktop
(START+D).
2) Click the Microsoft Edge icon on the taskbar to start the browser.
Notice that when you open the page the full URL
https://www.comptia.org/ is displayed in the address bar.
4) Spend a couple of minutes browsing the site. Try all of the following:
○ Following text and picture hyperlinks to other pages within the same
site.
5) Point to the new tab icon and click it. This opens a new tab. Tabbed
browsing makes it easier to view multiple pages at the same time. In the
address bar, type msn.com and press ENTER.
Page 63
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 3
9) Click the More Actions ellipse icon and then click Settings.
10) Click View advanced settings. You can configure a number of options
and control the way Microsoft Edge handles new tabs and website
browsing and security options.
11) Close Microsoft Edge and when prompted, click Close all.
13) Right-click Internet Explorer, point to More, and then click Pin to taskbar.
15) Click the Tools icon and then click Internet Options.
16) In the Internet Options dialog box, click through the available tabs
(General, Security, Privacy, Content, Connections, Programs, and
Advanced). View the available options and then click Cancel.
17) To configure a preferred browser, click Start and then click Settings.
18) Click Apps, and then, on the Default apps tab, under the Web browser
heading, click and select Internet Explorer. If prompted, click Switch
anyway.
19) To default to Microsoft Edge, under Web browser, click and select
Microsoft Edge. Close Settings.
20) Optionally, shut down your computer if you are not continuing to use it after
this lab.
Page 64
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 4 Managing an OS
Managing an OS
Objectives
On completion of this unit, you will be able to:
Page 65
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 4
Management Interfaces
The default Computer Management console with the configuration snap-ins shown on the left.
Screenshot used with permission from Microsoft.
Registry Editor—most configuration changes are stored as values in the Registry database.
Screenshot used with permission from Microsoft.
Page 66
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
■ Registry Editor (regedit)—when you change a setting via a management Managing an OS
interface, you are usually changing something stored in the Windows
Registry configuration database. The Registry Editor is a means of directly
editing this database.
We will not go into detail in this course, but in Linux all configuration is
performed by modifying text files. This can be done directly in a text editor,
such as vi or nano, but many Linux distributions include graphical tools and
system commands to assist with the process of making the underlying
changes.
Task Manager
The Task Manager utility (taskmgr) allows the user to shut down processes
that are not responding. An ordinary user can end unresponsive applications,
but administrative rights are required to end processes that were started by the
system rather than the signed in user. This protects the system as things like
malware cannot disable anti-virus software. In addition to this functionality,
Task Manager can be used to monitor the PC's key resources.
Page 67
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 4
Using Task Manger to end a process. Screenshot used with permission from Microsoft.
Service Management
A service is a Windows process that does not require any sort of user
interaction and thus runs in the background (without a window). Services
provide functionality for many parts of the Windows OS, such as allowing sign
in, browsing the network, or indexing file details to optimize searches. Services
may be installed by Windows and by other applications, such as anti-virus,
database, or backup software.
You can use the Services snap-in to check which services are running and to
start and stop each service or configure its properties, such as whether it starts
automatically at system boot time.
Page 68
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Managing an OS
Managing services using the Computer Management console. Screenshot used with permission
from Microsoft.
Task Scheduler
As noted above, a process (whether it is interactive or a background service)
can be started either manually by the user or automatically by the operating
system. In Windows, Task Scheduler, as its name suggests, sets tasks to run
at a particular time. Tasks can be run once at a future date or time or according
to a recurring schedule. A task can be a simple application process (including
switches if necessary) or a batch file or script. Task Scheduler is accessed via
its own console and can also be found in the Computer Management console.
As the CPU only has a limited amount of storage space in which to store
instructions, it has to work with other storage components. The two main types
of these are system memory and mass storage (or fixed disk storage).
■ Mass storage—to preserve data when the system is turned off, it is written
as files to a mass storage device. Every PC comes with at least one such
fixed disk. The fixed disk will either be a hard disk or a Solid-State Drive
(SSD).
Memory Management
When a process executes, it takes up space in system memory. If the system
runs out of memory, then processes will be unable to start, and running
processes may crash because they cannot load the data they need.
Using Task Manager to check system memory usage. Screenshot used with permission from
Microsoft.
Page 70
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Managing an OS
Using Task Manager to check how much memory a process is using. In this example each
browser (Firefox) tab has its own memory space—you can see that some web pages use more
memory than others! Screenshot used with permission from Microsoft.
Virtual Memory/Pagefile
There are situations where the OS loads more data than can fit within the
amount of system memory modules installed. The OS can use the fixed disk to
supplement RAM by paging it to the disk. This is called a pagefile or virtual
memory. The pagefile is usually user configurable (in Windows via the
Advanced system settings link in the System control panel applet), but in
most circumstances you would leave the OS to manage it.
Viewing virtual memory (or pagefile) settings via the System applet. The PC has 6 GB of system
RAM and Windows has automatically allocated the same amount of space to the pagefile.
Screenshot used with permission from Microsoft.
Page 71
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 4
Disk Management
Windows provides a GUI Disk Management tool to format mass storage
devices (disks and USB drives) and manage partitions. Partitions allow a single
disk to be divided into multiple different logical areas, each of which can be
accessed via the OS as a separate drive. A disk must have at least one
partition for the OS to use it. Also, each partition must be formatted with a file
system so that the OS can read and write files to the drive.
Storage and file systems are covered in more detail in Unit 3,4.
Disk Management is one of the snap-ins included with the default Computer
Management console, or you can open the tool directly from the START+X
menu (or run diskmgr.msc).
The Disk Management snap-in displays a summary of any fixed and removable
drives attached to the system. The top pane lists drives; the bottom pane lists
disks, showing information about the partitions created on each disk plus any
unpartitioned space. You can use the tool to create and modify partitions,
reformat a partition, assign a different drive letter, and so on.
Page 72
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Managing an OS
As you have seen, most operating systems can be operated using a Graphical
User Interface (GUI) controlled via a mouse, keyboard, and/or touchscreen,
but a GUI is only one type of interface or shell. A Command Line Interface
(CLI) shell represents an alternative means of configuring an OS or
application. Some operating systems only present a CLI and have no GUI. A
CLI displays a prompt, showing that it is ready to accept a command. When
you type the command plus any switches and press ENTER, the shell executes
the command, displays any output associated with the execution, and then
returns to the prompt.
Windows command prompt (cmd.exe). Screenshot used with permission from Microsoft.
Note that there may be more than one CLI environment included with an
operating system. For example, Windows provides both the Windows
Command Prompt (cmd.exe) and PowerShell CLIs. Linux usually presents the
Bash (Bourne Again SHell) but there are alternatives.
Page 73
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 4
Windows PowerShell command prompt. Screenshot used with permission from Microsoft.
Access control means that a computing device (or any information stored on
the device) can only be used by an authorized person, such as its owner.
Access control on workstation operating systems is usually enforced by the
concept of user accounts. Each user of the device is allocated an account and
uses a password (or other credential) to authenticate to that account. The OS
can restrict the privileges allocated to an account so that it is not able to
reconfigure settings or access certain data areas.
You should create ordinary user accounts for day-to-day access to the
computer. This is done by putting additional users of the computer in the
Standard users group. Standard users cannot change the system
configuration and are restricted to saving data files within their own user profile
folder or the Public profile. For example, a user named David could only save
files within C:\Users\David or C:\Users\Public. Administrators can access any
folder on the computer.
Page 74
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Least Privilege and User Account Control Managing an OS
The principle of least privilege is that users should have only sufficient
permissions required to perform tasks and no more.
UAC requiring confirmation of the use of administrator privileges. Screenshot used with permission
from Microsoft.
Note that options in Control Panel and menus and dialogs with the icon on
or next to them may require you to authorize use of the command through
UAC.
Page 75
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 4 Creating Other User Accounts
Windows supports two types of user accounts:
To create a new account, open Settings then click Accounts. Select Family &
other people then click Add someone else to this PC.
Enter the user's email address for their Microsoft account, click Next and click
Finish. The user must complete the process of signing in themselves.
To create a local account, you would click the I don't have this
person's sign-in information link.
Page 76
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Managing User Accounts Managing an OS
Users can manage their own account from Settings. In the Accounts node,
they can select and configure options on the following tabs:
■ Email & app accounts—allows you to associate accounts with email and
other apps on the local computer, such as a Microsoft Outlook or Gmail
account.
Configuring local user accounts. Screenshot used with permission from Microsoft.
1) What is the registry and how does it distinguish Windows and Linux?
3) Why might you use the Services snap-in to manage background processes
rather than Task Manager?
6) What two things are configured on a disk to make storage space on the
disk available to the Windows OS?
7) What is a CLI?
Page 78
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Managing an OS
This opens the Quick Access menu. This contains shortcuts to most of the
tools required by "power users."
This settings page provides information about the PC status and the
version of Windows currently installed.
Page 79
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 4 4) Take some time to browse other pages in the Settings app.
You can "kill" this task without risk of data loss but note that if you end a
task that is processing unsaved data, the information will be lost.
7) Start Paint and draw a picture in the window. Do not save the file.
"Killing" a process using Task Manager. Screenshot used with permission from Microsoft.
The Paint window closes without prompting you to save the image you
created.
9) Note the division of processes into apps and background processes. The
background processes run without a window, though some may be
configurable via notification area icons. Click each of the CPU, Memory,
Disk, and Network headings in turn to sort processes by how much of the
computer's resources each is consuming.
Page 80
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Computer Management is the default management console. Management Managing an OS
consoles can be configured with snap-ins to control most of the "power"
configuration options in Windows.
14) Press the START key and type control panel. Open the Control Panel
icon that appears in the search results.
With the latest feature update, there are relatively few configuration options
left in Control Panel.
15) Optionally, browse some of the applets then close the Control Panel
window.
Get-NetIPConfiguration
This PowerShell commandlet displays configuration information for the
computer's network adapters.
You do not actually have to match the case of the command when
using PowerShell. The command environment is typically case-
insensitive. Using case makes the command easier to read and
typing mistakes less common however. In Linux, the command
environment is case-sensitive.
ipconfig
This is an older command that displays similar information. PowerShell can
run both Windows command prompt commands and native commandlets.
Page 81
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 4 19) Press the START key and type cmd. Open the Command Prompt icon that
appears in the search results.
ipconfig
Note that this executes in the same way as in the PowerShell CLI.
Get-NetIPConfiguration
This produces an error message. The command prompt environment
cannot understand (parse) PowerShell commandlets. When using a CLI,
you need to understand which commands it can run as they are not all the
same.
Page 82
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Managing an OS
2) Click Accounts.
6) In the Set up a PIN window, in the New PIN and Confirm PIN boxes, enter
a four-digit PIN and click OK.
7) Right-click the Start button and select Shut down or sign out > Sign out.
8) Press a key to dismiss the privacy shade then in the PIN box, type your
four-digit PIN. You are signed in.
12) In the "How will this person sign in?" window, click I don’t have this
person’s sign-in information.
13) On the "Let’s create your account" page, click Add a user without a
Microsoft account.
14) On the "Create an account for this PC" page, in the "Username" box, type
User1.
16) For the "Security question" boxes, just enter Pa$$w0rd each time.
We're just doing this to make the lab simpler. In a real scenario, get
the user to input the responses properly.
17) On the "Family & other people" page, click User1, and then click Change
account type. Notice that the user is a standard user. Click Cancel.
Page 83
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 4 Remember that a standard user is able to launch apps and install apps
from the Windows Store but is not able to change the system settings or
install desktop applications. It is always safer to sign in with a standard
user account for day-to-day computer use than it is to sign in with
administrator privileges.
18) Click Start, and then click the "head and shoulders" default user icon
that represents your account.
20) Enter Pa$$w0rd and press ENTER. Wait while the account’s profile is built.
21) When the account has been signed in, open Settings and then select
Accounts.
22) Click the Sign-in options tab. You can configure an account password
from here (or use a different means of authenticating).
23) Open Microsoft Edge and view a few websites then open some apps or
desktop programs.
24) Right-click the Start button and select Shut down or sign out > Sign out.
25) Sign back into your own account by entering the PIN.
27) In the left-hand pane, click Sign-in options. Under "PIN," click the
Remove button then confirm by clicking the Remove button. Enter your
password when prompted.
29) Click the User1 account then click the Remove button. In the "Delete
account and data?" dialog, read the warning then click the Delete account
and data button.
When configuring a computer, it is important to take your time and read the
warnings displayed on notifications and dialogs.
30) Optionally, shut down your computer if you are not continuing to use it after
this lab.
Page 84
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 5 Troubleshooting and
Support
Objectives
On completion of this unit, you will be able to:
□ Use websites and tools to obtain support and search for advice and help.
Page 85
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 5
Support and Troubleshooting
○ Gather information.
○ Question users.
○ Identify symptoms.
These steps and the approach and attitude you should apply when
troubleshooting are explained in a bit more detail below.
Information gathering is the first step in troubleshooting. Image by rawpixel © 123rf.com. Page 87
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 5 Question Users and Determine Changes
When a user first discovers a problem and reports it to the help desk, you will
attempt to classify the problem in terms of the problem’s nature and scope.
Most of your troubleshooting information will have to be obtained by
questioning the user. You must be patient and address your questions and any
test actions you ask them to perform to the user's level of expertise and
knowledge. Be polite, avoid blaming the user for causing the problem, and help
them to help you.
You will probably start by asking the user to describe the symptoms of the
problem and the status of the computer, including any error messages or
unusual conditions. During a discussion with the user, you should also ask:
■ How many people are affected by the problem? This helps determine the
severity of a problem. Clearly, if all users are affected, that is more serious
than if only one user is experiencing the problem.
■ When did the problem first occur? This could help you identify possible
causes of the problem. For example, if the problem occurred on Monday
morning during sign in, then that might indicate that the user’s password
expired over the weekend. The user might tell you that the problem has
been intermittent for the last three weeks, but that it suddenly got worse.
Either of these responses might help you focus your troubleshooting.
You can also ask the user to describe symptoms, such as error messages
appearing on the screen, or ask them to navigate to the relevant log file and
report on its contents.
It may also be the case that a user reports two different problems at the same
time (often preceded by, "While you're on the line…" sort of statements). Treat
each problem as a separate case. In most cases you should advise the user to
initiate a separate support ticket.
■ Use a remote desktop tool to access the system or travel to the user to
observe it in operation.
Once you have gathered sufficient information it is possible that you are able to
learn enough to resolve the problem. This is likely with simple issues, such as
password lockouts. If not, during this classification stage, you will document the
problem in your ticket system and provide as much background information as
you are able to determine. This will help you, or a colleague to whom you
might escalate the issue, resolve the problem.
After you have gathered sufficient information about a reported problem, you
must start to determine a theory of probable cause from analysis of the
symptoms. This is a process of thinking about possible causes then eliminating
those possible causes through testing to arrive at the root cause. Ultimately,
the purpose is to complete the testing stage with a single probable cause,
enabling you to search for and implement a resolution.
If you think about a typical automotive problem – your car won’t start – you
might go through a testing process yourself. You might start by listing possible
causes, and then eliminating them one by one. You check that there’s fuel in
the tank, so you move on. You verify, by turning the ignition, that the starter
motor turns, so the battery is good and so is the starter. You progress through
a series of tests to eliminate those possibilities that are not the cause of the
symptoms you have recorded. With luck, you end up with a single possibility
which you can then seek to resolve. Bear in mind that although there is fuel in
your tank, it might be contaminated or unable to flow to the engine. So, you
might need to perform several tests for a given possible cause.
This process also works with computer-related problems. Think back to the
cabling example. You plugged the computer into a different socket, but
perhaps the cabling issue lies at the wiring closet end?
You might also suggest workarounds. A workaround doesn't actually solve the
reported problem but provides a way for the user to continue to work with the
system. That way you can deal with the consequences of the problem quickly
and give yourself more time to investigate the underlying issue.
Page 90
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Test the Theory and Escalate the Problem Troubleshooting and
Support
As you devise different theories of cause, you will naturally also be testing
them to see if they fit the facts. While "testing" follows "establishing" in the
methodology, the process is iterative (establish a theory, test it, if it doesn't
work, establish another theory). You might discover that the immediate cause
of a problem is itself just the symptom of a wider problem with a different
cause. The end result of this process, therefore, is to establish a root cause
for the problem.
If you are unable to resolve a problem during the initial phases, you might need
to escalate the problem. This largely depends on how your help desk
organization is structured.
Most help desks use a tiered system, with Tier 1 staff performing the
classification and some of the testing stages. If a problem cannot be resolved
quickly, then the problem is recorded and escalated to Tier 2. Staff at this level
have more experience and are allocated more time to work on these more
complex problems.
However, for even more difficult problems, Tier 2 staff can escalate to Tier 3.
These are IT specialists who have many years of experience in
troubleshooting. They might also be skilled in specific technologies, such as
email, networking, cloud platforms, and so on. In the unlikely situation where a
Tier 3 specialist is unable to resolve an issue, it can be escalated outside your
organization to a manufacturer.
Page 91
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 5 ■ Replace—often more expensive and may be time-consuming if a part is
not available. There may also be an opportunity to upgrade the device or
software.
■ Ignore—as any software developer will tell you, not all problems are
critical. If neither repair nor replace is cost-effective, it may be best either to
find a workaround or just to document the issue and move on.
When you consider solutions, you have to assess the cost and time required.
Another consideration is potential effects on the rest of the system. A typical
example is applying a software patch, which might fix a given problem in one
piece of software but cause other programs not to work. This is where an
effective configuration management system comes into play, as it should help
you to understand how different systems are interconnected and cause you to
seek the proper authorization for your plan.
Before you can consider a problem closed, you should both be satisfied in your
own mind that you have resolved it and get the customer's acceptance that it
has been fixed. Restate what the problem was and how it was resolved then
confirm with the customer that the incident log can be closed.
Page 92
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
To fully solve the root cause of a problem, you should try to eliminate any Troubleshooting and
Support
factors that may cause the problem to recur. For example, if a user plugs their
laptop into the wrong network jack, ensure that the jacks are clearly labeled to
help users in the future. If a faulty server induces hours of network downtime,
consider implementing failover services to minimize the impact of the next
incident.
Most troubleshooting takes place within the context of a ticket system. This
shows who is responsible for any particular problem and what its status is. This
gives you the opportunity to add a complete description of the problem and its
solution (findings, actions, and outcomes).
This is massively useful for future troubleshooting, as problems fitting into the
same category can be reviewed to see if the same solution applies. It also
helps to analyze IT infrastructure by gathering statistics on what type of
problems occur and how frequently.
When you complete a problem log, remember that people other than you may
come to rely on it. Also, logs may be presented to customers as proof of
troubleshooting activity. Write clearly and concisely, checking for spelling and
grammar errors.
Page 93
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 5
Troubleshooting PC Issues
If you are troubleshooting a computer that will not start or a peripheral device
that will not work, first inspect the component for physical damage. Look for
dents, scratches, or cracks that might show a device has been dropped or
banged. This might have caused damage to the internal components. Inspect
cables and connectors for signs of wear and dirt. Inspect the ports on the
computer case for dirt and damage.
■ No beep—check whether the power light has come on and whether the
disk light is flickering and whether there is an image on the screen. You
should also be able to hear some disk activity and the whir of fans inside
the PC. If you can detect none of these things, there is a power problem.
Check the power cable and fuse. If these are OK, then the problem is
either with the computer's internal power supply or the electrical outlet (try
plugging in a lamp to test).
■ More than one beep—the beeps specify where the problem is (and there
may be an error message on the screen), but you will probably need to get
help to diagnose and fix it. Do check that nothing is resting on the
keyboard; if a key is pushed down it can cause this type of error.
■ Screen is dark—check that the monitor is plugged in and switched on, that
the power cable and fuse are good, and that the cable from the monitor to
the computer is properly connected. If you see a message such as "No
sync," the cable is probably disconnected or damaged. If you can see a
very dim image, check that the brightness control hasn't been turned all the
way down.
If there are no problems during POST, the firmware then passes control of the
computer to the operating system, which finishes loading before displaying the
logon prompt. If the operating system fails to load, there should be an error
message. The error message should help to diagnose the cause of the boot
failure.
Page 94
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
If the system boots but a peripheral device does not work, first check for loose Troubleshooting and
Support
connections between the device and the computer. If you can discount
physical problems, the device's driver might need updating or replacing.
Getting Support
The system's "Setup" or "Getting Started" guide will usually include troubleshooting advice.
You can also use the vendor's website to look for the documentation; typically,
you will need to use the product code to find this. For example, on HP's
website, click the link for "Support" then choose the "Drivers and Downloads"
option. Enter the product name or code to view the available files. This will
include drivers for hardware components and system guides and manuals.
Page 95
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 5
Use a vendor support site to obtain the documentation, drivers, and advice.
Note that the site also hosts online troubleshooting guides and product support
forums, where you can post questions to HP employees and other system
owners.
Page 96
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Contacting Technical Support Troubleshooting and
Support
A lot of support is now done remotely. This means that the operator
takes control of your computer to try to diagnose and fix the
problem.
Most IT support works on the basis of a job ticket. When you contact a support
operator, they will open the ticket and ask you to provide a description of the
problem. You should provide the following information:
■ The software or device you are having trouble with (including its version
number, which can usually be found through the Help > About command,
or model and serial number).
The operator should then work with you to try to resolve the problem. If the
operator asks you to perform troubleshooting actions, listen carefully to the
steps and confirm when you have completed each one. If the operator has to
call you back, make sure you get their name and your job ticket number.
When you agree that the problem has been solved, the ticket can be closed.
Page 97
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 5 As mentioned above, PC and hardware vendors all operate forums to support
their products. There are also many community forums not tied to particular
vendors but hosting reviews, advice, support, and discussions about laptops,
or phones (or pretty much anything else). If you use an Internet search engine
to look for the symptoms of the problem you are having, the results are certain
to include posts in forums such as these.
Software vendors also maintain forums and support websites. For example,
Microsoft's support website support.microsoft.com hosts solution centers for
each product. You can access troubleshooting articles and (if applicable)
assisted support via phone, email, or chat. More advanced articles plus
product documentation and some online books can be found at
technet.microsoft.com.
A search engine is a tool to help locate web pages. A search engine may be
designed to search the entire web for pages or to locate pages within a
particular site.
The most widely used search engines are Google and Microsoft's Bing,
though there are many more. Also, search engines have different sites for
different countries. For example, you can access Google at google.co.uk,
google.com, google.co.za, google.com.au, and so on.
Page 98
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
In most browsers, if you type text into the address bar, the browser will convert Troubleshooting and
Support
the text into a search using the default search provider if it does not match an
actual web address. You can use browser settings or preferences to change
the default search provider.
As an alternative to using syntax, you can usually access the search engine's
Advanced Search page to specify criteria using a form.
Page 99
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 5
Note that this syntax is not always supported by all search engines.
Also, there may be additional requirements (for example in Google
you have to enter an advanced query within square brackets).
Page 100
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Troubleshooting and
Support
2) You have asked a senior manager to authorize your plan of action for
resolving a fault in a software application. What name is given to the
process you are following?
4) Your computer locks up periodically and feels hot to the touch. Could these
things be related?
5) What crucial piece of information would you need when trying to locate
support information about a computer system on the manufacturer's
website?
6) If you do not have a support contract, what is likely to be the best option for
obtaining advice about a problem with an application?
7) You are looking for content on a topic but your search is returning millions
of matches that are not particularly helpful. What two methods could you
use to get better search results?
8) You want to find something on a particular website, but the site does not
have a search tool. Could you use a general search engine, and if so,
how?
Page 101
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 5
1) If necessary, start your computer and sign in then open the Edge browser
When you buy a computer from an OEM, you may want to change the
default search provider. For Edge, the engine must support OpenSearch
(opensearch.org) and you must have visited the search engine home page.
2) Open google.com (you will be redirected to the home page for your
country). If prompted, complete the wizard explaining Google's privacy and
data collection policies.
3) Click the More Actions ellipse icon and then click Settings.
4) Click View advanced settings. Scroll down to the "Privacy and services"
section then click Change search engine.
5) If you want to change the search provider (you do not have to), select
Google Search then click the Set as default button.
6) Click in the address box and type laptop cursor jumps then press
ENTER.
Page 102
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
As you can see, the more specific you make the search, the fewer results Troubleshooting and
Support
are returned and the more likely they are to address the same issue that
you are researching.
10) Pick one of the HP forum pages ("h30434.www3.hp.com"), and read the
posts.
11) Click in the forum's search box and type dm4 cursor jumps "windows
7," change the list box option to Entire Forum and click Go.
12) Read some of the posts and their replies—note that the frequent request to
specify the exact model number when posting.
You decide to locate the latest touchpad driver version as the configuration
settings for palm rest do not seem to be present in the version you have.
13) Point to the forum's Support menu link and select Download drivers.
14) In the product box, type dm4-2070 then click Go. Open the link for the
matched product.
15) Note the option to use a software tool to identify missing drivers but use the
Go link under option 2.
17) Expand Driver-Keyboard, Mouse and Input Devices and you will see the
link for the touchpad driver.
We will not continue from here, but the next steps would be to ensure the
user's computer is backed up then download and install the driver. It can be
difficult to test whether a problem like this has really been solved so you
would encourage the user to report back after a day or two to confirm
whether the cursor problem was still present.
18) Optionally, shut down your computer if you are not continuing to use it after
this lab.
Page 103
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit 5 This page left blank intentionally.
Page 104
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Summary Using Computers
Using Computers
In this module you learned the basics of using a computer, operating system,
and software applications. You also learned some best practices to follow
when troubleshooting a problem or obtaining technical support.
□ You learned about the main Windows user interfaces and how to navigate
around the Windows desktop and Start Screen or Start Menu using a
keyboard and mouse or touchpad.
□ There are different types of operating systems for different devices and
commercial models. Windows is a commercial operating system, available
in a number of editions with different features. Alternative desktop
operating systems include Apple Mac OS and the various types of Linux
(open source) plus Google Chrome, while mobile devices are supported by
Windows Mobile, iOS, and Android.
□ You also learned how to use File Explorer to browse the file system and
network locations, Settings/Control Panel to adjust settings in Windows,
and a web browser to view websites.
Page 105
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM
Module 1 / Unit Summary Module 1 / Unit 4 / Managing an OS
□ As well as user interfaces for navigating the software and files stored on
the OS, there are management interfaces for performing configuration.
□ You learned how to use tools to perform different management tasks, such
as for processes, memory, disks, and scheduling.
□ Make sure you can recognize common external issues. Be aware of the
consequences of problems, such as risk of data loss or loss of service, and
measures that can be taken to reduce them.
□ Make sure you can use a search engine effectively, including use of
advanced search tools or query syntax.
Page 106
Licensed For Use Only By: Byte Back Student 1 BB1 Jun 10 2021 11:32AM